An attempt was made to study the effect of steel fibres on the compressive constitutive behaviour of geopolymer concrete specimens under cyclic loading. The variables considered in this study were the volumetric ratio of confinement and the volume fraction of steel fibres. Out of 40 cylindrical specimens, 8 were made of geopolymer concrete (GPC) and the remaining of steel fibre reinforced geopolymer concrete (SFRGPC). The volume fraction of steel fibres were 0.25, 0.50, 0.75 and 1%. The pitch of the reinforcement spirals were 75mm, 50mm and 25mm and the volumetric ratio of confinement were 1.36, 2.05 and 4.10 respectively. The test results indicates that the increase in the steel fibre content and volumetric ratio of confinement, improves the cracking behaviour, strain at peak load and ductility.
The construction sector in India currently faces a number of challenges. A key area of concern is the steady increase in the quantum of stalled projects with substantial time and cost overrun. The key reasons for the time overruns, as reported by various project implementing agencies, include delays in land acquisition and the lack of requisite clearances, especially the nod from the ministry of forests and environment. Other reasons include delay in award of works, lack of skilled manpower, termination of contract, high quoted price in tendering process, law and order issue and poor mobilisation of workers by the contractor. Companies have suffered elongated working capital cycles due to delays in realizing payments from clients; piling work-in-progress due to delayed certification by clients and the need to support sub-contractors to ensure continuity in project execution. Slower pace of execution and higher input and labour costs affected the operating profits of construction companies and leads to cost overrun. This paper investigates various issues related to delays and cost overruns in construction projects in the India and also suggests possible remedies.
Developments in computer technology have revolutionized the study of hydrologic systems and Water Resources Management. Several computer-based hydrologic/water quality models have been developed for applications in hydrologic modeling and water resources studies. Geographic information systems (GIS) and model GIS interfaces aid the efficient creation of input data files required by such models. One such model available for the water resources professional is the Soil and Water Assessment Tool (SWAT), a distributed parameter model developed by the United States Department of Agriculture. SWAT divided the watershed into Hydrological Response Units by merging Digital Elevation Model, Land use and Soil pattern.
The SWAT2005 model was applied to the Watershed No. GV-41 located at Gangapur, in Aurangabad districtMaharashtra .The main objective of this study is to develop the Delineated watershed model. Model was calibrated using topography and Digital Elevation Map of study area The calibrated model can be used for further analysis of the effect of climateand land use change as well as other different management scenarios on stream flow and soil erosion, estimation of rainfall andrunoff data, hydrological response to climate change in river basin and many of applications in Water resources engineering.
Delineation of particular watershed is the most important part of watershed modeling as well as in watershed management. While watershed management is gaining wide support, the spatial information on socioeconomic and physical processes needed for evaluating alternative watershed management plans is not readily accessible to local decision makers. With wide adoption of geographic information system (GIS) technology, a user-friendly appears to be an efficient tool in watershed management. A graphical user interface is developed to incorporate the Soil and Water Assessment Tool (SWAT) with Arc Info.
The watershed scale Soil and Water Assessment Tool (SWAT) model divides watersheds into smaller sub watersheds for simulation of rainfall-runoff and sediment loading at the field level and routing through stream networks. Typically, the SWAT model first needs to be calibrated and validated for accurate estimation through adjustment of sensitive input parameters (i.e., Curve Number values, USLE P, slope and slope-length, and so on). However, in some instances, SWAT-simulated results are greatly affected by the watershed delineation and Digital Elevation Models (DEM) cell size.
In this study, the SWAT Arc View GIS is developed for watershed at Gangapur from DEM of the study area. This study reveals the number of sub basins and number of outlets in that watershed after delineation using SWAT.
The present study is to experimentally investigate the air-water two-phase flow through 2.1 mm circular minichannel. T junction is used as inlet channel configuration and the experiments are conducted for vertical orientation. Six different flow patterns such as slug, slug-bubbly, bubbly, slug-annular, annular and churn are observed. The flow pattern map is proposed for vertical mini tube. The present results could become guidelines to design and analyze various two-phase microfluidic applications.
