Volume 11 - Issue 9

IJERD : Volume 11 - Issue 9

Version - 1 (September 2015)


Sai Eshwar Prasad M, Sai Shankar Nag M

Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
  • Abstract
  • Keywords
  • Reference
  • Full Article
Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam with the help of open source technologies. Emphasis in human activity recognition is given on the pose estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to the user on how to play a particular game using gestures and what are the various kinds of gestures that can be performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by instructing the user to place his component in a red box in about 10 seconds after the short documentary before the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a place where the user is to perform only gestures to start playing the game. At any point of time the user can call off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could also be achieved thus resulting in a disruptive growth to the advertising firms.
Gesture gaming, Human Computer Interaction, Human Activity Recognition, Pose Estimation, Pose Consistency
[1]. INCREMENTAL AND RADICAL INNOVATION : DESIGN RESEARCH VERSUS TECHNOLOGY AND MEANING CHANGE, Donald A. Norman and Roberto Verganti, esigning Pleasurable Products and Interfaces conference in Milan, 2011
[2]. Jamie Shotton, Ross Girshick, Andrew Fitzgibbon, Toby Sharp, Mat Cook, Mark Finocchio, Richard Moore, Pushmeet Kohli, Antonio Criminisi, Alex Kipman, and Andrew Blake, Efficient Human Pose Estimation from Single Depth Images, in Trans. PAMI, IEEE, 2012
[3]. http://en.wikipedia.org/wiki/Kinect
[4]. Pavlovic, V., Sharma, R. & Huang, T. (1997), "Visual interpretation of hand gestures for human-computer interaction: A review", IEEE Trans. Pattern Analysis and Machine Intelligence., July, 1997. Vol. 19(7), pp. 677 -695.
[5]. R. Cipolla and A. Pentland, Computer Vision for Human-Machine Interaction, Cambridge University Press, 1998,ISBN 978-0-521-62253-0
Citation
Sai Eshwar Prasad M, Sai Shankar Nag M "Gesture Gaming on the World Wide Web Using an Ordinary Web Camera" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0001. India
Page 01-07
Download  
ANED 06.067X/A1190107 aned
aned 067X-1109-0107

 

Nmegbu, C. G. J, Wemedo, S. A, Obah, B .A and George, I. S

Application of Buckley-Leverett Equation in Modeling the Radius of Invasion in a Reservoir Undergoing Microbial Enhanced Oil Recovery

  • Abstract
  • Keywords
  • Reference
  • Full Article
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding. Results shown from the analysis doesn't only records a success in determining the radial distance of the leading edge of water during the flooding process, but also gives a clearer understanding of the applicability of microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic gases, bio acids etc.
Waterflooding, Buckley-Leveret, Radial invasion, Microbial flooding
[1]. L. W Lake, 2014. PetroWiki. [Online] Available at: http://petrowiki.org/Waterflooding[Accessed 20 January 2015].
[2]. Carcoana, 1992. Applied Enhanced Oil Recovery. New Jersey: Prentice-Hall Incorporated.
[3]. R. E Terry, 2001. Enhanced Oil Recovery. In: Encyclopedia of Physical Science and Technology. Brigham: Robert A. Meyers Ed., Academic Press, pp. 503-518.
[4]. Wikipedia, 2012. Wikipedia. [Online] Available at: http://en.wikipedia.org/wiki/Microbial_enhanced_oil_recovery [Accessed 26 February 2015].
[5]. M. Magot, (2005). Indigenous microbial communities in oil fields. In ''Petroleum microbiology'' (B. Ollivier and M. Magot, Eds.), pp. 21–34. ASM, Washington, DC.
Citation
Nmegbu, C. G. J, Wemedo, S. A, Obah, B .A and George, I. S "Application of Buckley-Leverett Equation in Modeling the Radius of Invasion in a Reservoir Undergoing Microbial Enhanced Oil Recovery" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0002. Nigeria
Page 08-17
Download
ANED 06.067X/B1190817 aned
aned 067X-1109-0817

