Search results for: Venkata Ravi M.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 166

Search results for: Venkata Ravi M.

136 Artificial Intelligence and Distributed System Computing: Application and Practice in Real Life

Authors: Lai Junzhe, Wang Lihao, Burra Venkata Durga Kumar

Abstract:

In recent years, due to today's global technological advances, big data and artificial intelligence technologies have been widely used in various industries and fields, playing an important role in reducing costs and increasing efficiency. Among them, artificial intelligence has derived another branch in its own continuous progress and the continuous development of computer personnel, namely distributed artificial intelligence computing systems. Distributed AI is a method for solving complex learning, decision-making, and planning problems, characterized by the ability to take advantage of large-scale computation and the spatial distribution of resources, and accordingly, it can handle problems with large data sets. Nowadays, distributed AI is widely used in military, medical, and human daily life and brings great convenience and efficient operation to life. In this paper, we will discuss three areas of distributed AI computing systems in vision processing, blockchain, and smart home to introduce the performance of distributed systems and the role of AI in distributed systems.

Keywords: distributed system, artificial intelligence, blockchain, IoT, visual information processing, smart home

Procedia PDF Downloads 83
135 New Approaches for the Handwritten Digit Image Features Extraction for Recognition

Authors: U. Ravi Babu, Mohd Mastan

Abstract:

The present paper proposes a novel approach for handwritten digit recognition system. The present paper extract digit image features based on distance measure and derives an algorithm to classify the digit images. The distance measure can be performing on the thinned image. Thinning is the one of the preprocessing technique in image processing. The present paper mainly concentrated on an extraction of features from digit image for effective recognition of the numeral. To find the effectiveness of the proposed method tested on MNIST database, CENPARMI, CEDAR, and newly collected data. The proposed method is implemented on more than one lakh digit images and it gets good comparative recognition results. The percentage of the recognition is achieved about 97.32%.

Keywords: handwritten digit recognition, distance measure, MNIST database, image features

Procedia PDF Downloads 433
134 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 76
133 An Efficient Resource Management Algorithm for Mobility Management in Wireless Mesh Networks

Authors: Mallikarjuna Rao Yamarthy, Subramanyam Makam Venkata, Satya Prasad Kodati

Abstract:

The main objective of the proposed work is to reduce the overall network traffic incurred by mobility management, packet delivery cost and to increase the resource utilization. The proposed algorithm, An Efficient Resource Management Algorithm (ERMA) for mobility management in wireless mesh networks, relies on pointer based mobility management scheme. Whenever a mesh client moves from one mesh router to another, the pointer is set up dynamically between the previous mesh router and current mesh router based on the distance constraints. The algorithm evaluated for signaling cost, data delivery cost and total communication cost performance metrics. The proposed algorithm is demonstrated for both internet sessions and intranet sessions. The proposed algorithm yields significantly better performance in terms of signaling cost, data delivery cost, and total communication cost.

Keywords: data delivery cost, mobility management, pointer forwarding, resource management, wireless mesh networks

Procedia PDF Downloads 330
132 The Eloquent Importance of Knowing Fyodor Dostoevsky: An Understanding of The Dilettante

Authors: Ravi Teja Mandapaka

Abstract:

Literary assonance and lexical consonance have always put the readers pondering, shirking away, at times too, and beefing on the baffling question that hardly invited any answer. ‘Why should we read Fyodor Mikhailovich Dostoevsky today?’ Does he, during a surreal life beneath his bruised and broken soul, writhing in pain, toying with the affirmatives of pleasure in an innate way, draw the readers any sheath of support? Alexithymia has ruled the time and space for a quite a long time as many a reader spent more time than required on reading his works of art in literature. Do his swirling theories of deism and laconic gushiness when put in black and white push us towards reading the lost pieces of exuberant dilettantism? With a view of that, and a hallucinated panorama of another, its best to say, thoughts and droughts’ glorious uncertainties in literature have come forward towards putting the pen on the eloquent importance of knowing Fyodor Dostoevsky, the Socrates of Literature.

Keywords: Dostoyevsky, dilettantism, gushiness, hallucinations, puissance

Procedia PDF Downloads 286
131 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation

Authors: Venkata Venugopal Rao Gudlur

Abstract:

The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.

Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework

Procedia PDF Downloads 74
130 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 217
129 Study on Impact of Road Loads on Full Vehicle Squeak and Rattle Performance

Authors: R. Praveen, B. R. Chandan Ravi, M. Harikrishna

Abstract:

Squeak and rattle noises are the most annoying transient vehicle noises produced due to different terrain conditions. Interpretation and prohibition of squeak and rattle noises are the dominant aspects of a vehicle refinement. This paper describes the computer-aided engineering (CAE) approach to evaluating the full vehicle squeak and rattle performance with the measured road surface profile as enforced excitation at the tire patch points. The E-Line methodology has been used to predict the relative displacement at the interface points and the risk areas were identified. Squeak and rattle performance has been evaluated at different speeds and at different road conditions to understand the vehicle characteristics. The competence of the process in predicting the risk and root cause of the problems showcased us a pleasing conformity between the physical testing and CAE simulation results.

Keywords: e-line, enforced excitation, full vehicle, squeak and rattle, road excitation

Procedia PDF Downloads 117
128 A Guide to User-Friendly Bash Prompt: Adding Natural Language Processing Plus Bash Explanation to the Command Interface

Authors: Teh Kean Kheng, Low Soon Yee, Burra Venkata Durga Kumar

Abstract:

In 2022, as the future world becomes increasingly computer-related, more individuals are attempting to study coding for themselves or in school. This is because they have discovered the value of learning code and the benefits it will provide them. But learning coding is difficult for most people. Even senior programmers that have experience for a decade year still need help from the online source while coding. The reason causing this is that coding is not like talking to other people; it has the specific syntax to make the computer understand what we want it to do, so coding will be hard for normal people if they don’t have contact in this field before. Coding is hard. If a user wants to learn bash code with bash prompt, it will be harder because if we look at the bash prompt, we will find that it is just an empty box and waiting for a user to tell the computer what we want to do, if we don’t refer to the internet, we will not know what we can do with the prompt. From here, we can conclude that the bash prompt is not user-friendly for new users who are learning bash code. Our goal in writing this paper is to give an idea to implement a user-friendly Bash prompt in Ubuntu OS using Artificial Intelligent (AI) to lower the threshold of learning in Bash code, to make the user use their own words and concept to write and learn Bash code.

Keywords: user-friendly, bash code, artificial intelligence, threshold, semantic similarity, lexical similarity

Procedia PDF Downloads 90
127 Online Yoga Asana Trainer Using Deep Learning

Authors: Venkata Narayana Chejarla, Nafisa Parvez Shaik, Gopi Vara Prasad Marabathula, Deva Kumar Bejjam

Abstract:

Yoga is an advanced, well-recognized method with roots in Indian philosophy. Yoga benefits both the body and the psyche. Yoga is a regular exercise that helps people relax and sleep better while also enhancing their balance, endurance, and concentration. Yoga can be learned in a variety of settings, including at home with the aid of books and the internet as well as in yoga studios with the guidance of an instructor. Self-learning does not teach the proper yoga poses, and doing them without the right instruction could result in significant injuries. We developed "Online Yoga Asana Trainer using Deep Learning" so that people could practice yoga without a teacher. Our project is developed using Tensorflow, Movenet, and Keras models. The system makes use of data from Kaggle that includes 25 different yoga poses. The first part of the process involves applying the movement model for extracting the 17 key points of the body from the dataset, and the next part involves preprocessing, which includes building a pose classification model using neural networks. The system scores a 98.3% accuracy rate. The system is developed to work with live videos.

Keywords: yoga, deep learning, movenet, tensorflow, keras, CNN

Procedia PDF Downloads 208
126 Estimation of Aquifer Properties Using Pumping Tests: Case Study of Pydibhimavaram Industrial Area, Srikakulam, India

Authors: G. Venkata Rao, P. Kalpana, R. Srinivasa Rao

Abstract:

Adequate and reliable estimates of aquifer parameters are of utmost importance for proper management of vital groundwater resources. At present scenario the ground water is polluted because of industrial waste disposed over the land and the contaminants are transported in the aquifer from one area to another area which is depending on the characteristics of the aquifer and contaminants. To know the contaminant transport, the accurate estimation of aquifer properties is highly needed. Conventionally, these properties are estimated through pumping tests carried out on water wells. The occurrence and movement of ground water in the aquifer are characteristically defined by the aquifer parameters. The pumping (aquifer) test is the standard technique for estimating various hydraulic properties of aquifer systems, viz, transmissivity (T), hydraulic conductivity (K), storage coefficient (S) etc., for which the graphical method is widely used. The study area for conducting pumping test is Pydibheemavaram Industrial area near the coastal belt of Srikulam, AP, India. The main objective of the present work is to estimate the aquifer properties for developing contaminant transport model for the study area.

