To date, few construction methods have helped the project managers make a decision on the near-optimum distributions of men, material, Space and tools according to their job objectives and job limitations. This thesis presents an intelligent scheduling system (ISS) that can assist the project managers to find the near-optimum agenda plan according to their job objectives and job limitations. Intelligent scheduling system (ISS) uses model techniques to share out resources and allocate dissimilar levels of priorities to different tricks in each model cycle to find the near-optimum solution. ISS considers and combines most of the important construction factors (agenda of task, expenses, manpower, breathing space, utensils and material) at the same time in a incorporated environment, which makes the resulting agenda that will be nearer to optimum. Moreover, ISS allows for what-if analysis of probable scenarios, and schedule adjustments based on unexpected conditions (modified orders, delayed material delivery, etc.). As a final point, two model applications and one real-world construction job are utilized to illustrate and evaluate the success of ISS with two commonly used software packages, Primavera Project Planner and Microsoft Project.
Top Viewed Articles from Academia in 2019- International Journal of Distribu...ijdpsjournal
The growth of Internet and other web technologies requires the development of new algorithms and architectures for parallel and distributed computing. International journal of Distributed and parallel systems is a bi monthly open access peer-reviewed journal aims to publish high quality scientific papers arising from original research and development from the international community in the areas of parallel and distributed systems. IJDPS serves as a platform for engineers and researchers to present new ideas and system technology, with an interactive and friendly, but strongly professional atmosphere.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Top Viewed Articles from Academia in 2019- International Journal of Distribu...ijdpsjournal
The growth of Internet and other web technologies requires the development of new algorithms and architectures for parallel and distributed computing. International journal of Distributed and parallel systems is a bi monthly open access peer-reviewed journal aims to publish high quality scientific papers arising from original research and development from the international community in the areas of parallel and distributed systems. IJDPS serves as a platform for engineers and researchers to present new ideas and system technology, with an interactive and friendly, but strongly professional atmosphere.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Resource levelling minimizes resource fluctuations by postpone the earliest start time (EST) of non-critical activities with corresponding floats. Float consumption for resource leveling may reduces the project completion probability. This paper presents a method to minimize the resource fluctuations with minimum impact of float consumption. A case study is presented to verify the validity and usability of the method.
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
The missing links in software estimation: Work, Team Loading and Team PowerLuigi Buglione
This presentation investigates the theoretical foundation of the basic concepts used in software effort estimation, productivity measurement and benchmarking. By elaborating on how similar concepts are defined and used in well-established engineering fields, we aim to shed light on some inconsistent and fallacious use of concepts and units of measure, resulting misconceptions and their consequences in project planning. Particularly, we focus on ‘Work’, ‘Team Power’ and ‘Team Loading’, analyzing the way many studies from the ‘70s on faced such issue. Too often projects fail for being late and not always adding new resources allows respecting established milestones as well as the established quality levels. After setting the theoretical layout, we present the results of an empirical investigation we made using the data in the International Software Benchmarking Standards Group (ISBSG) dataset D&E (Development & Enhancement) v13, using both COSMIC and IFPUG data for Business and Real-Time applications. The results indicate that a considerable number of projects might have been poorly planned and utilized human resources inefficiently, and hence paid much higher costs. Hence, we suggest software companies to revisit the productivity data of the past projects as well as evaluating the new ones by measuring Team Power, Team Loading and comparing to Team Size utilized.
In this deck from GTC 2019, Seongchan Kim, Ph.D. presents: How Deep Learning Could Predict Weather Events.
"How do meteorologists predict weather or weather events such as hurricanes, typhoons, and heavy rain? Predicting weather events were done based on supercomputer (HPC) simulations using numerical models such as WRF, UM, and MPAS. But recently, many deep learning-based researches have been showing various kinds of outstanding results. We'll introduce several case studies related to meteorological researches. We'll also describe how the meteorological tasks are different from general deep learning tasks, their detailed approaches, and their input data such as weather radar images and satellite images. We'll also cover typhoon detection and tracking, rainfall amount prediction, forecasting future cloud figure, and more."
Watch the video: https://wp.me/p3RLHQ-k2T
Learn more: http://en.kisti.re.kr/
and
https://www.nvidia.com/en-us/gtc/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Task Scheduling using Hybrid Algorithm in Cloud Computing Environmentsiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey on Service Request Scheduling in Cloud Based ArchitectureIJSRD
Cloud computing has become quite popular now-a-days. It facilitates the users to store and process their data which is stored in 3rd party data centers. Today in IT sector everything is run and managed on the cloud environment. As the number of users is increasing day by day, faster and efficient processing of large volume of data and resources is desired at all levels. So the management of resources attains prime importance. While using cloud computing various issues are encountered like load balancing, traffic while computation etc. Job scheduling is one of the solution of these problems which reduces the waiting time and maximizes the quality of services. In job scheduling “priority†is an important factor. In this paper, we will be discussing various scheduling algorithms and a review on dynamic priority scheduling algorithm.
Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...IJSRD
This paper presents, the performance of STATCOM placed at midpoint of the two machine power system and compared with the performance of SVC. The comparison of various results found for the different type of faults (single line, double line & three phase fault) occur in long transmission line, and their removal by using shunt FACTS devices is analysed. Computer simulation results under a severe disturbance condition (three phase fault) for different fault clearing times, and different line lengths are analyzed. Both controllers are implemented using MATLAB/SIMULINK. Simulation results shows that the STATCOM with conventional PI controller installed with two machine three bus systems provides better damping oscillation characteristics in rotor angle as compared to two machine power system installed with SVC. The transient stability of two machine system installed with STATCOM has been improved considerably and post settling time of the system after facing disturbance is also improved.
Role of Simulation in Deep Drawn Cylindrical PartIJSRD
Simulation is widely used in forming industry due to its speed and lower cost and it has been proven to be effective in prediction of formability and spring back behavior. The purpose of finite element simulation in the sheet metal forming process is to minimize the time and cost in the design phase by predicting key outcomes such as the final shape of the part, the possibility of various defects and the flow of material. Such simulation is most useful and efficient when it is performed in the early stage of design by designers, rather than by analysis specialists after the detailed design is complete. The accuracy of such simulation depends on knowledge of material properties, boundary conditions and processing parameters. In the industry today, numerical sheet metal forming simulation is very important tool for reducing load time and improving part quality. In this paper finite element model for the deep-drawing of cylindrical cups is constructed and the simulation results are obtained by using different simulation parameters, i.e. punch velocity, coefficient of friction and blank holder force of the FE mesh-elements and these results are compared with experimental work.
Robotic technology has the origin from the year 1954 and has very vast application in the field like energy, health, agriculture, education, research, motion and space etc. The disadvantage of any autonomous robot is that, it is very difficult to maintain stability of its traverse condition. In this paper, we have introduced and achieved maximum stability for the traverse condition through white line following technique. Here we are using the Fire Bird V robotic technology as our robotic medium, which has the Atmega2560 as its microcontroller and where it uses Studio 4 as its controller’s software platform. The control dynamic to the robot is sent via the software platform which is embedded ‘C’ language and the traverse condition is maintained. This robot runs at step down voltage value of 9V AC supply and has also uses lithium 9v battery as a stand by back up.
On The Homogeneous Biquadratic Equation with 5 UnknownsIJSRD
Five different methods of the non-zero integral solutions of the homogeneous biquadratic Diophantine equation with five unknowns are determined. Some interesting relations among the special numbers and the solutions are observed.
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
Outsourcing information to an outsider authoritative control, as is done in distributed computing, offers ascend to security concerns. The information trade off may happen because of assaults by different clients and hubs inside of the cloud. Hence, high efforts to establish safety are required to secure information inside of the cloud. On the other hand, the utilized security procedure should likewise consider the advancement of the information recovery time. In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that all in all methodologies the security and execution issues. In the DROPS procedure, we partition a record into sections, and reproduce the divided information over the cloud hubs. Each of the hubs stores just a itary part of a specific information record that guarantees that even in the event of a fruitful assault, no important data is uncovered to the assailant. Additionally, the hubs putting away the sections are isolated with certain separation by method for diagram T-shading to restrict an assailant of speculating the areas of the sections. Moreover, the DROPS procedure does not depend on the customary cryptographic procedures for the information security; in this way alleviating the arrangement of computationally costly approaches. We demonstrate that the likelihood to find and bargain the greater part of the hubs putting away the sections of a solitary record is to a great degree low. We likewise analyze the execution of the DROPS system with ten different plans. The more elevated amount of security with slight execution overhead was watched.
