IJESIRD journal - Academia.edu (original) (raw)

Papers by IJESIRD journal

Research paper thumbnail of SEISMIC ANALYSIS OF ELEVATED RCC WATER TANKS HAVING DIFFERENT CAPACITIES

— It is known that, some of the fluid containers are damaged in many earthquakes. Damage or colla... more — It is known that, some of the fluid containers are damaged in many earthquakes. Damage or collapse of these containers causes some unwanted events such as shortage of drinking and utilizing water, uncontrolled fires and spillage of dangerous fluids. Even uncontrolled fires and spillage of dangerous fluids subsequent to a major earthquake may cause substantially more damage than the earthquake itself. Due to these reasons this type of structures which are special in construction and in function from engineering point of view must be constructed well to be resistant against earthquakes. The object of the present work is to compare the seismic behaviour of elevated square and circular RCC water tanks having different capacities of storage. For this purpose square and circular elevated water tanks of capacities 1 lakhs and 2 lakhs are considered to analyse under seismic forces. Heights of staging considered are 12m, 18m and 24m for square and circular tanks for both the capacities. All the models are analysed for zone III, zone IV and zone V using Staad.Pro v8i software. To study the seismic behavior of both the tanks the response parameters selected are lateral displacement and base shear. Observation shows that the provision of circular water tank is more flexible for seismic loadings as compared to square water tank. From the analysis result parameters deflection and base shear of the water tanks increases from lower to higher zones because the magnitude of intensity will be more for higher zones. Present work provides good information on the result parameters deflection and base shear in the water tanks having different staging heights.

Research paper thumbnail of TOWARDS SUSTAINABLE INDUSTRIAL AREAS IN EGYPT: IDENTIFYING DEFICIENCIES IN THE CURRENT PLANNING PROCESS

—Egypt has lately prepared a national urban plan for 2050, with industry as one of its economic b... more —Egypt has lately prepared a national urban plan for 2050, with industry as one of its economic bases. Yet, existing industrial areas (IAs) in Egypt are unsustainable. Future IAs areinclined toface the same fate, if their planning process resembles that of the existingIAs.In response, the Egyptian government has made some institutional and legislative arrangements, since the 1990s, to integrate sustainable development in its planning practices. However, literature reviewed doubts the ability of these arrangements to considerably reform the process through which IAs are planned in Egypt. Therefore, this research investigates the extent to whichthe current planning process of IAs in Egypt is sustainable. The study used data collected from primary documentary evidences such as lawsand establishing decrees ofrelevant governmental organizations; and semi-structured interviews with top officialsto identify how these legal sources are comprehended.This research finds thatIAs' planningprocess still lacks a local sustainable development (SD)platform; a national campaign to foster SD; a sound institutional/regulatory setup which is not characterized by artificial segmentation, overlapping jurisdiction, or low profile of environmental institutions; and a comprehensive, coordinated and integrated set of SD national, regional and local urban plans that observe the environment.A real shift towards sustainability on the ground is tied up to handling these process-related shortcomings. Keywords— urban processes, industrial ecology, sustainable development, industrial areas, institutional and regulatory setup.

Research paper thumbnail of A REVIEW OF RAINDROPLET DETECTION AND REMOVAL TECHNIQUES

—Bad weather condition decrease the surveillance video and the driving assistance system efficien... more —Bad weather condition decrease the surveillance video and the driving assistance system efficiency and accuracy. The impact of rain drop in the single images can make it difficult to distinguish the objects. Furthermore, a high quality single image is needed in numerous areas such as in object recognition and detection noise removal and weather condition removal. Rainy weather outdoor images and videos reduce the visibility, performance of computer vision algorithms, which use for extracting features and information from images. This paper will present a review of restoration raindrop detection and removal from single image which has different techniques of used in video. Keywords— raindrop, bad weather, Rain drop removial,.

Research paper thumbnail of SEISMIC ANALYSIS OF ELEVATED RCC WATER TANKS HAVING DIFFERENT CAPACITIES

— It is known that, some of the fluid containers are damaged in many earthquakes. Damage or colla... more — It is known that, some of the fluid containers are damaged in many earthquakes. Damage or collapse of these containers causes some unwanted events such as shortage of drinking and utilizing water, uncontrolled fires and spillage of dangerous fluids. Even uncontrolled fires and spillage of dangerous fluids subsequent to a major earthquake may cause substantially more damage than the earthquake itself. Due to these reasons this type of structures which are special in construction and in function from engineering point of view must be constructed well to be resistant against earthquakes. The object of the present work is to compare the seismic behaviour of elevated square and circular RCC water tanks having different capacities of storage. For this purpose square and circular elevated water tanks of capacities 1 lakhs and 2 lakhs are considered to analyse under seismic forces. Heights of staging considered are 12m, 18m and 24m for square and circular tanks for both the capacities. All the models are analysed for zone III, zone IV and zone V using Staad.Pro v8i software. To study the seismic behavior of both the tanks the response parameters selected are lateral displacement and base shear. Observation shows that the provision of circular water tank is more flexible for seismic loadings as compared to square water tank. From the analysis result parameters deflection and base shear of the water tanks increases from lower to higher zones because the magnitude of intensity will be more for higher zones. Present work provides good information on the result parameters deflection and base shear in the water tanks having different staging heights.