Keywords: aquifer, contaminant transport, hydraulic conductivity, industrial waste, pumping test

Procedia PDF Downloads 418
125 The Effects of the Aspect Ratio of a Flexible Cylinder on the Vortex Dynamics

Authors: Abouzar Kaboudian, Ravi Chaithanya Mysa, Boo Cheong Khoo, Rajeev Kumar Jaiman

Abstract:

The vortex structures observed in the wake of a flexible cylinder can be significantly different from those of a traditional vibrating, spring mounted, rigid cylinder. These differences can significantly affect the VIV characteristics of the flow and subsequently the VIV response of the cylindrical structures. In this work, we present how the aspect ratio of a flexible cylinder can change the vortex structures in its wake. We will discuss different vortex dynamics which can be observed in the wake of the vibrating flexible cylinder, and how they can affect the vibrational response of the cylinder. Moreover, we will study the transition of these structures versus the aspect ratio of the flexible cylinder. We will discuss how these transitions affect the in-line and transverse forces on the structure. In the end, we will provide general guidelines on the minimum acceptable aspect ratio for the offshore riser studies which may have grave implications for future numerical and experimental works.

Keywords: aspect ratio, flexible cylinder, vortex-shedding, VIV

Procedia PDF Downloads 460
124 Modeling and Simulation Methods Using MATLAB/Simulink

Authors: Jamuna Konda, Umamaheswara Reddy Karumuri, Sriramya Muthugi, Varun Pishati, Ravi Shakya,

Abstract:

This paper investigates the challenges involved in mathematical modeling of plant simulation models ensuring the performance of the plant models much closer to the real time physical model. The paper includes the analysis performed and investigation on different methods of modeling, design and development for plant model. Issues which impact the design time, model accuracy as real time model, tool dependence are analyzed. The real time hardware plant would be a combination of multiple physical models. It is more challenging to test the complete system with all possible test scenarios. There are possibilities of failure or damage of the system due to any unwanted test execution on real time.

Keywords: model based design (MBD), MATLAB, Simulink, stateflow, plant model, real time model, real-time workshop (RTW), target language compiler (TLC)

Procedia PDF Downloads 319
123 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 55
122 Groundwater Utilization and Sustainability: A Case Study of Pydibheemavaram Industrial Area, India

Authors: G. Venkata Rao, R. Srinivasa Rao, B. Neelima Sri Priya

Abstract:

The over extraction of groundwater from the coastal aquifers, result in reduction of groundwater resource and lowering of water level. In general, the depletion of groundwater level enhances the landward migration of saltwater wedge. Now a days the ground water extraction increases by year to year because increased population and industrialization. The ground water is the only source of irrigation, domestic and Industrial purposes at Pydibhimavaram industrial area, which is located in the coastal belt of Srikakulam district, India of Latitudes 18.145N 83.627E and Longitudes 18.099N 83.674E. The present study has been attempted to calculate amount of water getting recharged into this aquifer, status of rainfall pattern for the past two decades and the runoff is calculated by using Khosla’s formula with available rainfall and temperature in the study area. A decision support model has been developed on the basis of Monthly Extractions of the water from the ground through bore wells and the Net Recharge of the aquifer. It is concluded that the amount of extractions is exceeding the amount of recharge from May to October in a given year which will in turn damage the water balance in the subsurface layers.

Keywords: aquifer, decision support model, groundwater extraction, run off estimation and rainfall

Procedia PDF Downloads 267
121 Challenges for Municipal Solid Waste Management in India: A Case Study of Eluru, Andhra Pradesh

Authors: V. V. Prasada Rao P., K. Venkata Subbaiah, J. Sudhir Kumar

Abstract:

Most Indian cities or townships are facing greater challenges in proper disposal of their municipal solid wastes, which are growing exponentially with the rising urban population and improvement in the living standards. As per the provisional figures, 377 million people live in the urban areas accounting for 31.16 % of the Country’s total population, and expected to grow by 3.74% every year. In India, the municipal authority is liable for the safe management & disposal of Municipal Solid Wastes. However, even with the current levels of MSW generation, a majority of the local governments are unable to comply with their constitutional responsibility due to reasons ranging from cultural aspects to technological and financial constraints. In contrast, it is expected that the MSW generation in India is likely to increase from 68.8 MTD in 2011 to 160.5 MTD by 2041. Thus, the immediate challenge before the urban local bodies in India is to evolve suitable strategies not only to cope up with the current levels, but also to address the anticipated generation levels of MSW. This paper discusses the reasons for the low levels of enforcement of MSW Rules and suggests effective management strategies for the safe disposal of MSW.

