Browse Items (11810 total)
Sort by:
-
Use of waste foundry sand in precast concrete paver blocksa study with belgaum foundry industry
The current study was undertaken at CHRIST (Deemed to be University) in Bangalore to investigate the potential of using waste sand from Belgaum foundries as fine aggregate in the production of precast concrete paver blocks. Concrete paver blocks were manufactured as per the recommendations of IS 15658:2006. M-35 grade of concrete with block thickness of 60mm was considered as the design parameter. Waste Foundry Sand (WFS) and ground-Granulated Blast Furnace Slag (GGBS) were replaced for manufactured sand and cement, respectively. WFS replacement rates were 15, 30, and 45% by weight of the manufactured sand, and that of GGBS was 30% constant by weight of cement. Obligatory performance tests were conducted as per Indian standards, which included compressive strength, water absorption, and abrasion resistance. Accordingly, paver blocks with 45% WFS showed satisfactory results and can be considered into non-traffic to light-traffic category, which finds application in places like building and monument premises, paths and patios, landscapes, public gardens, and parks. Cost comparison of conventional paver blocks with WFS paver blocks showed approximately 4.8% reduction in the cost of paver blocks containing 45% WFS. Springer Nature Singapore Pte Ltd 2020. -
LRD: Loop Free Routing Using Distributed Intermediate Variable in Mobile Adhoc Network
One of the critical challenges in the design of the mobile adhoc networks is to design an efficient routing protocol. Mobility is an unique characteristics of wireless network, which leads to unreliable communication links and loss of data packets. We present a new algorithm, Loop Free Routing with DIV (LRD) is introduced which prevents loops and count to infinity problem using intermediate variables. In addition it finds the shortest path between source and destination. The analysis shows that DIV is compatible with all the routing protocol as it is independent of the underlying environment. The proposed algorithm LRD is compared with the existing algorithm of DIV to prove its applicability in the any routing environment. The simulation results show that LRD excels AODV routing protocol while considering throughput and packet delivery ratio. The new algorithm assures that the routing protocol is shortest loop-free path and outperforms all other loop-free routing algorithms previously proposed from the stand point of complexities and computations. Springer Nature Switzerland AG 2020. -
Enhanced Data Security Architecture in Enterprise Networks
Encryption and storing important information is one of the risky and most challenging tasks. It is the need of the hour in todays fast growing technological transformations that the world is undergoing. A simple Enterprise network is the communication backbone of any organization. It mostly provides better information storage and efficient retrieval, which helps the organization to function smoothly, without having to think twice about their crucial datas security aspects. The information technology paradigm, cloud computing is used to help the organization to focus on its core business. In cloud computing is dealing with many services. That service is used for provide Platform service with infrastructure and software service. This paper, promotes the idea of combining various security and encryption algorithms to connect different enterprise networks using cloud computing, security layer concepts and giving no room for hackers to intrude into the confidential system of data. Springer Nature Switzerland AG 2020. -
Inplane Lateral Load Behaviour of Masonry Walls
Masonry is one of the commonly used construction technology both in urban and rural areas. In this paper the in-plane behaviour of masonry walls is analytically studied considering existing closed form equations. Previous studies have proven that the lateral load behaviour mainly depends on the aspect ratios (h/L) as well as the axial loads. From this analysis the governing failure is determined and the lateral load versus lateral deflection curve is plotted for various percentages of axial loads. This graph gives the ductility of the wall. This concept is further applied to a simple masonry structure and the push over curve is plotted. 2020, Springer Nature Switzerland AG. -
Light Tracking Bot Endorsing Futuristic Underground Transportation
Controlling a bot machine that uses non-conventional energy form, i.e. light is said to have an upper hand in pioneering transportation system. The expanding request of making the streets more secure has persuaded a ton of organizations to create finest autonomous vehicles. This paper will concentrate on the potential outcomes of utilizing just light-sensing gadgets alone for the light tracking bot using advanced color detection algorithm. The algorithm would help the bot in sensing the color of light and act accordingly, for instance green color to proceed, red color to stop. This particular requisition has high scope in real time application over the emergent underground transportation system; speculating on how the emerging innovative advances fit to the fiddle urban areas of the 21st century. 2020, Springer Nature Switzerland AG. -
