In real condition the experimental study of scale on explosion resistance of reinforced concrete slab has highly expenses in conduction experiments. This analytical result of the work are overly desirable and close to the real time condition. This work indicates the obvious effect of scale on dynamic response resistance, stress strain behaviour, deflection of unilateral slab of reinforced concrete which are exposed to blast loading due to sudden explosion. To achieve this study reinforced concrete slab which were exposed to blast loading. Explosion test on this reinforced concrete slab which has different standoff distance. The slab are supported at its two ends using a suitable support condition. This work is analyze using the finite element software ABAQUS. The result of this experimental work is compared with the result obtained from the analytical result. From result the detachment in two slab of reinforced concrete both big and small is similar. The analytical behaviour of the slab is moreover same as that of the experimental behaviour
Accelerated Life Testing (ALT) is a lifetime prediction methodology commonly used by the industry in the past decades. This method , however, is reaching its limitations with the development of products within emerging technologies requiring long-term reliability. At TNO we work on technology development with long expected lifetimes , e.g. solar cells and LED lighting.
New methodologies are required to predict long term reliability for these type of products. Methods to predict long term reliability by extending ALT methods, like HALT (Highly Accelerated Life Testing) and MEOST (Multiple Environmental Stress Testing) will be discussed in the presentation.
A problem in application of these methods is definition of adequate stress profiles. It is our experience that to gain benefit from accelerated testing, insight in the Physic of Failure of a product is essential.
VIBRATION ANALYSIS FOR DAMAGE DETECTION IN COMPOSITE PLATE BY USING PIEZOELEC...IAEME Publication
This study focuses on an active monitoring method for damage detection applied to composite structures. Different specimens made up of fiber epoxy resin in the form of composite structures are studied. Wavelet analysis methods are adopted to post process the raw monitored signal. A new damage signature is introduced to determine the presence and extent of damage in composites, while eliminating the influence of different distances between the active actuator and active monitoring elements. The proposed method is shown to be effective, reliable, and straightforward for the specimens considered in the present study, which are composed of different materials and suffer various levels of damage. An online real-time active monitoring system for
damage detection is described that is based on this research.
Accelerated Life Testing (ALT) is a lifetime prediction methodology commonly used by the industry in the past decades. This method , however, is reaching its limitations with the development of products within emerging technologies requiring long-term reliability. At TNO we work on technology development with long expected lifetimes , e.g. solar cells and LED lighting.
New methodologies are required to predict long term reliability for these type of products. Methods to predict long term reliability by extending ALT methods, like HALT (Highly Accelerated Life Testing) and MEOST (Multiple Environmental Stress Testing) will be discussed in the presentation.
A problem in application of these methods is definition of adequate stress profiles. It is our experience that to gain benefit from accelerated testing, insight in the Physic of Failure of a product is essential.
VIBRATION ANALYSIS FOR DAMAGE DETECTION IN COMPOSITE PLATE BY USING PIEZOELEC...IAEME Publication
This study focuses on an active monitoring method for damage detection applied to composite structures. Different specimens made up of fiber epoxy resin in the form of composite structures are studied. Wavelet analysis methods are adopted to post process the raw monitored signal. A new damage signature is introduced to determine the presence and extent of damage in composites, while eliminating the influence of different distances between the active actuator and active monitoring elements. The proposed method is shown to be effective, reliable, and straightforward for the specimens considered in the present study, which are composed of different materials and suffer various levels of damage. An online real-time active monitoring system for
damage detection is described that is based on this research.
MULTI RESPONSE OPTIMISATION OF DIE SINKER EDM FOR ALSIC COMPOSITE IAEME Publication
On e of the important aspects that should be taken into consideration in the majority of manufacturing processes and, particularly, in processes related to Electrical Discharge Machining (EDM) is the correct selection of manufacturing conditions. Appropriate choice of the machining parameters and electrode material during electric discharge machining is fundamental to its performance and accuracy.
“Comparison of Maximum Stress distribution of Long & Short Side Column due to...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
SQL injection is the major susceptible attack in today’s era of web application which attacks the database to gain unauthorized and illicit access. It works as an intermediate between web application and database. Most of the time, well-known people fire the SQL injection, who is previously working in the organisation on the present database. Today organisation has major concern is to stop SQL injection because it is the major vulnerable attack in the database. SQLI attacks target databases that are reachable through web front. SQLI prevention technique efficiently blocked all of the attacks without generating any false positive. In this paper we present different techniques and tools which can prevent various attacks.
Analysis the Effect of Educational Package on Promotion of Protective Behavio...Editor IJCATR
dust phenomenon, especially in the summer, is a serious problem in Khuzestan province and has adverse effects on
health, environment and economic. Behavior change is the base for health associated risks prevention and one of the models for
behavior change in individual level is Health Belief Model. The aim of this study was to analyze the effect of educational
package on promotion of protective behaviors in exposure to dust phenomenon in Ahvaz teachers by SPSS software.
Methods: This was an experimental study in which 200 teachers randomly were divided into two groups, case and control groups
[n=100, in each group]
pha test. Before the educational intervention, questionnaire was
completed by two groups and educational requirements of subjects were detected and an educational package was designed and
implemented for 4 week. The control group received no intervention. After a month the effect of educational package on study
variables was evaluated. Data were analyzed with SPSS statistical software version 17, by descriptive and analytical tests.
