Abstract Data signal de-noising is a crucial part of every transaction which involves capturing waves and processing them into understandable format. Most essentially, this process of data signal de-noising is important in the field of military and defence. Because of the rapid development in military communication systems, a limitation arises in the systems. The limitation being - quantity of signals profoundly increases along with noise and other disturbances’ presence in the signal. In order to overcome this drawback, batch de-noising techniques are implemented on the systems to produce clean signals. In this paper, the critical analysis case of RADAR [RAdio Detection And Ranging] data de-noising by implementation of Haar Wavelet Transformation is considered. A signal set simulation containing four signals procured from RADAR data is taken into consideration. The signals are then subjected to de-noising in MATLAB and indigenously developed python tool using Haar Wavelet Transformations. The ensuing results pertaining to accuracy and efficiency of output signals are then compared. Keywords: RADAR data, MATLAB tool, Python, De-noising techniques, Haar Wavelet Transformation, Signal Simulation.
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...ijtsrd
Self driving vehicles are cars or trucks in which human drivers are never required to take control to safely operate the vehicle. They can possibly reform urban portability by giving maintainable, protected, and advantageous, clog free transportability. The issues like reliably perceiving traffic lights, signs, indistinct path markings can be overwhelmed by utilizing the innovative improvement in the fields of Deep Learning DL . Here, Faster Region Based Convolution Neural Network F RCNN is proposed for detection and recognition of Traffic Lights TL and signs by utilizing transfer learning. The input can be taken from the dataset containing various images of traffic signals and signs as per Indian Traffic Signals. The model achieves its target by distinguishing the traffic light and signs with its right class type. The proposed framework can likewise be upgraded for safe driving in spite of hazy path markings. Aswathy Madhu | Veena S Nair "Traffic Sign Detection and Recognition for Automated Driverless Cars Based on SSD" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31888.pdf Paper Url :https://www.ijtsrd.com/computer-science/artificial-intelligence/31888/traffic-sign-detection-and-recognition-for-automated-driverless-cars-based-on-ssd/aswathy-madhu
Neural Network Algorithm for Radar Signal RecognitionIJERA Editor
Nowadays, the traditional recognition method could not match the development of radar signals. In this paper, based on fractal theory and Neural Network, a new radar signal recognition algorithm is presented. The relevant point is extracted as the input of neutral network, and then it will recognize and classify the signals. Simulation results show that, this algorithm has a distinguish effect on classification under the condition of low SNR.
Traffic Sign Detection and Recognition for Automated Driverless Cars Based on...ijtsrd
Self driving vehicles are cars or trucks in which human drivers are never required to take control to safely operate the vehicle. They can possibly reform urban portability by giving maintainable, protected, and advantageous, clog free transportability. The issues like reliably perceiving traffic lights, signs, indistinct path markings can be overwhelmed by utilizing the innovative improvement in the fields of Deep Learning DL . Here, Faster Region Based Convolution Neural Network F RCNN is proposed for detection and recognition of Traffic Lights TL and signs by utilizing transfer learning. The input can be taken from the dataset containing various images of traffic signals and signs as per Indian Traffic Signals. The model achieves its target by distinguishing the traffic light and signs with its right class type. The proposed framework can likewise be upgraded for safe driving in spite of hazy path markings. Aswathy Madhu | Veena S Nair "Traffic Sign Detection and Recognition for Automated Driverless Cars Based on SSD" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31888.pdf Paper Url :https://www.ijtsrd.com/computer-science/artificial-intelligence/31888/traffic-sign-detection-and-recognition-for-automated-driverless-cars-based-on-ssd/aswathy-madhu
Neural Network Algorithm for Radar Signal RecognitionIJERA Editor
Nowadays, the traditional recognition method could not match the development of radar signals. In this paper, based on fractal theory and Neural Network, a new radar signal recognition algorithm is presented. The relevant point is extracted as the input of neutral network, and then it will recognize and classify the signals. Simulation results show that, this algorithm has a distinguish effect on classification under the condition of low SNR.
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
Localization is one of the most challenging and
important issues in wireless sensor networks (WSNs),
especially if cost effective approaches are demanded. Distance
measurement based on RSSI (Received Signal Strength
Indication) is a low cost and low complexity of the distance
measurement technique, and it is widely applied in the range-
based localization of the WSN. The RSS (Received Signal
Strength) used to estimate the distance between an unknown
node and a number of reference nodes with known co-ordinates.
Location of the target node is then determined by trilateration.
Log-normal shadowing model, can better describe the
relationship between the RSSI value and distance. Non-line
of sight and multipath transmission effects as the indoor
environment, the distance error or ranging error is large. In
this paper, experimental results that are carried out to analyze
the sensitivity of RSSI measurements in an indoor
environment for various power levels are presented. Location
error influenced by distance measure error and network
connectivity is analyzed.
