Browse Items (11855 total)
Sort by:
-
Exploration of Chemical Reaction Effects on Entropy Generation in Heat and Mass Transfer of Magneto-Jeffery Liquid
In many chemical engineering processes, a chemical reaction between a foreign mass and the fluid does occur. These processes find relevance in polymer production, oxidation of solid materials, ceramics or glassware manufacturing, tubular reactors, food processing, and synthesis of ceramic materials. Therefore, an exploration of homogeneous first-order chemical reaction effects on heat and mass transfer along with entropy analysis of Jeffrey liquid flow towards a stretched isothermal porous sheet is performed. Fluid is conducting electrically in the company of transverse magnetic field. Variations in heat and mass transfer mechanisms are accounted in the presence of viscous dissipation, heat source/sink and cross-diffusion aspects. The partial differential equations system governing the heat transfer of Jeffery liquid is reformed to the ordinary differential system through relevant transformations. Numerical solutions based on Runge-Kutta shooting method are obtained for the subsequent nonlinear problem. A parametric exploration is conducted to reveal the tendency of the solutions. The present study reveals that the Lorentz force due to magnetism can be used as a key parameter to control the flow fields. Entropy number is larger for higher values of Deborah and Brinkman numbers. It is also established that the concentration species field and its layer thickness of the Jeffery liquid decreases for a stronger chemical reaction aspect. To comprehend the legitimacy of numerical results a comparison with the existing results is made in this exploration and alleged an admirable agreement. 2018 Walter de Gruyter GmbH, Berlin/Boston 2018. -
Calculator using brain computer interface
This paper is undertaken with an aspiration to provide a new way to calculate that can be availed by exploiting BCI. Often it's said things moved at the blink of eye, now the time has come to make it true. This project is developed to ease the efforts in two different ways. First a mind controlled image viewer is build which can be used to change images at the blink of an eye. Second is a simple single digit calculator which lets the user choose the number and the operators just by focusing.Brain-Computer Interface aims to improve the detection and decoding of brain signals acquired by electroencephalogram (EEG). IAEME Publication. -
Parallel queue scheduling in Dynamic Cloud environment using Backfilling algorithm
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple numbers of tasks are allocated to multiple numbers of processors for simultaneous processing. From the given list, tasks are queued according to the ascending order based on their duration. This paper is designed to solve the Task Scheduling problem, by using our proposed effective new approach of Backfilling algorithm. Depending upon the task duration, tasks are split into multiple threads for processing. Multiple thread tasks are processed in the basic concept of "gang scheduling" technique. Here we implement new backfilling algorithm concept to minimize the idle processing time of the processors. The existing Simple Backfilling Algorithm (SBA) is used to minimize the ideal time processing. Whereas comparatively Dynamic Cloud Scheduling using Backfilling Algorithm (DCBA) is designed to reduce the ideal time processing than SBA to carry out the process of both LQueue and SQueue simultaneously. At the outset, DCBA reduces the average waiting time. As mentioned the algorithm which is specified in the previous line that contains three level which represent the working speed of the algorithm. The first and second level of DCBA algorithm is comparatively similar to the performance of SBA algorithm. The maximum better performance was given in a queue size (q=1.5) by DCBA algorithm as compare to SBA algorithm. The existing type (Gang Scheduling) consist of two approaches namely Adaptive First Come First Serve (AFCFS) and Largest Job First Served (LJFS) that focus on non-parallel jobs with deadline. When compare to existing gang scheduling algorithm and SBA algorithm the average waiting time of DCBA has slight improvement in the loader level of the key. As the separation of the queue like LQ and SQ the waiting time and average waiting time is reduced comparatively. 2018, Intelligent Network and Systems Society. -
Performance evaluation of diesel engine using genetic algorithm
?Abstract: Engine analysis and optimization is not a new approach to the field of automobiles. It has always been a keen focus in the research of experts domestically as well as internationally, the control of Air-Fuel Ratio (AFR) in transient operating conditions of engine. For the last few decades, the industry and economic expansion of developed countries has showed a clean increase in the vehicle production as well as transport volume. Global warming, acid rain, greenhouse effect and air pollution problems related to emission of CO2, NOx, PM, CO and unburned HC, together with the consumption of fossil fuels, unite to create serious problems at a global level. Therefore it is a research study considering all these current issues and taking it to a new level of optimization for the output of a better efficiency, better economy and less pollution. Performance of Diesel Engine is evaluated by parameters like Power, Torque and Specific Fuel Consumption. 2018, Blue Eyes Intelligence Engineering and Sciences Publication. All rights reserved. -
Facebook post analysis for a celebrity page
