Search results for: Raja Singh Khela
236 Development of Solar Poly House Tunnel Dryer (STD) for Medicinal Plants
Authors: N. C. Shahi, Anupama Singh, A. E. Kate
Abstract:
There was a scenario present day that drying of fresh fruits and vegetables by indirect solar drying by using mechanical device; hence, an effort was made to develop a small scale solar tunnel dryer (STD). Drying of spinach is carried out to analyze the performance of the dryer and to study its drying characteristics. To evaluate the performance of dryer the independent variables were selected as air flow rate, loading density and shade net while collector efficiency, drying efficiency, overall efficiency and specific energy consumption were selected as responses during performing the experiments. The spinach was dried from initial moisture content 88.21-94.04% (w.b.) to final moisture content 3.50-5.13% (w.b.). The drying time considerably reduced as compared to open sun drying of spinach as sun drying took 15 h for drying. The average collector efficiency, drying efficiency and overall efficiency were in the range 28.73-61.15%, 11.63% to 22.13%, and 7.61-14.66%, respectively.Keywords: Solar dryer, collector efficiency, drying efficiency, spinach.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1820235 Photocatalytic Detoxification Method for Zero Effluent Discharge in Dairy Industry: Effect of Operational Parameters
Authors: Janhavi Inamdar, S.K. Singh
Abstract:
Laboratory experiments have been performed to investigate photocatalytic detoxification by using TiO2 photocatalyst for treating dairy effluent. Various operational parameters such as catalyst concentration, initial concentration, angle of tilt of solar flat plate reactor and flow rate were investigated. Results indicated that the photocatalytic detoxification process can efficiently treat dairy effluent. Experimental runs with dairy wastewater can be used to identify the optimum operational parameters to perform wastewater degradation on large scale for recycling purpose. Also effect of two different types of reactors on degradation process was analyzed.
Keywords: Photocatalytic detoxification, TiO2 photocatalyst, solar flat plate reactor, Zero effluent discharge.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1932234 Analytical Study of Component Based Software Engineering
Authors: Iqbaldeep Kaur, Parvinder S. Sandhu, Hardeep Singh, Vandana Saini
Abstract:
This paper is a survey of current component-based software technologies and the description of promotion and inhibition factors in CBSE. The features that software components inherit are also discussed. Quality Assurance issues in componentbased software are also catered to. The feat research on the quality model of component based system starts with the study of what the components are, CBSE, its development life cycle and the pro & cons of CBSE. Various attributes are studied and compared keeping in view the study of various existing models for general systems and CBS. When illustrating the quality of a software component an apt set of quality attributes for the description of the system (or components) should be selected. Finally, the research issues that can be extended are tabularized.Keywords: Component, COTS, Component based development, Component-based Software Engineering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2740233 Effects of Channel Bed Slope on Energy Dissipation of Different Types of Piano Key Weir
Authors: Munendra Kumar, Deepak Singh
Abstract:
The present investigation aims to study the effect of channel bed slopes on energy dissipation across the different types of Piano Key Weir (PK weir or PKW) under the free-flow conditions in rigid rectangular channels. To this end, three different types (type-A, type-B, and type-C) of PKW models were tested and examined. To document and quantify this experimental investigation, a total of 270 tests were performed, including detailed observations of the flow field. The results show that the energy dissipation of all PKW models increases with the bed slopes and decreases with increasing the discharge over the weirs. In addition, the energy dissipation over the PKW varies significantly with the geometry of the weir. The type-A PKW has shown the highest energy dissipation than the other PKWs. As the bottom slope changed from Sb = 0% to 1.25%, the energy dissipation increased by about 8.5%, 9.1%, and 10.55% for type-A, type-B, and type-C, respectively.