Index Terms—
Analysis and reactive measures on the blackhole attackJyotiVERMA176
In this , we will analyses the effects of black-hole attacks on SW-WSN.
Active attack such as black-hole attack in which the node shows that it has the best smallest path
tp desired node in the given Networks even if it lacks it,hence all the data packets follows that
fake path through it hence make black-hole node to forward or drop the packet during the data
transmission.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Paper presented @Tyrrhenian Workshop on the Internet of Things 2009
ZigBee is probably the most popular IEEE 802.15.4 implementation used for Wireless Sensor Networks (WSN). The radio communication can also be used for localization purposes using fixed network devices as reference points. In this paper, the authors describe a procedure for automatically configuring a ZigBee-based localization appli-cation with environment-optimized parameters.
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
In this paper, a system, developed for speech encoding, analysis, synthesis and gender identification is
presented. A typical gender recognition system can be divided into front-end system and back-end system.
The task of the front-end system is to extract the gender related information from a speech signal and
represents it by a set of vectors called feature. Features like power spectrum density, frequency at
maximum power carry speaker information. The feature is extracted using First Fourier Transform (FFT)
algorithm. The task of the back-end system (also called classifier) is to create a gender model to recognize
the gender from his/her speech signal in recognition phase. This paper also presents the digital processing
of a speech signals (pronounced “A” and “B”) which are taken from 10 persons, 5 of them are Male and
the rest of them are Female. Power Spectrum Estimation of the signal is examined .The frequency at
maximum power of the English Phonemes is extracted from the estimated power spectrum. The system uses
threshold technique as identification tool. The recognition accuracy of this system is 80% on average.
Standard radar detection process requires that the sensor output is compared to a predetermined threshold. The
threshold is selected based on a-priori knowledge available and/or certain assumptions. However, any
knowledge and/or assumptions become in adequate due to the presence of multiple targets with varying signal
return and usually non stationary background. Thus, any predetermined threshold may result in either increased
false alarm rate or increased track loss. Even approaches where the threshold is adaptively varied will not
perform well in situations when the signal return from the target of interest is too low compared to the average
level of the background .Track-before-detect techniques eliminate the need for a detection threshold and provide
detecting and tracking targets with lower signal-to-noise ratios than standard methods. However, although trackbefore-
detect techniques eliminate
the need for detection threshold at sensor's signal processing stage, they often use tuning thresholds at the output
of the filtering stage .This paper presents a computerized simulation model for target detection process.
Moreover, the proposed model method is based on the target motion models, the output of the detection
process can easily be employed for maneuvering target tracking.
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...IJMER
Scarcity of spectrum is the issue that wireless communication technology has to deal with.
Primary user is the licensed user of the spectrum. When primary user is idle or not using the spectrum
secondary user can utilize the spectrum. This sharing of spectrum can be enabled by cognitive radio
(CR) technology. The heart of enabling this technology is spectrum sensing. Spectrum sensing involves
detection of primary signal at very low SNR (in the range of -20 dB), under noise and interference
uncertainty. This requirement makes spectrum sensing, a hard nut to crack. Another major issue in
detection is hidden node problem wherein the node in vicinity of primary transmitter also indicates
absence of the primary signal since it is hidden behind the large object. There are various algorithms
for detection viz. energy detection, matched filter detection, feature detection (cyclostationary
detection, eigen-value based detection etc.) These algorithms have limitations of complexity,
requirement of signal knowledge and detection performance. In this paper the performance of
eigenvalue based detection (EBD) method in presence of noise and low SNR of the received signal has
been evaluated for a single user.
Enhanced signal detection slgorithm using trained neural network for cognitiv...IJECEIAES
Over the past few years, Cognitive Radio has become an important research area in the field of wireless communications. It can play an important role in dynamic spectrum management and interference identification. There are many spectrum sensing techniques proposed in literature for cognitive radio, but all those techniques detect only presence or absence of the primary user in the designated band and do not give any information about the used modulation scheme. In certain applications, in cognitive radio receiver, it is necessary to identify the modulation type of the signal so that the receiver parameters can be adjusted accordingly. Most of the modulated signals exhibit the property of Cyclostationarity that can be used for the purpose of correct detection of primary user and the modulation type. In this paper, we have proposed an enhanced signal detection algorithm for cognitive radio receiver which makes use of cyclostationarity property of the modulated signal to exactly detect, the modulation type of the received signal using a trained neural network. The algorithm gives better accuracy of signal detection even in low SNR conditions. The use of a trained neural network makes it more flexible and extendible for future applications
Spectrum Sensing Detection Techniques for Overlay UsersIJMTST Journal
Spectrum allocated Agency (FCC) is currently working on the concept of white space users “borrowing” spectrum from free license holders temporarily to improve the spectrum utilization, i.e known as dynamic spectrum access (DSA). CRN systems can utilize dispersed spectrum, and thus such approach is known as dispersed spectrum cognitive radio systems. This project provides a tradeoff between a false alarm probability (Pf) and the signal to noise ratio (SNR) value of any spectrum detector to have a certain performance. Moreover, the performance of the cyclostationary detector (CD) and the matched filter detector (MF) is better than the energy detector(ED) especially at low signal to noise ratio values. Unfortunately, the cyclostationary spectrum sensing method, performance is not satisfying when the wireless fading channels are employed. In this project we provide the best trade off for spectrum usage for over lay users.
