Ajinkya Yadav - Academia.edu (original) (raw)
Papers by Ajinkya Yadav
International journal of computer applications, Apr 18, 2014
In this digital world all information and data is kept safe by passwords. The simple and convenie... more In this digital world all information and data is kept safe by passwords. The simple and convenient format of password is in the form of text. But, text passwords are not always strong enough and under different vulnerabilities they are very easily stolen and changed. When a person creates a weak password or same password is reused in many sites it may be possible that others can acquire that password. If one password is stolen, then it is possible that it can be used for all the websites. This phenomenon is known as the Domino Effect. Another possible risky attacks are related to phishing, malware and key loggers etc. A protocol is designed which makes use of the user's customer's mobile i.e. cellular phone and SMS (short message service) to ensure protection against password stealing attacks. This user authentication protocol is named as m-Pass. The unique phone number is required which will be possessed by each participating website. The telecommunication service provider plays important role in the registration and the recovery phases. The main theme is to reduce the password reuse attack. It works with one time password technology, and results in reduction of the password validity time. The results show improvement in performance of the security.
International journal of engineering research and technology, Oct 26, 2019
In this present work, systematic study has been conducted to investigate the wear phenomenon by a... more In this present work, systematic study has been conducted to investigate the wear phenomenon by adding micron size silicon carbide and graphite particles into Al6061 base. Al6061 compound was taken as the base lattice to which SiC and graphite particulates were utilized as fortifications. Al 6061-3, 6, 9% SiC-3, 6, and 9% were introduced to the base framework. The microstructural behaviour was analysed through scanning electron microscopy, which uncovered the uniform appropriation of SiC and graphite content in the Al matrix. Pin on-disc equipment was utilized to assess the volumetric wear loss of arranged samples, in which EN32 steel disc was utilized as the counter face. The outcomes uncovered that the volumetric wear misfortune was expanded with increment in applied load, disc speed and sliding distance for every one of the specimens. The outcomes additionally showed that the volumetric wear loss of the Al 6061-2.5% SiC-2.5% graphite composite was smaller than the Al6061 lattice. The worn out surfaces were portrayed by RSM analysis.
In this digital world all information and data is kept safe by passwords. The simple and convenie... more In this digital world all information and data is kept safe by passwords. The simple and convenient format of password is in the form of text. But, text passwords are not always strong enough and under different vulnerabilities they are very easily stolen and changed. When a person creates a weak password or same password is reused in many sites it may be possible that others can acquire that password. If one password is stolen, then it is possible that it can be used for all the websites. This phenomenon is known as the Domino Effect. Another possible risky attacks are related to phishing, malware and key loggers etc. A protocol is designed which makes use of the user’s customer’s mobile i.e. cellular phone and SMS (short message service) to ensure protection against password stealing attacks. This user authentication protocol is named as m-Pass. The unique phone number is required which will be possessed by each participating website. The telecommunication service provider plays i...
International journal of engineering research and technology, 2019
In this present work, systematic study has been conducted to investigate the wear phenomenon by a... more In this present work, systematic study has been conducted to investigate the wear phenomenon by adding micron size silicon carbide and graphite particles into Al6061 base. Al6061 compound was taken as the base lattice to which SiC and graphite particulates were utilized as fortifications. Al 6061-3, 6, 9% SiC-3, 6, and 9% were introduced to the base framework. The microstructural behaviour was analysed through scanning electron microscopy, which uncovered the uniform appropriation of SiC and graphite content in the Al matrix. Pin on-disc equipment was utilized to assess the volumetric wear loss of arranged samples, in which EN32 steel disc was utilized as the counter face. The outcomes uncovered that the volumetric wear misfortune was expanded with increment in applied load, disc speed and sliding distance for every one of the specimens. The outcomes additionally showed that the volumetric wear loss of the Al 6061-2.5% SiC-2.5% graphite composite was smaller than the Al6061 lattice. The worn out surfaces were portrayed by RSM analysis.
International journal of engineering research and technology, 2020
In this present work, systematic study has been conducted to investigate the wear phenomenon by a... more In this present work, systematic study has been conducted to investigate the wear phenomenon by adding micron size silicon carbide and graphite particles into Al6061 base. Al6061 compound was taken as the base lattice to which SiC and graphite particulates were utilized as fortifications. 3 wt. %, 6 wt. %, & 9 wt. % of SiC and 3 wt. %, 6 wt. %, & 9 wt. % of graphite were introduced to the base framework. The wear behavior analysis, which uncovered the uniform appropriation of SiC and graphite content in the Al matrix. Pin on-disc equipment was utilized to assess the volumetric wear loss of arranged samples, in which EN32 steel disc was utilized as the counter face. The outcomes uncovered that the volumetric wear misfortune was expanded with increment in applied load, disc sp eed and sliding distance for every one of the specimens. The outcomes additionally showed that the volumetric wear loss of the Al 6061-9 % SiC-9 % graphite composite was smaller than the Al 6061-9 % SiC-9 % grap...