Result: Mean age of case and control groups were 39.75±6.95 and 39.78±7.02 years, respectively. There was no significant
association between marriage and behavior, but there was a significant association between employment number of years and
behavior [p=0.03], education and behavior [p=0.03]. Based on the findings of this study there was a significant association
between the knowledge, health belief model components and behavior of the study subjects, before and after the intervention [p<
0.001].
Conclusion: designing and implementation of an educational package based on health belief model can promote the knowledge
and protective behaviors in exposure to dust particles effectively.
Neural Network Based Context Sensitive Sentiment AnalysisEditor IJCATR
Social media communication is evolving more in these days. Social networking site is being rapidly increased in recent years, which provides platform to connect people all over the world and share their interests. The conversation and the posts available in social media are unstructured in nature. So sentiment analysis will be a challenging work in this platform. These analyses are mostly performed in machine learning techniques which are less accurate than neural network methodologies. This paper is based on sentiment classification using Competitive layer neural networks and classifies the polarity of a given text whether the expressed opinion in the text is positive or negative or neutral. It determines the overall topic of the given text. Context independent sentences and implicit meaning in the text are also considered in polarity classification.
Location Based Tracking System for Emergency ServicesEditor IJCATR
Transmitting the geo-location information of a target via wireless networks is effective when both the target and the
tracker are within Wi-Fi coverage area; the 802.11 wireless networks are not always accessible. When the target or the tracker is
unable to access Wi-Fi, it is impossible to perform location tracking. Therefore, SMS is a relatively more reliable and flexible
solution because of its widespread use. In this system, a device is equipped with a global system for mobile communications
(GSM) modem and a GPS unit. It transmits short messages containing its GPS coordinates to the server at 30-s intervals.
Although transmitting the geo-location information of a target via wireless networks is effective when both the target and the
tracker are within Wi-Fi coverage area, the 802.11 wireless networks are not always accessible. When the target or the tracker is
unable to access Wi-Fi, it is impossible to perform location tracking. In this System, a novel method called location-based
delivery (LBD), which combines the short message service (SMS) and global position system (GPS). LBD reduces the number of
short message transmissions while maintaining the location tracking accuracy within the acceptable range. The proposed
approach, LBD, consists of three primary features: Short message format, location prediction, and dynamic threshold. The
defined short message format is proprietary.
New Technique for Image Encryption Based on Choas and Change of MSBEditor IJCATR
In this paper, an algorithm for image encryption using chaotic systems and techniques to change the pixel values are proposed for
protecting digital images in an efficient and safe manner will be offered. In the proposed algorithm, the stochastic properties of chaotic
Logistic system is used. To evaluate the performance of the proposed algorithm, we have implemented it in MATLAB using
parameters such as visual analysis, key space analysis, histogram analysis. Implementation results show that the proposed algorithm,
the algorithm is efficient and safe.
Superconductivity and Spin Density Wave (SDW) in NaFe1-xCoxAsEditor IJCATR
A model is presented utilizing a Hamiltonian with equal spin singlet and triplet pairings based on quantum field theory and
green function formalism, to show the correlation between the superconducting and spin density wave (SDW) order parameters. The
model exhibits a distinct possibility of the coexistence of superconductivity and long-range magnetic phase, which are two usually
incompatible cooperative phenomena. The work is motivated by the recent experimental evidences on high-TC superconductivity in
the FeAs-based superconductors. The theoretical results are then applied to show the coexistence of superconductivity and spin density
wave (SDW) in NaFe1-xCoxAs.
Humans communication is generally under the control of emotions and full of opinions. Emotions and their opinions plays an important role in thinking process of mind, influences the human actions too. Sentiment analysis is one of the ways to explore user’s opinion made on any social media and networking site for various commercial applications in number of fields. This paper takes into account the basis requirements of opinion mining to explore the present techniques used to developed an full fledge system. Is highlights the opportunities or deployment and research of such systems. The available tools used for building such applications have even presented with their merits and limitations.
When observing Egypt‟s method of expansion, one can identify a clear language and distinctive pattern of urban
development. The years following 1952, marked by the privatization of agricultural land and the population boom, gave rise to a soon
to be urban „catastrophe‟. In order to fulfil the needs of the growing population, buildings were sprouting out everywhere, causing
agricultural lands to disappear under a jungle of red bricks, erasing the lines between urban and rural. This phenomenon of informal
expansion has spread across the country composing what is commonly known as Ashwa’eeyat or informal settlements. In Egypt, these
can be identified by a unified method of construction using concrete skeleton structures of concrete slabs and beams along with plain
red brick walls; an appearance that does not reflect nor shed light on the Egyptian culture or environmental requirements. The use of
bricks and concrete is due to the fact that this construction method is the most commonly used and feasible type of construction; the
material is available, the workmanship, even though it is not the most economic method. Egypt is a developing country that possesses
numerous resources, being both tangible and intangible ones. The aim of this paper is to research and determine the possibility of
creating different elements of construction utilizing available resources and recycling waste material. These elements would be
economic and reflective of the Egyptian culture while maintaining the necessary environmental and physical safety requirements
sought in residential buildings.