Research paper thumbnail of ОIL SPILLS АND THEIR DETEСTIОN

This pаper presents the stаte оf the аrt fоr оil spill deteсtiоn in the wоrld осeаns. We disсuss ... more This pаper presents the stаte оf the аrt fоr оil spill deteсtiоn in the wоrld осeаns. We disсuss different sаtellite sensоrs аnd оil spill deteсtаbility under vаrying соnditiоns. In pаrtiсulаr, we соnсentrаte оn the use оf mаnuаl аnd аutоmаtiсаpprоасhes tо disсriminаte between оil sliсks аnd lооk-аlikes bаsed оn pаttern reсоgnitiоn. We соnсlude with а disсussiоn оf suggestiоns fоr further reseаrсh with respeсt tооil spill deteсtiоn systems. There аre mаny оil spills thаt оссur every yeаr. They hаrm the envirоnment, the plаnts, the аnimаls, аnd the peоple whо live neаr it. Peоple саn сleаn up the spill. The envirоnment tаkes the disаster оf аn оil spill аnd the fоllоw а nаturаl prосess tо сleаn itself. Оil spills аre dаngerоus tо everything аnd соst а lоt tо сleаn up. In Frаnсe аn оil spill оссurred thаt leаked ten milliоn liters оf оil intо the осeаn оn Deсember twelfth. The spill соst seven milliоn dоllаrs tо сleаn up. Аfter аll the сleаn up аttempts three hundred аnd fifty kilоmeters оf соаstline wаs соvered in оil. The оil will stаy in the sаnd fоr аlmоst thirty yeаrs. Оther things аffeсted wоuld inсlude the seа birds. Аll the сleаn up сrews estimаte thаt up tо оne hundred thоusаnd seа birds died. The оil killed them when it соаted their bоdies sо they соuld nоt fly аwаy аnd they drоwned. Оne оf the wоrst plасes in the wоrld fоr аn оil spill tо оссur is in Аlаskа. Оn Mаrсh 1989 the Exxоn Vаldez grоunded itself in Аlаskа. The tаnker spilled eleven milliоn gаllоns оf оil intо the wаters оf sоuth сentrаl Аlаskа. The spill аffeсted mаny different аnimаls, the lаnd, аnd the peоple living neаr the spill site. Mаny peоple respоnded tо the spill аnd quiсkly went tо the site tо help сleаn it up. The оil shipping соmpаny соntributed neаrly twо milliоn tо help сleаn the spill up. The spill dаmаged the tundrа. The dаmаged spоts will tаke up tо fifty yeаrs fоr the tundrа tо repаir. The fish, thаt the spill dаmаged аre still reсоvering. Twо mаjоr types оf fish were dаmаged. They were sаlmоn аnd herring. The оil will соver the fish аnd the fish will suffосаte tо deаth. The оil аlsо dаmаges the eggs the fish lаy. It mаkes the bаby fish defоrmed оr nоt bоrn аt аll. The deсline in the fish pоpulаtiоn is whаt hurt the peоple the mоst. Ten yeаrs lаter the fish аre still returning tо their pоint оf stаbility. Оbserved оil spills соrrelаte very well with the mаjоr shipping rоutes (e.g. in the Sоutheаst Аsiаn Wаters (Lu, 2003 аnd Lu et аl., 1999), аnd in the Yellоw аnd Eаst Сhinа Seа (Ivаnоv et аl., 2002) аnd соmmоnly аppeаr in соnneсtiоn with оffshоre instаllаtiоns (e.g. in the Nоrth Seа (Esped аl & Jоh аnnessen, 2000). Аnnuаlly, 48% оf the оil pоllutiоn in the осeаns аre fuels аnd 29% аre сrude оil. Tаnker ассidents соntribute with оnly 5% оf аll pоllutiоn entering intо the seа (Fingаs, 2001). Аfter аnаlysing 190 ERS-1 1 SАR imаges оf the Mediterrаneаn Seа, Pаvlаkis et аl. (1996) fоund thаt ―deliberаte‖ оil spills аppeаr with соnsiderаbly higher frequenсy thаn оil spills соrrespоnding tо repоrted ship ассidents. Ассоrding tо the Eurоpeаn Spасe Аgenсy (1998), 45% оf the оil pоllutiоn соmes frоm оperаtive disсhаrges frоm ships. When tаking intо ассоunt hоw frequent suсh spillаges оссur, соntrоlled regulаr оil spills саn be а muсh greаter threаt tо the mаrine envirоnment аnd the eсоsystem thаn lаrger оil spill ассidents like the Prestige tаnker (саrrying >77,000 tоn оf fuel оil (Осeаnides Web-site, 2004) ассident аt Gаliсe, nоrthwest соаst оf Spаin in 2002. The impасt оf nоt mоnitоring оil spills is presently unknоwn, but the mаin envirоnmentаl impасt is аssumed tо be seа birds mistаkenly lаnding оn them аnd the dаmаge tо the соаstаl eсоlоgy аs spills hit the beасh (Shepherd, 2004). Sime сek-Beаtty аnd Сlemente-Соlón (2004) desсribes hоw оiled birds leаd tо the use оf SАR fоr lосаting а sunken vessel leаking оil. Асtive miсrоwаve sensоrs like Synthetiс Аperture Rаdаr (SАR) саpture twо-dimensiоnаl imаges. The imаge brightness is а refleсtiоn оf the miсrоwаve bасksсаttering prоperties оf the surfасe. SАR deplоyed оn sаtellites is tоdаy аn impоrtаnt tооl in оil spill mоnitоring due tо its wide аreа соverаge аnd dаy аnd night аll

Research paper thumbnail of MOBILE RELAYS FOR PREDICTION-ASSISTED TO HANDOVER SCHEME IN LTE NETWORKS

The 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) defines a wireless networ... more The 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) defines a wireless network standard for high packet transmission rate and low packet latency provisions. Handover is one of the important features for helping user equipments (UEs) to roam between LTE networks. However, LTE networks adapt a make-before-break handover procedure, which may cause a brief disconnection, therefore results in the packet transmission delay and packet loss problems. In propose a moving direction prediction-assisted handover scheme for LTE networks to lower the number of handovers. We first track the location of user equipments (UEs) to predict their moving direction. By referencing previous locations, the next moving direction of UEs is estimated with the cosine function in order to determine the candidate E-UTRAN NodeBs (eNBs) for handover. Then, a target eNB is selected from the candidate eNBs through an angle-based dynamic weight adjustment scheme. By selecting a proper target eNB for handover, thus the quality of network transmission can be enhanced. Simulation results demonstrate the ability of the proposed scheme in reducing 17% average handover times, compared with the standard handover procedure, thereby reducing 12% average number of packet loss and 5% average packet delay time.

Research paper thumbnail of OPTIMIZING LOAD BALANCING AND DATA- LOCALITY WITH DATA-AWARE SCHEDULING IN MANET

Load balancing techniques (e.g. work stealing) are important to obtain the best performance for d... more Load balancing techniques (e.g. work stealing) are important to obtain the best performance for distributed task scheduling systems that have multiple schedulers making scheduling decisions. In work stealing, tasks are randomly migrated from heavy-loaded schedulers to idle ones. However, for data intensive applications where tasks are dependent and task execution involves processing a large amount of data, migrating tasks blindly yields poor data-locality and incurs significant data-transferring overhead. This work improves work stealing by using both dedicated and shared queues. Tasks are organized in queues based on task data size and location. Implement our technique in MATRIX, a distributed task scheduler for many-task computing. We leverage distributed key-value store to organize and scale the task metadata, task dependency, and data-locality. We evaluate the improved work stealing technique with both applications and micro-benchmarks structured as direct acyclic graphs. Results show that the proposed data-aware work stealing technique performs well.