Wireless lan intrusion detection by using statistical timing approacheSAT Journals
Abstract Today as we all are habitual of using internet through wired or wireless LAN Networks, but using internet through Wireless LAN becomes harder as the threat of unauthorized access point is increasing day by day. In This paper we are focusing on different types of rogue access points (APs) that are masquerading and attracting people to get associate with them or to connect with them. We are implementing a solution to avoid people or users from connecting to the unauthorized access point by using experimental time dependent scheme. Our detection technique is a client-oriented method that uses the complete tour time between the DNS server and user that perfectly determine that whether an access point with which the user has connected is the legitimate access point or a unauthorized access point. In this paper we are implementing concept using .Net framework and sql server, Which gives us the characteristics like robust, accuracy and effectiveness for detecting rogue or unauthorized access point without getting any help from WLAN administrator. In this simulation technique we will get accurate values so that we can distinguish between rogue access point and legitimate access point Keywords— WLAN, APs, RAP, LAN
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
Localization is one of the most challenging and
important issues in wireless sensor networks (WSNs),
especially if cost effective approaches are demanded. Distance
measurement based on RSSI (Received Signal Strength
Indication) is a low cost and low complexity of the distance
measurement technique, and it is widely applied in the range-
based localization of the WSN. The RSS (Received Signal
Strength) used to estimate the distance between an unknown
node and a number of reference nodes with known co-ordinates.
Location of the target node is then determined by trilateration.
Log-normal shadowing model, can better describe the
relationship between the RSSI value and distance. Non-line
of sight and multipath transmission effects as the indoor
environment, the distance error or ranging error is large. In
this paper, experimental results that are carried out to analyze
the sensitivity of RSSI measurements in an indoor
environment for various power levels are presented. Location
error influenced by distance measure error and network
connectivity is analyzed.
Index Terms—
Analysis and reactive measures on the blackhole attackJyotiVERMA176
In this , we will analyses the effects of black-hole attacks on SW-WSN.
Active attack such as black-hole attack in which the node shows that it has the best smallest path
tp desired node in the given Networks even if it lacks it,hence all the data packets follows that
fake path through it hence make black-hole node to forward or drop the packet during the data
transmission.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Paper presented @Tyrrhenian Workshop on the Internet of Things 2009
ZigBee is probably the most popular IEEE 802.15.4 implementation used for Wireless Sensor Networks (WSN). The radio communication can also be used for localization purposes using fixed network devices as reference points. In this paper, the authors describe a procedure for automatically configuring a ZigBee-based localization appli-cation with environment-optimized parameters.
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
In this paper, a system, developed for speech encoding, analysis, synthesis and gender identification is
presented. A typical gender recognition system can be divided into front-end system and back-end system.
The task of the front-end system is to extract the gender related information from a speech signal and
represents it by a set of vectors called feature. Features like power spectrum density, frequency at
maximum power carry speaker information. The feature is extracted using First Fourier Transform (FFT)
algorithm. The task of the back-end system (also called classifier) is to create a gender model to recognize
the gender from his/her speech signal in recognition phase. This paper also presents the digital processing
of a speech signals (pronounced “A” and “B”) which are taken from 10 persons, 5 of them are Male and
the rest of them are Female. Power Spectrum Estimation of the signal is examined .The frequency at
maximum power of the English Phonemes is extracted from the estimated power spectrum. The system uses
threshold technique as identification tool. The recognition accuracy of this system is 80% on average.
Standard radar detection process requires that the sensor output is compared to a predetermined threshold. The
threshold is selected based on a-priori knowledge available and/or certain assumptions. However, any
knowledge and/or assumptions become in adequate due to the presence of multiple targets with varying signal
return and usually non stationary background. Thus, any predetermined threshold may result in either increased
false alarm rate or increased track loss. Even approaches where the threshold is adaptively varied will not
perform well in situations when the signal return from the target of interest is too low compared to the average
level of the background .Track-before-detect techniques eliminate the need for a detection threshold and provide
detecting and tracking targets with lower signal-to-noise ratios than standard methods. However, although trackbefore-
detect techniques eliminate
the need for detection threshold at sensor's signal processing stage, they often use tuning thresholds at the output
of the filtering stage .This paper presents a computerized simulation model for target detection process.