The present study focuses on the nature and pattern of urban expansion of Madurai city over its surrounding region during the period from 2003 to 2008. Based on its proximity to the Madurai city, Preparation of various thematic data such Land use and Land cover using Land sat data. Create a land use land cover map from satellite imagery using supervised classification. Find out the areas from the classified data. The study is based on secondary data, the satellite imagery has downloaded from GLCF (Global Land Cover Facility) web site, for the study area (path101 row 67), the downloaded imagery subset using Imagery software to clip the study area. The clipped satellite imagery has used to prepare the land use and land cover map using supervised classification.
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
Ethernet a popular choice for metropolitan-area networks (MAN) due to simplicity, cost effectiveness and scalability. The
Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment,
is a performance bottleneck in Metro network context. Handling of link failure is an important issue in metro Ethernet networks. A
link failure may result in serious service disruptions. A local restoration method for metro Ethernet with multiple spanning trees, which
aims at fast handling of single link failures in a distributed manner, have been proposed in the literature. In this paper, we propose a
local restoration mechanism that uses MULTILINK algorithm for solving multiple link failures
The technology behind information systems in today’s world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
Microstructure, thermal, electrical and mechanical properties of penta Bi- Sn- Pb based alloys have been investigated. Matrix structure (Formed crystalline phases) and measured physical properties of Bi- Sn- Pb- In- X (X= Cd/or Zn) penta alloys changed with varying composition. The new penta fusible, Bi50Pb15Sn22Cd3In10, alloy has best properties such as high density, low melting point and friendly environmental, (reduced toxicity elements Pb and Cd by 40% and 75%, compared used alloys), for shielding blocks in mega-volt radiotherapy. The melting temperature of Bi50Pb15Sn22Cd3In10 alloy is ~58 ºC and it is density is 10.117 gm/cm3. The elastic modulus of Bi50Pb15Sn22Cd3In10 is 29.03 Gpa. Vickers hardness and internal friction values of Bi50Pb15Sn22Cd3In10 alloy are 9.72 Kg/mm2 and 0.085. The Bi50Pb15Sn22Cd3In10 alloy consists of rhombohedral Bi phase, tetragonal Sn phase, face centered cubic Pb phase, hexagonal Cd phase, face centered cubic In phase, Pb7Bi3 and SnBi intermetallic compounds.
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
Information Systems (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in
organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on
successful systems development and implementation of ERP systems continues to be an area of interest to researchers. Common
understanding has been that extensive user participation is not only important, but absolutely essential to system success. Even with
this understanding of user participation as one of the critical factor in successful IS development and implementation, empirical studies
have been unable to conclusively link user participation to systems success. This paper uses a private university as a case study to
examine the role played by user participation in the implementation of an ERP system. In order to achieve its objective, this study
adopted a mixed method where both qualitative and quantitative approaches were used in the collection of data. The results of the
study reveal that user participation has a positive impact on the likelihood of ERP system success, user participation by choice is the
best, user participation leads to better understanding of system requirements, the more participation the more the satisfied the users are,
and participation builds support for the system during implementation. From our results we conclude that user participation in ERP
system implementation is critical for successful implementation.
Effect of adding titanium oxide nanoparticles (TiO2) on structure, elastic moduli, Vickers hardness, internal friction, electrical
resistivity and thermal properties of tin-antimony-lead and tin-aluminum bearing alloys have been investigated. Elastic modulus, Vickers
hardness and thermal diffusivity of Sn87Sb10Pb3 and Sn80Al20 alloys increased after adding TiO2 nanoparticles. Internal friction, thermal
conductivity and specific heat of Sn87Sb10Pb3 and Sn80Al20 alloys varied after adding TiO2 nanoparticles. Adding titanium oxide nanoparticles
improved bearing properties, such as strengthens and internal friction of Sn87Sb10Pb3 and Sn80Al20 alloys. The Sn85.5Sb10Pb3(TiO2)1.5 alloy has
best properties for automotive industry. Also Sn78.5Al20(TiO2)1.5 alloy has best properties for marine applications.
MULTI RESPONSE OPTIMISATION OF DIE SINKER EDM FOR ALSIC COMPOSITE IAEME Publication
On e of the important aspects that should be taken into consideration in the majority of manufacturing processes and, particularly, in processes related to Electrical Discharge Machining (EDM) is the correct selection of manufacturing conditions. Appropriate choice of the machining parameters and electrode material during electric discharge machining is fundamental to its performance and accuracy.
“Comparison of Maximum Stress distribution of Long & Short Side Column due to...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
SQL injection is the major susceptible attack in today’s era of web application which attacks the database to gain unauthorized and illicit access. It works as an intermediate between web application and database. Most of the time, well-known people fire the SQL injection, who is previously working in the organisation on the present database. Today organisation has major concern is to stop SQL injection because it is the major vulnerable attack in the database. SQLI attacks target databases that are reachable through web front. SQLI prevention technique efficiently blocked all of the attacks without generating any false positive. In this paper we present different techniques and tools which can prevent various attacks.
Analysis the Effect of Educational Package on Promotion of Protective Behavio...Editor IJCATR
dust phenomenon, especially in the summer, is a serious problem in Khuzestan province and has adverse effects on
health, environment and economic. Behavior change is the base for health associated risks prevention and one of the models for
behavior change in individual level is Health Belief Model. The aim of this study was to analyze the effect of educational
package on promotion of protective behaviors in exposure to dust phenomenon in Ahvaz teachers by SPSS software.