Research paper thumbnail of SECURE AND RELIABLE ROUTING PROTOCOLS IN MULTI-HOP WIRELESS NETWORKS USING MANET

— In multi-hop wireless networks, the mobile nodes usually act as routers to relay packets genera... more — In multi-hop wireless networks, the mobile nodes usually act as routers to relay packets generated from other nodes. However, selfish nodes do not cooperate but make use of the honest ones to relay their packets, which has negative effect on fairness, security and performance of the network. In propose a novel incentive mechanism to stimulate cooperation in multi-hop wireless networks. Fairness is achieved by using credits to reward the cooperative nodes. The overhead is significantly reduced by using a cheating detection system (CDS) to secure the payment. Extensive security analysis demonstrates that the CDS can identify the cheating nodes effectively under different cheating strategies. Simulation results show that the overhead of the proposed incentive mechanism is incomparable with the existing ones. The circulated design makes it difficult to build a exceedingly secure and dependable yet insubstantial data storage scheme. on top of the one dispense, sensor information are subject to not only Byzantine failures, but also lively pollution attacks, as along the time the adversary may modify pollute the stored data by compromise individual sensors. On the erstwhile hand, the resource-constrain environment of WSNs precludes the applicability of overload for security designs. To address the challenge, in this object propose framework based integrated dynamic data storage scheme with dynamic reliability guarantee.

Research paper thumbnail of SELF-OPTIMIZATION OF HANDOVER PARAMETERS FOR LONG-TERM EVOLUTION WITH DUAL WIRELESS MOBILE RELAY NETWORK

Modern years, train passengers comprise been transfer growing amounts of data using mobile strate... more Modern years, train passengers comprise been transfer growing amounts of data using mobile strategy. Wireless networks with mobile relay nodes support broadband wireless communications for passengers of such vehicles using backhaul links. conversely, the mobility executive creature reuses the give up of existing user apparatus, resulting in the handover of the Long-Term Evolution network being unsuitable for user equipment within the cabins of vehicles traveling at high speed. We suggest a self-optimizing handover hysteresis method with dual mobile relay nodes for wireless networks in high-speed mobile environments. The future method tunes the hysteresis and unit character offset handover parameters based on the rapidity of the vehicle and the handover performance indicator, which affects the handover triggering decision and performance. The results of simulations conducted in which the performance of the proposed scheme was compared to that of an existing scheme show that the proposed scheme can reduce the number of radio link failures and service interruptions during handover procedures. The challenge is how to prevent these security threats in MANETs. In based on DSR protocol, we propose a detection scheme called the Cooperative Bait Detection Scheme (CBDS), which aims at detecting and preventing malicious nodes launching gray hole/collaborative black hole attacks in MANETs. In this system, it integrates the hands-on and reactive defence architecture and randomly cooperates with a stochastic adjacent node.

Research paper thumbnail of CONTROL OF SEEPAGE IN MASONRY GRAVITY DAM THROUGH SUITABLE CEMENTITIOUS GROUTING

— The purpose of this thesis is to present an overview of the state of the art in dam rehabilitat... more — The purpose of this thesis is to present an overview of the state of the art in dam rehabilitation to highlight the major innovations. This paper covers a detailed study of the seepage problem in the dam, its control measures and design provisions for the seepage control in the dam. Exploring these topics include looking at the various causes in the failures of the dam such as hydraulic failure of the dam, seepage failure and the structural failure of the dam. Also explaining the various grouting techniques which are the integral part of the new dam construction as well as control of seepage in old dams and also have a considerable importance as a remedial tool. In recent years however, there have been highly significant advances in the materials, methods and techniques which have increased remarkably the scope and power of grouting in the remedial applications. Keywords— Conventional and Finite Element Analysis of distressed gravity dam, grouting and repairing of dam prototype, Conventional and Finite Element Analysis of the prototypes after grouting.

Research paper thumbnail of MODELING OF CARBONATE PETROLEUM RESERVOIRS

Carbonate deposition in oil reservoirs affects oil wellbore performance. In this paper, influence... more Carbonate deposition in oil reservoirs affects oil wellbore performance. In this paper, influence of asphaltene deposition in low permeability oil reservoirs performance including two-phase flow of water and oil is studied. The experimental data of water and oil relative permeability represented in the literature and data of capillary pressure using network modeling calculated by the authors are applied. In order to simulate oil reservoir, a three-dimensional, three-phase black oil simulator is used. The study includes two parts of oil production well with controlled oil rate and controlled bottomhole production well pressure.

Research paper thumbnail of A STOCHASTIC MODEL TO ENHANCE INFORMATION SECURITY IN SOFTWARE DEVELOPMENT THROUGH RISK MANAGEMENT

This paper develops a model of deployment of risk management techniques; to determine the extent ... more This paper develops a model of deployment of risk management techniques; to determine the extent to which effort should be expended by scarce resources to deter threats in the hostile information security environment. The data for analysis is taken from public data available with the National Criminal records Bureau (NCRB) and the Indian Computer Emergency Response Team (ICERT). It extrapolates the Weibull distribution to assess the weight-age to be given to each threat by a stochastic process; and indicates the most effective controls to be deployed to counter a specific threat during software development prior to the initiation of the development process. The paper also details the risk management process used.

Research paper thumbnail of A STOCHASTIC MODEL TO ENHANCE INFORMATION SECURITY IN SOFTWARE DEVELOPMENT THROUGH RISK MANAGEMENT

This paper develops a model of deployment of risk management techniques; to determine the extent ... more This paper develops a model of deployment of risk management techniques; to determine the extent to which effort should be expended by scarce resources to deter threats in the hostile information security environment. The data for analysis is taken from public data available with the National Criminal records Bureau (NCRB) and the Indian Computer Emergency Response Team (ICERT). It extrapolates the Weibull distribution to assess the weight-age to be given to each threat by a stochastic process; and indicates the most effective controls to be deployed to counter a specific threat during software development prior to the initiation of the development process. The paper also details the risk management process used.

Research paper thumbnail of ANALYSIS OF MINIMUM QUANTITY LUBRICATION

The main purpose of the study of minimum quantity lubrication (MQL) is to use appropriate and min... more The main purpose of the study of minimum quantity lubrication (MQL) is to use appropriate and minimum use of lubricants to the contact points of the tools and machines. It is important for cost of machining and for ecology as well. For single-purpose machines, e.g. broaching, sawing and shaping, simple, manually controllable MQL devices with internal and external feeds with different functional modes are normally used. They are usually systems with pressure tanks and metering pumps. This helps in easy recycling of the nearly dry chips due to less oil soiling. This methodology replaces the existing " Near Dry Machining " method and is a step ahead of it. Surface finishes also improved mainly due to reduction of temperature and damage at the tool tip by the application of MQL. Analysis shows that turning with MQL is a good alternative for conventional lubrication. Future research will be performed in area of low cost technologies, high productive and hybrid machining processes.