Design and Linear Static Analysis of Transport Aircraft Vertical Tail for Dif...IJSRD
The design of vertical tail structure varies according to nature of aircraft and its function. The experimental test of vertical tail structure is difficult and more expensive process. In this present work detailed design of transport aircraft vertical tail with rudder structure modelling done by using CATIA V5 R19 software. The static stress analysis is carried out to find the stresses at of the vertical tail with rudder structure for different deflection of rudder. The stresses are estimated to find the safety factor of the structure using finite element approach with the help of MSC/PATRAN and MSC/NASTRAN software. The material used in the vertical tail structure is aluminium 7075-T6, which has high fatigue strength. From the analysis it is found that maximum principal stress of vertical tail structure is less than yield strength of aluminium 7075-T6 alloy. The maximum principal stress value form analysis is used to find fatigue damage calculations for vertical tail structure. The obtained analytical result shows that safe no of fatigue life hours of vertical tail structure. The result is verified with reserve factor approach.
Experimental study on Torsion behavior of Flange beam with GFRPIJSRD
The Study deals with experimental study using glass fiber polymers in civil science. Repairing represents an important aspect of the construction industry and its importance is increasing due to surrounding conditions or geoenvironmental degradations, increased service loads, reduced ability (to hold or do something) due to (old/allowing to get old/getting older), worsening because of poor construction materials and work quality’s and need for seismic-related have demanded the need for repair and rehabilitation of existing structures. Fiber reinforced polymers has been utilized effectively as a part of numerous applications such as low weight, high quality and capacity to last. Numerous past examination chips away at torsion strengthening were centered on strong rectangular RC Beams with distinctive strip designs and diverse sorts of fiber. Distinctive models were produced to torsion test for strengthening of RC beams and effectively utilized for approval of the test works.In the present work test study was done with a specific end goal to have a superior comprehension the conduct of torsion reinforcing of strong RC flanged T-Beam. A RC T-beam is deliberately examined and intended for torsion like a RC rectangular beam; the impact of cement on flange is disregarded by codes. In the present study impact of width in changing so as to oppose torsion is concentrated on flange width of controlled bars. Alternate specification considered is reinforcing and fiber orientations.
Test Rig for Measurement of Spark Advance Angle and Ignition System Using AT8...IJSRD
An electronic ignition control system for internal combustion engine, notably for motor vehicles, which comprises a rotary member revolving at engine speed and provided with two reference marks Which the position correspond to the maximum ignition advance angle and to the minimum ignition advance angle, respectively , said reference marks defining at least one area on said rotary member, a sensor disposed in close vicinity of said rotary member so as to detect the moments of passage of said references marks and at least one up and down counter for counting pulse, said rotary member further comprising a third references marks separate from the first two reference marks aforesaid so as to define two successive areas scanned in succession by said sensor, while a first up and down counter positively counts the pulse from a first area and negatively counts, during passage of second area the pulse from second clock system adapted to emit pluses at a frequency programmable according to the desired ignition advance law, the resetting of said up and down counter being utilized for producing ignition spark. Finally up and down counter calculates the final value of the advance angle. After calculating the final value of advance angle signal send to the ignition box to ignition coil, and ignition coil operate the spark as per advance angle.
A Survey on Service Request Scheduling in Cloud Based ArchitectureIJSRD
Cloud computing has become quite popular now-a-days. It facilitates the users to store and process their data which is stored in 3rd party data centers. Today in IT sector everything is run and managed on the cloud environment. As the number of users is increasing day by day, faster and efficient processing of large volume of data and resources is desired at all levels. So the management of resources attains prime importance. While using cloud computing various issues are encountered like load balancing, traffic while computation etc. Job scheduling is one of the solution of these problems which reduces the waiting time and maximizes the quality of services. In job scheduling “priority†is an important factor. In this paper, we will be discussing various scheduling algorithms and a review on dynamic priority scheduling algorithm.
A Literature Survey on Comparative Analysis of RZ and NRZ Line Encoding over ...IJSRD
Modern world is the world of internet which requires more capacity and more bandwidth to modernize the world. Hence we move towards optical communication. When we talk about optical communication then chromatic dispersion is biggest obstacle for high speed optical channel. Chromatic dispersion can be reduced either by compensation technique [1, 2] or either by electronic dispersion compensation. In this paper, we make comparative analysis in RZ and NRZ line encoding over 40 Gbps system. Two different modulation formats including non-return-to-zero (NRZ), return-to-zero (RZ) is compared on the basis of Bit error rate and quality factor. The 40 Gbps signal is transmitted over 200 km in single mode fiber.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
Structural and Thermal Analysis of Metal - Ceramic Disk BrakeIJSRD
Disk brakes are using from so many years in automotive and still researches are going on in this field for decreasing the temperature effect so that by this we can operate easily. Many new materials are introduced for the disk brake rotor to withstand high temperature produced during braking action. Apart from the high temperature property, the disc rotor materials must also have high thermal conductivity property, as this property decides the amount of heat dissipation to the air stream from the disk rotor. A brake material with good temperature and high thermal conductivity property gives maximum efficiency by overcoming the problem of thermo-mechanical instability [TEI] in the rotor which is more common in low thermal conductivity brake rotor material. In the present work, a Grey cast iron material and metal-ceramic has been chosen for the disk brake rotor. Number of methods before already introduced to know the history of the different materials related to disk brakes, analysis will be done in 2d and 3d in analytical and numerical methods. With different types of assumptions these numerical methods ranges from finite differences to finite elements. To conclude the temperature history for the Grey cast iron material, and metal-ceramic, a numerical simulation technique called finite element method is used. Transient analysis is carried out in ANSYS to predict temperature distribution as a function of time in the disk brake rotor. The results from the transient analysis are compared. As the brake rotor can be treated as the coupled field problem, it is mandatory to do structural analysis after performing thermal analysis in ANSYS to study the stability and rigidity behavior of the rotor material. The results from the transient analysis are given as the input to the structural analysis in order to conclude the stress distribution and displacement in disk brake rotor under thermal loading. The stability behavior of different brake rotor material is compared to facilitate the conceptual design of the disk brake system.
Resource levelling minimizes resource fluctuations by postpone the earliest start time (EST) of non-critical activities with corresponding floats. Float consumption for resource leveling may reduces the project completion probability. This paper presents a method to minimize the resource fluctuations with minimum impact of float consumption. A case study is presented to verify the validity and usability of the method.
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
The missing links in software estimation: Work, Team Loading and Team PowerLuigi Buglione
This presentation investigates the theoretical foundation of the basic concepts used in software effort estimation, productivity measurement and benchmarking. By elaborating on how similar concepts are defined and used in well-established engineering fields, we aim to shed light on some inconsistent and fallacious use of concepts and units of measure, resulting misconceptions and their consequences in project planning. Particularly, we focus on ‘Work’, ‘Team Power’ and ‘Team Loading’, analyzing the way many studies from the ‘70s on faced such issue. Too often projects fail for being late and not always adding new resources allows respecting established milestones as well as the established quality levels. After setting the theoretical layout, we present the results of an empirical investigation we made using the data in the International Software Benchmarking Standards Group (ISBSG) dataset D&E (Development & Enhancement) v13, using both COSMIC and IFPUG data for Business and Real-Time applications. The results indicate that a considerable number of projects might have been poorly planned and utilized human resources inefficiently, and hence paid much higher costs. Hence, we suggest software companies to revisit the productivity data of the past projects as well as evaluating the new ones by measuring Team Power, Team Loading and comparing to Team Size utilized.
In this deck from GTC 2019, Seongchan Kim, Ph.D. presents: How Deep Learning Could Predict Weather Events.