Methods: This was an experimental study in which 200 teachers randomly were divided into two groups, case and control groups
[n=100, in each group]
pha test. Before the educational intervention, questionnaire was
completed by two groups and educational requirements of subjects were detected and an educational package was designed and
implemented for 4 week. The control group received no intervention. After a month the effect of educational package on study
variables was evaluated. Data were analyzed with SPSS statistical software version 17, by descriptive and analytical tests.
Result: Mean age of case and control groups were 39.75±6.95 and 39.78±7.02 years, respectively. There was no significant
association between marriage and behavior, but there was a significant association between employment number of years and
behavior [p=0.03], education and behavior [p=0.03]. Based on the findings of this study there was a significant association
between the knowledge, health belief model components and behavior of the study subjects, before and after the intervention [p<
0.001].
Conclusion: designing and implementation of an educational package based on health belief model can promote the knowledge
and protective behaviors in exposure to dust particles effectively.
Neural Network Based Context Sensitive Sentiment AnalysisEditor IJCATR
Social media communication is evolving more in these days. Social networking site is being rapidly increased in recent years, which provides platform to connect people all over the world and share their interests. The conversation and the posts available in social media are unstructured in nature. So sentiment analysis will be a challenging work in this platform. These analyses are mostly performed in machine learning techniques which are less accurate than neural network methodologies. This paper is based on sentiment classification using Competitive layer neural networks and classifies the polarity of a given text whether the expressed opinion in the text is positive or negative or neutral. It determines the overall topic of the given text. Context independent sentences and implicit meaning in the text are also considered in polarity classification.
Location Based Tracking System for Emergency ServicesEditor IJCATR
Transmitting the geo-location information of a target via wireless networks is effective when both the target and the
tracker are within Wi-Fi coverage area; the 802.11 wireless networks are not always accessible. When the target or the tracker is
unable to access Wi-Fi, it is impossible to perform location tracking. Therefore, SMS is a relatively more reliable and flexible
solution because of its widespread use. In this system, a device is equipped with a global system for mobile communications
(GSM) modem and a GPS unit. It transmits short messages containing its GPS coordinates to the server at 30-s intervals.
Although transmitting the geo-location information of a target via wireless networks is effective when both the target and the
tracker are within Wi-Fi coverage area, the 802.11 wireless networks are not always accessible. When the target or the tracker is
unable to access Wi-Fi, it is impossible to perform location tracking. In this System, a novel method called location-based
delivery (LBD), which combines the short message service (SMS) and global position system (GPS). LBD reduces the number of
short message transmissions while maintaining the location tracking accuracy within the acceptable range. The proposed
approach, LBD, consists of three primary features: Short message format, location prediction, and dynamic threshold. The
defined short message format is proprietary.
New Technique for Image Encryption Based on Choas and Change of MSBEditor IJCATR
In this paper, an algorithm for image encryption using chaotic systems and techniques to change the pixel values are proposed for
protecting digital images in an efficient and safe manner will be offered. In the proposed algorithm, the stochastic properties of chaotic
Logistic system is used. To evaluate the performance of the proposed algorithm, we have implemented it in MATLAB using
parameters such as visual analysis, key space analysis, histogram analysis. Implementation results show that the proposed algorithm,
the algorithm is efficient and safe.
Superconductivity and Spin Density Wave (SDW) in NaFe1-xCoxAsEditor IJCATR
A model is presented utilizing a Hamiltonian with equal spin singlet and triplet pairings based on quantum field theory and
green function formalism, to show the correlation between the superconducting and spin density wave (SDW) order parameters. The
model exhibits a distinct possibility of the coexistence of superconductivity and long-range magnetic phase, which are two usually
incompatible cooperative phenomena. The work is motivated by the recent experimental evidences on high-TC superconductivity in
the FeAs-based superconductors. The theoretical results are then applied to show the coexistence of superconductivity and spin density
wave (SDW) in NaFe1-xCoxAs.
Humans communication is generally under the control of emotions and full of opinions. Emotions and their opinions plays an important role in thinking process of mind, influences the human actions too. Sentiment analysis is one of the ways to explore user’s opinion made on any social media and networking site for various commercial applications in number of fields. This paper takes into account the basis requirements of opinion mining to explore the present techniques used to developed an full fledge system. Is highlights the opportunities or deployment and research of such systems. The available tools used for building such applications have even presented with their merits and limitations.
When observing Egypt‟s method of expansion, one can identify a clear language and distinctive pattern of urban
development. The years following 1952, marked by the privatization of agricultural land and the population boom, gave rise to a soon
to be urban „catastrophe‟. In order to fulfil the needs of the growing population, buildings were sprouting out everywhere, causing
agricultural lands to disappear under a jungle of red bricks, erasing the lines between urban and rural. This phenomenon of informal
expansion has spread across the country composing what is commonly known as Ashwa’eeyat or informal settlements. In Egypt, these
can be identified by a unified method of construction using concrete skeleton structures of concrete slabs and beams along with plain
red brick walls; an appearance that does not reflect nor shed light on the Egyptian culture or environmental requirements. The use of
bricks and concrete is due to the fact that this construction method is the most commonly used and feasible type of construction; the
material is available, the workmanship, even though it is not the most economic method. Egypt is a developing country that possesses
numerous resources, being both tangible and intangible ones. The aim of this paper is to research and determine the possibility of
creating different elements of construction utilizing available resources and recycling waste material. These elements would be
economic and reflective of the Egyptian culture while maintaining the necessary environmental and physical safety requirements
sought in residential buildings.