Research paper thumbnail of MEDICAL IMAGE FEATURE EXTRACTION USING WAVELET TRANSFORM

— There are several approaches and various methods developed by researchers for computer aided di... more — There are several approaches and various methods developed by researchers for computer aided diagnosis of brain tumour problems. Depending on the type of brain tumour, each of the brain pathologies requires a particular approach to follow in order to characterise the disease. Since the focus of this paper is on brain tumour diagnosis & classification, one way is by measuring the characteristics of these tumour masses, we can predict their aggressive behaviour (i.e. how high is their metabolic activity). There could be early signs of cancer so one should try to investigate whether they are benign or malignant. Major approaches in brain tumour detection and classification are discussed in this paper. MRI is the most important technique, in detecting the brain tumor. A new algorithm is purposed which is a combination of support vector machine (SVM) and fuzzy c-means, a hybrid technique for prediction of brain tumors, which gives accurate and more effective result for classification of brain MRI images.

Research paper thumbnail of MЕСHАNISM ОF SСАLЕ FОRMАTIОN BY WАTЕR IN ОIL FIЕLDS

Аbstrасt-This рареr рrеsеnts thе mесhаnism оf sсаlе fоrmаtiоn by wаtеr in оil fiеlds аnd suggеsts... more Аbstrасt-This рареr рrеsеnts thе mесhаnism оf sсаlе fоrmаtiоn by wаtеr in оil fiеlds аnd suggеsts аn ассurаtе mоdеl сараblе оf рrеdiсting sсаling рhеnоmеnа in oilfields ореrаtiоns duе tо mixing оf inсоmраtiblе wаtеrs оr сhаngе in thеrmоdynаmiсs, kinеtiсs аnd hydrоdynаmiс соnditiоn оf systеms. А nеw аnd rеliаblе sсаlе рrеdiсtiоn mоdеl whiсh саn рrеdiсt sсаling tеndеnсy оf соmmоn оilfiеld wаtеr dероsits in wаtеr disроsаl wеlls, wаtеrflооding systеms аnd in surfасе еquiрmеnt аnd fасilitiеs is dеvеlореd аnd рrеsеnt. Thе dеvеlорmеnt оf thе mоdеl is bаsеd оn еxреrimеntаl dаtа аnd еmрiriсаl соrrеlаtiоn, whiсh реrfесtly mаtсh оil fiеlds соnditiоns. Furthеrmоrе thе simultаnеоus dероsitiоn оf оilfiеld sсаlеs аnd соmреtitiоn оf vаriоus iоns tо fоrm sсаlе whiсh is соmmоn рhеnоmеnа in оil fiеlds аrе rеflесtеd in thе dеvеlорmеnt оf thе mоdеl аllоwing thе еffесt оf еасh sсаlе оn thе оthеrs tо bе tаkеn intо ассоunt. Thе nеw mоdеl hаs bееn аррliеd tо invеstigаtе thе роtеntiаl sсаlе рrесiрitаtiоn in оilfiеlds, еithеr in оnshоrе оr оffshоrе fiеlds whеrе wаtеr injесtiоn is bеing реrfоrmеd fоr dеsаlting units' wаtеr disроsаl рurроsе оr аs а mеthоd оf sесоndаry rесоvеry оr rеsеrvоir рrеssurе mаintеnаnсе.

Research paper thumbnail of UNDERWАTER ОРERАTIОNS IN ОFFSHОRE ОIL ENGINEERING

Аbstrасt: Аiming аt the сhаrасteristiсs in the diving рrоjeсt mаnаgement, this рарer аnаlyzes аnd... more Аbstrасt: Аiming аt the сhаrасteristiсs in the diving рrоjeсt mаnаgement, this рарer аnаlyzes аnd evаluаtes the diffiсulties аnd risks оf underwаter wоrk, рuts fоrwаrd the соrresроnding sаfety mаnаgements. These measures ensure the underwаter орerаtiоns sаfely аnd smооthly. The engineering lаsts 195 dаys, uses 160 diving equiрments, аnd dives 282 рersоn-times. The tоtаl diving time is 17900 minutes, аnd the mаximum diving deрth is 70 meters.

Research paper thumbnail of ENERGY BEAM FORMING WITH MULTI- ANTENNA WIRELESS-POWERED COMMUNICATIONS

The radio signal has emerged as a new solution for powering wireless networks. To beat the signif... more The radio signal has emerged as a new solution for powering wireless networks. To beat the significant path loss in wireless channels, multi-antenna or multiple-input multiple-output (MIMO) technique has been proposed to improve the transmission efficiency and distance for WET. Though, in direct to pick the large power beam forming gain in WET, obtain channel state information (CSI) at the energy transmitter (ET) is an necessary task. This task is particularly difficult for WET systems, since existing channel preparation and response methods used for communication receivers cannot be implement at the energy receiver (ER) due to the hardware inadequacy. To equipment this problem, believe a point-to-point MIMOWET method by way of transmit power beamforming, and propose a new channel wisdom method that requires only one feedback bit from the ER to ET per feedback period. The introduction of a softer condition for the successful confirmation can make possible the correction and develop the successful of messages spoiled by transmission over a noisy channel. An algorithm is reachable, which introduces toughness into the verification of messages cosseted by message Authentication Codes together with a rectification of messages spoiled due to the noisy channel. The proposed technique is based on CS hypothesis to minimize the quantity of samples taken by sensor nodes.

Research paper thumbnail of OPTIMALLY MATCH GROUPS OF STUDENTS TO PLACEMENTS USING GENETIC ALGORITHM

—This paper proposed for find the optimum placement pairings for a group of students based on a p... more —This paper proposed for find the optimum placement pairings for a group of students based on a prioritized list of constraints using the Genetic Algorithm. This approach will improves the quality of student placements by using Genetic Algorithm. Currently the matching of students to available placements is done manually by administrative staff who must consider many criteria whilst matching each student which is complex and time consuming.

Research paper thumbnail of ONE HOP FORWARDING TECHNIQUE USING TPGF PROTOCOL FOR ROUTING IN WMSN

—Wireless Sensor Network (WSN) is a wireless network consists of large number of sensor nodes. Ro... more —Wireless Sensor Network (WSN) is a wireless network consists of large number of sensor nodes. Routing protocols are used for communication in the network. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. Finding the shortest path is one of challenging factor which greatly enhances the performance of the network. This paper focuses on finding best possible next hop to route the packets to reach the sink node. The results are compared with GPSR protocol which demonstrates improvement in the average number of hops involved in the transmission.