Keywords: biodegradable waste, dumping sites, management strategy, municipal solid waste (MSW), MSW rules, vermicompost

Procedia PDF Downloads 268
120 Bandwidth Control Using Reconfigurable Antenna Elements

Authors: Sudhina H. K, Ravi M. Yadahalli, N. M. Shetti

Abstract:

Reconfigurable antennas represent a recent innovation in antenna design that changes from classical fixed-form, Fixed function antennas to modifiable structures that can be adapted to fit the requirements of a time varying system. The ability to control the operating band of an antenna system can have many useful applications. Systems that operate in an acquire-and-track configuration would see a benefit from active bandwidth control. In such systems a wide band search mode is first employed to find a desired signal, Then a narrow band track mode is used to follow only that signal. Utilizing active antenna bandwidth control, A single antenna would function for both the wide band and narrow band configurations providing the rejection of unwanted signals with the antenna hardware. This ability to move a portion of the RF filtering out of the receiver and onto the antenna itself will also aid in reducing the complexity of the often expensive RF processing subsystems.

Keywords: designing methods, mems, stack, reconfigurable elements

Procedia PDF Downloads 242
119 Theoretical and Experimental Analysis of End Milling Process with Multiple Finger Inserted Cutters

Authors: G. Krishna Mohana Rao, P. Ravi Kumar

Abstract:

Milling is the process of removing unwanted material with suitable tool. Even though the milling process is having wider application, the vibration of machine tool and work piece during the process produces chatter on the products. Various methods of preventing the chatter have been incorporated into machine tool systems. Damper is cut into equal number of parts. Each part is called as finger. Multiple fingers were inserted in the hollow portion of the shank to reduce tool vibrations. In the present work, nonlinear static and dynamic analysis of the damper inserted end milling cutter used to reduce the chatter was done. A comparison is made for the milling cutter with multiple dampers. Surface roughness was determined by machining with multiple finger inserted milling cutters.

Keywords: damping inserts, end milling, vibrations, nonlinear dynamic analysis, number of fingers

Procedia PDF Downloads 493
118 Incorporating Priority Round-Robin Scheduler to Sustain Indefinite Blocking Issue and Prioritized Processes in Operating System

Authors: Heng Chia Ying, Charmaine Tan Chai Nie, Burra Venkata Durga Kumar

Abstract:

Process scheduling is the method of process management that determines which process the CPU will proceed with for the next task and how long it takes. Some issues were found in process management, particularly for Priority Scheduling (PS) and Round Robin Scheduling (RR). The proposed recommendations made for IPRRS are to combine the strengths of both into a combining algorithm while they draw on others to compensate for each weakness. A significant improvement on the combining technique of scheduler, Incorporating Priority Round-Robin Scheduler (IPRRS) address an algorithm for both high and low priority task to sustain the indefinite blocking issue faced in the priority scheduling algorithm and minimize the average turnaround time (ATT) and average waiting time (AWT) in RR scheduling algorithm. This paper will delve into the simple rules introduced by IPRRS and enhancements that both PS and RR bring to the execution of processes in the operating system. Furthermore, it incorporates the best aspects of each algorithm to build the optimum algorithm for a certain case in terms of prioritized processes, ATT, and AWT.

Keywords: round Robin scheduling, priority scheduling, indefinite blocking, process management, sustain, turnaround time

Procedia PDF Downloads 95
117 The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems

Authors: Wu You, Burra Venkata Durga Kumar

Abstract:

This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry.

Keywords: blockchain, artificial intelligence (AI), scaled distributed systems, supply chain finance, efficiency and security

Procedia PDF Downloads 52
116 On Enabling Miner Self-Rescue with In-Mine Robots using Real-Time Object Detection with Thermal Images

Authors: Cyrus Addy, Venkata Sriram Siddhardh Nadendla, Kwame Awuah-Offei

Abstract:

Surface robots in modern underground mine rescue operations suffer from several limitations in enabling a prompt self-rescue. Therefore, the possibility of designing and deploying in-mine robots to expedite miner self-rescue can have a transformative impact on miner safety. These in-mine robots for miner self-rescue can be envisioned to carry out diverse tasks such as object detection, autonomous navigation, and payload delivery. Specifically, this paper investigates the challenges in the design of object detection algorithms for in-mine robots using thermal images, especially to detect people in real-time. A total of 125 thermal images were collected in the Missouri S&T Experimental Mine with the help of student volunteers using the FLIR TG 297 infrared camera, which were pre-processed into training and validation datasets with 100 and 25 images, respectively. Three state-of-the-art, pre-trained real-time object detection models, namely YOLOv5, YOLO-FIRI, and YOLOv8, were considered and re-trained using transfer learning techniques on the training dataset. On the validation dataset, the re-trained YOLOv8 outperforms the re-trained versions of both YOLOv5, and YOLO-FIRI.

Keywords: miner self-rescue, object detection, underground mine, YOLO

Procedia PDF Downloads 45
115 Effect of Homogeneous and Heterogeneous Chemical Reactions on Peristaltic Flow of a Jeffrey Fluid in an Asymmetric Channel

Authors: G. Ravi Kiran, G. Radhakrishnamacharya

Abstract:

In this paper, the dispersion of a solute in the peristaltic flow of a Jeffrey fluid in the presence of both homogeneous and heterogeneous chemical reactions has been discussed. The average effective dispersion coefficient has been found using Taylor's limiting condition under long wavelength approximation. It is observed that the average dispersion coefficient increases with amplitude ratio which implies that dispersion is more in the presence of peristalsis. The average effective dispersion coefficient increases with Jeffrey parameter in the cases of both homogeneous and combined homogeneous and heterogeneous chemical reactions. Further, dispersion decreases with a phase difference, homogeneous reaction rate parameters, and heterogeneous reaction rate parameter.

Keywords: peristalsis, dispersion, chemical reaction, Jeffrey fluid, asymmetric channel

Procedia PDF Downloads 554
114 Design of Raw Water Reservoir on Sandy Soil

Authors: Venkata Ramana Pamu

Abstract:

This paper is a case study of a 5310 ML capacity Raw Water Reservoir (RWR), situated in Indian state Rajasthan, which is a part of Rajasthan Rural Water Supply & Fluorosis Mitigation Project. This RWR embankment was constructed by locally available material on natural ground profile. Height of the embankment was varying from 2m to 10m.This is due to existing ground level was varying. Reservoir depth 9m including 1.5m free board and 1V:3H slopes were provided both upstream and downstream side. Proper soil investigation, tests were done and it was confirmed that the existing soil is sandy silt. The existing excavated earth was used as filling material for embankment construction, due to this controlling seepage from upstream to downstream be a challenging task. Slope stability and Seismic analysis of the embankment done by Conventional method for both full reservoir condition and rapid drawdown. Horizontal filter at toe level was provided along with upstream side PCC (Plain Cement Concrete) block and HDPE (High Density poly ethylene) lining as a remedy to control seepage. HDPE lining was also provided at storage area of the reservoir bed level. Mulching was done for downstream side slope protection.

Keywords: raw water reservoir, seepage, seismic analysis, slope stability

Procedia PDF Downloads 472
113 Can Bone Resorption Reduce with Nanocalcium Particles in Astronauts?

Authors: Ravi Teja Mandapaka, Prasanna Kumar Kukkamalla

Abstract:

Poor absorption of calcium, elevated levels in serum and loss of bone are major problems of astronauts during space travel. Supplementation of calcium could not reveal this problem. In normal condition only 33% of calcium is absorbed from dietary sources. In this paper effect of space environment on calcium metabolism was discussed. Many surprising study findings were found during literature survey. Clinical trials on ovariectomized mice showed that reduction of calcium particles to nano level make them more absorbable and bioavailable. Control of bone loss in astronauts in critical important In Fortification of milk with nana calcium particles showed reduces urinary pyridinoline, deoxypyridinoline levels. Dietary calcium and supplementation do not show much retention of calcium in zero gravity environment where absorption is limited. So, the fortification of foods with nano calcium particles seemed beneficial for astronauts during and after space travel in their speedy recovery.