The present study focuses on the nature and pattern of urban expansion of Madurai city over its surrounding region during the period from 2003 to 2008. Based on its proximity to the Madurai city, Preparation of various thematic data such Land use and Land cover using Land sat data. Create a land use land cover map from satellite imagery using supervised classification. Find out the areas from the classified data. The study is based on secondary data, the satellite imagery has downloaded from GLCF (Global Land Cover Facility) web site, for the study area (path101 row 67), the downloaded imagery subset using Imagery software to clip the study area. The clipped satellite imagery has used to prepare the land use and land cover map using supervised classification.
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
Ethernet a popular choice for metropolitan-area networks (MAN) due to simplicity, cost effectiveness and scalability. The
Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment,
is a performance bottleneck in Metro network context. Handling of link failure is an important issue in metro Ethernet networks. A
link failure may result in serious service disruptions. A local restoration method for metro Ethernet with multiple spanning trees, which
aims at fast handling of single link failures in a distributed manner, have been proposed in the literature. In this paper, we propose a
local restoration mechanism that uses MULTILINK algorithm for solving multiple link failures
The technology behind information systems in today’s world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
Microstructure, thermal, electrical and mechanical properties of penta Bi- Sn- Pb based alloys have been investigated. Matrix structure (Formed crystalline phases) and measured physical properties of Bi- Sn- Pb- In- X (X= Cd/or Zn) penta alloys changed with varying composition. The new penta fusible, Bi50Pb15Sn22Cd3In10, alloy has best properties such as high density, low melting point and friendly environmental, (reduced toxicity elements Pb and Cd by 40% and 75%, compared used alloys), for shielding blocks in mega-volt radiotherapy. The melting temperature of Bi50Pb15Sn22Cd3In10 alloy is ~58 ºC and it is density is 10.117 gm/cm3. The elastic modulus of Bi50Pb15Sn22Cd3In10 is 29.03 Gpa. Vickers hardness and internal friction values of Bi50Pb15Sn22Cd3In10 alloy are 9.72 Kg/mm2 and 0.085. The Bi50Pb15Sn22Cd3In10 alloy consists of rhombohedral Bi phase, tetragonal Sn phase, face centered cubic Pb phase, hexagonal Cd phase, face centered cubic In phase, Pb7Bi3 and SnBi intermetallic compounds.
User participation in ERP Implementation: A Case-based StudyEditor IJCATR
Information Systems (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in
organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on
successful systems development and implementation of ERP systems continues to be an area of interest to researchers. Common
understanding has been that extensive user participation is not only important, but absolutely essential to system success. Even with
this understanding of user participation as one of the critical factor in successful IS development and implementation, empirical studies
have been unable to conclusively link user participation to systems success. This paper uses a private university as a case study to
examine the role played by user participation in the implementation of an ERP system. In order to achieve its objective, this study
adopted a mixed method where both qualitative and quantitative approaches were used in the collection of data. The results of the
study reveal that user participation has a positive impact on the likelihood of ERP system success, user participation by choice is the
best, user participation leads to better understanding of system requirements, the more participation the more the satisfied the users are,
and participation builds support for the system during implementation. From our results we conclude that user participation in ERP
system implementation is critical for successful implementation.
Effect of adding titanium oxide nanoparticles (TiO2) on structure, elastic moduli, Vickers hardness, internal friction, electrical
resistivity and thermal properties of tin-antimony-lead and tin-aluminum bearing alloys have been investigated. Elastic modulus, Vickers
hardness and thermal diffusivity of Sn87Sb10Pb3 and Sn80Al20 alloys increased after adding TiO2 nanoparticles. Internal friction, thermal
conductivity and specific heat of Sn87Sb10Pb3 and Sn80Al20 alloys varied after adding TiO2 nanoparticles. Adding titanium oxide nanoparticles
improved bearing properties, such as strengthens and internal friction of Sn87Sb10Pb3 and Sn80Al20 alloys. The Sn85.5Sb10Pb3(TiO2)1.5 alloy has
best properties for automotive industry. Also Sn78.5Al20(TiO2)1.5 alloy has best properties for marine applications.
The method presented in this paper is beased on coupled line in the standard schiffman phase shifters structure and replace it
with lange coupler. To having a wider bandwidth, the stronger coupling is required. One way to achieve strong coupling is using of the
parallel coupled lines that this property exist in the lange coupler. So this paper discusses the design of fixed broadband phase shifter
by using the lange coupler and a novel phase shifters will be introduced according to the standard schiffman phase shifters. Finally
optimal parameters to achieve the desired performance will be shown.