 

Shelly, Dr Rajesh Kumar Bawa

Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
  • Abstract
  • Keywords
  • Reference
  • Full Article
Data over the cloud is transferred or transmitted between servers and users. Privacy of that data is very important as it belongs to personal information. If data get hacked by the hacker, can be used to defame a person's social data. Sometimes delay are held during data transmission. i.e. Mobile communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient transmission, encryption is used for security purposes and blurring is used by providing additional layers of security. These algorithms are hybridized for having a robust and efficient security and transmission over cloud storage system.
Secure Image Transfer, Encryption, Blur Map Model, Compression.

[1]. Al-Hilo, Eman A., and Rusul Zehwar. "Fractal Image Compression by YIQ Color Space." In Computational Science and Computational Intelligence (CSCI), 2014 International Conference on, vol. 1, pp. 221-225. IEEE, 2014. [2]. Xiangui Kang, Jiwu Huang [2003]: "A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression" IEEE aug 2003.

[3]. Sonja Grgic, Mislav Grgic [2001]: "Performance analysis of image compression using wavelets." Industrial elsctronics. IEEE 2001.

[4]. Marcelloni, Francesco, and Massimo Vecchio. "A simple algorithm for data compression in wireless sensor networks." Communications Letters, IEEE 12, no. 6 (2008): 411-413.

[5]. Srisooksai, Tossaporn, Kamol Kaemarungsi, Poonlap Lamsrichan, and Kiyomichi Araki. "Energy-Efficient Data Compression in Clustered Wireless Sensor Networks using Adaptive Arithmetic Coding with Low Updating Cost."International Journal of Information and Electronics Engineering 1, no. 1 (2011): 85-93.

Citation
Shelly, Dr Rajesh Kumar Bawa "Secure Image Transmission for Cloud Storage System Using Hybrid Scheme" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0003. India
Page 18-26
Download
ANED 06.067X/C1191826 aned
aned 067X-1109-1826

 

Mrs. Swagota Bera, Dr. Monisha Sharma

A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array. Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives improved outcome in attacking.
Steganography, Steganalysis, Cover image, Stego image, cover Image, Attack, Least Significant Bit (LSB), DCT,DWT
[1]. http://www.outguess.org/
[2]. http://wwwrn.inf.tu-dresden.de/~westfeld/f5.html.
[3]. Lyu. S. and Farid. H. 2003.Detecting hidden messages using higher-order statistics and support vector machines. Information Hiding, Springer. 2578: 340–354.
[4]. Fridrich . J. 2005 . Feature based steganalysis for JPEG images and its implications for future design of steganographic schemes. Information Hiding, Springer. 67–81.
[5]. Farid . H. and Lyu . S. 2006. Steganalysis using higher - order image statistics. IEEE Trasactions on Information Forensics and Security. 1(1): 111–119.
Citation
Mrs. Swagota Bera, Dr. Monisha Sharma "A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features and its Performance Analysis" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0004. India
Page 27-31
Download
ANED 06.067X//D1192731 aned
aned 067X-1109-2731

 