"How do meteorologists predict weather or weather events such as hurricanes, typhoons, and heavy rain? Predicting weather events were done based on supercomputer (HPC) simulations using numerical models such as WRF, UM, and MPAS. But recently, many deep learning-based researches have been showing various kinds of outstanding results. We'll introduce several case studies related to meteorological researches. We'll also describe how the meteorological tasks are different from general deep learning tasks, their detailed approaches, and their input data such as weather radar images and satellite images. We'll also cover typhoon detection and tracking, rainfall amount prediction, forecasting future cloud figure, and more."
Watch the video: https://wp.me/p3RLHQ-k2T
Learn more: http://en.kisti.re.kr/
and
https://www.nvidia.com/en-us/gtc/
Sign up for our insideHPC Newsletter: http://insidehpc.com/newsletter
Task Scheduling using Hybrid Algorithm in Cloud Computing Environmentsiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Survey on Service Request Scheduling in Cloud Based ArchitectureIJSRD
Cloud computing has become quite popular now-a-days. It facilitates the users to store and process their data which is stored in 3rd party data centers. Today in IT sector everything is run and managed on the cloud environment. As the number of users is increasing day by day, faster and efficient processing of large volume of data and resources is desired at all levels. So the management of resources attains prime importance. While using cloud computing various issues are encountered like load balancing, traffic while computation etc. Job scheduling is one of the solution of these problems which reduces the waiting time and maximizes the quality of services. In job scheduling “priority†is an important factor. In this paper, we will be discussing various scheduling algorithms and a review on dynamic priority scheduling algorithm.
Comparison of Shunt Facts Devices for the Improvement of Transient Stability ...IJSRD
This paper presents, the performance of STATCOM placed at midpoint of the two machine power system and compared with the performance of SVC. The comparison of various results found for the different type of faults (single line, double line & three phase fault) occur in long transmission line, and their removal by using shunt FACTS devices is analysed. Computer simulation results under a severe disturbance condition (three phase fault) for different fault clearing times, and different line lengths are analyzed. Both controllers are implemented using MATLAB/SIMULINK. Simulation results shows that the STATCOM with conventional PI controller installed with two machine three bus systems provides better damping oscillation characteristics in rotor angle as compared to two machine power system installed with SVC. The transient stability of two machine system installed with STATCOM has been improved considerably and post settling time of the system after facing disturbance is also improved.
Role of Simulation in Deep Drawn Cylindrical PartIJSRD
Simulation is widely used in forming industry due to its speed and lower cost and it has been proven to be effective in prediction of formability and spring back behavior. The purpose of finite element simulation in the sheet metal forming process is to minimize the time and cost in the design phase by predicting key outcomes such as the final shape of the part, the possibility of various defects and the flow of material. Such simulation is most useful and efficient when it is performed in the early stage of design by designers, rather than by analysis specialists after the detailed design is complete. The accuracy of such simulation depends on knowledge of material properties, boundary conditions and processing parameters. In the industry today, numerical sheet metal forming simulation is very important tool for reducing load time and improving part quality. In this paper finite element model for the deep-drawing of cylindrical cups is constructed and the simulation results are obtained by using different simulation parameters, i.e. punch velocity, coefficient of friction and blank holder force of the FE mesh-elements and these results are compared with experimental work.
Robotic technology has the origin from the year 1954 and has very vast application in the field like energy, health, agriculture, education, research, motion and space etc. The disadvantage of any autonomous robot is that, it is very difficult to maintain stability of its traverse condition. In this paper, we have introduced and achieved maximum stability for the traverse condition through white line following technique. Here we are using the Fire Bird V robotic technology as our robotic medium, which has the Atmega2560 as its microcontroller and where it uses Studio 4 as its controller’s software platform. The control dynamic to the robot is sent via the software platform which is embedded ‘C’ language and the traverse condition is maintained. This robot runs at step down voltage value of 9V AC supply and has also uses lithium 9v battery as a stand by back up.
On The Homogeneous Biquadratic Equation with 5 UnknownsIJSRD
Five different methods of the non-zero integral solutions of the homogeneous biquadratic Diophantine equation with five unknowns are determined. Some interesting relations among the special numbers and the solutions are observed.
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
Outsourcing information to an outsider authoritative control, as is done in distributed computing, offers ascend to security concerns. The information trade off may happen because of assaults by different clients and hubs inside of the cloud. Hence, high efforts to establish safety are required to secure information inside of the cloud. On the other hand, the utilized security procedure should likewise consider the advancement of the information recovery time. In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that all in all methodologies the security and execution issues. In the DROPS procedure, we partition a record into sections, and reproduce the divided information over the cloud hubs. Each of the hubs stores just a itary part of a specific information record that guarantees that even in the event of a fruitful assault, no important data is uncovered to the assailant. Additionally, the hubs putting away the sections are isolated with certain separation by method for diagram T-shading to restrict an assailant of speculating the areas of the sections. Moreover, the DROPS procedure does not depend on the customary cryptographic procedures for the information security; in this way alleviating the arrangement of computationally costly approaches. We demonstrate that the likelihood to find and bargain the greater part of the hubs putting away the sections of a solitary record is to a great degree low. We likewise analyze the execution of the DROPS system with ten different plans. The more elevated amount of security with slight execution overhead was watched.
Design and Linear Static Analysis of Transport Aircraft Vertical Tail for Dif...IJSRD
The design of vertical tail structure varies according to nature of aircraft and its function. The experimental test of vertical tail structure is difficult and more expensive process. In this present work detailed design of transport aircraft vertical tail with rudder structure modelling done by using CATIA V5 R19 software. The static stress analysis is carried out to find the stresses at of the vertical tail with rudder structure for different deflection of rudder. The stresses are estimated to find the safety factor of the structure using finite element approach with the help of MSC/PATRAN and MSC/NASTRAN software. The material used in the vertical tail structure is aluminium 7075-T6, which has high fatigue strength. From the analysis it is found that maximum principal stress of vertical tail structure is less than yield strength of aluminium 7075-T6 alloy. The maximum principal stress value form analysis is used to find fatigue damage calculations for vertical tail structure. The obtained analytical result shows that safe no of fatigue life hours of vertical tail structure. The result is verified with reserve factor approach.
Experimental study on Torsion behavior of Flange beam with GFRPIJSRD
The Study deals with experimental study using glass fiber polymers in civil science. Repairing represents an important aspect of the construction industry and its importance is increasing due to surrounding conditions or geoenvironmental degradations, increased service loads, reduced ability (to hold or do something) due to (old/allowing to get old/getting older), worsening because of poor construction materials and work quality’s and need for seismic-related have demanded the need for repair and rehabilitation of existing structures. Fiber reinforced polymers has been utilized effectively as a part of numerous applications such as low weight, high quality and capacity to last. Numerous past examination chips away at torsion strengthening were centered on strong rectangular RC Beams with distinctive strip designs and diverse sorts of fiber. Distinctive models were produced to torsion test for strengthening of RC beams and effectively utilized for approval of the test works.In the present work test study was done with a specific end goal to have a superior comprehension the conduct of torsion reinforcing of strong RC flanged T-Beam. A RC T-beam is deliberately examined and intended for torsion like a RC rectangular beam; the impact of cement on flange is disregarded by codes. In the present study impact of width in changing so as to oppose torsion is concentrated on flange width of controlled bars. Alternate specification considered is reinforcing and fiber orientations.
Test Rig for Measurement of Spark Advance Angle and Ignition System Using AT8...IJSRD
An electronic ignition control system for internal combustion engine, notably for motor vehicles, which comprises a rotary member revolving at engine speed and provided with two reference marks Which the position correspond to the maximum ignition advance angle and to the minimum ignition advance angle, respectively , said reference marks defining at least one area on said rotary member, a sensor disposed in close vicinity of said rotary member so as to detect the moments of passage of said references marks and at least one up and down counter for counting pulse, said rotary member further comprising a third references marks separate from the first two reference marks aforesaid so as to define two successive areas scanned in succession by said sensor, while a first up and down counter positively counts the pulse from a first area and negatively counts, during passage of second area the pulse from second clock system adapted to emit pluses at a frequency programmable according to the desired ignition advance law, the resetting of said up and down counter being utilized for producing ignition spark. Finally up and down counter calculates the final value of the advance angle. After calculating the final value of advance angle signal send to the ignition box to ignition coil, and ignition coil operate the spark as per advance angle.