Dynamic Resource Provisioning with Authentication in Distributed DatabaseEditor IJCATR
Data center have the largest consumption amounts of energy in sharing the power. The public cloud workloads of different
priorities and performance requirements of various applications [4]. Cloud data center have capable of sensing an opportunity to present
different programs. In my proposed construction and the name of the security level of imperturbable privacy leakage rarely distributed
cloud system to deal with the persistent characteristics there is a substantial increases and information that can be used to augment the
profit, retrenchment overhead or both. Data Mining Analysis of data from different perspectives and summarizing it into useful
information is a process. Three empirical algorithms have been proposed assignments estimate the ratios are dissected theoretically and
compared using real Internet latency data recital of testing methods
Implementation of 2D Optimal Barcode (QR Code) for ImagesEditor IJCATR
Quick Response (QR) Code is very useful for encoding the data in an efficient manner. Here data capacity in 2D barcode is limited according to the various types of data formats used for encoding. The data in image format uses more space. The data capacity can be increased by compressing the data using any of the data compression techniques before encoding. In this paper, we suggest a technique for data compression which in turn helps to increase the data capacity of QR Codes generated for image. Finally, results are compared with the normal QR Codes to find the efficiency of the new technique of encoding followed by compression for generating optimal QR code.
Health Monitoring System of Elderly using Wireless Sensor NetworkIjcatr04031005Editor IJCATR
Wireless-sensor-network-based home monitoring system for elderly activity behaviour involves functional assessment of daily activities. In this paper, we report a mechanism for estimation of elderly well-being condition based on usage of house-hold appliances connected through various sensing units. We define a two new wellness functions to determine the status of the elderly on performing essential daily activities. The modernized system for monitoring and evaluating the essential daily activities was tested at homes for four different elderly persons living alone and the results are encouraging in determining wellness of the elderly.
An Experimental Study of Low Velocity Impact (Lvi) On Fibre Glass Reinforced ...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The purpose of this study is to design experiments to determine the impact of ship
aerodynamics in Indonesia using the Computational Fluid Dynamic method and
compare the impact of fuell consumption and load from experimental testing. Thus, it
can be known in detail about the voltage that occurs up to the final speed of the ship
during testing. In the preparation of this research the first step is to model the end of
the ship using CAD software from the original model used in experimental testing. The
next thing is to determine the value of the mechanical properties of the material and
then put it in the CAE software. In CAE software, it is also determined about the
boundary conditions of the material and then determines the speed. The next thing to
do is the process of meshing the plate and ammunition and after the meshing process
is proceeded to the running process. In contrast to experimental testing where there
are various obstacles, the data produced by testing the Computational Fluid Dynamic
method and experimental testing can sometimes be different. This is because in the
testing process using Computational Fluid Dynamic, conditions are always in optimal
conditions.
The cutting-edge applications that the engineers are bringing with using finite element procedure for the human civilization and the emergence of new techniques in solving real-life scenarios in finite element procedures.
The problem in question is relevant since the process of detonation and
shockwaves collision and recompression of detonation products is a challenging task
in terms of gas dynamics. The paper is aimed at addressing this problem that would
enable to intentionally control the process of transferring energy of explosive to
environment through choosing optimal structure of charge or mode of triggering. The
problem is examined mostly through method for numerical simulation of non-steady
detonation and gas dynamic processes occurring while blast-hole charge is exploded.
An attribute-based pattern of process for transferring energy of explosion products to
environment when blasting charges of different structures and with different
parameters of triggering modes was pre-investigated. The paper describes
mathematical model of calculating parameters of dynamic loads on a blast-hole (hole)
wall when exploding charges of various structures in various triggering modes. The
results of calculating parameters of stress wave generated in rock mass by explosive
charge blast and gas dynamic parameters in powder chamber of a blast-hole (well)
were presented. The obtained coefficients of explosion pulse effect allow to correct
calculations of unit rate of differently-structured charges.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
1. International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 130
Analytical Study Of Explosion Resistance Scaling On
Reinforced Concrete Slab Under Free Air-Burst Blast
Load
M.Gowtham N.Chellakavitha
Department of Civil Engineering, Department of Civil Engineering,
Mepco Schlenk Engineering College, Mepco Schlenk Engineering college,
Sivakasi-626005 Sivakasi-626005
Abstract: In real condition the experimental study of scale on explosion resistance of reinforced concrete slab has highly expenses in
conduction experiments. This analytical result of the work are overly desirable and close to the real time condition. This work indicates
the obvious effect of scale on dynamic response resistance, stress strain behaviour, deflection of unilateral slab of reinforced concrete
which are exposed to blast loading due to sudden explosion. To achieve this study reinforced concrete slab which were exposed to blast
loading. Explosion test on this reinforced concrete slab which has different standoff distance. The slab are supported at its two ends using
a suitable support condition. This work is analyze using the finite element software ABAQUS. The result of this experimental work is
compared with the result obtained from the analytical result. From result the detachment in two slab of reinforced concrete both big and
small is similar. The analytical behaviour of the slab is moreover same as that of the experimental behaviour.
Keywords: Blast load, dynamic response resistance, deflection, damage mode, scaling.