Social Media is a subject that is large and extremely talked about in the present day. The expanding accessibility of the web and the development of social media brought in a necessity for the analysis of data based on a Facebook page. The number of information generated by social media platforms are expanding exponentially. The best approach to understand data of this magnitude lies in mining and analysis of such big data. The present focus is on the analysis of a Facebook Fan Page. This research work concentrates on the examination of the number of likes, post shares and correlation of posts and comments on various topics, fields or areas of a Facebook page. 'Like' is not the only way of rating a post nowadays. There are also recently added features like emoticons which display emotions such as 'love', 'wow', 'angry', 'sad', etc., to rate a post. The objective of this paper is to extract the data available and to perform analysis on a cricket fan page. Python is used to extract and analyse the information. IAEME Publication. -
Significance of key distribution using quantum cryptography
The main challenge to the cryptosystems is providing secrecy in distributing key. This challenge is explained through key distribution problem. The key distribution in classical cryptosystems is based on classical information or bits. As bits can be replicable, there will be scope for an eavesdropper to make copies of information. The classical key distribution methods rely on computational assumptions which are not potential to offer anticipated results. Consequently, it is solved using laws of quantum mechanics, and the solution is Quantum Key Distribution (QKD). In QKD, the bits are encoded into quantum states or qubits using photon polarization. The qubits cannot be replicated as per the laws of quantum mechanics. An attempt to replication will introduce errors. Thus an eavesdropping will inevitably lead to detectable traces and then the legitimate entities will decide upon discarding a particular qubit. BB84 protocol is the first QKD protocol evolved in 1984. This paper notifies the significance of QKD over key distribution performed using classical methods. It is evidently shown that the time taken to distribute a secret key through BB84 QKD protocol is comparatively less than the classical methods of key distribution. 2018 ICIC International. -
Thermal Marangoni convection in two-phase flow of dusty Casson fluid
This paper deals with the thermal Marangoni convection effects in magneto-Casson liquid flow through suspension of dust particles. The transpiration cooling aspect is accounted. The surface tension is assumed to be fluctuating linearly with temperature. The fluid and dust particle's temperature of the interface is chosen as a quadratic function of interface arc length. The governing problem is modelled by conservation laws of mass, momentum and energy for fluid and dust particle phase. Stretching transformation technique is utilized to form ordinary differential equations from the partial differential equations. Later, the numerical solutions based on Runge-Kutta-Fehlberg method are established. The momentum and heat transport distributions are focused on the outcome of distinct governing parameters. The results of Nusselt number is also presented and discussed. It is established that the heat transfer rate is higher in the case of dusty non-Newtonian fluid than dusty Newtonian fluid. The rate of heat transfer can be enhanced by suspending dust particles in a base liquid. 2017 -
Experimenting with ONOS scalability on software defined network
In traditional network, a developer cannot change the configuration of a router with software programs to control the behavior of the network switches due to closed vendor specific configuration scripts. In order to make the routers/switches programmable, a new architecture of network has to be developed and this gave rise to Software defined networks. It is the new architecture for Computer Networks in which, the old traditional architecture is slowly depreciated. It is very difficult to adapt new technology especially to decide upon which controller has to be considered and what may be its scalability to compete the dynamic circumstances of networks. Many researches are working on possible solutions and look upon SDN to overcome the traditional network limitations. There are many SDN controllers existing amongst them, some are OpenDaylight, Floodlight, Onos, Ryu, Beacon etc. From the existing multiple controllers serving the SDN services to the network, Onos is one of the Controller. ONOS can be deployed on Docker container and it is accessed using its IP as a host. In this paper, authors are contributing for the evaluation of the Performance to check the Scalability of ONOS controller by taking many scenarios which are experimented on the simulation tool of Mininet, Onos Controller, Docker and iPerf. ONOS Controller?s simulated environments are observed for its throughput evaluated in dynamic conditions of a network over Mesh topology by gradually increasing the number of hosts until its supported by the system with optimum resource utilization. 2018, Institute of Advanced Scientific Research, Inc.. All rights reserved. -
Understanding user behavior through web utilization mining
This paper is focused on the efficiency of applications in Web Mining Algorithm for web log analysis which can be applied to identify user behavior and the context related to the pattern of an e-commerce website. The main objective is to find user behavior over the internet which can be done through the branch of web mining i.e., web utilization mining. So, it is mainly focused on learning the behavior of web user with their interaction with websites and application of web to extract hidden knowledge and information from World Wide Web. This motive can be accessed from the huge web log data and this data will be available in a log file of the server. Thus, the web server log file includes hidden knowledge and information of a visited user on web. This article provides a survey and analysis of current web mining system and technologies. Therefore, we implement how web mining techniques can apply to the web personalization by providing an efficient algorithm. 2018 IAEME Publication. All rights reserved. -