Moreover, the proposed model method is based on the target motion models, the output of the detection
process can easily be employed for maneuvering target tracking.
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...IJMER
Scarcity of spectrum is the issue that wireless communication technology has to deal with.
Primary user is the licensed user of the spectrum. When primary user is idle or not using the spectrum
secondary user can utilize the spectrum. This sharing of spectrum can be enabled by cognitive radio
(CR) technology. The heart of enabling this technology is spectrum sensing. Spectrum sensing involves
detection of primary signal at very low SNR (in the range of -20 dB), under noise and interference
uncertainty. This requirement makes spectrum sensing, a hard nut to crack. Another major issue in
detection is hidden node problem wherein the node in vicinity of primary transmitter also indicates
absence of the primary signal since it is hidden behind the large object. There are various algorithms
for detection viz. energy detection, matched filter detection, feature detection (cyclostationary
detection, eigen-value based detection etc.) These algorithms have limitations of complexity,
requirement of signal knowledge and detection performance. In this paper the performance of
eigenvalue based detection (EBD) method in presence of noise and low SNR of the received signal has
been evaluated for a single user.
Enhanced signal detection slgorithm using trained neural network for cognitiv...IJECEIAES
Over the past few years, Cognitive Radio has become an important research area in the field of wireless communications. It can play an important role in dynamic spectrum management and interference identification. There are many spectrum sensing techniques proposed in literature for cognitive radio, but all those techniques detect only presence or absence of the primary user in the designated band and do not give any information about the used modulation scheme. In certain applications, in cognitive radio receiver, it is necessary to identify the modulation type of the signal so that the receiver parameters can be adjusted accordingly. Most of the modulated signals exhibit the property of Cyclostationarity that can be used for the purpose of correct detection of primary user and the modulation type. In this paper, we have proposed an enhanced signal detection algorithm for cognitive radio receiver which makes use of cyclostationarity property of the modulated signal to exactly detect, the modulation type of the received signal using a trained neural network. The algorithm gives better accuracy of signal detection even in low SNR conditions. The use of a trained neural network makes it more flexible and extendible for future applications
Spectrum Sensing Detection Techniques for Overlay UsersIJMTST Journal
Spectrum allocated Agency (FCC) is currently working on the concept of white space users “borrowing” spectrum from free license holders temporarily to improve the spectrum utilization, i.e known as dynamic spectrum access (DSA). CRN systems can utilize dispersed spectrum, and thus such approach is known as dispersed spectrum cognitive radio systems. This project provides a tradeoff between a false alarm probability (Pf) and the signal to noise ratio (SNR) value of any spectrum detector to have a certain performance. Moreover, the performance of the cyclostationary detector (CD) and the matched filter detector (MF) is better than the energy detector(ED) especially at low signal to noise ratio values. Unfortunately, the cyclostationary spectrum sensing method, performance is not satisfying when the wireless fading channels are employed. In this project we provide the best trade off for spectrum usage for over lay users.
Wireless lan intrusion detection by using statistical timing approacheSAT Journals
Abstract Today as we all are habitual of using internet through wired or wireless LAN Networks, but using internet through Wireless LAN becomes harder as the threat of unauthorized access point is increasing day by day. In This paper we are focusing on different types of rogue access points (APs) that are masquerading and attracting people to get associate with them or to connect with them. We are implementing a solution to avoid people or users from connecting to the unauthorized access point by using experimental time dependent scheme. Our detection technique is a client-oriented method that uses the complete tour time between the DNS server and user that perfectly determine that whether an access point with which the user has connected is the legitimate access point or a unauthorized access point. In this paper we are implementing concept using .Net framework and sql server, Which gives us the characteristics like robust, accuracy and effectiveness for detecting rogue or unauthorized access point without getting any help from WLAN administrator. In this simulation technique we will get accurate values so that we can distinguish between rogue access point and legitimate access point Keywords— WLAN, APs, RAP, LAN
If you have seen the Business Plan, then you realize that we invested funds to significantly upgrade our entire brand presence. This was the media kit we used to attract potential advertisers. We successfully acquired John Deere Landscapes, Hawaiian Airlines, America West Airlines, Southwest Putting Greens and others as our initial advertising partners.