Divij H.Patel

Spyware triggering system by particular string value
  • Abstract
  • Keywords
  • Reference
  • Full Article
This computer programme can be used for good and bad purpose in hacking or in any general purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if user or hacker store particular string as a input after that software continually compare typing activity of user with that stored string and if it is match then launch spyware programme.
triggered, spyware, particular keyword, real time, hidden mode.
[1]. Hemita Pathak1,Apurva Pawar2,Balaji Patil3,"A Survey on Keylogger: A malicious Attack," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 4, April 2015.
[2]. Nairit Adhikary1, Rohit Shrivastava2, Ashwani Kumar3, Sunil Kumar Verma4, Monark Bag5, Vrijendra Singh6, "Battering Keyloggers and Screen Recording Software by Fabricating Passwords," I. J. Computer Network and Information Security, 2012, 5, 13-21
[3]. Mehdi Dadkhah1, Mohammad Davarpanah Jazi2," Secure Payment in E-commerce: Deal with Keyloggers and Pishings," International Journal of Electronics Communication and Computer EngineeringVolume 5, Issue 3, ISSN (Online): 2249–071X, ISSN (Print): 2278–4209.
[4]. Milind. J. Joshi1, Bhaskar V. Patil2," Computer Virus: Their Problems & Major attacks in Real Life," Journal of Advanced Computer Science and Technology, 1 (4) (2012) 316-324. [5]. Mark B. Schmidt, Kirk P. Arnett ," Spyware: a little knowledge is a wonderful thing," Communications of the ACM, Vol. 48 No. 8, Pages 67-70.
Citation
Divij H.Patel "Spyware triggering system by particular string value" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0005. India
Page 32-36
Download
ANED 06.067X/E1193236 aned
aned 067X-1109-2336

 

Tharun George Thomas

Study on the Fused Deposition Modelling In Additive Manufacturing
  • Abstract
  • Keywords
  • Reference
  • Full Article
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy. Unlike conventional manufacturing processes where material is removed from a given work price to derive the final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity factor of this process is 0% as in any object of any shape and size can be manufactured.
Additive manufacturing process, 3-D printing, Fused Deposition Modelling, CAD, ABS plastic.

[1]. Pakirappa, Metal cutting and machine tool engineering, 1st ed, 2012

[2]. Dr. Ian Gibson, Dr. David W. Rosen, Dr. Brent Stucker, Additive Manufacturing Technologies: Rapid Prototyping to Direct Digital Manufacturing, 2010: Springer

[3]. Emanuel Sachs, "Three dimensional printing: The physics and implications of Additive manufacturing", CIRP Annals- Manufacturing Engineering, Vol 42, Issue 1, 1993

Citation
Tharun George Thomas "Study on the Fused Deposition Modelling In Additive Manufacturing" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0006. India
Page 37-40
Download
ANED 06.067X//F1193740 aned
aned 067X-1109-3740
  

J.Janakiram Naik, G.madhavi

Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
  • Abstract
  • Keywords
  • Reference
  • Full Article
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments, control devices and non-linear loads as part of automated processes to increase energy efficiency and productivity. Voltage disturbances are the most common power quality problem due to this the use of a large numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper discusses the design and simulation of dynamic voltage restorer for improvement of power quality and reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag, swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability of a DVR depends primarily on the maximum voltage injection ability and the amount of stored energy available within the restorer. This device is connected in series with the distribution feeder at medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the circuit is simulated by using MATLAB/SIMULINK software.
Dynamic voltage restorer (DVR), power quality, unit vector, voltage harmonics, voltage sag, voltage swell, Hysteresis Voltage Controller.
[1]. M. H. J. Bollen, Understanding Power Quality Problems—Voltage Sags and Interruptions. New York, NY, USA: IEEE Press, 2000.
[2]. K. R. Padiyar, FACTS Controllers in Transmission and Distribution. New Delhi, India: New Age Int., 2007.
[3]. A. Ghosh and G. Ledwich, ―Compensation of distribution system volt age using DVR,‖IEEE Trans. Power Del., vol. 17, no. 4, pp. 1030–1036, Oct. 2002.
[4]. A. Ghosh and A. Joshi, ―A new algorithm for the generation of reference voltages of a DVR using the method of instantaneous symmetrical components,‖ IEEE Power Eng. Rev., vol. 22, no. 1, pp. 63–65,Jan. 2002.
[5]. J. W. Liu, S. S. Choi, and S. Chen, ―Design of step dynamic voltage regulator for power quality enhancement, ‖IEEE Trans. Power Del., vol. 18, no. 4, pp. 1403–1409, Oct. 2003.
Citation
J.Janakiram Naik, G.madhavi "Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0007. India
Page 41-52
Download
ANED 06.067X/G1194152 aned
aned 067X-1109-4152
  