DAE SOLID STATE PHYSICS SYMPOSIUM 2018, 2019
The present paper describes about estimation of diffusion coefficient of hydrogen in three differ... more The present paper describes about estimation of diffusion coefficient of hydrogen in three different zirconium based alloys namely Zircaloy-2, Zr-2.5% Nb and Zr-1%Nb alloy. The selected sample specimens were charged with hydrogen by electrochemical method. After vacuum sealing in quartz tube, samples were annealed at 673 K for about 100 h in resistance furnace. Slices were made from charge end employing slow moving cutter. Hydrogen mole fraction and then its concentration were determined employing by Hot Vacuum Extraction-Quadrupole Mass Spectrometer (HVEQMS) technique. Diffusion coefficient was calculated using Fick's second law of diffusion equation used in nonlinear fitting code of Fortran language.
International Journal of Computer Applications, 2014
In this digital world all information and data is kept safe by passwords. The simple and convenie... more In this digital world all information and data is kept safe by passwords. The simple and convenient format of password is in the form of text. But, text passwords are not always strong enough and under different vulnerabilities they are very easily stolen and changed. When a person creates a weak password or same password is reused in many sites it may be possible that others can acquire that password. If one password is stolen, then it is possible that it can be used for all the websites. This phenomenon is known as the Domino Effect. Another possible risky attacks are related to phishing, malware and key loggers etc. A protocol is designed which makes use of the user's customer's mobile i.e. cellular phone and SMS (short message service) to ensure protection against password stealing attacks. This user authentication protocol is named as m-Pass. The unique phone number is required which will be possessed by each participating website. The telecommunication service provider plays important role in the registration and the recovery phases. The main theme is to reduce the password reuse attack. It works with one time password technology, and results in reduction of the password validity time. The results show improvement in performance of the security.
IOSR Journal of Computer Engineering, 2013
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties)... more A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject "realistic but fake" data records to further improve our chances of detecting leakage and identifying the guilty party.
International journal of engineering research and technology, Dec 17, 2020
In this present work, systematic study has been conducted to investigate the wear phenomenon by a... more In this present work, systematic study has been conducted to investigate the wear phenomenon by adding micron size silicon carbide and graphite particles into Al6061 base. Al6061 compound was taken as the base lattice to which SiC and graphite particulates were utilized as fortifications. 3 wt. %, 6 wt. %, & 9 wt. % of SiC and 3 wt. %, 6 wt. %, & 9 wt. % of graphite were introduced to the base framework. The wear behavior analysis, which uncovered the uniform appropriation of SiC and graphite content in the Al matrix. Pin on-disc equipment was utilized to assess the volumetric wear loss of arranged samples, in which EN32 steel disc was utilized as the counter face. The outcomes uncovered that the volumetric wear misfortune was expanded with increment in applied load, disc sp eed and sliding distance for every one of the specimens. The outcomes additionally showed that the volumetric wear loss of the Al 6061-9 % SiC-9 % graphite composite was smaller than the Al 6061-9 % SiC-9 % graphite. The worn out surfaces were portrayed by RSM analysis. Aluminum matrix composites (AMCs) are the competent material in the industrial world. Efforts have been made to develop aluminium metal matrix composites in recent years due to their low density, high strength, and superior creep resistance and have great potential in automotive and aerospace applications. Aluminium (Al) is the second most widely used metal in the world today after iron. It has a low density (2.7 g/cc), superior malleability, excellent corrosion resistance, good thermal conductivity (237 W/mK), very low electrical resistivity (2.65*10-8Ωm) and good formability. It's Young's modulus is 70 GPa and its Vickers hardness is 60 to 70 VHN. Al has a melting point of 660.32°C and at high temperatures, the strength of Al decreases. However, the demand for Al and its alloys having a much higher strength is increasing [3]. Al matrix composites (AMCs) have been widely used in automobile and aerospace industries due to their excellent physical and mechanical properties. To overcome these shortcomings and to meet the ever increasing demand of modern day technology, composites are one of the most promising materials [3]. 1.2 Alloy-Aluminium 6061 6061 (UNS designation A96061) is a precipitation-hardened aluminum alloy, containing magnesium and silicon as its major alloying elements. Originally called "Alloy 61S", it was developed in 1935. It has good mechanical properties, exhibits good weld ability, and is very commonly extruded (second in popularity only to 6063). It is one of the most common alloys of aluminum for general-purpose use. It is commonly available in pre-tempered grades such as 6061-O (annealed), tempered grades such as 6061-T6 (solutionized and artificially aged) and 6061-T651 (solutionized, stress-relieved stretched and artificially aged).