1. INTRODUCTION on the surroundings. Thus, the sudden conversion of chemical
energy into kinetic energy with the release of heat, light and
About 70 per cent of India’s production of fireworks
and matches accounts from Sivakasi, town in Virudhunagar
district in Tamilnadu. With around 480 firework factories
employing about 40000 direct labourers and 100000 indirect
labourers, an equal proportion of unauthorized sector is also
controlling the manufacturing of firework products. These units
manufacture about 300 unique varieties of fireworks. The
market for fireworks is likely to grow at the rate of 10 per cent
per annum. So, in a desperate attempt to improvise and meet
the demand for light over sound, the industries have been
experimenting dangerously, trying new processes and chemical
combinations, which the workers are not used to. For the
employers the business becomes a highly profitable one but the
workers suffer a lot, which mostly goes unnoticed. Sometimes,
child labourers are compelled to experiment with high-risk
chemicals such as potassium chlorate, which emphasizes
mainly on glittering aerial display but, which might also cause
a catastrophic effect that may affect not only them but the whole
neighborhood. Accidental explosions during the manufacturing
process can cause loss of men, material, money and
infrastructure. On the other hand, some of the unregistered units
operate in the night hours, violating the rules as even an electric
spark can trigger major accidents. A random survey conducted
in 77 authorized industries and 16 unauthorized industries,
recommended for construction of a blast resistant structure with
necessary infrastructure facilities to minimize the effects of an
explosion. An explosion is a sudden increase in volume and
release of energy in a violent manner, usually with the
generation of high temperature and release of gas. It is a
chemical reaction when initiated, undergoes a very rapid
decomposition releasing large volume of highly heated gas that
exert pressure
mechanical shock causes abrupt destruction. The Explosives
Act, 1884 is a comprehensive law regulating the manufacture,
possession, sale, transportation, exportation and importation of
explosives in India. Based on this act, Explosives Rules 1983,
Gas Cylinders Rules 1981 and Static and Mobile Pressure
Vessels Rules 1981 were framed to prevent accidents at various
points of handling of explosives in India.
Behavioral analysis and calculations of resistant
construction which is used for protecting against dynamic
loading such as aerial blast must be noticed both in military and
civil and buildings with different uses. Herein blast tests on
reinforced concrete symbols and in complete scale are
necessary. However, these tests are somehow limited due to
safety and economic issues. This research includes evaluation
of scale on RC one-sided reinforced concrete under blast
loading.
2. FREE AIR BURST LOADING
When a blast is occurred next to or over a
construction that there is not any kind of reinforcement of first
shock between the source of explosives and construction, in
that case the load of blast on construction pressure is called
open space blast.
Figure 1.blast due to explosion in open
space(TM5-1300, 1969).
2. International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 131
2.1 SCALING RULE OF WOVE BLAST
Hopkinson-Kornez scaling rule which is usually
known as cube root has the most usage in scaling blast (Mays
and Smith, 1995; Bangash, 1993). Consider two bombs with
W1and W2 weights that have d1 and d2 diameter respectively
and are made from the same explosive.W1 and W2 are related
to the.
d1/d2=(w1/w2)
1/3
.
3. FREE AIR-BURST LOADING USING
ABAQUS FEA SOFTWARE
The slab is modelled using the finite element
modeling software ABAQUS. The specimen tested using the
software are of size 1000x1000x40mm.
The analytical work of the experimental work is done
using the ABAQUS software. The blast load is applied using
the explicit dynamics in the ABAQUS. The TNT value used in
the analytical work for 0.31kg and the standoff distance is
0.4m.
After feeding the necessary data’s in the software for
the slab is loaded and the result is checked is compared using
the result obtained from the experimental work.
Table 1. Properties of materials
MATE DEN YOUNGS POISS
RAL SIT MODULU ONS
Y S(Gpa) RATI
(kg/ O
m3
)
Concrete 2500 28.3 0.2
Re-bars 7850 200 0.3
Table 2. Specification of blast loading
SCALE DIMENS EXPLO STAND SCALE
FACTO ION(mm) SION OFF DISTANC
R MASS(k DISTAN E(m/kg1/3)
g) CE(m)
1.25 1000X1000 0.31 0.4 0.591
X40
Fig 1. Property assigned specimen.
Fig 2. Load and boundary conditions applied specimen.
Fig 3. Meshed model of the specimen.
4. RESULT AND DISCUSSION
The deflection value obtained in the analytical
study of the reinforced concrete slab slightly varies when
compared to the experimental value. The variation in the
deflection is due to the application of the load in open
environment which alter the load effect on the test specimen.
The deflection of the first slab is about 9mm where as in the
analytical study the deflection is about 14.54 mm which is
slightly higher. More over the deflection obtained for the
analytical study is about plus or minus 5-10%
2
3. International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 132
Fig 4. Deflection of the slab.
Fig 5. External work graph.
Fig 6. Internal work graph.
Fig 7. Strain energy graph.
Fig 8. Stress vs Time graph.
Table 3. Comparison of experimental and analytical
deflection.
SCAL DIMEN EXPLO CENTRA ANALYT
E SION SIVE L ICAL
FAC (MM)
MASS
DEFLEC DEFLEC
TOR TION TION
(KG)
(MM) (MM)
1.25 1000X10 0.31 15 14.54
00X40
Table 4.Comparison of experimental and analytical δ/h.
SCA DIMEN EXPL EXPERIM ANALY
LE SION OSIVE ENTAL TICAL
FAC (MM) Δ/H Δ/H
TOR
MASS
(KG)
1.25 1000X10 0.31 0.375 0.388
00X40
5. CONCLUSION
The considered scaling principals for this experiment
were like similitude geometric while scaling for blast load was
based on Hopkinson rule.