P.Bhaskar Chand Yadav, M.Hemanth Sai

Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Harmonic Frequency
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper presents a component within the flexible ac-transmission system (FACTS) family, called distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC) with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange between the shunt and series converters, which is through the common dc link in the UPFC, is now through the transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding simulation results that are carried out on a scaled prototype are also shown.
AC–DC power conversion, load flow control, Phase Locked Loop (PLL), dqo transformation, power-transmission control.
[1]. Y.-H. Song and A. Johns, Flexible ac Transmission Systems (FACTS) (IEEPower and Energy Series), vol. 30. London, U.K.: Institution of Electrical Engineers, 1999.
[2]. N. G. Hingorani and L. Gyugyi, Understanding FACTS : Concepts and Technology of Flexible AC Transmission Systems. New York: IEEE Press, 2000.
[3]. L.Gyugyi, C.D. Schauder, S. L.Williams, T. R. Rietman,D. R. Torgerson, andA. Edris, ―The unified power flowcontroller:Anewapproach to power transmission control,‖ IEEE Trans. Power Del., vol. 10, no. 2, pp. 1085–1097, Apr. 1995.
[4]. A.-A. Edris, ―Proposed terms and definitions for flexible ac transmissionsystem (facts),‖ IEEE Trans. Power Del., vol. 12, no. 4, pp. 1848–1853,Oct. 1997.
[5]. K. K. Sen, ―Sssc-static synchronous series compensator: Theory, modeling,and application,‖ IEEE Trans. Power Del., vol. 13, no. 1, pp. 241–246,Jan. 1998.
Citation
P.Bhaskar Chand Yadav, M.Hemanth Sai "Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Harmonic Frequency" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0008. India
Page 53-61
Download
ANED 06.067X/H1195361 aned
aned 067X-1109-5361
  

Nidhi Gopal

Router 1X3 – RTL Design and Verification
  • Abstract
  • Keywords
  • Reference
  • Full Article
Routing is the process of moving a packet of data from source to destination and enables messages to pass from one computer to another and eventually reach the target machine. A router is a networking device that forwards data packets between computer networks. It is connected to two or more data lines from different networks (as opposed to a network switch, which connects data lines from one single network). This paper, mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top module.
Routing, Router, Data Packets, Verilog, Xilinx ISE, Questasim
[1]. Verilog HDL:- Samir Palnitkar
[2]. System Verilog:- Chris Spear
[3]. The ASIC Website: www.asicworld.com
[4]. www.google.com/fifo-theory-verilog
[5]. www.wikipedia.com
Citation
Nidhi Gopal"Router 1X3 – RTL Design and Verification" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0009. India
Page 62-71
Download
ANED 06.067X/I1196271 aned
aned 067X-1109-6271
  