International journal of computer applications, Apr 18, 2014
In this digital world all information and data is kept safe by passwords. The simple and convenie... more In this digital world all information and data is kept safe by passwords. The simple and convenient format of password is in the form of text. But, text passwords are not always strong enough and under different vulnerabilities they are very easily stolen and changed. When a person creates a weak password or same password is reused in many sites it may be possible that others can acquire that password. If one password is stolen, then it is possible that it can be used for all the websites. This phenomenon is known as the Domino Effect. Another possible risky attacks are related to phishing, malware and key loggers etc. A protocol is designed which makes use of the user's customer's mobile i.e. cellular phone and SMS (short message service) to ensure protection against password stealing attacks. This user authentication protocol is named as m-Pass. The unique phone number is required which will be possessed by each participating website. The telecommunication service provider plays important role in the registration and the recovery phases. The main theme is to reduce the password reuse attack. It works with one time password technology, and results in reduction of the password validity time. The results show improvement in performance of the security.
International journal of engineering research and technology, Oct 26, 2019
In this present work, systematic study has been conducted to investigate the wear phenomenon by a... more In this present work, systematic study has been conducted to investigate the wear phenomenon by adding micron size silicon carbide and graphite particles into Al6061 base. Al6061 compound was taken as the base lattice to which SiC and graphite particulates were utilized as fortifications. Al 6061-3, 6, 9% SiC-3, 6, and 9% were introduced to the base framework. The microstructural behaviour was analysed through scanning electron microscopy, which uncovered the uniform appropriation of SiC and graphite content in the Al matrix. Pin on-disc equipment was utilized to assess the volumetric wear loss of arranged samples, in which EN32 steel disc was utilized as the counter face. The outcomes uncovered that the volumetric wear misfortune was expanded with increment in applied load, disc speed and sliding distance for every one of the specimens. The outcomes additionally showed that the volumetric wear loss of the Al 6061-2.5% SiC-2.5% graphite composite was smaller than the Al6061 lattice. The worn out surfaces were portrayed by RSM analysis.
In this digital world all information and data is kept safe by passwords. The simple and convenie... more In this digital world all information and data is kept safe by passwords. The simple and convenient format of password is in the form of text. But, text passwords are not always strong enough and under different vulnerabilities they are very easily stolen and changed. When a person creates a weak password or same password is reused in many sites it may be possible that others can acquire that password. If one password is stolen, then it is possible that it can be used for all the websites. This phenomenon is known as the Domino Effect. Another possible risky attacks are related to phishing, malware and key loggers etc. A protocol is designed which makes use of the user’s customer’s mobile i.e. cellular phone and SMS (short message service) to ensure protection against password stealing attacks. This user authentication protocol is named as m-Pass. The unique phone number is required which will be possessed by each participating website. The telecommunication service provider plays i...
International journal of engineering research and technology, 2019
In this present work, systematic study has been conducted to investigate the wear phenomenon by a... more In this present work, systematic study has been conducted to investigate the wear phenomenon by adding micron size silicon carbide and graphite particles into Al6061 base. Al6061 compound was taken as the base lattice to which SiC and graphite particulates were utilized as fortifications. Al 6061-3, 6, 9% SiC-3, 6, and 9% were introduced to the base framework. The microstructural behaviour was analysed through scanning electron microscopy, which uncovered the uniform appropriation of SiC and graphite content in the Al matrix. Pin on-disc equipment was utilized to assess the volumetric wear loss of arranged samples, in which EN32 steel disc was utilized as the counter face. The outcomes uncovered that the volumetric wear misfortune was expanded with increment in applied load, disc speed and sliding distance for every one of the specimens. The outcomes additionally showed that the volumetric wear loss of the Al 6061-2.5% SiC-2.5% graphite composite was smaller than the Al6061 lattice. The worn out surfaces were portrayed by RSM analysis.
International journal of engineering research and technology, 2020
In this present work, systematic study has been conducted to investigate the wear phenomenon by a... more In this present work, systematic study has been conducted to investigate the wear phenomenon by adding micron size silicon carbide and graphite particles into Al6061 base. Al6061 compound was taken as the base lattice to which SiC and graphite particulates were utilized as fortifications. 3 wt. %, 6 wt. %, & 9 wt. % of SiC and 3 wt. %, 6 wt. %, & 9 wt. % of graphite were introduced to the base framework. The wear behavior analysis, which uncovered the uniform appropriation of SiC and graphite content in the Al matrix. Pin on-disc equipment was utilized to assess the volumetric wear loss of arranged samples, in which EN32 steel disc was utilized as the counter face. The outcomes uncovered that the volumetric wear misfortune was expanded with increment in applied load, disc sp eed and sliding distance for every one of the specimens. The outcomes additionally showed that the volumetric wear loss of the Al 6061-9 % SiC-9 % graphite composite was smaller than the Al 6061-9 % SiC-9 % grap...