Nuzzer algorithm based Human Tracking and Security System for Device-Free Pas...Eswar Publications
In recent years, majority of researches are focused on localization system for wireless environment. These researches rely on localization using devices to track the entities. In this paper, we use, a recently proposed Device-free Passive (DfP) that uses Probabilistic techniques to track locations in large-scale real environment without the need of carrying devices. The proposed system uses the Access Points (APs) and Monitoring Point (MPs) that works by monitoring and processing the changes in the received physical signals at one or more monitoring points to detect changes in the environment. The system uses continuous space estimator to return multiple location while the mortal is in motion. Our results show that the system can achieve very high probability of detection and tracking with very few false positives.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Advanced Audio Aid for Visually Impaired using Raspberry PiAM Publications
This work focuses on the obstacle detection and face detection which helps for blind person in day-to-day activities. Raspberry pi is used for interface powered by MATLAB. It helps in recognizing usual objects around the person. Addition to that, it also helps in finding the known person approaching the user. Portable power supply keeps the hardware running throughout the day and the power bank can be recharged. Hence the power consumption is low.
Cognitive Radio Networks: a comprehensive study on scope and applicationsAM Publications
The work aims to investigate into the modern concept of cognitive radio and details about its functioning.
The ideas that led to its invention and the thoughts that led to this modern technology of using white spaces in the
most efficient way. It aims to take a dig into the earlier radios namely the conventional radio and the software defined
radio and later on modifications of those that ultimately led to cognitive radio. Not only that but it deals with every
nuance between each of them. Various persons including the person who was the propagator of the concept of
cognitive radio technology Dr. Joseph Mitola and various organizations have tried to define cognitive radio and the
discussion considers all those definitions to let the reader get a clear picture regarding their understanding as far as
defining cognitive radio is concerned. The requirements of cognitive radio in various fields and the future scope of the
technology are profoundly dealt with. A network of cognitive radios known as cognitive radio network (CRN) is also
the matter of discussion in the latter half of the work. Various components of the CRN and certain details regarding it
are included with appropriate diagrams as per requirements
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Critical analysis of radar data signal de noising by implementation of haar wavelet transformation
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 13
CRITICAL ANALYSIS OF RADAR DATA SIGNAL DE-NOISING BY
IMPLEMENTATION OF HAAR WAVELET TRANSFORMATION
Ananth Abhishek Jillepalli1
, Raghavendra Deeduvanu2
, Sreenath DeviReddy3
, Deepak Vangala4
, Ravi
Mathey5
1
IVth
Year, Department of CSE, Vidya Jyothi Institute of Technology, Hyderabad
2
IVth
Year, Department of CSE, Vidya Jyothi Institute of Technology, Hyderabad
3
IVth
Year, Department of CSE, Vidya Jyothi Institute of Technology, Hyderabad
4
IVth
Year, Department of CSE, Vidya Jyothi Institute of Technology, Hyderabad
5
Head of Department, Department of Computer Science and Engineering, Vidya Jyothi Institute of Technology,
Hyderabad
Abstract
Data signal de-noising is a crucial part of every transaction which involves capturing waves and processing them into
understandable format. Most essentially, this process of data signal de-noising is important in the field of military and defence.
Because of the rapid development in military communication systems, a limitation arises in the systems. The limitation being -
quantity of signals profoundly increases along with noise and other disturbances’ presence in the signal. In order to overcome
this drawback, batch de-noising techniques are implemented on the systems to produce clean signals. In this paper, the critical
analysis case of RADAR [RAdio Detection And Ranging] data de-noising by implementation of Haar Wavelet Transformation is
considered. A signal set simulation containing four signals procured from RADAR data is taken into consideration. The signals
are then subjected to de-noising in MATLAB and indigenously developed python tool using Haar Wavelet Transformations. The
ensuing results pertaining to accuracy and efficiency of output signals are then compared.
Keywords: RADAR data, MATLAB tool, Python, De-noising techniques, Haar Wavelet Transformation, Signal
Simulation.
----------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
The main focus of this paper is to contrast de-noising
methods available in two different tools and to determine
the most efficient and accurate output producing tool. The
potential conclusion for this analytical problem case will
also include the extent of memory consumption by the two
tools. To this point, the intention of this paper is to perform
de-noising of four signals MATLAB and Python, in order
to properly de-noise the signals, such that a military system
can precisely and memory efficiently process the signals
being received into understandable data. The substantial
inspiration for this work is that the problem of efficient and
accurate denoising targets considerable number of military
tracking systems.
The process of de-noising a captured RADAR data set
commences with the processing and selection of a single
relevant signal from the entire captured set. The signal
selection is of instrumental importance to the process of
cleaning the signal and subsequently will be applied to
entire set of signals. Our efforts enable us to optimise the
process through which signals can be cleaned out
efficiently without much data loss and precision, as
intended. A potential conclusion and a result like this one
will not only supplement military tracking and
communication systems in understanding the signal data
quickly and with agility, but it will also reduce system
maintenance costs as our research also enables us to find
out cost effective tool for de-noising. This paper will
concentrate on the critical analysis of data signal de-noising
from a signal set simulated from the data obtained from
RADAR transceivers.