A comparison of algorithms for controller replacement in software defined networking
Software Defined Network (SDN) partitions the control plane and the information plane to decrease the cost and for increasing the capacity for upgrading, and this will be helpful for the network administrators to manage the network services. It's the location where the controller exists. One of the main issue in Software Defined Networking is the location of the controllers as this could affect network execution and cost. In this paper, we have done an analysis on some algorithms that have been used for minimizing the number of controllers to reduce the latency, delay, etc. while placing a controller with the consideration of communication among the controller and the nodes. 2018 Authors. -
Assessment of SERVQUAL Model in Hospitals Located in Tier II Cities of India
Service quality, being an assessment of services offered to a customer or the extent to which the services offered meets customers expectations, plays a significant role in healthcare industry. Patients pay hefty prices for the services they avail from specialty hospitals and they demand quality services. Hospitals have a larger challenge in delivering these services effectively to the patients. The current study helps us understand the role of information systems in service delivery process. Most of the hospitals have adopted healthcare information systems due to the benefit it provides. The study attempts to analyze the impact of information systems on service quality in the hospitals which are located in Tier II cities. The popular SERVQUAL model is adopted for this purpose. Patients who visit the hospitals were part of the respondent group. Gap score is found in order to observe the expected and actual experience of the patients based on five dimensions. 2018, 2018 Indian Institute of Health Management Research. -
Lung cancer detection using image processing techniques
Lung cancer is one of the hazardous disease which leads to high death rates in the world. A cancer is an irregular growth of cells that can be characteristically derived from a single irregular cell and that may spread to whole part of the lung. So, it is necessary to find it at the earlier stages and take basic steps to cure.CT scan is one of the sensitive method used in the medical field for treating the patients. The quality of the image is very important for detection of lung cancer. Pre-processing of an image is a necessary process, as there is a difficulty in detecting cancer cells in an image due to the presence of noise and low-quality of images. To reduce the volume of these problems, diagnosis of lung cancer steps like image enhancement, image segmentation, feature extraction methods can be used. For processing and implementation of these methods Matlab tool has been used. This paper focuses on improving the quality of image and to optimise the work. Implementation is done using image processing toolbox that is available in Matlab tool.The whole idea of this research is to show the improved work in the existing system and to get more agreeable results. RJPT All right reserved. -
Platt number of total graphs
The degree of an edge uv is defined as the number of edges incident on vertices u and v other than itself. The Platt number of a graph is the sum of degrees of all its edges. In this paper, the concept of degree of an edge is analysed in social networks. The Platt number is investigated in certain classes of graphs and their total graphs. Also related bounds are proposed on connected graphs. An algorithm developed to determine the Platt number of any connected graph is presented. 2018 Academic Publications. -
Security analysis in multi-tenant cloud computing healthcare system
Cloud Computing is an innovation in the field of Information Technology and in healthcare system because of the deployment models which services as profitability for the tenants. Cloud Computing is cost-effective, flexible and a delivery platform which provides business and services over internet. Multi-tenancy with its hardware sharing and high degree of configurability is utilized in cloud computing health care system even though many health care organizations are unwilling to adapt due to infrastructure and security shortcoming. In order to store the sensitive health care data cloud service providers should include promising security features where both the trusted and untrusted parties should be addressed in it. This paper addresses the security requirements and security issues in multi-tenant healthcare system, a frame is proposed for analyzing the security issues based on the available requirements and possible counter measures been suggested. The security concerns are analyzed by trust, confidentiality, integrity, audit and compliances and furthermore insight for the security is provided in multi cloud with possible security recommended for healthcare system. IAEME Publication. -
Numerical investigation of two-phase mixed convection flow of particulate oldroyd-B fluid with non-linear thermal radiation and convective boundary condition