DAE SOLID STATE PHYSICS SYMPOSIUM 2018, 2019
The present paper describes about estimation of diffusion coefficient of hydrogen in three differ... more The present paper describes about estimation of diffusion coefficient of hydrogen in three different zirconium based alloys namely Zircaloy-2, Zr-2.5% Nb and Zr-1%Nb alloy. The selected sample specimens were charged with hydrogen by electrochemical method. After vacuum sealing in quartz tube, samples were annealed at 673 K for about 100 h in resistance furnace. Slices were made from charge end employing slow moving cutter. Hydrogen mole fraction and then its concentration were determined employing by Hot Vacuum Extraction-Quadrupole Mass Spectrometer (HVEQMS) technique. Diffusion coefficient was calculated using Fick's second law of diffusion equation used in nonlinear fitting code of Fortran language.
International Journal of Computer Applications, 2014
In this digital world all information and data is kept safe by passwords. The simple and convenie... more In this digital world all information and data is kept safe by passwords. The simple and convenient format of password is in the form of text. But, text passwords are not always strong enough and under different vulnerabilities they are very easily stolen and changed. When a person creates a weak password or same password is reused in many sites it may be possible that others can acquire that password. If one password is stolen, then it is possible that it can be used for all the websites. This phenomenon is known as the Domino Effect. Another possible risky attacks are related to phishing, malware and key loggers etc. A protocol is designed which makes use of the user's customer's mobile i.e. cellular phone and SMS (short message service) to ensure protection against password stealing attacks. This user authentication protocol is named as m-Pass. The unique phone number is required which will be possessed by each participating website. The telecommunication service provider plays important role in the registration and the recovery phases. The main theme is to reduce the password reuse attack. It works with one time password technology, and results in reduction of the password validity time. The results show improvement in performance of the security.
IOSR Journal of Computer Engineering, 2013
A data distributor has given sensitive data to a set of supposedly trusted agents (third parties)... more A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an unauthorized place (e.g., on the web or somebody's laptop). The distributor must assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases we can also inject "realistic but fake" data records to further improve our chances of detecting leakage and identifying the guilty party.
International journal of engineering research and technology, Dec 17, 2020
In this present work, systematic study has been conducted to investigate the wear phenomenon by a... more In this present work, systematic study has been conducted to investigate the wear phenomenon by adding micron size silicon carbide and graphite particles into Al6061 base. Al6061 compound was taken as the base lattice to which SiC and graphite particulates were utilized as fortifications. 3 wt. %, 6 wt. %, & 9 wt. % of SiC and 3 wt. %, 6 wt. %, & 9 wt. % of graphite were introduced to the base framework. The wear behavior analysis, which uncovered the uniform appropriation of SiC and graphite content in the Al matrix. Pin on-disc equipment was utilized to assess the volumetric wear loss of arranged samples, in which EN32 steel disc was utilized as the counter face. The outcomes uncovered that the volumetric wear misfortune was expanded with increment in applied load, disc sp eed and sliding distance for every one of the specimens. The outcomes additionally showed that the volumetric wear loss of the Al 6061-9 % SiC-9 % graphite composite was smaller than the Al 6061-9 % SiC-9 % graphite. The worn out surfaces were portrayed by RSM analysis. Aluminum matrix composites (AMCs) are the competent material in the industrial world. Efforts have been made to develop aluminium metal matrix composites in recent years due to their low density, high strength, and superior creep resistance and have great potential in automotive and aerospace applications. Aluminium (Al) is the second most widely used metal in the world today after iron. It has a low density (2.7 g/cc), superior malleability, excellent corrosion resistance, good thermal conductivity (237 W/mK), very low electrical resistivity (2.65*10-8Ωm) and good formability. It's Young's modulus is 70 GPa and its Vickers hardness is 60 to 70 VHN. Al has a melting point of 660.32°C and at high temperatures, the strength of Al decreases. However, the demand for Al and its alloys having a much higher strength is increasing [3]. Al matrix composites (AMCs) have been widely used in automobile and aerospace industries due to their excellent physical and mechanical properties. To overcome these shortcomings and to meet the ever increasing demand of modern day technology, composites are one of the most promising materials [3]. 1.2 Alloy-Aluminium 6061 6061 (UNS designation A96061) is a precipitation-hardened aluminum alloy, containing magnesium and silicon as its major alloying elements. Originally called "Alloy 61S", it was developed in 1935. It has good mechanical properties, exhibits good weld ability, and is very commonly extruded (second in popularity only to 6063). It is one of the most common alloys of aluminum for general-purpose use. It is commonly available in pre-tempered grades such as 6061-O (annealed), tempered grades such as 6061-T6 (solutionized and artificially aged) and 6061-T651 (solutionized, stress-relieved stretched and artificially aged).