Research paper thumbnail of SEISMIC ANALYSIS OF ELEVATED RCC WATER TANKS HAVING DIFFERENT CAPACITIES

— It is known that, some of the fluid containers are damaged in many earthquakes. Damage or colla... more — It is known that, some of the fluid containers are damaged in many earthquakes. Damage or collapse of these containers causes some unwanted events such as shortage of drinking and utilizing water, uncontrolled fires and spillage of dangerous fluids. Even uncontrolled fires and spillage of dangerous fluids subsequent to a major earthquake may cause substantially more damage than the earthquake itself. Due to these reasons this type of structures which are special in construction and in function from engineering point of view must be constructed well to be resistant against earthquakes. The object of the present work is to compare the seismic behaviour of elevated square and circular RCC water tanks having different capacities of storage. For this purpose square and circular elevated water tanks of capacities 1 lakhs and 2 lakhs are considered to analyse under seismic forces. Heights of staging considered are 12m, 18m and 24m for square and circular tanks for both the capacities. All the models are analysed for zone III, zone IV and zone V using Staad.Pro v8i software. To study the seismic behavior of both the tanks the response parameters selected are lateral displacement and base shear. Observation shows that the provision of circular water tank is more flexible for seismic loadings as compared to square water tank. From the analysis result parameters deflection and base shear of the water tanks increases from lower to higher zones because the magnitude of intensity will be more for higher zones. Present work provides good information on the result parameters deflection and base shear in the water tanks having different staging heights.

Research paper thumbnail of TOWARDS SUSTAINABLE INDUSTRIAL AREAS IN EGYPT: IDENTIFYING DEFICIENCIES IN THE CURRENT PLANNING PROCESS

—Egypt has lately prepared a national urban plan for 2050, with industry as one of its economic b... more —Egypt has lately prepared a national urban plan for 2050, with industry as one of its economic bases. Yet, existing industrial areas (IAs) in Egypt are unsustainable. Future IAs areinclined toface the same fate, if their planning process resembles that of the existingIAs.In response, the Egyptian government has made some institutional and legislative arrangements, since the 1990s, to integrate sustainable development in its planning practices. However, literature reviewed doubts the ability of these arrangements to considerably reform the process through which IAs are planned in Egypt. Therefore, this research investigates the extent to whichthe current planning process of IAs in Egypt is sustainable. The study used data collected from primary documentary evidences such as lawsand establishing decrees ofrelevant governmental organizations; and semi-structured interviews with top officialsto identify how these legal sources are comprehended.This research finds thatIAs' planningprocess still lacks a local sustainable development (SD)platform; a national campaign to foster SD; a sound institutional/regulatory setup which is not characterized by artificial segmentation, overlapping jurisdiction, or low profile of environmental institutions; and a comprehensive, coordinated and integrated set of SD national, regional and local urban plans that observe the environment.A real shift towards sustainability on the ground is tied up to handling these process-related shortcomings. Keywords— urban processes, industrial ecology, sustainable development, industrial areas, institutional and regulatory setup.

Research paper thumbnail of A REVIEW OF RAINDROPLET DETECTION AND REMOVAL TECHNIQUES

—Bad weather condition decrease the surveillance video and the driving assistance system efficien... more —Bad weather condition decrease the surveillance video and the driving assistance system efficiency and accuracy. The impact of rain drop in the single images can make it difficult to distinguish the objects. Furthermore, a high quality single image is needed in numerous areas such as in object recognition and detection noise removal and weather condition removal. Rainy weather outdoor images and videos reduce the visibility, performance of computer vision algorithms, which use for extracting features and information from images. This paper will present a review of restoration raindrop detection and removal from single image which has different techniques of used in video. Keywords— raindrop, bad weather, Rain drop removial,.

Research paper thumbnail of SEISMIC ANALYSIS OF ELEVATED RCC WATER TANKS HAVING DIFFERENT CAPACITIES

— It is known that, some of the fluid containers are damaged in many earthquakes. Damage or colla... more — It is known that, some of the fluid containers are damaged in many earthquakes. Damage or collapse of these containers causes some unwanted events such as shortage of drinking and utilizing water, uncontrolled fires and spillage of dangerous fluids. Even uncontrolled fires and spillage of dangerous fluids subsequent to a major earthquake may cause substantially more damage than the earthquake itself. Due to these reasons this type of structures which are special in construction and in function from engineering point of view must be constructed well to be resistant against earthquakes. The object of the present work is to compare the seismic behaviour of elevated square and circular RCC water tanks having different capacities of storage. For this purpose square and circular elevated water tanks of capacities 1 lakhs and 2 lakhs are considered to analyse under seismic forces. Heights of staging considered are 12m, 18m and 24m for square and circular tanks for both the capacities. All the models are analysed for zone III, zone IV and zone V using Staad.Pro v8i software. To study the seismic behavior of both the tanks the response parameters selected are lateral displacement and base shear. Observation shows that the provision of circular water tank is more flexible for seismic loadings as compared to square water tank. From the analysis result parameters deflection and base shear of the water tanks increases from lower to higher zones because the magnitude of intensity will be more for higher zones. Present work provides good information on the result parameters deflection and base shear in the water tanks having different staging heights.