A Survey on Service Request Scheduling in Cloud Based ArchitectureIJSRD
Cloud computing has become quite popular now-a-days. It facilitates the users to store and process their data which is stored in 3rd party data centers. Today in IT sector everything is run and managed on the cloud environment. As the number of users is increasing day by day, faster and efficient processing of large volume of data and resources is desired at all levels. So the management of resources attains prime importance. While using cloud computing various issues are encountered like load balancing, traffic while computation etc. Job scheduling is one of the solution of these problems which reduces the waiting time and maximizes the quality of services. In job scheduling “priority†is an important factor. In this paper, we will be discussing various scheduling algorithms and a review on dynamic priority scheduling algorithm.
A Literature Survey on Comparative Analysis of RZ and NRZ Line Encoding over ...IJSRD
Modern world is the world of internet which requires more capacity and more bandwidth to modernize the world. Hence we move towards optical communication. When we talk about optical communication then chromatic dispersion is biggest obstacle for high speed optical channel. Chromatic dispersion can be reduced either by compensation technique [1, 2] or either by electronic dispersion compensation. In this paper, we make comparative analysis in RZ and NRZ line encoding over 40 Gbps system. Two different modulation formats including non-return-to-zero (NRZ), return-to-zero (RZ) is compared on the basis of Bit error rate and quality factor. The 40 Gbps signal is transmitted over 200 km in single mode fiber.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
Structural and Thermal Analysis of Metal - Ceramic Disk BrakeIJSRD
Disk brakes are using from so many years in automotive and still researches are going on in this field for decreasing the temperature effect so that by this we can operate easily. Many new materials are introduced for the disk brake rotor to withstand high temperature produced during braking action. Apart from the high temperature property, the disc rotor materials must also have high thermal conductivity property, as this property decides the amount of heat dissipation to the air stream from the disk rotor. A brake material with good temperature and high thermal conductivity property gives maximum efficiency by overcoming the problem of thermo-mechanical instability [TEI] in the rotor which is more common in low thermal conductivity brake rotor material. In the present work, a Grey cast iron material and metal-ceramic has been chosen for the disk brake rotor. Number of methods before already introduced to know the history of the different materials related to disk brakes, analysis will be done in 2d and 3d in analytical and numerical methods. With different types of assumptions these numerical methods ranges from finite differences to finite elements. To conclude the temperature history for the Grey cast iron material, and metal-ceramic, a numerical simulation technique called finite element method is used. Transient analysis is carried out in ANSYS to predict temperature distribution as a function of time in the disk brake rotor. The results from the transient analysis are compared. As the brake rotor can be treated as the coupled field problem, it is mandatory to do structural analysis after performing thermal analysis in ANSYS to study the stability and rigidity behavior of the rotor material. The results from the transient analysis are given as the input to the structural analysis in order to conclude the stress distribution and displacement in disk brake rotor under thermal loading. The stability behavior of different brake rotor material is compared to facilitate the conceptual design of the disk brake system.
A Review on Un filling Defect Found In Forging ProcessIJSRD
The objective of this paper is to find defects in forging process. Causes for unfilling defects are discussed and remedies for the unfilling defect would help to improve the quality of forging product. It is concluded that proper forging technique, improving die design, proper heating of billet reduce the unfilling defect. Simulation in FEM based software DEFORM 3D helps to detect unfilling defect and using discussed remedies help to reduce rejection rate.
A Study on Uniform and Apodized Fiber Bragg GratingsIJSRD
The design, simulation and analysis of an optical Fiber Bragg Grating for maximum reflectivity, minimum side lobe power wastage has been done using MATLAB software. The reflection spectra and side lobes strength were analyzed with different grating lengths, refractive index profiles and pitch values. The simulations are based on coupled mode equations and transfer matrix method that describes the interaction of guided modes.
Lid driven cavity flow simulation using CFD & MATLABIJSRD
Steady Incompressible Navier-Stokes equation on a uniform grid has been studied at various Reynolds number using CFD (Computational Fluid Dynamics). Present paper aim is to obtain the stream-function and velocity field in steady state using the finite difference formulation on momentum equations and continuity equation. Reynold number dominates the flow problem. Taylor’s series expansion has been used to convert the governing equations in the algebraic form using finite difference schemes. MATLAB has been used to draw to flow simulations inside the driven-cavity.
Experimental Investigation of Wear Properties of Aluminium LM25 Red Mud Metal...IJSRD
The use of different kind of Metal-matrix composite materials is in constant growing over the years, because they have better physical, mechanical and tribological properties comparing to matrix materials. In automotive industry they are used for pistons, cylinders, engine blocks, brakes and power transfer system elements. Research attempts have been made in the past toreduce the cost of processing of composites, decrease the weight of the composites, and increase the desired performance characteristics. This paper presents the findings of an experimental investigation on the effects of applied load, RPM, Sliding distance and pin temperature in dry sliding wear studies performed on red mud-based aluminum metal matrix composites (MMC). Red mud is an industrial waste during the production of aluminum from bauxite ore. A pin-on-disc apparatus was used to conduct the dry sliding wear test. Taguchi-based L9 orthogonal array has been used to accomplish the objective of the experimental study. Analysis of variance (ANOVA) is employed to find the optimal setting and the effect of each parameter on wear rate.
Optimized Assignment of Independent Task for Improving Resources Performance ...ijgca
Grid computing has emerged from category of distributed and parallel computing where the
heterogeneous resources from different network are used simultaneously to solve a particular problem that
need huge amount of resources. Potential of Grid computing depends on my issues such as security of
resources, heterogeneity of resources, fault tolerance & resource discovery and job scheduling. Scheduling
is one of the core steps to efficiently exploit the capabilities of heterogeneous distributed computing
resources and is an NP-complete problem. To achieve the promising potential of grid computing, an
effective and efficient job scheduling algorithm is proposed, which will optimized two important criteria to
improve the performance of resources i.e. makespan time & resource utilization. With this, we have
classified various tasks scheduling heuristic in grid on the basis of their characteristics.
Optimized Assignment of Independent Task for Improving Resources Performance ...Ricardo014
Grid computing has emerged from category of distributed and parallel computing where the heterogeneous resources from different network are used simultaneously to solve a particular problem that need huge amount of
resources. Potential of Grid computing depends on my issues such as security of resources, heterogeneity of resources, fault tolerance & resource discovery and job scheduling. Scheduling is one of the core steps to
efficiently exploit the capabilities of heterogeneous distributed computing resources and is an NP-complete problem. To achieve the promising potential of grid computing, an effective and efficient job scheduling algorithm is
proposed, which will optimized two important criteria to improve the performance of resources i.e. makespan time & resource utilization. With this, we have classified various tasks scheduling heuristic in grid on the basis of
their characteristics.
Optimized Assignment of Independent Task for Improving Resources Performance ...ijgca
Grid computing has emerged from category of distributed and parallel computing where the heterogeneous resources from different network are used simultaneously to solve a particular problem that need huge amount of resources. Potential of Grid computing depends on my issues such as security of resources, heterogeneity of resources, fault tolerance & resource discovery and job scheduling. Scheduling is one of the core steps to efficiently exploit the capabilities of heterogeneous distributed computing resources and is an NP-complete problem. To achieve the promising potential of grid computing, an effective and efficient job scheduling algorithm is proposed, which will optimized two important criteria to improve the performance of resources i.e. makespan time & resource utilization. With this, we have classified various tasks scheduling heuristic in grid on the basis of their characteristics.
Effective and Efficient Job Scheduling in Grid ComputingAditya Kokadwar
The integration of remote and diverse resources and the increasing computational needs of Grand Challenges problems combined with the faster growth of the internet and communication technologies leads to the development of global computational grids. Grid computing is a prevailing technology, which unites underutilized resources in order to support sharing of resources and services distributed across numerous administrative region. An efficient and effective scheduling system is essentially required in order to achieve the promising capacity of grids. The main goal of scheduling is to maximize the resource utilization and minimize processing time and cost of the jobs. In this research, the objective is to prioritize the jobs based on execution cost and then allocate the resources with minimum cost by merging it with conventional job grouping strategy to provide the solution for better and more efficient job scheduling which is beneficial to both user and resource broker. The proposed scheduling approach in grid computing employs a dynamic cost-based job scheduling algorithm for making an efficient mapping of a job to available resources in the grid. It also improves communication to computation ratio (CCR) and utilization of available resources by grouping the user jobs before resource allocation.