2. BACKGROUND STUDY
The large number of signals received in transceiver systems
far outruns the modules deployed for denoising. We
conducted some initial experiments on internal equipment
and were able to deduce the most frequent category of
signals received. Prior research on this matter revealed the
four standard categories of signals being received
frequently:
First, the most frequent category of signals being
received belongs to tracking type of data which
track the whereabouts of any device and report
back to the base.
Second, the next frequent class of signals being
received belongs to communication data type
where in one base communicates with the other.
Next, the signals being received in this category
belong to medical data type of the military
personnel which contain the medical records of the
staff and soldiers.
Finally, the least category of signals received is
trash or pranks which are mostly useless.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 14
2.1 Signal Overview
Signals have many instances and forms depending upon the
category of the data being transmitted. The overview of
signal forms is as follows:
Overview
A very frequently found type of signal wave is the sine
wave. These signals are used almost for every type of data
transmission. Sine waves are also easier to de-noise since
there many functions developed for sine owing to the huge
potential of applications.
A not so frequently used type of signal wave is the Doppler
wave. These signals are not used unless the data
transmission must be very secure. Doppler waves are hard
and slow to transmit and so, anyone who uses them should
sacrifice speed for security.
A very rare type of signals wave used are the Chebyshev
filter waves. The infrastructure needed to generate these
waves is so complex that these waves were generated only
one in entire human history till now. They are fast, secure
and reliable but complex to generate.
3. CONTEMPORARY USAGE OF DE-NOISING
IN VARIOUS SYTEMS
The conventional process of eliminating unnecessary
disturbances and any unwanted resources from an entity
has been coined into a single term, known as de-noising.
From then on, this phenomenon of de-noising an entity has
been implemented on various fields and for various
applications.
Technically, de-noising is taking any variable or entity as
input and removing unwanted data, called “noise” with the
use of some algorithms. The various implementations of
de-noising functionality is as follows:
3.1 Image Refining using De-Noising
Unclear and obfuscated images are often not desirable for
obvious reasons of lacking clarity. As such, to make these
images clearer, there have been many attempts at
developing image de-noising software. Some successful
attempts resulted in software like Topaz Image Cleaner,
Ninja Noise Remove and Photoshop Image processor.
3.2 Data Refinement using De-noising
Refinement of data, also known as data cleaning or rarely
also known as data classification is the process of
eliminating opaque data item sets from relevant material in
a large collection of data items, like Data Warehouses and
Data Bases.
Due to the numerous successful attempts of data denoising,
made in the last decade, there are a couple of tools in
market available, which can efficiently refine data without
much data loss and with precision. Most popular ones are
WEKA tool and CITRUS development environment which
includes internally built data de-noising module.
3.3 Signal Refining using De-noising
Partly as a result of gigantic expansion of signal usage for
data transmission in the last few decades, there has been an
urgent need for some techniques which would be capable of
eliminating unnecessary data and unwanted disturbances
from the signals.
As such, there have been countless attempts made at
developing algorithms and subsequently developing tools
which can de-noise signals of any format and containing
any data formats. As a result, there have arisen numerous
tools for de-noising signals universally, though most of
them are inefficient and even incompetent to some extent.
There are presently three tools which, we can classify under
“working as intended” category. They are: MATLAB,
OriginPro and Sony WavePad (for audio signals only). Of
these three, only MATLAB and OriginPro are capable of
de-noising signals of any format and type. And of those
two, our experiments clearly showed that MATLAB
produces accurate and efficient results.
3.4 Proposed Tool
The tool that we propose has been built from scratch using
Python, VB Script and minor C++ functionality only. No
external modules or third party software was used in the
indigenous development of our tool. In our internal
experiments, the python tool was able to de-noise signals of
all formats and any data type. As such, we move forward to
compare MATLAB and our tool on the basis of efficiency,
accuracy, compatibility and memory costs.
4. OBSERVATION AND ANALYSIS
We have generated four signals containing RADAR data
simulation. Three of which relate to tracking and
communication type of data and one of them is a medical
record type of data. The Sequence of our Observation and
subsequent analysis is as follows:
MATLAB Observation
Python Tool Observations
Comparative Analysis
4.1 MATLAB Observations
All the MATLAB Observations have been conducted
through the use of a specialised module toolbox known as
Wavelet Toolbox. The Signal Graphs shown below are only
screenshots of MATLAB Wavelet toolbox results.
4.1.1 Signal #1
Signal #1 contains information which pertains to the data
sent by trackers. Trackers are basic identifying devices
which can be used to track any object.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 15
Original Signal
Fig 1: – Original Signal #1 (MATLAB)
Frequency – 100 cycles / 1 sec
Standard Deviation – 20 metres
De-Noised Signal
Fig 2:– De-Noised Signal #1 (MATLAB)
Frequency – 100 cycles / 1 sec
Standard Deviation – 20 metres
Signal Accuracy – 89%
Noise Removed – 92%
4.1.2 Signal #2
Signal #2 contains information which pertains to the data
sent by locators. Locators are the devices which can locate
entities that are either lost or not cannot be tracked with
Trackers.