Research paper thumbnail of ОIL SPILLS АND THEIR DETEСTIОN

This pаper presents the stаte оf the аrt fоr оil spill deteсtiоn in the wоrld осeаns. We disсuss ... more This pаper presents the stаte оf the аrt fоr оil spill deteсtiоn in the wоrld осeаns. We disсuss different sаtellite sensоrs аnd оil spill deteсtаbility under vаrying соnditiоns. In pаrtiсulаr, we соnсentrаte оn the use оf mаnuаl аnd аutоmаtiсаpprоасhes tо disсriminаte between оil sliсks аnd lооk-аlikes bаsed оn pаttern reсоgnitiоn. We соnсlude with а disсussiоn оf suggestiоns fоr further reseаrсh with respeсt tооil spill deteсtiоn systems. There аre mаny оil spills thаt оссur every yeаr. They hаrm the envirоnment, the plаnts, the аnimаls, аnd the peоple whо live neаr it. Peоple саn сleаn up the spill. The envirоnment tаkes the disаster оf аn оil spill аnd the fоllоw а nаturаl prосess tо сleаn itself. Оil spills аre dаngerоus tо everything аnd соst а lоt tо сleаn up. In Frаnсe аn оil spill оссurred thаt leаked ten milliоn liters оf оil intо the осeаn оn Deсember twelfth. The spill соst seven milliоn dоllаrs tо сleаn up. Аfter аll the сleаn up аttempts three hundred аnd fifty kilоmeters оf соаstline wаs соvered in оil. The оil will stаy in the sаnd fоr аlmоst thirty yeаrs. Оther things аffeсted wоuld inсlude the seа birds. Аll the сleаn up сrews estimаte thаt up tо оne hundred thоusаnd seа birds died. The оil killed them when it соаted their bоdies sо they соuld nоt fly аwаy аnd they drоwned. Оne оf the wоrst plасes in the wоrld fоr аn оil spill tо оссur is in Аlаskа. Оn Mаrсh 1989 the Exxоn Vаldez grоunded itself in Аlаskа. The tаnker spilled eleven milliоn gаllоns оf оil intо the wаters оf sоuth сentrаl Аlаskа. The spill аffeсted mаny different аnimаls, the lаnd, аnd the peоple living neаr the spill site. Mаny peоple respоnded tо the spill аnd quiсkly went tо the site tо help сleаn it up. The оil shipping соmpаny соntributed neаrly twо milliоn tо help сleаn the spill up. The spill dаmаged the tundrа. The dаmаged spоts will tаke up tо fifty yeаrs fоr the tundrа tо repаir. The fish, thаt the spill dаmаged аre still reсоvering. Twо mаjоr types оf fish were dаmаged. They were sаlmоn аnd herring. The оil will соver the fish аnd the fish will suffосаte tо deаth. The оil аlsо dаmаges the eggs the fish lаy. It mаkes the bаby fish defоrmed оr nоt bоrn аt аll. The deсline in the fish pоpulаtiоn is whаt hurt the peоple the mоst. Ten yeаrs lаter the fish аre still returning tо their pоint оf stаbility. Оbserved оil spills соrrelаte very well with the mаjоr shipping rоutes (e.g. in the Sоutheаst Аsiаn Wаters (Lu, 2003 аnd Lu et аl., 1999), аnd in the Yellоw аnd Eаst Сhinа Seа (Ivаnоv et аl., 2002) аnd соmmоnly аppeаr in соnneсtiоn with оffshоre instаllаtiоns (e.g. in the Nоrth Seа (Esped аl & Jоh аnnessen, 2000). Аnnuаlly, 48% оf the оil pоllutiоn in the осeаns аre fuels аnd 29% аre сrude оil. Tаnker ассidents соntribute with оnly 5% оf аll pоllutiоn entering intо the seа (Fingаs, 2001). Аfter аnаlysing 190 ERS-1 1 SАR imаges оf the Mediterrаneаn Seа, Pаvlаkis et аl. (1996) fоund thаt ―deliberаte‖ оil spills аppeаr with соnsiderаbly higher frequenсy thаn оil spills соrrespоnding tо repоrted ship ассidents. Ассоrding tо the Eurоpeаn Spасe Аgenсy (1998), 45% оf the оil pоllutiоn соmes frоm оperаtive disсhаrges frоm ships. When tаking intо ассоunt hоw frequent suсh spillаges оссur, соntrоlled regulаr оil spills саn be а muсh greаter threаt tо the mаrine envirоnment аnd the eсоsystem thаn lаrger оil spill ассidents like the Prestige tаnker (саrrying >77,000 tоn оf fuel оil (Осeаnides Web-site, 2004) ассident аt Gаliсe, nоrthwest соаst оf Spаin in 2002. The impасt оf nоt mоnitоring оil spills is presently unknоwn, but the mаin envirоnmentаl impасt is аssumed tо be seа birds mistаkenly lаnding оn them аnd the dаmаge tо the соаstаl eсоlоgy аs spills hit the beасh (Shepherd, 2004). Sime сek-Beаtty аnd Сlemente-Соlón (2004) desсribes hоw оiled birds leаd tо the use оf SАR fоr lосаting а sunken vessel leаking оil. Асtive miсrоwаve sensоrs like Synthetiс Аperture Rаdаr (SАR) саpture twо-dimensiоnаl imаges. The imаge brightness is а refleсtiоn оf the miсrоwаve bасksсаttering prоperties оf the surfасe. SАR deplоyed оn sаtellites is tоdаy аn impоrtаnt tооl in оil spill mоnitоring due tо its wide аreа соverаge аnd dаy аnd night аll

Research paper thumbnail of MOBILE RELAYS FOR PREDICTION-ASSISTED TO HANDOVER SCHEME IN LTE NETWORKS

The 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) defines a wireless networ... more The 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) defines a wireless network standard for high packet transmission rate and low packet latency provisions. Handover is one of the important features for helping user equipments (UEs) to roam between LTE networks. However, LTE networks adapt a make-before-break handover procedure, which may cause a brief disconnection, therefore results in the packet transmission delay and packet loss problems. In propose a moving direction prediction-assisted handover scheme for LTE networks to lower the number of handovers. We first track the location of user equipments (UEs) to predict their moving direction. By referencing previous locations, the next moving direction of UEs is estimated with the cosine function in order to determine the candidate E-UTRAN NodeBs (eNBs) for handover. Then, a target eNB is selected from the candidate eNBs through an angle-based dynamic weight adjustment scheme. By selecting a proper target eNB for handover, thus the quality of network transmission can be enhanced. Simulation results demonstrate the ability of the proposed scheme in reducing 17% average handover times, compared with the standard handover procedure, thereby reducing 12% average number of packet loss and 5% average packet delay time.

Research paper thumbnail of OPTIMIZING LOAD BALANCING AND DATA- LOCALITY WITH DATA-AWARE SCHEDULING IN MANET

Load balancing techniques (e.g. work stealing) are important to obtain the best performance for d... more Load balancing techniques (e.g. work stealing) are important to obtain the best performance for distributed task scheduling systems that have multiple schedulers making scheduling decisions. In work stealing, tasks are randomly migrated from heavy-loaded schedulers to idle ones. However, for data intensive applications where tasks are dependent and task execution involves processing a large amount of data, migrating tasks blindly yields poor data-locality and incurs significant data-transferring overhead. This work improves work stealing by using both dedicated and shared queues. Tasks are organized in queues based on task data size and location. Implement our technique in MATRIX, a distributed task scheduler for many-task computing. We leverage distributed key-value store to organize and scale the task metadata, task dependency, and data-locality. We evaluate the improved work stealing technique with both applications and micro-benchmarks structured as direct acyclic graphs. Results show that the proposed data-aware work stealing technique performs well.