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Journals
Abstract Nowadays cloud computing is emerging Technology. It is used to access anytime and anywhere through the internet. Hadoop is an open-source Cloud computing environment that implements the Googletm MapReduce framework. Hadoop is a framework for distributed processing of large datasets across large clusters of computers. This paper proposes the workload of jobs in clusters mode using Hadoop. MapReduce is a programming model in hadoop used for maintaining the workload of the jobs. Depend on the job analysis statistics the future workload of the cluster is predicted for potential performance optimization by using genetic algorithm. Key Words: Cloud computing, Hadoop Framework, MapReduce Analysis, Workload
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Scheduling in Virtual Infrastructure for High-Throughput Computing IJCSEA Journal
For the execution of the scientific applications, different methods have been proposed to dynamically provide execution environments for such applications that hide the complexity of underlying distributed and heterogeneous infrastructures. Recently virtualization has emerged as a promising technology to provide such environments. Virtualization is a technology that abstracts away the details of physical hardware and provides virtualized resources for high-level scientific applications. Virtualization offers a cost-effective and flexible way to use and manage computing resources. Such an abstraction is appealing in Grid computing and Cloud computing for better matching jobs (applications) to computational resources. This work applies the virtualization concept to the Condor dynamic resource management system by using Condor Virtual Universe to harvest the existing virtual computing resources to their maximum utility. It allows existing computing resources to be dynamically provisioned at run-time by users based on application requirements instead of statically at design-time thereby lay the basis for efficient use of the
available resources, thus providing way for the efficient use of the available resources.
Bragged Regression Tree Algorithm for Dynamic Distribution and Scheduling of ...Editor IJCATR
In the past few years, Grid computing came up as next generation computing platform which is a combination of
heterogeneous computing resources combined by a network across dynamic and geographically separated organizations. So, it
provides the perfect computing environment to solve large-scale computational demands. As the Grid computing demands are still
increasing from day to day due to rise in large number of complex jobs worldwide. So, the jobs may take much longer time to
complete due to poor distribution of batches or groups of jobs to inappropriate CPU’s. Therefore there is need to develop an efficient
dynamic job scheduling algorithm that would assign jobs to appropriate CPU’s dynamically. The main problem which dealt in the
paper is, how to distribute the jobs when the payload, importance, urgency, flow time etc. dynamically keeps on changing as the grid
expands or is flooded with number of job requests from different machines within the grid.
In this paper, we present a scheduling strategy which takes the advantage of decision tree algorithm to take dynamic decision
based on the current scenarios and which automatically incorporates factor analysis for considering the distribution of jobs.
An enhanced adaptive scoring job scheduling algorithm with replication strate...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...Editor IJCATR
This article is intended to use the multi-PSO algorithm for scheduling tasks for cost management in cloud computing. This means that
any migration costs due to supply failure consider as a one objective and each task is a little particle and recognize by use of the
appropriate fitness schedule function (how the particles arrangement) that cost at least amount of total expense. In addition to, the weight
is granted to the each expenditure that reflects the importance of cost. The data which is used to simulate proposed method are series of
academic and research data that are prepared from the Internet and MATLAB software is used for simulation. We simulate two issues,
in the first issue, consider four task by four vehicles and divide tasks. In the second issue, make the issue more complicated and consider
six tasks by four vehicles. We write PSO's output for each two issues of various iterations. Finally, the particles dispersion and as well
as the output of the cost function were computed for each pa
HW/SW Partitioning Approach on Reconfigurable Multimedia System on ChipCSCJournals
Due to the complexity and the high performance requirement of multimedia applications, the design of embedded systems is the subject of different types of design constraints such as execution time, time to market, energy consumption, etc. Some approaches of joint software/hardware design (Co-design) were proposed in order to help the designer to seek an adequacy between applications and architecture that satisfies the different design constraints. This paper presents a new methodology for hardware/software partitioning on reconfigurable multimedia system on chip, based on dynamic and static steps. The first one uses the dynamic profiling and the second one uses the design trotter tools. The validation of our approach is made through 3D image synthesis.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Computer aided design (CAD) has increased by orders of magnitude the power of design tools available
to the engineer. Advantages of CAD include the reduction of computation time and therefore its cost, the elimination
of the amount of tedious and error-prone detailed calculations done by the engineer, and the ability to develop and
analyze much more complete models of structures. All present applications of the computer to structural design deal
with later stages of the design process, namely, analysis, proportioning and drafting. In Architecture more
prominence is given to outlook and not aesthetics and we as engineers should consider this as a problem and give a
solution in the form of optimization. With the advancements of a section of computer science called artificial
intelligence, it is now conceivable to create a knowledge-based system to automate or assist in the early, preliminary
stages of the civil engineering design process. The purpose of this work is to try and design a set of algorithms to solve
the building design problem as an optimization issue.
Similar to Surveying, Planning and Scheduling For A Hill Road Work at Kalrayan Hills by Adopting ISS Method (20)
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
The data in real world applications is distributed at multiple locations, and the owner of the databases may be different people. Thus to perform mining task, the data needs to be kept at central location which causes threat to the privacy of corporate data. Hence the key challenge is to applying mining on distributed source data with preserving privacy of corporate data. The system addresses the problem of incrementally mining frequent itemsets in dynamic environment. The assumption made here is that, after initial mining the source undergoes into small changes in each time. The privacy of data should not be threatened by an adversary i.e. the miner and target database owner should not be able to recover original data from transformed data.
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
The current trends in CI engine are to use Water-diesel emulsion as alternative fuel. It can be employed directly to the existing CI Engine system with no additional modifications. This system helps in reduction of NOx as well as PM, which in turn improve the combustion efficiency of the engine. However there are still investigations have to be done. The current work mainly concentrated on diesel engine run on water-diesel emulsions and its effect on engine performance and emissions were studied. The various loads were applied on a constant speed diesel engine run on water-diesel emulsions of varying ratios of 0.2:1, 0.3:1. 0.4:1 and 0.5:1. Emission and performance characteristics were measured and were compared with base diesel operation. The emissions like NOx and smoke density were found to decrease greatly and brake thermal efficiency was found to increase at high loads. Smoke level was 4.2 BSU and 3 BSU for base diesel and water diesel emulsion of 0.4. The ignition delay was found to increase with water diesel emulsions. This also increased the maximum rate of pressure rise and peak pressure. The engine was found to run rough with water-diesel emulsions. The optimal water-diesel ratio was found to be 0.4:1 by weight. HC and CO emissions were found to increase with water diesel emulsions.
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
Pressure is an important physical parameter to be controlled in process boiler, heat exchanger, nuclear reactor and steam carrying pipeline. In the article the issue has been face in boiler operation due to pressure is handled. In boiler, the problem is due to maximum and minimum range of pressure. Due to the issues there is a chance to causes the hazop. To avoid such the problem the high and low pressure in boiler has to control. In the paper such the problem has sorted out by implementing ON-OFF control. Here the proposed control action for pressure control is implemented with the help of LabVIEW (Laboratory Virtual Instrument Engineering Workbench) software and NI ELVIS hardware. In the idea the boiler’s low range and high is monitored and controlled valve desirably. And also the high range and low range of pressure in the boiler is signified to plant operator by alarm signal.
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
In this paper it is discuss about AODV protocol and security attacks and man in the middle attack in detail. AODV Protocol is use to find route and very important protocol for communication in wireless network. So AODV protocol should be Secured and it is a big challenge. There are various attacks that occur on it. Here in this paper it discussed about the detection and preventions of man-in-the-middle attack in detail.