Keywords: Piano key weir, bed slope, energy dissipation across PKW, free overfalls.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 520232 A Complexity Measure for Java Bean based Software Components
Authors: Sandeep Khimta, Parvinder S. Sandhu, Amanpreet Singh Brar
Abstract:
The traditional software product and process metrics are neither suitable nor sufficient in measuring the complexity of software components, which ultimately is necessary for quality and productivity improvement within organizations adopting CBSE. Researchers have proposed a wide range of complexity metrics for software systems. However, these metrics are not sufficient for components and component-based system and are restricted to the module-oriented systems and object-oriented systems. In this proposed study it is proposed to find the complexity of the JavaBean Software Components as a reflection of its quality and the component can be adopted accordingly to make it more reusable. The proposed metric involves only the design issues of the component and does not consider the packaging and the deployment complexity. In this way, the software components could be kept in certain limit which in turn help in enhancing the quality and productivity.Keywords: JavaBean Components, Complexity, Metrics, Validation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1527231 The Design, Development, and Optimization of a Capacitive Pressure Sensor Utilizing an Existing 9 DOF Platform
Authors: Andrew Randles, Ilker Ocak, Cheam Daw Don, Navab Singh, Alex Gu
Abstract:
Nine Degrees of Freedom (9 DOF) systems are already in development in many areas. In this paper, an integrated pressure sensor is proposed that will make use of an already existing monolithic 9 DOF inertial MEMS platform. Capacitive pressure sensors can suffer from limited sensitivity for a given size of membrane. This novel pressure sensor design increases the sensitivity by over 5 times compared to a traditional array of square diaphragms while still fitting within a 2 mm x 2 mm chip and maintaining a fixed static capacitance. The improved design uses one large diaphragm supported by pillars with fixed electrodes placed above the areas of maximum deflection. The design optimization increases the sensitivity from 0.22 fF/kPa to 1.16 fF/kPa. Temperature sensitivity was also examined through simulation.Keywords: Capacitive pressure sensor, 9 DOF, 10 DOF, sensor, capacitive, inertial measurement unit, IMU, inertial navigation system, INS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2328230 Genetic Algorithm Approach for Solving the Falkner–Skan Equation
Authors: Indu Saini, Phool Singh, Vikas Malik
Abstract:
A novel method based on Genetic Algorithm to solve the boundary value problems (BVPs) of the Falkner–Skan equation over a semi-infinite interval has been presented. In our approach, we use the free boundary formulation to truncate the semi-infinite interval into a finite one. Then we use the shooting method based on Genetic Algorithm to transform the BVP into initial value problems (IVPs). Genetic Algorithm is used to calculate shooting angle. The initial value problems arisen during shooting are computed by Runge-Kutta Fehlberg method. The numerical solutions obtained by the present method are in agreement with those obtained by previous authors.
Keywords: Boundary Layer Flow, Falkner–Skan equation, Genetic Algorithm, Shooting method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2509229 A Comparative Study of Metal Extraction from Spent Catalyst Using Acidithiobacillus ferrooxidans
Authors: Haragobinda Srichandan, Sradhanjali Singh, Dong Jin Kim, Seoung-Won Lee
Abstract:
The recovery of metal values and safe disposal of spent catalyst is gaining interest due to both its hazardous nature and increased regulation associated with disposal methods. Prior to the recovery of the valuable metals, removal of entrained deposits limit the diffusion of lixiviate resulting in low recovery of metals must be taken into consideration. Therefore, petroleum refinery spent catalyst was subjected to acetone washing and roasting at 500oC. The treated samples were investigated for metals bioleaching using Acidithiobacillus ferrooxidans in batch reactors and the leaching efficiencies were compared. It was found out that acetone washed spent catalysts results in better metal recovery compare to roasted spent. About 83% Ni, 20% Al, 50% Mo and 73% V were leached using the acetone washed spent catalyst. In both the cases, Ni, V and Mo was high compared to Al.Keywords: Acetone wash, At. ferrooxidans, Bioleaching, Calcined, Metal recovery.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2583228 Design and Optimization of Coplanar Waveguide-Fed Sensing Antennas for ISM Band Applications
Authors: Vivek Bharti, Inderpreet Kaur, Saurabh Verma, Renu Gangwar, Hari Kumar Singh
Abstract:
This work presents a dual-band Coplanar Waveguide (CPW) fed rectangular patch antenna designed for applications in Industrial, Scientific, and Medical (ISM) Band sensing. Fabricated on a cost-effective FR-4 substrate with specific dimensions, the antenna incorporates a rectangular slot and a copper patch, optimized through simulation to achieve desired characteristics, particularly focusing on the reflection coefficient. A unique feature is introduced through the integration of copper cells forming a Partially Reflecting Surface (PRS) to feed the antenna. Dual-band functionality is achieved, covering frequencies of 1.28 GHz-1.3 GHz and 4.9 GHz-5.2 GHz, catering to diverse communication needs within these frequency ranges. The addition of a superstrate enhances the antenna’s gain, resulting in 4.5 dBi at 1.28 GHz-1.3 GHz and 6.5 dBi at 4.9 GHz-5.2 GHz, with an efficiency of 58%.