Cloud Virtualization with Data Security: Challenges and Opportunities
In recent years, Cloud Computing is emerging as a torrid research area for both academicians and industrialists. It provides effective ways to handle and store the data in advanced system processing applications. Furthermore, it also leverages a radical change in the way the users access and use the available resources. Despite the hype, it also has the challenge of slow data transition from present physical storage to the cloud based platform. This is mainly due to the security challenges associated with the Cloud Computing applications. Hence, data protection has become very critical and always requires an efficient and effective security protocol into the existence. So, the security and reliability of the cloud platform would definitely attract more researchers to this platform. This article discusses an overview of Cloud paradigm and the different virtualization techniques adopted to overcome the security issues associated with the cloud computing platform. Springer Nature Switzerland AG 2020. -
Creativity Education in India: Breaking Barriers
Classrooms in India are posed with challenges of rigid curriculum demands, lack of resources, large class sizes and very often low motivation levels among teachers. Add to that poor teacher training facilities. Given the constraints, the pursuit of encouraging creativity education in the Indian schooling system seems like a tall order. The aim of this chapter is to explore the scope for creative learning and expression in Indian classrooms. The purpose is also to search for education models that facilitate and encourage creativity amongst children by adapting the curriculum to their advantage and operate within the constraints imposed by systemic drawbacks. The chapter searches for a coherent, pragmatic definition of creativity among practitioners and pedagogues with the rationale of identifying workable solutions for dissemination of creativity education in Indian classrooms. The methodology entails conversations and interviews with teachers, curriculum planners and pedagogues representing different education models and schooling systems in India. A case-study design approach is assumed to present programs that are successfully implementing practices which encourage creativity learning among their students. An attempt is made to highlight the philosophical beliefs that underlie adoption of such practices as well as to document the challenges and demands that such an endeavour imposes on the system. The chapter therefore, provides an optimistic view of the future of out of the box learning not only in the Indian classrooms but also makes a case for all education systems stifled by curriculum constraints and lack of resources. Inter-Disciplinary Press 2012. -
Vulnerability of urban ecology of Bangalore: An examination of its contention with the politics of land administration
Through a critical examination of questions on the politics of land tenures, the study brings out two interpretations on the conflicts of land and water governance: (1), the concerted efforts and the physical processes of scaling the water terrain in parallel to the political missions of administering the land; and (2), how the scalar rearrangements of land at a local scale intersect with water, revealing the new structuration of land fragmentation and water. It demonstrates that the State has been instrumental in the process of the scalar deterioration of the urban wetlands in Bangalore since 1873. The comprehensive study of these political realignments of land and water, using the data from the Records of Rights obtained from the land revenue records of the Office of the Land Survey Settlement and Records Department under the Government of Karnataka, reveals the vulnerability of urban ecology as a corollary to land administration. Pieter Van den Broeck, Asiya Sadiq, Ide Hiergens, Monica Quintana Molina, Han Verschure and Frank Moulaert 2020. -
HCI Authentication to Prevent Internal Threats in Cloud Computing
Cloud computing reduces physical resources and simplifies common management tasks. Over the past decade, cloud computing has become an important IT (information technology) industry, driving cost savings, flexibility, convenience, and scalability. Despite these advantages, many government organizations and companies are still cautious about using cloud computing. They continue to believe that the threats inherent in cloud computing technology are greater and deadly than traditional technologies. Cloud computing security threats typically include insider attacks, malware attacks, information leaks and losses, distributed denial of service, and application programming interface vulnerability attacks. Technical security improvements for virtual networks are actively researched, and many are working hard. But defending against internal attackers is more than just a technical solution but a complement to manuals and company policy. In reality, however, there are cases of damage by internal attackers, and the damage is getting bigger. Technically malicious internal attackers can relatively easily manipulate the control system and cause malfunctions. This paper provides comprehensive information about security threats in cloud computing, shows the severity of attacks by insiders, analyzes the latest authentication technologies for humancomputer interaction, and identifies the pros and cons. This shows how HCI (humancomputer interaction) technology can be applied to cloud computing management servers. The result is an innovative security certification model that can be applied. 2020, Springer Nature Switzerland AG. -