Muhammad Akhlis Rizza, Anang Takwanto

Reducing Corrosion Rate by Welding Design
  • Abstract
  • Keywords
  • Reference
  • Full Article
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The problems happened associated with welding are common issues in these fields, especially corrosion. Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good welding design. In the research, it can be found that reducing residual stress on the welding can be solved in corrosion rate reduction problem. Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76% lost. Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is 0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-0,71% lost.
welding, corrosion, pre-heating, residual stress.
[1]. García-Rentería, M., Morelos, V., Hernández, R. G., Pérez, L. D., Ochoa, G. E., & Sánchez, J. G. (2014). Improvement of localised corrosion resistance of AISI 2205 Duplex Stainless Steel joints made by gas metal arc welding under electromagnetic interaction of low intensity. Applied Surface Science, 252–260.
[2]. Geng, S., Sun, J., Guo, L., & Wang, H. (2015). Evolution of microstructure and corrosion behavior in 2205 duplex stainless steel GTA-welding joint. Journal of Manufacturing Processes, 32-37.
[3]. Kadry, S. (2008). Corrosion Analysis of Stainless Steel. European Journal of Scientific Research, 508-516.
[4]. Mizhar, S., & Pandiangan, I. H. (2014). Effect of Heat Input To microstructure, hardness and toughness In SMAW welding of 2.5 inch Diameter Steel Pipe. Jurnal Dinamis Vol.II,, 16-22.
[5]. Nikseresht, Z., Karimzadeh, F., Golozar, M., & Heidarbeigy, M. (2010). Effect of heat treatment on microstructure and corrosion behavior of Al6061 alloy weldment. Materials and Design , 2643–2648.
Citation
Muhammad Akhlis Rizza, Anang Takwanto "Reducing Corrosion Rate by Welding Design" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0010. India
Page 72-77
Download
ANED 06.067X/J1197277 aned
aned 067X-1109-7277
    

Version - 2 (September 2015)

  

Sohieb Ghazali

Gold prospecting using Remote Sensing 'A case study of Sudan'
  • Abstract
  • Keywords
  • Reference
  • Full Article
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia. Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they originate as sea floor massive sulphide deposits.
..
[1]. DRURY, S. A. (1993): Image Interpretation in Geology. 2nd ed.,-271 pp., (Chapman and Hall), London.
[2]. GUPTA,R.P. (1991): Remote Springer- verlag Geology. – 356 pp., Berlin-Heidelberg (Springer).
[3]. KENEA, N. H. (1997): Digital Enhancement of Landsat Data, Spectral Analysis and GIS Data Integration for Geological Studies of the Derudeb Area, southern Red Sea Hills, NE Sudan. – 116 pp., Berliner Geowiss. Abh., D 14, Berlin.
[4]. SEGAL, D. B. (1983): Use of Landsat Multispectral Scanner Data for Definition of Limonitic Exposures in Heavily Vegetated Areas. Econ. Geol., 78, pp. 711-722, EL Paso, Texas.
[5]. Kenea, N. H. 1997. Improved geological mapping using Landsat TM data, Southern Red Sea Hills, Sudan: PC and HIS decorrelation stretching. Intern. Jour. of remote sensing, 18, (12), p. 1233-1244.
Citation
Sohieb Ghazali "Gold prospecting using Remote Sensing 'A case study of Sudan'" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0001. India
Page 01-05
Download
ANED 06.067X/A1190105 aned
aned 067X-1109-0105
  

Hyun-Seop Shin

Influence of tensile behaviour of slab on the structural Behaviour of shear connection in composite Beam subjected to hogging moment
  • Abstract
  • Keywords
  • Reference
  • Full Article
A composite beam is composed of a steel beam and a slab connected by means of shear connectors like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear connection appears also to be closely related to the change in the tensile strain of rebar according to the increase of the load. Further experimental and analytical studies shall be conducted considering variables such as the reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection in composite beams subjected to hogging moment.
steel-concrete composite beam, push-out test, shear connection, horizontal shear behaviour
[1]. Johnson, R.P., Oehlers, D.J.: The Strength of Stud Shear Connectors in Composite Beams. The Structural Engineer, Volume 65/B2, 1987.
[2]. Aribert, J.M.: Design of composite beams with a partial shear connection. IABSE Symposium Mixed Structures including New Materials, IABSE Reports Vol. 60, S. 215-220, Brussels, Belgium, 1990.
[3]. Bode, H., Künzel, R.: ZurTraglast von VerbundträgernunterbesondererBerücksichtigungeinernachgiebigenVerdübelung. Abschlußberichtzum DFG-Forschungsvorhaben, Kaiserslautern, 12/1988.
[4]. Döinghaus, P.: ZumZusammenwirkenhochfesterBaustoffe in Verbundträgern. Dissertation. Lehrstuhl und InstitutfürMassivbau, RWTH-Aachen. 2001.
[5]. Hanswille, G.: ZurRißbreitenbeschränkungbeiVerbundträgern. Dissertation. Ruhr-Universität Bochum, 1986.
Citation
Hyun-Seop Shin "Influence of tensile behaviour of slab on the structural Behaviour of shear connection in composite Beam subjected to hogging moment" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0002. India
Page 06-15
Download
ANED 06.067X/B1190615 aned
aned 067X-1109-0615
  