Keywords: ISM, Coplanar waveguide fed, superstrate, circularly polarized.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 133227 Shell Closures in Exotic Nuclei
Authors: G. Saxena, D. Singh, M. Kaushik,
Abstract:
Inspired by the recent experiments [1]-[3] indicating unusual doubly magic nucleus 24O which lies just at the neutron drip-line and encouraged by the success of our relativistic mean-field (RMF) plus state dependent BCS approach for the description of the ground state properties of the drip-line nuclei [23]-[27], we have further employed this approach, across the entire periodic table, to explore the unusual shell closures in exotic nuclei. In our RMF+BCS approach the single particle continuum corresponding to the RMF is replaced by a set of discrete positive energy states for the calculations of pairing energy. Detailed analysis of the single particle spectrum, pairing energies and densities of the nuclei predict the unusual proton shell closures at Z = 6, 14, 16, 34, and unusual neutron shell closures at N = 6, 14, 16, 34, 40, 70, 112.Keywords: Relativistic Mean Field theory, Magic Nucleus, Si isotopes, Shell Closure.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1503226 Survival of Neutrino Mass Models in Nonthermal Leptogenesis
Authors: Amal Kr Sarma, H Zeen Devi, N Nimai Singh
Abstract:
The Constraints imposed by non-thermal leptogenesis on the survival of the neutrino mass models describing the presently available neutrino mass patterns, are studied numerically. We consider the Majorana CP violating phases coming from right-handed Majorana mass matrices to estimate the baryon asymmetry of the universe, for different neutrino mass models namely quasi-degenerate, inverted hierarchical and normal hierarchical models, with tribimaximal mixings. Considering two possible diagonal forms of Dirac neutrino mass matrix as either charged lepton or up-quark mass matrix, the heavy right-handed mass matrices are constructed from the light neutrino mass matrix. Only the normal hierarchical model leads to the best predictions of baryon asymmetry of the universe, consistent with observations in non-thermal leptogenesis scenario.Keywords: Thermal leptogenesis, Non-thermal leptogenesis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1286225 Computation of Probability Coefficients using Binary Decision Diagram and their Application in Test Vector Generation
Authors: Ashutosh Kumar Singh, Anand Mohan
Abstract:
This paper deals with efficient computation of probability coefficients which offers computational simplicity as compared to spectral coefficients. It eliminates the need of inner product evaluations in determination of signature of a combinational circuit realizing given Boolean function. The method for computation of probability coefficients using transform matrix, fast transform method and using BDD is given. Theoretical relations for achievable computational advantage in terms of required additions in computing all 2n probability coefficients of n variable function have been developed. It is shown that for n ≥ 5, only 50% additions are needed to compute all probability coefficients as compared to spectral coefficients. The fault detection techniques based on spectral signature can be used with probability signature also to offer computational advantage.Keywords: Binary Decision Diagrams, Spectral Coefficients, Fault detection
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1465224 Back Bone Node Based Black Hole Detection Mechanism in Mobile Ad Hoc Networks
Authors: Nidhi Gupta, Sanjoy Das, Khushal Singh
Abstract:
Mobile Ad hoc Network is a set of self-governing nodes which communicate through wireless links. Dynamic topology MANETs makes routing a challenging task. Various routing protocols are there, but due to various fundamental characteristic open medium, changing topology, distributed collaboration and constrained capability, these protocols are tend to various types of security attacks. Black hole is one among them. In this attack, malicious node represents itself as having the shortest path to the destination but that path not even exists. In this paper, we aim to develop a routing protocol for detection and prevention of black hole attack by modifying AODV routing protocol. This protocol is able to detect and prevent the black hole attack. Simulation is done using NS-2, which shows the improvement in network performance.Keywords: Ad hoc, AODV, Back Bone, routing, Security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2160223 DNS of a Laminar Separation Bubble