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
In this modern era, Orthogonal Frequency Division Multiplexing (OFDM) has been proved to be an explicit promising technique for wired and wireless systems because of its several advantages like high spectral efficiency, robustness against frequency selective fading, relatively simple receiver implementation etc. Besides having a number of advantages OFDM suffers from few disadvantages like high Peak to Average Power Ratio (PAPR), Intercarrier Interference (ICI), Intersymbol Interference (ISI) etc. These detrimental effects, if not compensated properly and timely, can result in system performance degradation. This paper mainly concentrates on reduction of PAPR.A comparisons have been made between various precoding techniques against conventional OFDM.
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Keystroke Dynamics Authentication with Project Management SystemIJSRD
Generally user authentication is done using username and password that is called as login process. This login process is not more secure because, however a login session is still unprotected to impersonator when the user leaves his computer without logging off. Keystroke dynamics methods can be made useful to verify a user by extracting some typing features then, after the authentication process has successfully ended. From the last decade several studies proposed the use of keystroke dynamics as a behavioral biometric tool to verify users. We propose a new method, for representing the keystroke patterns by joining similar pairs of consecutive keystrokes. The above proposed method is used to consider clustering the di-graphs which are based on their temporal features. In this project, authentication system is provide to project management system that make more Secure management system without acknowledging unauthorized user. The Project Management System addresses the management of software projects. It provides the framework for organizing and managing resources in such a way that these resources deliver all the work required to complete a software project within defined scope, time and cost constraints. The system applies only to the management of software projects and is a tool that facilitates decision making.
Diagnosing lungs cancer Using Neural NetworksIJSRD
Artificial Neural Networks is the new technology. It is the branch of Artificial Intelligence and also it is an accepted new technology. Now a days Neural Networks Plays a Vital role in Medicine, Particularly in some fields such as cardiology, oncology etc. And also it has many applications in many areas like Science and Technology, Education, Business, Business and Manufacturing, etc. Neural Networks is most useful for making the decision more Effective. In this Paper, by the use of Neural Networks how the severe disease Lungs Cancer has been diagnosed more effectively. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. The Neural Networks has been successfully applied in Carcinogenesis. The main aim of this research is by the use of Neural Networks the Carcinogenesis can be diagnosed more cost-effective, easy to use techniques and methods. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. Sputum Cytology is used to detect the Lungs Cancer in Early stages.
A Survey on Sentiment Analysis and Opinion MiningIJSRD
In Today’s world, the social media has given web users a place for expressing and sharing their thoughts and opinions on different topics or events. For this purpose, the opinion mining has gained the importance. Sentiment classification and Opinion Mining is the study of people’s opinion, emotions, attitude towards the product, services, etc. Sentiment Analysis and Opinion Mining are the two interchangeable terms. There are various approaches and techniques exist for Sentiment Analysis like Naïve Bayes, Decision Trees, Support Vector Machines, Random Forests, Maximum Entropy, etc. Opinion mining is a useful and beneficial way to scientific surveys, political polls, market research and business intelligence, etc. This paper presents a literature review of various techniques used for opinion mining and sentiment analysis.
A Defect Prediction Model for Software Product based on ANFISIJSRD
Artificial intelligence techniques are day by day getting involvement in all the classification and prediction based process like environmental monitoring, stock exchange conditions, biomedical diagnosis, software engineering etc. However still there are yet to be simplify the challenges of selecting training criteria for design of artificial intelligence models used for prediction of results. This work focus on the defect prediction mechanism development using software metric data of KC1.We have taken subtractive clustering approach for generation of fuzzy inference system (FIS).The FIS rules are generated at different radius of influence of input attribute vectors and the developed rules are further modified by ANFIS technique to obtain the prediction of number of defects in software project using fuzzy logic system.
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
In this experimental work ninety nine cubes has been prepared having dimension 70.7x70.7x70.7 mm are cast as per IS:4031 (2000). In this experimental investigation cement mortar mix 1:3 by volume were selected for 0%, 20%, 40%, 60%, 80% and 100% partially replacement of natural sand (NS) by Granulated blast furnace slag (GBFS) and quarry dust (QD) [3 cubes on each parameter respectively] for W/C ratio of 0.55 respectively. All the cubes were tested under compressive testing machine. To compare the average compressive strength of natural sand (NS) with granulated blast furnace slag (GBFS) and quarry dust (QD).
Product Quality Analysis based on online ReviewsIJSRD
Customers satisfaction is the most important criteria before buying any product. Technology today has grown to such an extent that every smallest possible query is found on internet. An individual can express his reviews towards a product through Internet. This allows others to have a brief idea about the product before buying one for them. In this paper, we take into account all the challenges and limitations encountered while reading the online reviews and time being consumed in understanding quality of the product from the reviews. We include several methods and algorithms that help the consumer to understand the Quality of the product in better way.
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
The matrix game theory gives a mathematical background for dealing with competitive or antagonistic situations arise in many parts of real life. Matrix games have been extensively studied and successfully applied to many fields such as economics, business, management and e-commerce as well as advertising. This paper deals with two-person matrix games whose elements of pay-off matrix are fuzzy numbers. Then the corresponding matrix game has been converted into crisp game using defuzzification techniques. The value of the matrix game for each player is obtained by solving corresponding crisp game problems using the existing method. Finally, to illustrate the proposed methodology, a practical and realistic numerical example has been applied for different defuzzification methods and the obtained results have been compared
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
Data mining is a technology used in different disciplines to search for significant relationships among variables in n number of data sets. Data mining is frequently used in all types’ areas as well as applications. In this paper the application of data mining is attached with the field of education. The relationship between student’s university entrance examination results and their success was studied using cluster analysis and k-means algorithm techniques.
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
Big data is a popular term used to define the exponential evolution and availability of data, includes both structured and unstructured data. The volatile progression of demands on big data processing imposes heavy burden on computation, communication and storage in geographically distributed data centers. Hence it is necessary to minimize the cost of big data processing, which also includes fault tolerance cost. Big Data processing involves two types of faults: node failure and data loss. Both the faults can be recovered using heartbeat messages. Here heartbeat messages acts as an acknowledgement messages between two servers. This paper depicts about the study of node failure and recovery, data replication and heartbeat messages.
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
In case of friction stir welding, the maximum temperature along the weld line within appropriate range at tool workpiece interface is responsible for quality of welded joint. Through this paper, an attempt is made to establish a relationship between the input process parameters and the maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075. The design of pre-experimental simulation has been performed in accordance with full factorial technique. The simulation of friction stir welding has been performed by varying input parameters, tool rotational speed and welding speed. The analysis of variance (ANOVA) is used to investigate the effect of input parameters on maximum temperature during friction stir welding. A correlation was established between input parameters and maximum temperature by multiple regression lines. This study indicates that the tool rotational speed is the main input parameter that has high statistical influence on maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075.
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
The intent of this paper is to study the various forces and stress acting on a rotor shaft of a standard rotavator which is subjected to transient loading. The standard models of rotavator, having a progressive cutting sequence was considered for the study and analysis. The study was extended to various available models having different cutting blade arrangement. The study was carried on different papers and identifies the various forces acting on a Rotor shaft of a rotavator. The positions of the torque and forces applied are varied according to the model considered. The response was obtained by considering the angle of twist and equivalent stress on the rotor shaft. This paper presented a methodology for conducting transient analysis of rotor shaft of a rotavator,
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
A crime is an act which is against the laws of a country or region. The technique which is used to find areas on a map which have high crime intensity is known as crime hotspot prediction. The technique uses the crime data which includes the area with crime rate and predict the future location with high crime intensity. The motivation of crime hotspot prediction is to raise people’s awareness regarding the dangerous location in certain time period. It can help for police resource allocation for creating a safe environment. The paper presents survey of different types of data mining techniques for crime hotspots prediction.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Surveying, Planning and Scheduling For A Hill Road Work at Kalrayan Hills by Adopting ISS Method
1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 952
Surveying, Planning and Scheduling for a Hill Road Work at Kalrayan
Hills by Adopting ISS Method
VijayaSundravel K1
Saravanarajan N2
Amirthagadeshwaran G3
VijayaSrinivasan K4
Sureshkumar M P5
1,2,3,4,5
Assistant Professor
1,2,3,4,5
Department of Civil Engineering
1,2,3,5
K.S.Rangasamy College of Technology, Tiruchengode 4
Tagore Engineering College, Chennai
Abstract— To date, few construction methods have helped
the project managers make a decision on the near-optimum
distributions of men, material, Space and tools according to
their job objectives and job limitations. This thesis presents
an intelligent scheduling system (ISS) that can assist the
project managers to find the near-optimum agenda plan
according to their job objectives and job limitations.