The manufacturing cost estimation of engineering components is important in today’s competitive industrial environment. Many times, estimated cost plays an important role in early stage of product development. This research is aimed at estimating cost of hydraulic hoses using robust regression analysis. The paper gives a brief overview of cost estimation followed by the cost estimation of two cases of hoses – firstly hoses having two end connectors and secondly hoses having more than two connectors. Different parameters for hydraulic hoses are researched for regression analysis, and final parameters are presented. After evaluating the results with respect to criteria such as R square, mean absolute percentage error etc., the results are found acceptable. The results of regression analysis can give useful insights to cost planning engineers for cost estimation and cost reduction.
This research aims to experimentally explore the thermal histories and temperature distributions in a workpiece during a friction stir welding (FSW) process involving the butt joining of aluminium AA 8011. K- Type thermocouples are used to measure the temperature histories during FSW at different locations on the workpiece in the welding direction. Successful welding processes are achieved by appropriately controlling the maximum temperatures during the welding process. Regression analyses by the least squares method are used to predict the temperatures at the joint line. A second-order polynomial curve is found to best fit the experimental temperature values in the width direction of the workpiece. A three-dimensional thermal model for Friction Stir Welding (FSW) is presented. The simulation model is tested with existing experimental results of aluminium alloys 8011.The results of the simulation are in good agreement with that of experimental results.
The applications which need the materials with high thermal and electrical conductivity are attracting researchers' interest in recent year for the development of Copper-Alumina MMC's. This study describes mathematical modeling of properties and wear behavior of aluminum oxide dispersed copper matrix composite produced by PM route which finds increasing application in elevated temperature system.Taguchi method is used for designing the experiment. Full factorial wear experiments were conducted on pin-on-disc wear testing machine for measuring wear rate. Mathematical model obtained by using regression analysis is used to predict the properties and wear behavior of fabricated composites. A satisfactory agreement between experimental and mathematical model values was obtained from using the considered model.
Akbar Huseni Nadaf, Amita Abhay Patil, P. J. Kulkarni
The traditional antivirus programs demands for online signature update time-to-time so as to detect the recently appeared viruses effectively. To keep the computer system secure, the user needs to be continuously relying upon the third party to get the signatures. In case, if user unable to update the signature for recent attacks from antivirus vendor, the system becomes open to the attacker and at any moment system might becomes infected one. The idea is to prepare the autonomous system to detect and heal the virus infection through self-learning. To achieve this, the system undergoes the initial training, where it backup of host file
information. By carrying out the systematic analysis over the infected host file and backup host file information, it is possible to detect and update the virus information by its own which tends to self learning of the system.The work based on the premise that the system is having initially the basic suspicious behavioural patterns of PE(Portable Executables) and DLL(Dynamic Link Library) file parasitic viruses. The untrained system initially using these basic patterns for the detection of unknown viruses. The experiment results shown that, it is possible to have system, which can detect future viruses by taking the help of knowledge acquired in the form of virus behavioural patterns of newly appeared viruses in the incremental learning process. As a result the designed system behaviour is autonomous way which updates virus signatures and behavioural patterns by self learning.
: Multiple Transmit and receive antenna are now widely used to form multiple input, multiple output (MIMO) channels to increase the capacity as well as to reduce the Bit Error Rate (BER). This paper describes the combination of MIMO system along with Orthogonal Frequency Division Multiplexing (OFDM) system which offers important features of both the system. Use of Hybrid MIMO-OFDM system is considered broadly for wideband transmission to mitigate Intersymbol interference to enhance the system performance. In this study 2×1 and 2×2 Hybrid MIMO-OFDM system is studied and MatlabSimulink technique is used for the analysis for these systems. The performance of MIMO-OFDM model is measured in terms of BER and constellation diagram. Results of system analyzed with M-PSK and M-QAM modulation techniques. The result shows that adding one antenna at the receiver side can improve the performance of the system.