Authors: N. K. Singh, S. Sarkar
Abstract:
Direct numerical simulation (DNS) is used to study the evolution of a boundary layer that was laminar initially followed by separation and then reattachment owing to generation of turbulence. This creates a closed region of recirculation, known as the laminar-separation bubble. The present simulation emulates the flow environment encountered in a modern LP turbine blade, where a laminar separation bubble may occur on the suction surface. The unsteady, incompressible three-dimensional (3-D) Navier-Stokes (NS) equations have been solved over a flat plate in the Cartesian coordinates. The adverse pressure gradient, which causes the flow to separate, is created by a boundary condition. The separated shear layer undergoes transition through appearance of ╬ø vortices, stretching of these create longitudinal streaks. Breakdown of the streaks into small and irregular structures makes the flow turbulent downstream.
Keywords: Adverse pressure gradient, direct numerical simulation, laminar separation bubble.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2603222 Potential Field Functions for Motion Planning and Posture of the Standard 3-Trailer System
Authors: K. Raghuwaiya, S. Singh, B. Sharma, J. Vanualailai
Abstract:
This paper presents a set of artificial potential field functions that improves upon, in general, the motion planning and posture control, with theoretically guaranteed point and posture stabilities, convergence and collision avoidance properties of 3-trailer systems in a priori known environment. We basically design and inject two new concepts; ghost walls and the distance optimization technique (DOT) to strengthen point and posture stabilities, in the sense of Lyapunov, of our dynamical model. This new combination of techniques emerges as a convenient mechanism for obtaining feasible orientations at the target positions with an overall reduction in the complexity of the navigation laws. The effectiveness of the proposed control laws were demonstrated via simulations of two traffic scenarios.
Keywords: Artificial potential fields, 3-trailer systems, motion planning, posture, parking and collision-free trajectories.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2129221 The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc Networks
Authors: Narendra Singh Yadav, R.P.Yadav
Abstract:
Mobile ad hoc network is a collection of mobile nodes communicating through wireless channels without any existing network infrastructure or centralized administration. Because of the limited transmission range of wireless network interfaces, multiple "hops" may be needed to exchange data across the network. Consequently, many routing algorithms have come into existence to satisfy the needs of communications in such networks. Researchers have conducted many simulations comparing the performance of these routing protocols under various conditions and constraints. One question that arises is whether speed of nodes affects the relative performance of routing protocols being studied. This paper addresses the question by simulating two routing protocols AODV and DSDV. Protocols were simulated using the ns-2 and were compared in terms of packet delivery fraction, normalized routing load and average delay, while varying number of nodes, and speed.Keywords: AODV, DSDV, MANET, relative performance
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2162220 On Quasi Conformally Flat LP-Sasakian Manifolds with a Coefficient α
Authors: Jay Prakash Singh
Abstract:
The aim of the present paper is to study properties of Quasi conformally flat LP-Sasakian manifolds with a coefficient α. In this paper, we prove that a Quasi conformally flat LP-Sasakian manifold M (n > 3) with a constant coefficient α is an η−Einstein and in a quasi conformally flat LP-Sasakian manifold M (n > 3) with a constant coefficient α if the scalar curvature tensor is constant then M is of constant curvature.Keywords: LP-Sasakian manifolds, coefficient α, quasi conformal curvature tensor, concircular vector field, torse forming vector field, η-Einstein manifold.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1716219 Why We Are Taller in the Morning than Going to Bed at Night – An in vivo and in vitro Study