Original Signal
Fig 3 – Original Signal #2 (MATLAB)
Frequency – 130 cycles / 1 sec
Standard Deviation – 15 metres
De-Noised Signal
A Decomposition Level – 2 has been used with Haar
Wavelet Discrete Transformation and Inverse Discrete
Transformation.
Fig 4 – Original Signal #2 (MATLAB)
Frequency – 130 cycles / 1 sec
Standard Deviation – 15 metres
Signal Accuracy – 93%
Noise Removed – 91%
4.1.3 Signal #3
Signal #3 contains information which pertains to the data
sent by communicators. These signals carry very private
information and so, the signals are secured with algorithms.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 16
Original Signal
Fig 5 – Original Signal #3 (MATLAB)
Frequency – 100 cycles / 1 sec
Standard Deviation – 20 metres
De-Noised Signal
A Decomposition Level – 2 has been used with Haar
Wavelet Discrete Transformation and Inverse Discrete
Transformation.
Fig 6 – Original Signal #3 (MATLAB)
Frequency – 100 cycles / 1 sec
Standard Deviation – 20 metres
Signal Accuracy – 97%
Noise Removed – 89%
4.1.4 Signal #4
Signal #4 contains information which pertains to the
medical data of one staff member recorded internally.
Original Signal
Fig 7 – Original Signal #4 (MATLAB)
Frequency – 75 cycles / 1 sec
Standard Deviation – 30 metres
De-Noised Signal
A Decomposition Level – 2 has been used with Haar
Wavelet Discrete Transformation and Inverse Discrete
Transformation.
Fig 8 – Original Signal #4 (MATLAB)
Frequency – 75 cycles / 1 sec
Standard Deviation – 30 metres
Signal Accuracy – 99%
Noise Removed – 89%
4.2 Python Tool Observations
All the Observations using Python Tool have been
conducted through the use of a custom, specially developed
and designed UI module. The Signal Graphs shown below
are only screenshots of Python Tool signal processing
results.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 17
4.2.1 Signal #1
Signal #1 contains information which pertains to the data
sent by trackers. Trackers are basic identifying devices
which can be used to track any object.
Original Signal
Fig 9 – Original Signal #1 (PYTHON)
Frequency – 100 cycles / 1 sec
Standard Deviation – 20 metres
De-Noised Signal
A Decomposition Level – 2 has been used with Haar
Wavelet Discrete Transformation and Inverse Discrete
Transformation.
Fig 10 – De-Noised Signal #1 (PYTHON)
Frequency – 100 cycles / 1 sec
Standard Deviation – 20 metres
Signal Accuracy – 90%
Noise Removed – 80%
4.2.2 Signal #2
Signal #2 contains information which pertains to the data
sent by locators. Locators are the devices which can locate
entities that are either lost or not cannot be tracked with
Trackers.
Original Signal
Fig 11 – Original Signal #2 (PYTHON)
Frequency – 130 cycles / 1 sec
Standard Deviation – 15 metres
De-Noised Signal
A Decomposition Level – 2 has been used with Haar
Wavelet Discrete Transformation and Inverse Discrete
Transformation.
Fig 12 – De-Noised Signal #2 (PYTHON)
Frequency – 130 cycles / 1 sec
Standard Deviation – 15 metres
Signal Accuracy – 100%
Noise Removed – 95%
4.2.3 Signal #3
Signal #3 contains information which pertains to the data
sent by communicators. These signals carry very private
information and so, the signals are secured with algorithms.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 18
Original Signal
Fig 13 – Original Signal #3 (PYTHON)
Frequency – 100 cycles / 1 sec
Standard Deviation – 20 metres
De-Noised Signal
A Decomposition Level – 2 has been used with Haar
Wavelet Discrete Transformation and Inverse Discrete
Transformation.
Fig 14 – De-Noised Signal #3 (PYTHON)
Frequency – 100 cycles / 1 sec
Standard Deviation – 20 metres
Signal Accuracy – 90%
Noise Removed – 80%
4.2.4 Signal #4
Signal #4 contains information which pertains to the
medical data of one staff member recorded internally.
Original Signal
Fig 15 – Original Signal #4 (PYTHON)
Frequency – 75 cycles / 1 sec
Standard Deviation – 30 metres
De-Noised Signal
A Decomposition Level – 2 has been used with Haar
Wavelet Discrete Transformation and Inverse Discrete
Transformation.