Intelligent scheduling system (ISS) uses model techniques to
share out resources and allocate dissimilar levels of
priorities to different tricks in each model cycle to find the
near-optimum solution. ISS considers and combines most of
the important construction factors (agenda of task, expenses,
manpower, breathing space, utensils and material) at the
same time in a incorporated environment, which makes the
resulting agenda that will be nearer to optimum. Moreover,
ISS allows for what-if analysis of probable scenarios, and
schedule adjustments based on unexpected conditions
(modified orders, delayed material delivery, etc.). As a final
point, two model applications and one real-world
construction job are utilized to illustrate and evaluate the
success of ISS with two commonly used software packages,
Primavera Project Planner and Microsoft Project.
Key words: Primavera Project Planner, intelligent
scheduling system, Microsoft Project
I. INTRODUCTION
Construction projects are becoming gradually superior and
more composite in terms of physical size and cost, hence the
risks and potential for losses require better control. Project
management has evolved mainly because of the need to
direct costs and schedule. The Intelligent Scheduling
Systems have been implemented to produce answers to the
Questions which becomes difficult to the Project Managers.
What is the near-optimum resource (i.e., manpower,
material and equipment) distribution for each activity
for different combinations of project objectives (e.g.,
bare minimum project cost and bare minimum job
duration) and project constraints (e.g., project due date
and daily resource constraints)?
What is the near-optimum space distribution that can
satisfy the requirements of resources with the minimum
prohibition for the project objectives?
What is the probability to reach the project objectives?
Thus, the contractors can decide if they should buy the
insurances for their projects and how much that they
should buy accordingly. More importantly, is there a
more reliable way to do risk analyses?
What are the impacts if schedule adjustments are
required based on unforeseen conditions (e.g., change
orders and late material delivery)?
ISS was developed from combining computer
simulation with analytical techniques. This approach can use
the advantages and avoid the disadvantages of both
simulation and mathematical modeling techniques. ISS
considers and Integrates most of the important construction
factors (schedule, cost, manpower, equipment, and material)
simultaneously during the process of finding the near-
optimum schedule, which makes the resulting schedule
closer to optimal.
II. OBJECTIVE OF STUDY
The Main Objectives to Implement ISS method is:
To produce efficient schedules, and Handle complex,
mission-critical scheduling problems using ISS Method
The Major Objectives of ISS Method is:
1) Applies evolutionary techniques to decide the near-
optimum distributions of manpower, equipment,
material and space according to project objectives and
project constraints.
2) Considers and integrates most of the important
construction factors (schedule, cost, manpower,
equipment, material and space) simultaneously in a
unified environment, which makes the resulting
schedule that will be close to optimal
3) Improves risk analyses on project duration, project cost,
project revenue, and net present
III. OTHER TOOLS AND CONCEPTS UTILIZED
1) Captures Quantity Takeoffs from a 3D CAD model
automatically
a) ISS allows project managers to capture quantity
takeoffs from a 3D CAD model automatically through
database linkage system (built by the author andwill be
introduced in a companion paper) and Dynamic Data
Exchange (DDE) technique, or assign them manually
2) Develops Production Rate of Driving Resources
a) The production rate of the driving resource determines
the duration of the activity. ISS affords a manual
interface to allow project managers to assign a possible
maximum production rate for each resource in each
activity. Production rates of driving resources in each
activity will be identified and posted after running the
simulation process
3) Develops the Utilization rate of each Resource/Space
Allocation
a) The purpose of developing utilization rates for each
resource (manpower, equipment, material, space)
allotted to a whole project in ISS is to afford project
mangers the necessary databases to adjust the required
resource amounts and space distributions.
4) What-if Analysis of possible scenario
2. Surveying, Planning and Scheduling for a Hill Road Work at Kalrayan Hills by Adopting ISS Method
(IJSRD/Vol. 3/Issue 10/2015/213)
All rights reserved by www.ijsrd.com 953
a) ISS allows project managers to set up project
constraints for any variable, project goals, maximum
available resources for the whole projects. Once any of
the settings is changed, ISS will reallocate the resource
distribution for every activity. Thus activity duration,
Project Schedule, Net Present Value will change
accordingly.
5) Schedule Adjustments based on unforeseen conditions
a) ISS allows the project managers to do the schedule
adjustments based on their requirements and practical
situations.
IV. STRUCTURE OF ISS
A. Iss Flow Chart
The Flow Chart Consists of
1) Activity Network Building
2) Simulation Execution
3) Risk Analysis
B. Activity Network Building:
1) Step 1
The available manpower/equipment/material/space types in
the whole project are identified. Then, the activity network
is built and the resource types required in each activity are
identified.
2) Step 2
The work quantity takeoffs for
manpower/equipment/material are imported from 3D CAD
model or assigned manually in each activity. And, the
maximum available resource/space quantity and mean unit
cost in the whole project are identified. In this simulation
model all of the resources, except material resources which
are assumed without daily resource constraints, are assigned
integer variables with uniform distribution from one to their
maximum available resource amount in each activity. The
mean resource productivity and resource relationship
constraints (e.g. one truck needs one driver) in each activity
are assigned. The project objectives (e.g., minimum project
duration, minimum project cost, or minimum project cost
without exceeding assigned project due date) and project
constraints (e.g., project due date and daily resource
constraints) are defined.
C. Simulation Execution
3) Step 3
The Number of simulation Iterations is set
4) Step 4
In each activity, activity priority (the right to take
precedence in obtaining required resources) is an assigned
integer variable with a uniform distribution from one to the
total activity quantity in the whole project.
5) Step 5
Manpower /Equipment/Space is distributed accordingly to
the activity priority assigned in step 4.
6) Step 6
Activity duration, activity schedule and project duration are
calculated according to the resources distributed in step 5.
7) Step 7
After the resources are assigned to each activity and the
activity schedule is calculated, the resources used in every
hour/day are summarized. If a resource is assigned a certain
value that violates the assigned resources' relationship
constraints, or the total resource amount used in any
hour/day exceeds the hourly/daily resource limit, this
resource will be re-assigned another value so that the above
constraints are satisfied.
8) Step 8
Material Quantity required for each activity is calculated.
9) Step 9
Activity Cost and Project Cost are calculated.
10) Step 10
The simulation model produces outputs on a number of
parameters that can be used towards optimization of the
project. Such project parameters are: activity and project
durations, activity and project costs, project net present
value, project revenue, material quantity and optimum crew
in each activity, actual resource productivity in each
activity, risk analysis of project duration, project cost, and
project net present value at the project's start date. The
output data is saved in each simulation iteration.
11) Step 11
At the end of every run, the simulation model will compare
the outputs produced in step 10 with the optimum computer
outputs in memory (from the previous simulation run). If the
new outputs are better than the previous optimum ones, the
model will replace the old optimum outputs with the new
outputs and update the underlying databases (e.g., the
assigned resources and space for each activity).
Alternatively, if the simulation produces successively worse
results, the simulation model will maintain the optimum
results in memory. Successive simulation alterations (to
specified number of simulation runs) will therefore produce
optimal results. Optimality is dependent on the project
objectives defined in step 2.
12) Step 12
The algorithm repeats step 4 to 12, until the total number of
simulation runs reaches the number of simulation iterations
set in step 3.
D. Risk Analysis:
13) Step 13
The number of extra simulations iterations for risk analysis
is set.
14) Step 14
The resource productivity and resource unit cost are set as
probability density function.
15) Step 15
The resource quantity is assigned as constant as the
optimum result obtained from simulation execution stage.
16) Step 16
The probability distribution/cumulative distribution of
project duration/project cost/project revenue/project net
present value are produced.