Water Purification Using Subnanostructured Photocatalysts
Visible light is an abundant resource, and photocatalysts absorb this light and use it to energize chemical reactions. Of the many types of reactions that are catalyzed by photocatalysts, wastewater purification is an important area. Photocatalysis is an economical, eco-friendly, and sustainable method of purifying water, a precious resource for which need is increasing while availability is shrinking. Of the several types of photocatalytic materials available, atomically dispersed metals and metal oxides appear to be the most promising. In conventional materials, the efficiency of utilization of active photocatalytic material is rather poor because only a small fraction of those present on the surface can serve as active materials. As the particle size decreases, this efficiency increases. In this respect, subnanometric catalysts such as single-site heterogeneous catalysts, atomically dispersed catalysts, and single-atom catalysts have distinct advantages when compared with their bulk and nanometric counterparts. The challenges in preparing stable single-atom catalysts have largely been overcome, and several methods are now available for their preparation. Many atomically dispersed photocatalytic materials have been synthesized, and many new insights have been gained, unlocking the tremendous potential in purifying wastewater by utilizing solar radiation. The aspects of higher activity, improved selectivity, economical use of materials, and a better understanding of the structure-activity relationship offered by subnanometric photocatalysts have been explored in this chapter. 2020 American Chemical Society. -
HumanComputer Interaction Technique for Irrigation and Sun Tracking Solar Panel Model
Humancomputer interaction (HCI) is an acquainted field of study concentrating on the design of computer innovation and, specifically, the interaction between computers and humans. While at first about computers, HCI has since extended to cover practically all types of data innovation design. Agriculture uses most of the natural resources, and the use of these natural resources will increase. In irrigation system, depending upon the moisture of the soil, water is provided to the plant. Two things are very important, first to get information about the humidity and temperature of the soil and second to measure the soil moisture. The Bluetooth module is added in the system so the water can be controlled through the mobile device. A solar tracking system is used to track the solar rays and convert them into electricity for pumping of water for irrigation purposes. There is a motor and two solenoid valves which control the water supply, according to the information obtained from the sensors which are placed. In a solar tracking system, LDRs are used as the main light sensors. The sensors are used to sense the soil moisture, temperature, and humidity, and if the moisture content is very low, then the motor is automatically switched on and will be turned off after getting the required water to the soil. For this, there is a GSM that is used to send the notification to the farmers. This chapter deals with the process of implementing an IoT-based model for smart irrigation and sun tracking solar panel for electricity to reduce human efforts. 2020, Springer Nature Switzerland AG. -
A Review on Influence of Cutting Fluid on Improving the Machinability of Inconel 718
Nickel-based superalloys are widely used in the production and manufacturing sectors that require processes or applications that endure or operate at very high superheating temperatures. With the properties of high tensile strength, high melting point, and lightweight structural arrangement of molecules within the alloy material composition makes it more suitable for industrial utilization in aerospace industries and marine applications. This review paper discusses the use of various coolant lubricants that improves the machinability of Inconel 718 based on parameters such as surface roughness and tool wear under the influence of cutting speed, feed rate, and depth of cut. The machine used for analysis is CNC milling machine which will be used for experimentation using ceramic inserts as end milling tool. Various cooling techniques such as hybrid cooling, flood emulsion cooling, minimum quantity lubrication, and cryogenic cooling are being summarized in this paper from various experimentations and conclusions of other authors. On the basis of review, the hybrid cooling technique is found to be better than other cooling techniques because of its ability to obtain long tool life and smoother surface finish on the workpiece. With the use of these reviewed data, further research for finding a more compatible and effective cooling lubricant has to be done by experimentation in order to obtain an improved machining process for Inconel 718 material. 2020, Springer Nature Singapore Pte Ltd. -