G.Sai kumar* and S.Sharada

MEMS MICROPHONE INTERFACE
  • Abstract
  • Keywords
  • Reference
  • Full Article
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the severity of their hearing loss. This paper describes the implementation and characterization details of a dual channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and power-scalable ADC system.
transmitter front end(TFE), digital hearing aids(DHA), ultra low power scalable ADCs, MEMS microphones
[1]. L. M. Luxon and A. Martini, Audiological Medicine. London, U.K.: Taylor & Francis , 2003.
[2]. M. Valente, Hearing Aids: Standards, Options, and Limitations. New York: Thieme New York, 2002.
[3]. H. G. McAllister,N.D. Black, and N.Waterman, ―Hearing aids—A development with digital signal processing devices,‖ IEEE Comput. Control Eng. J., vol. 6, no. 6, pp. 284–291, Dec. 1995.
[4]. H. Neuteboom, B. M. J. Kup, and M. Janssens, ―A DSP-based hearing instrument IC,‖ IEEE J. Solid-State Circuits, vol. 32, no. 11, pp. 1790–1806, Nov. 1997.
[5]. D. G. Gata, W. Sjursen, J. R. Hochschild, J. W. Fattaruso, L. Fang, G. R. Iannelli, Z. Jiang, C. M. Branch, J. A. Holmes, M. L. Skorcz, E. M. Petilli, S. Chen, G. Wakeman, D. A. Preves, and W. A. Severin, ―A 1.1-V 270- �A mixed-signal hearing aid chip,‖ IEEE J. Solid-State Circuits, vol. 37, no. 12, pp. 1670–1678, Dec. 2002.
Citation
G.Sai kumar* and S.Sharada "MEMS MICROPHONE INTERFACE" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0003. India
Page 16-19
Download
ANED 06.067X/C1191619 aned
aned 067X-1109-1619
  

S. Anil Kumar, G. Dayanandam, Dr. T. V. Rao

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
  • Abstract
  • Keywords
  • Reference
  • Full Article
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies, then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding techniques which are used in DDoS attack.
Simulation, Network Security, Botnet, DoS, DDoS, BW-DDoS, Firewall.
[1]. Moti geva, Amir Herzberg, and Yehoshua Gev, "Bandwidth Distribute Denial of Service Attacks and Defences," IEEE Transaction on Security & Privacy, Vol. 12, Issue. 1, Issue Date. Jan. - Feb. 2014.
[2]. Candid Wueest, "the Continued Rise of DDoS Attacks," Security Response by Symantec version 1.0 – Oct 21, 2014.]
[3]. "State of the Internet / Security" Q1 2015 Report, Vol. 2, No. 1, May - 2015.
[4]. P.S. lokhonde, B. B. Meshram, "Botnet understanding Behaviour, Lifecycle Events & Actions," International Journal of Advance Research in Computer Science and Software Engineering. (Research paper) 2013.
[5]. Daniel Plohmann and Elmar Gerhards Padillo, "Case Study of the Miner Botnet", Cyber Conflict (CYCON), 2012.
Citation
S. Anil Kumar, G. Dayanandam, Dr. T. V. Rao "A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks" published at International Journal of Engineering Research and Development, Volume 11, Issue 09 (September 2015)
MID 1109.067X.0010. India
Page 20-27
Download
ANED 06.067X/D1192027 aned
aned 067X-1109-2027