V. ISS ALGORITHM
Activities are the basic elements that ISS directly deals with
during a simulation experiment. The dynamic behaviour of a
construction process is portrayed by detailing the changes in
the state of activities. The major simulation algorithm of ISS
involves two stages: (1) calculate production rate of driving
resource, activity duration, activity cost, activity revenue,
and space requirements of an activity; and (2) select activity
for construction
3. Surveying, Planning and Scheduling for a Hill Road Work at Kalrayan Hills by Adopting ISS Method
(IJSRD/Vol. 3/Issue 10/2015/213)
All rights reserved by www.ijsrd.com 954
A. Stage 1:
Calculate Production rate of driving resource, activity
duration, activity cost, activity revenue, and space
requirements of activity.
Before ISS can begin the resource/space allocation,
the activity duration, activity cost, activity revenue, and the
space requirements of each activity must be calculated first.
B. Stage 2:
All activities are equally checked against their logical,
resource and space requirements. If an activity meets all
conditions for start, it is selected into the feasibility activity
set, and the early start time of an activity is equal to the
maximum of the earliest available time of required
resources, required spaces, and dependent activities. The
activity with the minimum early start time is then selected
for construction.
VI. CONCLUSIONS
ISS uses simulation techniques to assign different levels of
priorities to different activities in every simulation cycle to
find near-optimum distributions of manpower, material,
equipment and space according to their project objectives
and project constraints. This helps ISS to avoid the resulting
schedule to be trapped in local optima and get rid of
application limits.
The major contributions of this model are listed as follows:
1) Applies evolutionary techniques to decide the near-
optimum distributions of manpower, equipment, material
and space according to project objectives and project
constraints
2) Considers and integrates most of the important
construction factors (schedule, cost, manpower,
equipment, material and space) simultaneously in a
unified environment, which makes the resulting schedule
that will be close to optimal
3) Improves risk analyses on project duration, project cost,
project revenue, and net present.
And, the other tools and concepts utilized in this
model are listed as follows:
1) Captures quantity take offs from a 3D CAD model
automatically
2) Develops production rates of driving resources
3) Develops the utilization rate of each resource/space
allocation
4) What-if analyses of possible scenarios
5) Schedule adjustments based on unforeseen conditions
REFERENCES
[1] H. Ahuja, S.P. Dozzi, S.M. AbouRizk, Project
management techniques in planning and controlling
construction projects, 2nd Ed. Wiley, N.Y., 1995
[2] M.-Y. Cheng. ―Automated site layout of temporary
facilities using geographic information systems (GIS),‖
PhD dissertation, Civil Engineering Dept., University of
Texas, Austin, Tex. 1992.
[3] S. Cheung, T.K. Tong, C. Tam, Site pre-cast yard layout
arrangement through genetic algorithms, Autom. Constr.
11 (2002) 35–46.
[4] E. Elbeltagi, T. Hegazy, A. Eldosouky, Dynamic layout
of construction temporary facilities considering safety, J.
Constr. Eng. Manage. 130 (4) (2004) 534–541.
[5] A. Hamiani, ―CONSITE: a knowledge-based expert
system framework for construction site layout,‖ PhD
dissertation, Civil Engineering Dept., University of
Texas, Austin, Tex. 1987.
[6] T. Hegazy, H. El-Zamzamy, Project management
software that meet the challenge, Cost Engineering,
AACE International, Vol. 4, No. 5, 1998, pp. 25–33.
[7] T. Hegazy, Computer-based Construction Project
Management, Prentice-Hall, Upper Saddle River, N.J.,
2002.
[8] T. Hegazy, H. El-Zamzamy, Project management
software that meets the challenge, Cost Eng. 40 (5)
(1998) 25–32.
[9] T. Hegazy, E. Elbeltagi, EvoSite: evolutionary-based
model for site layout planning, J. Comput. Civ. Eng. 13
(3) (1999) 198–206.
[10]A. Khalafallah, K. El-Rayes, Trade-off between safety
and cost in planning construction site layouts, J. Constr.
Eng. Manage. 131 (11) (2005) 1186–1195.
[11]A. Khalafallah, K. El-Rayes, Minimizing construction
related hazards in airport expansion projects, J. Constr.
Eng. Manage. 132 (6) (2006) 562–572.
[12]H. Li, P. Love, Using improved genetic algorithms to
facilitate time-cost optimization, J. Constr. Eng. Manage.
123 (3) (1997) 233–237.
[13]K.-L. Lin, C.T. Haas, An interactive planning
environment for critical operations, J. Constr. Engr.
Manage. ASCE 122 (3) (1996) 212–222.
[14]M.J. Mawdesley, S.H. Al-jibouri, H. Yang, Genetic
algorithms for construction site layout in project
planning, J. Constr. Eng. Manage. 128 (5) (2002) 418–
426.
[15]B.Montreuil, U. Venkatadri, Strategic interpolative
design of dynamicmanufacturing systems layouts,
Manage. Sci. 37 (6) (1991) 682–693.
[16]H. Osman, M.E. Georgy, M.E. Ibrahim, A hybrid CAD
based construction site layout planning system using
genetic algorithms, Autom. Constr. 12 (2003) 749–764.
[17]H. Osman, M.E. Georgy, M.E. Ibrahim, An automated
system for dynamic construction site layout planning,
Proc., 10th Int. Colloquium on Structural and
Geotechnical Engineering, Ain Shams University, Cairo,
Egypt, 2003.
[18]D.R. Riley, ―Modeling the space behavior of
construction activities,‖ PhD dissertation, Dept. of
Architectural Engrg., Penn State University, University
Park, Pa. 1994.
[19]W.E. Rodriguez-Ramos, ―Quantitative techniques for
construction site layout planning,‖ PhD dissertation,
University of Florida, Gainesville, Fla. 1982.
[20]M.J. Rosenblatt, The dynamics of plant layout, Manage.
Sci. 32 (1) (1986) 76–86.
[21]A. Sawhney, O. Abudayyeh, T. Chaitavatputtiporn,
Modeling and Analysis of a Concrete Production Plant
using Colored Petri Nets, Journal of Computing in Civil
Engineering, American Society of Civil Engineers
(ASCE), 1999 To Appear in July 1999 Issue.
[22]D.M. Smith, An investigation of the space constraint
problem in construction planning, Major Paper, MS,
4. Surveying, Planning and Scheduling for a Hill Road Work at Kalrayan Hills by Adopting ISS Method
(IJSRD/Vol. 3/Issue 10/2015/213)
All rights reserved by www.ijsrd.com 955
Virginia Polytechnic Institute and State University,
Blacksburg, Va, 1987.
[23]F. Talbot, J. Patterson, Optimal methods for scheduling
projects under resource constrains, Proj. Manage. Q.
(Dec. 1979) 26–33.
[24]C.M. Tam, T.K. Tong, W.K.W. Chan, Genetic
algorithms for optimizing supply locations around tower
crane, J. Constr. Eng. Manage. 127 (4) (2001) 315–321.
[25]W.Y. Thabet, ―A space-constrained resource-constrained
scheduling system for multi-story buildings,‖ PhD
dissertation, Civil Engineering Dept., Virginia
Polytechnic Institute and State University, Blacksburg,
Va. 1992.
[26]I.D. Tommelein. ―SightPlan—an expert system that
models and augments human decision-making for
designing construction site lay-outs,‖ PhD dissertation,
Dept. of Civil Engineering, Stanford University,
Stanford, Calif. 1989.
[27]I.D. Tommelein, Site layout: where should it go? Proc.,
Constr. Congr., 91, ASCE, New York, 1991, pp. 632–
637.
[28]I.D. Tommelein, P.P. Zouein, Interactive dynamic layout
planning, J. Constr. Eng. Mgmt. ASCE 119 (2) (1993)
266–287.
[29]A. Warszawski, S. Peer, Optimizing the location of
facilities on a building site, Oper. Res. Q. 24 (1) (1973)
35–44.
[30]I.C. Yeh, Construction-site layout using annealed neural
network, J. Comp. Civ. Eng. ASCE 9 (3) (1995) 201–
208.
[31]P.P. Zouein, H. Harmanani, A. Hajar, Genetic algorithms
for solving site layout problem with unequal-size and
constrained facilities, J. Comput. Civ. Eng. 16 (2) (2002)
143–151