The crack develop more at the place where the blast effect
hits.
The damage level of the slab is mainly due to the strain
which caused by the blast load. The damage level of the slab
will be more when amount of explosion amount is more.
3
4. International Journal of Science and Engineering Applications
Volume 4 Issue 3, 2015, ISSN-2319-7560 (Online)
www.ijsea.com 133
From the result the failure patter are the same for almost
all of cases. Bigger samples face with more damages and
smaller one face less damages.
The surface which expose to the blast loading are damaged
seviour which causes more damage. The standoff distance,
explosion mass has the major influence over the damage of the
slab.
The spacing and the size of the reinforcement plays a
major role. Less spacing and bigger size reinforcement
sample will encounter a less amount of damage.
The locally damages on concrete slabs with bigger scale
compared to concrete slabs with smaller scale factor indicate
that by increasing the number of scale, this amount decreases.
6. ACKNOWLEDGMENTS
This paper is published with the permission of the guide,
department of civil engineering,Mepco Schlenk engineering
college.
7. REFERENCES
[1] Lok, T.S, Xiao J.R.; 1999.Steel-fibre-reinforced concrete
panels exposed to air blast loading; Proc Inst Civil Eng
Struct Build; 134:319e31.
[2] Mays, G.C; Hetherington, J.G; Rose, TA.;1999. Response
to blast loading of concrete wall panels with openings;
ASCE J StructEng; 125(12):1448e50. Tavel, P. 2007
Modeling and Simulation Design. AK Peters Ltd.
[3] Mosalam, K.M; Mosallam, A.S.; 2001.Nonlinear transient
analysis of reinforced concrete slabs subjected to blast
loading and retrofitted with CFRP composites; Compos
Part B-Eng; 32:623e36.
[4] Mosallam, A; Haroun, M; Mosalam, K.M.; 2001.Repair
and rehabilitation of reinforced and unreinforced concrete
slabs with polymer composites, In: Forde MC, editor.
Proceedings of the structural faults Repair-2001. London,
UK. Edinburgh UK: Engineering Technics Press; 2001,
July 4e6.A keynote paper, CD-ROM.
[5] Lawver, D; Daddazio, R; Jin Oh, G; Lee, C.K.B; Pifko,
A.B; Stanley, M.; 2003.Simulating the response of
composite reinforced floor slabs subjected to blast
loading; ASME Int Mech Eng Cong Wash DC;15e22.
[6] Ngo, T.; 2005.Behaviour of high strength concrete subject
to impulsive loading; Ph.D. thesis, Univ. of Melbourne,
Australia.
[7] Luccioni, B.M; Luege, M.; 2006.Concrete pavement slab
under blast loads,Int J Impact Eng; 32:1248e66.
[8] Lu, B; Silva, P.F.; 2007.Improving the blast
resistancecapacity of RC slabs with innovative composite
materials; Compos Part B-Eng; 38:523e34.
[9] Silva PF, Lu B. Blast resistance capacity of reinforced
concrete slabs. (2009): J StructEng-ASCE; 135:708e16.
[10] Mcvay, M.K.; 1998.Spall damage of concrete structures.
Technical Report SL 88e22; US Army Corps of Engineers
Waterways Experiment Station. al study on the
effectiveness of fiber sheet reinforcement on the
explosive-resistant performance of concrete plates. Int
Impact Eng;35:1702e8.
[11] Wu, C; Oehlers, D.J; Rebentrost, M; Burman,
N;Whittaker, A.S.; 2009.Blast testing of ultrahigh
performance fiber concrete slabs and FRP retrofitted RC
slabs; EngStruct; 31:2060e9.
[12] Nash, P.T;Vallabhan, C.V.G; Knight, T.C.; 1995.Spall
damage to concrete walls from close in cased and uncased
explosions in air; ACI Struct J; 92(6):680e8.
[13] Rabczuk, T; Eibl, J; Stempniewski, L.; 2004.Numerical
analysis of high speed concrete fragmentation using a
mesh free Lagrangian method;
EngFractMech;71(4e6):547e56.
[14] Wu, C; Nurwidayati, R; Oehlers,
D.J.;2009.Fragmentation from spallation of RC slabs due
to airblastloads; Int J Impact Eng; 36:1371e6.
[15] Rabczuk T, Eibl J.; 2003.Simulation of high velocity
concrete fragmentation using SPH/MLSPH.Int J Numer
Meth Eng; 56(10):1421e44.
[16] Xu, K; Lu, Y.; 2006.Numerical simulation study of
spallation in reinforced concrete plates subjected to
blast loading; Comput Struct; 84:431e8.
[17] Zhou, X.Q; Hao, H; Deeks, A.J.; 2005.Modeling dynamic
damage of concrete slab under blast loading; In: Hao
H,Lok TS, Lu GX, editors. Proceeding of the 6th Asia-
Pacific conference on shock and impact loads on
structures, December, Perth, WA, Australia; p. 703e10.
ISBN: 981-05-3550-3.
[18] Ngo, T; Mendis, P; Krauthammer, T.; 2007.Behavior of
ultrahigh-strength pre-stressed concrete panels subjected
to blast loading; J StructEng-ASCE; 133: 1582e90.