Manuscripts

Recent Papers

Research Paper

RSM application for optimization of ECMM parameter using S1 Tool steel

S1 tool steel (60WCrV7) are used for the production of cold shear knives, ejector pins, air hammers etc. It is very difficult to machine S1 Tool steel alloys using conventional machine tools due to high toughness, impact resistance, dimensional stability and high hardening capacity. The Electrochemical Machining (ECM), a non-traditional manufacturing process, is a prime choice for machining S1 Tool steel alloys. The main aim in present work is to investigate the influence of ECM process parameters, such as applied voltage (V), inter-electrode gap (IEG), electrolyte flow rate (F.R.) and electrolyte concentration (EC), on Radial Overcut (ROC) during machining S1 Tool steel material. An aqueous solution of sodium nitrate (NaNO3) is used as an electrolyte. The experimental strategy depends on design formulated using response surface methodology. The effects of process parameters as well as their interactions are investigated and the process parameters are optimized by application of the response surface methodology

Published by: Love Kishore Sharma, Dilip Gehlot, Anil Kumar Sharma, Bhupendra Verma

Author: Love Kishore Sharma

Paper ID: V4I4-1227

Paper Status: published

Published: July 17, 2018

Full Details
Research Paper

An experiment on CBA concrete

The coal-fired thermal power plants are the main source of coal bottom ash. Coal Bottom Ash is used as a replacement of both sand and cement depending on the size of bottom ash. The present study will provide a better understanding of the mechanical and durability properties of concrete in which cement is partially replaced with bottom ash. The present thesis would contribute to the efforts being made in the field of concrete technology towards the development of concretes possessing good strength. Based on the study, valuable advice will be given to concrete structures. In the present experimental study, the various strength properties like a compressive strength of concrete and also durability properties like Acid attack test on both ordinary concrete and coal bottom ash Concrete, best coal bottom ash concrete mix is carried out and compared with an ordinary concrete mix for economic and ecological study. In this study different percentage of ordinary and grinded coal bottom ash is used. It was found that with the increase in the amount of coal bottom ash, standard consistency, initial and final setting time increases at the same time workability of concrete decreases. It was also found that initial day’s strength is less for bottom ash concrete compare to control mix, but as the age increases, they show good improvement in strength due to a pozzolanic reaction. Optimum dosage is observed to be 15% GBA which shows more strength compared to the control mix at 56 days. It was found that with the increase in an amount of bottom ash resistance to acid attack increases. GBA shows more resistance to acid attack compared to OBA. With the increase in the amount of bottom ash. It was also found that at optimum dosage i.e at 15% replacement of cement with GBA it is also economical and also amount of CO2 Emitted is also decreasing that means it is also environmentally friendly compared to control mix.

Published by: Shivam Rai, Ram Bharosh

Author: Shivam Rai

Paper ID: V4I4-1224

Paper Status: published

Published: July 17, 2018

Full Details
Research Paper

Autonomous and self-driving car

Today, in twenty-first-century Information Technology is revolutionizing everything around us. All our daily drivers, things we depend on, things which makes our lives easy are getting smart day by day; the automobile industry is no behind and is moving with great pace. We are seeing intense growth in technology that is powering today’s automobiles enabling us to rely heavily on the system, improving our driving abilities, minimizing the chances of accidents and saving human efforts and lives in the end. With technological advancements, application of Artificial Intelligence and Machine Leaning and powerful hardware to drive the system, not in distant future, we will see the vehicles that can drive themselves on urban roads with heavy traffic scenarios relieving humans from putting their immense efforts and precious time in driving the vehicles and allowing them to invest the time in doing some productive work. There will be a time in future where roads will be grids for self-driving cabs, running with no drivers, when there will be no traffic jams or conjunctions because of rough driving, when meeting will be conducted in cars, your car will drop your kids to schools, take you to hospital in emergency situations and it will be your complete infotainment system. However, there remain many facets to polish when it comes to complete self-driving experience. We still have hurdles to cross such as extreme environmental conditions, pedestrians, ethical dilemmas of decision making, etc.

Published by: Sathe Vaibhav, Archana Pai

Author: Sathe Vaibhav

Paper ID: V4I4-1255

Paper Status: published

Published: July 16, 2018

Full Details
Review Paper

Black hole attack analysis in vehicular ADHOC Network

The use of wireless links furnishes a VANET unsafe to malicious attacks for example Denial of Service, black hole attack, Sybil attack, selective forwarding and altering routing information. In Vehicular Networks are contemplated as the unique class of wireless networks, also called as VANET. It is a major part of Intelligent Transport System (ITS). VANET technology is recognized for enhancing road safety and transport efficiency. But, there are huge security issues in VANET, therefore, there must be a reliable way for communication which is quite tedious and important concern. In this review article, we studied Black Hole attacks under CBR/UDP traffic pattern using various protocols from various research papers of high quality. There are possibilities of various attacks like an active and passive attack on the network to access data. As we know there are many issues in VANET and especially security issues. Our research work will be carried out using NS-2 simulator. Besides this, a detailed study of the attack examined because there are abundant numbers of attack available. These attacks are divided into an active and passive attack and further, these two are classified. In this review paper, we convoluted the diverse class of attacks and their depth in an ad-hoc network.

Published by: Krishan Kumar, Sonia Sharma

Author: Krishan Kumar

Paper ID: V4I4-1271

Paper Status: published

Published: July 16, 2018

Full Details
Research Paper

Higher dimensional cosmological models with variable gravitational and cosmological constants

A higher-dimensional cosmological model with the gravitational and cosmological constants generalized as coupling scalars in Einstein theory is considered in the framework kaluza-klein theory of gravitation. A general method of solving the field Equations is given. Exact solutions for matter distribution in cosmological model satisfying G=G_o (R/R_o )^mis presented. The corresponding physical interpretations of the cosmological solutions are also discussed.

Published by: Dr. Salam Kiranmala Chanu

Author: Dr. Salam Kiranmala Chanu

Paper ID: V4I4-1264

Paper Status: published

Published: July 16, 2018

Full Details
Research Paper

Medical Image Denoising and Enhancement using DTCWT and Wiener filter

Image denoising is the process to remove the noise from the image which contains noise. Wavelet transform technique is a unique mathematical manipulation framework used for medical image denoising and enhancement implementation. The wavelet techniques are effective to remove the noise due to their ability to capture the energy of a signal in a few energy transform values. A dual-tree complex wavelet transform is used to present the image enhancement process. The proposed technique has the cascaded structure of DTCWT used for generation of different frequency bands for analysis. In this paper, a denoising approach based on dual-tree complex wavelet and Wiener filter technique is used. The result has a better balance between smoothness and accuracy than the DWT and is less redundant than SWT. We used the SIM (Structural Similarity Index Measure) along with PSNR (Peak Signal to Noise Ratio) to assess the quality of denoised images.

Published by: Prachi Mukund Tayade, S. P. Bhosale

Author: Prachi Mukund Tayade

Paper ID: V4I4-1263

Paper Status: published

Published: July 16, 2018

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X