Network coding is increasing network performance in lossy networks and in multicast and multipath up till now it show theoretical experiment and mathematical proof.To realize in practically how packet will flow through network in window size mechanism. and how coding across packets interacts with acknowledgment(ACK). Rate less codes and batch-based coding are not efficient with TCP re transmission and sliding-window mechanisms.The network coding challenges arise from the desire to combine several attractive properties, such as low complexity, delay and memory requirements, high achievable rates, and adaptability to unknown channel conditions. In my system we will see How can network coding be used to increase throughput and reliability of TCP communications in wireless settings, when data is transfer from one node to another node What is the impact of implementing such a network
coding scheme into practice it designed with care, can bring significant gains, not only in terms of throughput but also in terms of encoding decoding, load balancing reliability, security, and robustness.
Bhavana S. Pansare, Rajesh B. Sing, Supriya B. Bamane
The energy efficiency in battery limited MANET is achieved by dynamically changing the network topology based on various traffic conditions. In routing process, topology is created dynamically involving smaller no. of nodes awake and other nodes are put into sleep mode. The active nodes are chosen on the basis of stability factor, utility factor and energy factor. The proposed technique is implemented over the network using AODV as routing protocol that ensures energy efficiency in MANET without affecting node connectivity and also increases the lifetime of network with the performance better in terms of energy, delay, and delivery ratio.
Srikrishna V. Iyengar, Prerana D. Jagtap, Swapnil S. Thite, Abhijeet B. Bhosale, Vikas S. Kadam
Cloud Computing is one of the most developing sectors in the computing Industry. This also supplements a list of security concerns which are to be addressed in their entirety. In this paper, we present a Literature Survey based on the various security issues in Cloud. Data Security is highlighted as one of the most crucial aspects in any sector which leads us to look for competitive solutions. Solutions such as Homomorphic Encryption are emerging to protect Cloud users. This paper aims to lay a foundation to aid research teams in developing concrete solutions to the security issues.
Planning a road path requires an extensive evaluation process in order to identify the best possible path the road can follow. Effective road path is an essential interest of every developing country and it acts as a means of interconnectivity between different parts and regions within and outside the country. Prioritization plays a major role in deciding how much proportion of funds to be allocated to each corridor based on its necessity. In the present Research, Fuzzy Multi Criteria Decision Making (FMCDM) approach is used to determine the most deficient corridor.Kukatpally municipality of Hyderabad, A.P, India is taken as the study area. Fourteen corridors in the municipality are selected for the study and the priority index of the corridors, based on the geometric characteristics, land use characteristics, traffic characteristics, and utility characteristics, is determined. The use of GIS and multi criteria decision analysis techniques in fuzzy logic has helped planners to achieve desired and more accurate results and as such reducing the complex nature in the planning process allowing different stakeholders to reach a general conclusion. The out come of the Research gives the most deficient road segments in the study area based on the combined effect of land use, traffic, road geometrics and utility characteristics.
This paper will presents a review on the Finger vein authentication system. In this system we are using the blood vessel patterns as a personal unique identifying factor. The blood vessels will transport the blood throughout the body to sustain the metabolism, using a network of arteries, veins as being a part of the circulatory system. By using such vascular structures in the palm and Fingers has been invented in the biometrics literature with high success. There are two basic reasons that are considered for the preference of finger-vein biometrics. First, As the finger veins are hidden structures inside the body of human being; it is extremely difficult to steal the finger-vein patterns of an individual without their prior knowledge, therefore will gives us a high degree of privacy or security. Second, the use of finger-vein pattern will leads to strong antispoofing capabilities as it can also ensure liveness in the presented fingers .Hence ,The finger vein authentication technology leads to a high level of accuracy by considering both time and space parameters. Also the Finger vein is a secure biometric pattern for personal identification in terms of its security and convenience both. The importance of biometrics trends in the current field of Security has been depicted in this complete work..Japan's Bank of Kyoto has adopted Hitachi's biometric finger-vein authentication system on its ATMs since March 2006.Customers are expected to be using the system. On the heels of its recent development of Finger Vein Authentication Technology, Hitachi is showing off a similar system
designed to thwart car thieves. To start the car, the driver needs to slide her finger into the scanner, mounted behind the steering wheel, which illuminates the digit and matches the internal vein pattern to a pre-registered profile. Once a match is made, the engine starts. No match, no start. Once the scanner has determined the identity of a registered driver, the system
can initiate custom settings for car systems, as well, including mirrors, climate control, seat position, and audio settings.