A decade survey on internet of things in agriculture
The Internet of Things (IoT) is a united system comprising of physical devices, mechanical and digital machines, and different hardware components like sensors, actuators, cameras etc., monitored and operated by the software. The combination of devices and systems connected over the internet opens the pathway for development of various applications beneficial in terms of economic growth of a nation. IoT has evolved as a potentially emerging computer technology solving various real-life problems and issues. IoT covers vast group of applications, from warfare to surveillance, from habitat monitoring to energy harnessing, predictive analytics and personalized health care, and so on. Among various fields, agriculture is one important field having maximum scope of implementation and investment. The main aim of this book chapter is to furnish all the details related to applications of IoT in the field of agriculture. This includes the details related to data collection, types of sensors used, deployment details, data access through cloud. It also covers details related to various communication technologies used in IoT such as Bluetooth, LoRaWAN, LTE, 6LowPAN, NFC, RFID etc. And above all, the chapter focuses on the significance of IoT on agronomics, agricultural engineering, crop production and livestock production. This chapter is a decade survey conducted to study the contribution of IoT in the field of agriculture. Around 40 research papers for the duration 2008-2018 are collected from peer reviewed journals and conferences. The collected articles are analyzed to provide relevant information required for the various end users. Springer Nature Switzerland AG 2020. -
Single activity recognition system: A review
Human Activity Recognition (HAR) plays an important role in smart home assisted living system which is one among the growing research area in smart computing. In this modern era, Smart home assisted living is highly recommended for elderly people to monitor and assist in taking care of themselves. HAR is applied in various ambiences to recognize single activity and group activity as well. This chapter focuses on single activity recognition system with respect to variety of sensors used in smart homes, activity recognition methods and wide range of communication systems that helps to ease the living style of elderly people in healthy environment which can be linked to the advancement of IoT technology in smart building. This chapter reviews many applications with variety of sensors, real time smart home projects, and smart home assisted living systems including activity recognition methods and communication systems. Springer Nature Switzerland AG 2020. -
Rapid Prototyping Methods in Manufacturing of Biomedical Implants: A Review
The advancements in science and technology have given the flexibility in various levels for the scientists to manufacture variety of components. Rapid prototyping is one of the most sought-after techniques in the field of biomedical engineering for material manufacture. Bio-inertness, biocompatibility, and manufacturability are the desirable properties for biomedical applications. The review aims to provide a valuable contribution to the biomedical field, by identifying and comparing the rapid prototyping methods on the basis of time, quality, and cost. This work is dedicated to study, identify, and compare different methods of rapid prototyping in the manufacture of biomedical implants, the materials used for these processes. It also encompasses comparison of the process parameters for each manufacturing method and the advantages and disadvantages of the processes. Polysiloxane, hydroxyapatite, bioceramics, and titanium alloys due to its bio-inertness and nontoxic nature are some of the identified materials in the current review of the research. The highly sophisticated and complex biomedical implant manufacturing by various methods was studied and compared. Immense researches are being carried out in this novel field and are more prevalent in biomedical field due to its beautiful characteristics. The rapid advanced technological methods facilitate immediate intervention and faster treatment of the patient which reduces the risk and helps in faster recovery. 2020, Springer Nature Singapore Pte Ltd. -
Blended Learning and Its Impact on Cognition and Emotion