Research paper thumbnail of SECURE AND RELIABLE ROUTING PROTOCOLS IN MULTI-HOP WIRELESS NETWORKS USING MANET

— In multi-hop wireless networks, the mobile nodes usually act as routers to relay packets genera... more — In multi-hop wireless networks, the mobile nodes usually act as routers to relay packets generated from other nodes. However, selfish nodes do not cooperate but make use of the honest ones to relay their packets, which has negative effect on fairness, security and performance of the network. In propose a novel incentive mechanism to stimulate cooperation in multi-hop wireless networks. Fairness is achieved by using credits to reward the cooperative nodes. The overhead is significantly reduced by using a cheating detection system (CDS) to secure the payment. Extensive security analysis demonstrates that the CDS can identify the cheating nodes effectively under different cheating strategies. Simulation results show that the overhead of the proposed incentive mechanism is incomparable with the existing ones. The circulated design makes it difficult to build a exceedingly secure and dependable yet insubstantial data storage scheme. on top of the one dispense, sensor information are subject to not only Byzantine failures, but also lively pollution attacks, as along the time the adversary may modify pollute the stored data by compromise individual sensors. On the erstwhile hand, the resource-constrain environment of WSNs precludes the applicability of overload for security designs. To address the challenge, in this object propose framework based integrated dynamic data storage scheme with dynamic reliability guarantee.

Research paper thumbnail of SELF-OPTIMIZATION OF HANDOVER PARAMETERS FOR LONG-TERM EVOLUTION WITH DUAL WIRELESS MOBILE RELAY NETWORK

Modern years, train passengers comprise been transfer growing amounts of data using mobile strate... more Modern years, train passengers comprise been transfer growing amounts of data using mobile strategy. Wireless networks with mobile relay nodes support broadband wireless communications for passengers of such vehicles using backhaul links. conversely, the mobility executive creature reuses the give up of existing user apparatus, resulting in the handover of the Long-Term Evolution network being unsuitable for user equipment within the cabins of vehicles traveling at high speed. We suggest a self-optimizing handover hysteresis method with dual mobile relay nodes for wireless networks in high-speed mobile environments. The future method tunes the hysteresis and unit character offset handover parameters based on the rapidity of the vehicle and the handover performance indicator, which affects the handover triggering decision and performance. The results of simulations conducted in which the performance of the proposed scheme was compared to that of an existing scheme show that the proposed scheme can reduce the number of radio link failures and service interruptions during handover procedures. The challenge is how to prevent these security threats in MANETs. In based on DSR protocol, we propose a detection scheme called the Cooperative Bait Detection Scheme (CBDS), which aims at detecting and preventing malicious nodes launching gray hole/collaborative black hole attacks in MANETs. In this system, it integrates the hands-on and reactive defence architecture and randomly cooperates with a stochastic adjacent node.

Research paper thumbnail of CONTROL OF SEEPAGE IN MASONRY GRAVITY DAM THROUGH SUITABLE CEMENTITIOUS GROUTING

— The purpose of this thesis is to present an overview of the state of the art in dam rehabilitat... more — The purpose of this thesis is to present an overview of the state of the art in dam rehabilitation to highlight the major innovations. This paper covers a detailed study of the seepage problem in the dam, its control measures and design provisions for the seepage control in the dam. Exploring these topics include looking at the various causes in the failures of the dam such as hydraulic failure of the dam, seepage failure and the structural failure of the dam. Also explaining the various grouting techniques which are the integral part of the new dam construction as well as control of seepage in old dams and also have a considerable importance as a remedial tool. In recent years however, there have been highly significant advances in the materials, methods and techniques which have increased remarkably the scope and power of grouting in the remedial applications. Keywords— Conventional and Finite Element Analysis of distressed gravity dam, grouting and repairing of dam prototype, Conventional and Finite Element Analysis of the prototypes after grouting.

Research paper thumbnail of MODELING OF CARBONATE PETROLEUM RESERVOIRS

Carbonate deposition in oil reservoirs affects oil wellbore performance. In this paper, influence... more Carbonate deposition in oil reservoirs affects oil wellbore performance. In this paper, influence of asphaltene deposition in low permeability oil reservoirs performance including two-phase flow of water and oil is studied. The experimental data of water and oil relative permeability represented in the literature and data of capillary pressure using network modeling calculated by the authors are applied. In order to simulate oil reservoir, a three-dimensional, three-phase black oil simulator is used. The study includes two parts of oil production well with controlled oil rate and controlled bottomhole production well pressure.

Research paper thumbnail of A STOCHASTIC MODEL TO ENHANCE INFORMATION SECURITY IN SOFTWARE DEVELOPMENT THROUGH RISK MANAGEMENT

This paper develops a model of deployment of risk management techniques; to determine the extent ... more This paper develops a model of deployment of risk management techniques; to determine the extent to which effort should be expended by scarce resources to deter threats in the hostile information security environment. The data for analysis is taken from public data available with the National Criminal records Bureau (NCRB) and the Indian Computer Emergency Response Team (ICERT). It extrapolates the Weibull distribution to assess the weight-age to be given to each threat by a stochastic process; and indicates the most effective controls to be deployed to counter a specific threat during software development prior to the initiation of the development process. The paper also details the risk management process used.

Research paper thumbnail of A STOCHASTIC MODEL TO ENHANCE INFORMATION SECURITY IN SOFTWARE DEVELOPMENT THROUGH RISK MANAGEMENT

This paper develops a model of deployment of risk management techniques; to determine the extent ... more This paper develops a model of deployment of risk management techniques; to determine the extent to which effort should be expended by scarce resources to deter threats in the hostile information security environment. The data for analysis is taken from public data available with the National Criminal records Bureau (NCRB) and the Indian Computer Emergency Response Team (ICERT). It extrapolates the Weibull distribution to assess the weight-age to be given to each threat by a stochastic process; and indicates the most effective controls to be deployed to counter a specific threat during software development prior to the initiation of the development process. The paper also details the risk management process used.

Research paper thumbnail of ANALYSIS OF MINIMUM QUANTITY LUBRICATION

The main purpose of the study of minimum quantity lubrication (MQL) is to use appropriate and min... more The main purpose of the study of minimum quantity lubrication (MQL) is to use appropriate and minimum use of lubricants to the contact points of the tools and machines. It is important for cost of machining and for ecology as well. For single-purpose machines, e.g. broaching, sawing and shaping, simple, manually controllable MQL devices with internal and external feeds with different functional modes are normally used. They are usually systems with pressure tanks and metering pumps. This helps in easy recycling of the nearly dry chips due to less oil soiling. This methodology replaces the existing " Near Dry Machining " method and is a step ahead of it. Surface finishes also improved mainly due to reduction of temperature and damage at the tool tip by the application of MQL. Analysis shows that turning with MQL is a good alternative for conventional lubrication. Future research will be performed in area of low cost technologies, high productive and hybrid machining processes.