The present investigation addresses the mixed convection two-phase flow of dusty Oldroyd-B fluid towards a vertical stretching surface in the presence of convective boundary condition and nonlinear thermal radiation. The fluid and dust particles motion is coupled only in the course of drag and heat transfer between them. The Stokes linear drag theory is employed to model the drag force. The numerical solutions based on the Runge-Kutta-Fehlberg scheme with shooting method are presented for both fluid and particle phase velocity and temperature fields. Further, numerical results are obtained for skin friction factor and local Nusselt number of prescribed values of pertinent parameters. The results are presented graphically and the physical aspects of the problem are analyzed. The obtained results are validated with existing results and found to be in good agreement. It is established that the mass concentration of the dust particle parameter plays a key role in controlling flow and thermal behaviour of non-Newtonian fluids. An asymptotic state occurs in the rate of heat transfer for larger values of the Biot number. It is also proved that the significance of radiation effect in nonlinear form is outstanding in comparison with the traditional linear radiation effect. The momentum boundary layer thickness for both fluid and dust phase become loftier due to the consequence of buoyancy force. 2018 Trans Tech Publications, Switzerland. -
Impact of chemical reaction on MHD 3D flow of a nanofluid containing gyrotactic microorganism in the presence of uniform heat source/sink
The purpose of current study is to deliberate the effect of chemical reaction on 3D flow and heat transfer of an MHD nanofluid in the vicinity of plate containing gyrotactic microorganism over a elastic surface. Influence of uniform heat source/sink on temparature transfer has been considerd. The governing standard nonlinear system of equalities is resolved numerically via Runge-Kutta method of 45th order based shooting scheme. Role of substantial parameters on flow fields as well as on the, heat, mass and microorganism transportation rates are determined and discussed through ploted graphs. 2018 Walter de Gruyter GmbH, Berlin/Boston. -
Comparative analysis and suggestion of architectures for reduction of road accidents
As Road Accidents are increasing all over the world, it is very important to save peoples lives. With the advancement in technology we can make use of various real time sensors and technology to save peoples lives. This paper focuses on comparing various architectures which consists of various real time sensors like Eye blink sensor, Alcohol sensor, Speed sensor, load sensor, tilt and turning sensor and various technologies like GPS, GSM. After comparison paper suggests which architecture should be used in the vehicle based on certain attributes. For E.g. If the car always travels outside the city then this paper suggests the architecture which has Eye blink sensor, Speed Sensor GPS and GSM. IAEME Publication. -
Crossing numbers of complete bipartite graphs and complete graphs
The crossing number of a graph is the smallest number of two edge crossings over all planar representations of the graph. In this paper, we investigate the crossing numbers of complete bipartite and complete graphs. Further, we identify optimal drawings and present results on crossing numbers of these classes of graphs. In addition, Zarankiewicz's conjecture on complete bipartite graphs and Guy's conjecture on complete graphs are verified to be true. 2018 Sanjith Hebbar, Tabitha Agnes Mangam. -
IOT based application to detect fall with a measured force
Fall of patients and aged individuals may end up deadly if unnoticed in time. A fall detection framework has been developed which sends caution notification to the concerned individuals or to the specialist, at the time of occurrence. To limit the consequences of associated wounds/damage caused by the fall, such a device has been developed. The model in this study, detects the fall and measures the force of the fall without using the force sensor and the direction of the fall. In this study, the body posture is obtained from change of increasing speed in three axes, which is measured with a triaxial accelerometer (ADXL335). The sensor is set on the lumbar area to interpret the tilt point. The value obtained from the sensor is compared with the threshold given to diminish the false cautions and furthermore provides the force by which the individual has fallen and the direction in which the person has fallen. The threshold value is computed by the execution of various trials on subjects in different directions of fall. The sensor data is collected on the fall is computed and analyzed in the Audrino microcontroller. The location of fall is detected by GPS beneficiary, which is customized to trace the subject persistently. On detecting the fall, the gadget sends an instant message through GSM module to the emergency contact. The developed model is tested on 7 volunteers who replicated falls in different direction with varying forces. Out of 28 trials, 80% of exactness is accomplished with zero false cautions for dayto-day activities like sitting, lying down on bed and grabbing objects. IAEME Publication. -
Mixed convection 3D radiating flow and mass transfer of eyring-powell nanofluid with convective boundary condition
Three-dimensional mixed convection flow, heat and mass transfer of Eyring-powell fluid over a convectively heated stretched sheet is inspected in this paper. The encouragement of Brownian motion, thermophoresis, convective condition and thermal radiations are accounted. Appropriate transformations are used to reduce the principal PDE's into set of coupled highly nonlinear ODE's which are then solved numerically using RKF fourth-fifth order method. The consequence of several parameters on flow, heat and mass transfer characteristics are deliberated with the help of graphs and tables. It is observed that the temperature and concentration profiles diminish for higher values mixed convection parameter. Further, the temperature and its related boundary layer thickness is increases with increasing the Biot number and thermal radiation effects. 2018 Trans Tech Publications, Switzerland.