A lot of research has been conducted to improvise learning by means of smart incorporation of technology and multimedia. There exists a complex relationship between cognition and emotions; technology is used to elicit emotional responses to create an emotional state which people learn best. Given the increasing attention to the important relationship between learning and emotions, this chapter is about blended learning and the emotion experienced by the students. The blended learning model focuses on the learners freedom in the way that they learn and engross in their education. The cognitive goals are the achieved by maintaining learners interest throughout the course. This chapter also explores the intrinsic differences, such as individual characteristics and contextual motivational factors which influence learning. The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020, Corrected Publication 2020. -
Smart car - accident detection and notification using amazon alexa
The high demand for automobiles has increased traffic hazards and road accidents. Life of the people is under high risk. This is because of the lack of the best emergency facilities available in the country. The proposed system can detect accidents in significantly less time and sends the basic information first to aid center and relatives of the victim on mobile and Amazon Alexa within a few seconds covering geographical coordinates. Various devices like Arduino UNO for car movement demonstration, Arduino Mega for accident detection and Raspberry Pi 3B for internet services gateway, accelerometer and impact sensor working together to detect an accident. All connected over the internet to generate a huge amount of data which holds a lot of information about the occurrence of the accident based on the speed and location and can be used to detect accident hotspots. The system also focuses on the safety of pedestrians where a safety band is programmed to perform the notification services using an emergency push button. The ESP8266 NodeMCU invokes the same services using a button on the module. The data generated may be used for the prediction, analysis to prevent future accidents and contribute to future road safety. Springer Nature Switzerland AG 2020. -
Spectroscopic parameters of red emitting Eu3 +-doped La2Ba3B4O12 phosphor for display and forensic applications
Eu3+-activated La2Ba3B4O12 (LBBO) phosphor was synthesized by the solid-state reaction method. LBBO phosphors characterized by structural analysis (X-ray diffraction), including refinement parameters and crystallite size, morphological analysis by (Scanning Electron Microscopy and Transmission Electron Microscopy). Photoluminescence (PL) studies of synthesized phosphors monitored in the range of 450-675 nm for the LBBO phosphor doped with Eu3 +. An excitation peak was found at 254nm and several sharp emission peaks were found around 466, 541, 588, 593, 613, and 626nm with high intensities. The crystallite size of the Eu3 +-doped LBBO phosphor was around 126nm. It is found that the intense emission peak is in the red region. The detailed processes involved and a possible mechanism for the PL are studied and discussed. The phosphor can also be used in forensic science to detect fingerprints. 2021 Elsevier Ltd All rights reserved. -
Conclusion and future research directions
[No abstract available] -
Data visualization: Experiment to impose ddos attack and its recovery on software-defined networks
The entire network is doing paradigm shift towards the software-defined networks by separating forwarding plane from control plane. This gives a clear call to researchers for joining the ocean of software-defined networks for doing research considering its security aspects. The biggest advantage of SDN is programmability of the forwarding plane. By making the switches programmable, it can take live instructions from controllers. The versions of OpenFlow protocol and the compatibility of programmable switches with OpenFlow were the stepping stone making software-defined networks thrashed towards reality. The control plane has come up with multiple options of controllers such as NOX [2], Ryu [3], Floodlight [4], Open- DayLight [6], ONOS [7] and the list is big. The major players are Java based which keeps the doors open for enhancement of features by the contributors. However, more is expected from the practicality of P4Lang programmed switches by bringing skilled people to the industry who can actually implement programmable switches with ease. The obvious reason for delayed progress in the area of software-defined networks is the lack of awareness towards data visualization options existing as of now. The purpose of writing this chapter is to throw light upon the existing options available for data visualization in the area of SDN especially addressing the security aspect by analyzing the experiment of distributed denial of service (DDoS) attack on SDN with clarity on its usage, features, applicability and scopes for its adaptabilities in the world of networks which is going towards SDN. This chapter is a call to network researchers to join the train of SDN and push forward the SDN technology by proved results of data visualization of network and security matrices. The sections and subsections show clearly the experimental steps to implement DDoS attack on SDN and further provide solution to overcome the attack. Springer Nature Singapore Pte Ltd. 2020.