Keywords: nano calcium, astronauts, fortification, supplementation

Procedia PDF Downloads 459
112 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 47
111 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 90
110 Study of First Hydrogenation Kinetics at Different Temperatures of BCC Alloy 52Ti-12V-36Cr + x wt% Zr (x = 4, 8 & 12)

Authors: Ravi Prakash

Abstract:

The effects of Zr addition on kinetics and hydrogen absorption characteristics of BCC alloy 52Ti-12V-36Cr doped with x wt% of Zr (x = 0, 4, 8 & 12) was investigated. The samples have been characterized by X-ray diffraction, and activation study were made at four different temperatures- 100 oC, 200 oC, 300 oC and 400 oC. First hydrogenation kinetics of alloys were studied at 20 bar of hydrogen pressure and room temperature after giving heat treatment at different temperatures for 6 hours. Among the various Zr doped alloys studied, the composition 52Ti-12V-36Cr + 4wt% Zr shows maximum hydrogen storage capacity of 3.6wt%. Small amount of Zr shows advantageous effects on kinetics of alloy. It was also found out that alloys with the higher Zr concentration can be activated by giving heat treatment at lower temperatures. There is reduction in hydrogen storage capacity with increasing Zr content in the alloy primarily due to increasing abundance of secondary phase as established by X-Ray Diffraction and Scanning Electron Microscope results.

Keywords: hydrogen storage, metal hydrides, bcc alloy, heat treatment

Procedia PDF Downloads 39
109 Hybrid GA-PSO Based Pitch Controller Design for Aircraft Control System

Authors: Vaibhav Singh Rajput, Ravi Kumar Jatoth, Nagu Bhookya, Bhasker Boda

Abstract:

In this paper proportional, integral, derivative (PID) controller is used to control the pitch angle of the aircraft when the elevation angle is changed or modified. The pitch angle is dependent on elevation angle; a change in one corresponds to a change in the other. The PID controller helps in restricted change of pitch rate in response to the elevation angle. The PID controller is dependent on different parameters like Kp, Ki, Kd which change the pitch rate as they change. Various methodologies are used for changing those parameters for getting a perfect time response pitch angle, as desired or wished by a concerned person. While reckoning the values of those parameters, trial and guessing may prove to be futile in order to provide comfort to passengers. So, using some metaheuristic techniques can be useful in handling these errors. Hybrid GA-PSO is one such powerful algorithm which can improve transient and steady state response and can give us more reliable results for PID gain scheduling problem.

Keywords: pitch rate, elevation angle, PID controller, genetic algorithm, particle swarm optimization, phugoid

Procedia PDF Downloads 288
108 Diabatic Flow of Sub-Cooled R-600a Inside a Capillary Tube: Concentric Configuration

Authors: Ravi Kumar, Santhosh Kumar Dubba

Abstract:

This paper presents an experimental study of a diabatic flow of R-600a through a concentric configured capillary tube suction line heat exchanger. The details of experimental facility for testing the diabatic capillary tube with different inlet sub-cooling degree and pressure are discussed. The effect of coil diameter, capillary length, capillary tube diameter, sub-cooling degree and inlet pressure on mass flow rate are presented. The degree of sub-cooling at the inlet of capillary tube is varied from 3-20°C. The refrigerant mass flow rate is scattered up with rising of pressure. A semi-empirical correlation to predict the mass flow rate of R-600a flowing through a diabatic capillary tube is proposed for sub-cooled inlet conditions. The proposed correlation predicts measured data with an error band of ±20 percent.

Keywords: diabatic, capillary tube, concentric, R-600a

Procedia PDF Downloads 180
107 Development of Fuzzy Logic and Neuro-Fuzzy Surface Roughness Prediction Systems Coupled with Cutting Current in Milling Operation

Authors: Joseph C. Chen, Venkata Mohan Kudapa

Abstract:

Development of two real-time surface roughness (Ra) prediction systems for milling operations was attempted. The systems used not only cutting parameters, such as feed rate and spindle speed, but also the cutting current generated and corrected by a clamp type energy sensor. Two different approaches were developed. First, a fuzzy inference system (FIS), in which the fuzzy logic rules are generated by experts in the milling processes, was used to conduct prediction modeling using current cutting data. Second, a neuro-fuzzy system (ANFIS) was explored. Neuro-fuzzy systems are adaptive techniques in which data are collected on the network, processed, and rules are generated by the system. The inference system then uses these rules to predict Ra as the output. Experimental results showed that the parameters of spindle speed, feed rate, depth of cut, and input current variation could predict Ra. These two systems enable the prediction of Ra during the milling operation with an average of 91.83% and 94.48% accuracy by FIS and ANFIS systems, respectively. Statistically, the ANFIS system provided better prediction accuracy than that of the FIS system.

Keywords: surface roughness, input current, fuzzy logic, neuro-fuzzy, milling operations

Procedia PDF Downloads 116