Fig 16 – De-Noised Signal #4 (PYTHON)
Frequency – 75 cycles / 1 sec
Standard Deviation – 30 metres
Signal Accuracy – 95%
Noise Removed – 90%
4.3 Analysis
The results obtained from above observational cases are
recorded in the tables below for comparison purposes and
to determine the most accurate and efficient tool in data
signal de-noising. The comparative value tables are as
follows:
Attribute Signal
#1
Signal
#2
Signal
#3
Signal
#4
Frequenc
y
100 130 100 75
Stnd. Dev. 20 15 20 30
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 19
Matlab Specifics
Signal Acc. 89% 93% 97% 99%
Noise Rem. 92% 91% 89% 89%
Observation – Very Consistent with colour indentation,
average efficiency but high cost and high memory
requirement.
Python Tool Specifics
Signal Acc. 90% 100% 90% 95%
Noise Rem. 80% 95% 80% 90%
Observation – Very Efficient, cost-effective and memory
friendly but no colour indentation and bad consistency.
Frequency – Number of cycles present in ONE second
time.
Stnd. Dev. – Standard Deviation (Average Deviation
between crusts).
Signal Acc. – Percentage of signal accuracy when
compared to original signal.
Noise Rem. – Percentage of Noise Removed from original
signal.
5. RESULTS and DISCUSSIONS
The most important purpose of these analytics is to guide
schemata of de-noising techniques available in two
different tools, which are: MATLAB and Python Tool. We
have given four same signals as input to the two tools and
we were able to ascertain their efficiency, obtain their
consistency, observe their performance, note their memory
taxation and finally, we were also able to see their relative
cost expenses. After the aforementioned comparative
critical analysis of all the involved components, we have
arrived at a conclusive result.
In all our experiments and testing with MATLAB using 4
signals, we have noticed that MATLAB is very consistent
and easy to understand due to colour indentation, but is also
costly both monetarily and memory wise. Efficiency in
denoising and retaining relevant data is found to be
average.
As of our experiments and testing with Python Tool using 4
signals, we have observed that our Python Tool is very
efficient, almost takes 25% of memory taken by MATLAB
and projected monetary cost at maintaining is also very
low. Consistency is a bit lacking feature in our Python tool
and it may be a bit harder to understand in first look due to
lack of specialised colour indentation.
Overall, if the client requirement is data signal de-noising
efficiency and maintenance cum memory cost
effectiveness, then our PYTHON TOOL is optimal. If the
client requirement is consistency and ease of
understanding, then MATLAB TOOL is optimal.
REFERENCES
(All the references were accessed during Feb-March 2015).
[1]. Introduction to Haar Wavelets – Portland State
University.
[2]. Besslich PhW, Trachtenberg LA. The sign transform:
an invertible non-linear transform with quantized
coefficients. In: Moraga C, editor. Theory and application
of spectral techniques. University Dortmund Press;
October 1988.
[3]. Beauchamp KG. Applications of Walsh and related
functions with an introduction to sequency theory. New
York: Academic Press and Publications p. 4-13; 1984.
[4]. Boiko LL. Generalized Fourier–Haar transform on
finite Abelian groups. In: Yaroslavsky LP, editor. Digital
signal processing and applications. Moscow: Nauka; 1981.
p. 12–22
[5]. Buron AM, Michell JA, Sloana M. Single chip fast
Haar transform at megahertz rates. In: Moraga C, editor.
Theory and application of spectral techniques. University
Dortmund Press and publications for open source; October
1988, p. 8–17.
[6]. Burrus CS, Gophinat RA, Guo H. Introduction to
wavelets and wavelet transforms. Englewood Cliffs:
Prentice Hall; 1988.
[7]. Castleman KR. Digital image processing. Englewood
Cliffs Press and publications p. 13-22: Prentice-Hall; 1996.
[8].https://en.wikipedia.org/wiki/Haar_Transformation_wa
velet
[9].https://en.wikipedia.org/wiki/Discrete_wavelet_transfor
m
BIOGRAPHIES
1. Ananth Abhishek Jillepalli, IVth
Year, Department of
CSE, Vidya Jyothi Institute of Technology,
Hyderabad.
E-Mail: ananth9328@gmail.com
2. Raghavendra Deeduvanu, IVth
Year, Department of
CSE, Vidya Jyothi Institute of Technology,
Hyderabad.
E-Mail: raghavendra065@gmail.com
3. Sreenath DeviReddy, IVth
Year, Department of CSE,
Vidya Jyothi Institute of Technology, Hyderabad.
E-Mail: sreenathreddy9194@gmail.com
4. Deepak Vangala IVth
Year, Department of CSE,
Vidya Jyothi Institute of Technology, Hyderabad.
E-Mail: deep.vangala21@gmail.com
5. Ravi Mathey, Head of Department, Department of
Computer Science and Engineering, Vidya Jyothi
Institute of Technology, Hyderabad.
E-Mail: ravimathey@gmail.com