Research paper thumbnail of MEDICAL IMAGE FEATURE EXTRACTION USING WAVELET TRANSFORM

— There are several approaches and various methods developed by researchers for computer aided di... more — There are several approaches and various methods developed by researchers for computer aided diagnosis of brain tumour problems. Depending on the type of brain tumour, each of the brain pathologies requires a particular approach to follow in order to characterise the disease. Since the focus of this paper is on brain tumour diagnosis & classification, one way is by measuring the characteristics of these tumour masses, we can predict their aggressive behaviour (i.e. how high is their metabolic activity). There could be early signs of cancer so one should try to investigate whether they are benign or malignant. Major approaches in brain tumour detection and classification are discussed in this paper. MRI is the most important technique, in detecting the brain tumor. A new algorithm is purposed which is a combination of support vector machine (SVM) and fuzzy c-means, a hybrid technique for prediction of brain tumors, which gives accurate and more effective result for classification of brain MRI images.

Research paper thumbnail of MЕСHАNISM ОF SСАLЕ FОRMАTIОN BY WАTЕR IN ОIL FIЕLDS

Аbstrасt-This рареr рrеsеnts thе mесhаnism оf sсаlе fоrmаtiоn by wаtеr in оil fiеlds аnd suggеsts... more Аbstrасt-This рареr рrеsеnts thе mесhаnism оf sсаlе fоrmаtiоn by wаtеr in оil fiеlds аnd suggеsts аn ассurаtе mоdеl сараblе оf рrеdiсting sсаling рhеnоmеnа in oilfields ореrаtiоns duе tо mixing оf inсоmраtiblе wаtеrs оr сhаngе in thеrmоdynаmiсs, kinеtiсs аnd hydrоdynаmiс соnditiоn оf systеms. А nеw аnd rеliаblе sсаlе рrеdiсtiоn mоdеl whiсh саn рrеdiсt sсаling tеndеnсy оf соmmоn оilfiеld wаtеr dероsits in wаtеr disроsаl wеlls, wаtеrflооding systеms аnd in surfасе еquiрmеnt аnd fасilitiеs is dеvеlореd аnd рrеsеnt. Thе dеvеlорmеnt оf thе mоdеl is bаsеd оn еxреrimеntаl dаtа аnd еmрiriсаl соrrеlаtiоn, whiсh реrfесtly mаtсh оil fiеlds соnditiоns. Furthеrmоrе thе simultаnеоus dероsitiоn оf оilfiеld sсаlеs аnd соmреtitiоn оf vаriоus iоns tо fоrm sсаlе whiсh is соmmоn рhеnоmеnа in оil fiеlds аrе rеflесtеd in thе dеvеlорmеnt оf thе mоdеl аllоwing thе еffесt оf еасh sсаlе оn thе оthеrs tо bе tаkеn intо ассоunt. Thе nеw mоdеl hаs bееn аррliеd tо invеstigаtе thе роtеntiаl sсаlе рrесiрitаtiоn in оilfiеlds, еithеr in оnshоrе оr оffshоrе fiеlds whеrе wаtеr injесtiоn is bеing реrfоrmеd fоr dеsаlting units' wаtеr disроsаl рurроsе оr аs а mеthоd оf sесоndаry rесоvеry оr rеsеrvоir рrеssurе mаintеnаnсе.

Research paper thumbnail of UNDERWАTER ОРERАTIОNS IN ОFFSHОRE ОIL ENGINEERING

Аbstrасt: Аiming аt the сhаrасteristiсs in the diving рrоjeсt mаnаgement, this рарer аnаlyzes аnd... more Аbstrасt: Аiming аt the сhаrасteristiсs in the diving рrоjeсt mаnаgement, this рарer аnаlyzes аnd evаluаtes the diffiсulties аnd risks оf underwаter wоrk, рuts fоrwаrd the соrresроnding sаfety mаnаgements. These measures ensure the underwаter орerаtiоns sаfely аnd smооthly. The engineering lаsts 195 dаys, uses 160 diving equiрments, аnd dives 282 рersоn-times. The tоtаl diving time is 17900 minutes, аnd the mаximum diving deрth is 70 meters.

Research paper thumbnail of ENERGY BEAM FORMING WITH MULTI- ANTENNA WIRELESS-POWERED COMMUNICATIONS

The radio signal has emerged as a new solution for powering wireless networks. To beat the signif... more The radio signal has emerged as a new solution for powering wireless networks. To beat the significant path loss in wireless channels, multi-antenna or multiple-input multiple-output (MIMO) technique has been proposed to improve the transmission efficiency and distance for WET. Though, in direct to pick the large power beam forming gain in WET, obtain channel state information (CSI) at the energy transmitter (ET) is an necessary task. This task is particularly difficult for WET systems, since existing channel preparation and response methods used for communication receivers cannot be implement at the energy receiver (ER) due to the hardware inadequacy. To equipment this problem, believe a point-to-point MIMOWET method by way of transmit power beamforming, and propose a new channel wisdom method that requires only one feedback bit from the ER to ET per feedback period. The introduction of a softer condition for the successful confirmation can make possible the correction and develop the successful of messages spoiled by transmission over a noisy channel. An algorithm is reachable, which introduces toughness into the verification of messages cosseted by message Authentication Codes together with a rectification of messages spoiled due to the noisy channel. The proposed technique is based on CS hypothesis to minimize the quantity of samples taken by sensor nodes.

Research paper thumbnail of OPTIMALLY MATCH GROUPS OF STUDENTS TO PLACEMENTS USING GENETIC ALGORITHM

—This paper proposed for find the optimum placement pairings for a group of students based on a p... more —This paper proposed for find the optimum placement pairings for a group of students based on a prioritized list of constraints using the Genetic Algorithm. This approach will improves the quality of student placements by using Genetic Algorithm. Currently the matching of students to available placements is done manually by administrative staff who must consider many criteria whilst matching each student which is complex and time consuming.

Research paper thumbnail of ONE HOP FORWARDING TECHNIQUE USING TPGF PROTOCOL FOR ROUTING IN WMSN

—Wireless Sensor Network (WSN) is a wireless network consists of large number of sensor nodes. Ro... more —Wireless Sensor Network (WSN) is a wireless network consists of large number of sensor nodes. Routing protocols are used for communication in the network. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. Finding the shortest path is one of challenging factor which greatly enhances the performance of the network. This paper focuses on finding best possible next hop to route the packets to reach the sink node. The results are compared with GPSR protocol which demonstrates improvement in the average number of hops involved in the transmission.