Authors: Harcharan Singh Ranu
Abstract:
Intradiscal and intervertebral pressure transducers were developed. They were used to map the pressures in the nucleus and within the annulus of the human spinal segments. Their stressrelaxation were recorded over a period of time for nucleus pressure, applied load, and peripherial strain against time. The results show that for normal discs, pressures in the nucleus are viscoelastic in nature with the applied compressive load. Mechanical strains which develop around the periphery of the vertebral body are also viscoelastic with the applied compressive load. Applied compressive load against time also shows viscoelastic behavior. However, annulus does not respond viscoelastically with the applied load. It showed a linear response to compressive loading.Keywords: Intradiscal pressure transducer (IDPT), intervertebral pressure transducer (IVPT), mechanical strains of vertebral bone, viscoelasticity of human spinal disc.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3272218 Multi-Objective Optimization in End Milling of Al-6061 Using Taguchi Based G-PCA
Authors: M. K. Pradhan, Mayank Meena, Shubham Sen, Arvind Singh
Abstract:
In this study, a multi objective optimization for end milling of Al 6061 alloy has been presented to provide better surface quality and higher Material Removal Rate (MRR). The input parameters considered for the analysis are spindle speed, depth of cut and feed. The experiments were planned as per Taguchis design of experiment, with L27 orthogonal array. The Grey Relational Analysis (GRA) has been used for transforming multiple quality responses into a single response and the weights of the each performance characteristics are determined by employing the Principal Component Analysis (PCA), so that their relative importance can be properly and objectively described. The results reveal that Taguchi based G-PCA can effectively acquire the optimal combination of cutting parameters.Keywords: Material Removal Rate, Surface Roughness, Taguchi Method, Grey Relational Analysis, Principal Component Analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2227217 Neural Network Based Approach for Face Detection cum Face Recognition
Authors: Kesari Verma, Aniruddha S. Thoke, Pritam Singh
Abstract:
Automatic face detection is a complex problem in image processing. Many methods exist to solve this problem such as template matching, Fisher Linear Discriminate, Neural Networks, SVM, and MRC. Success has been achieved with each method to varying degrees and complexities. In proposed algorithm we used upright, frontal faces for single gray scale images with decent resolution and under good lighting condition. In the field of face recognition technique the single face is matched with single face from the training dataset. The author proposed a neural network based face detection algorithm from the photographs as well as if any test data appears it check from the online scanned training dataset. Experimental result shows that the algorithm detected up to 95% accuracy for any image.Keywords: Face Detection, Face Recognition, NN Approach, PCA Algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2301216 Cognitive Radio Networks (CRN): Resource Allocation Techniques Based On DNA-inspired Computing
Authors: Santosh Kumar Singh, Krishna Chandra Roy, Vibhakar Pathak
Abstract:
Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled, since all networks share a common pool of channels, exhausting the available channels will force networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. However, CRN facing challenges and condition become worst while tracks changes i.e. reallocation of another under-utilized channels while primary network user arrives. In this paper, channels or resource reallocation technique based on DNA-inspired computing algorithm for CRN has been proposed.
Keywords: Ad hoc networks, channels reallocation, cognitive radio, DNA local sequence alignment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1787215 Audio Watermarking Using Spectral Modifications
Authors: Jyotsna Singh, Parul Garg, Alok Nath De
Abstract:
In this paper, we present a non-blind technique of adding the watermark to the Fourier spectral components of audio signal in a way such that the modified amplitude does not exceed the maximum amplitude spread (MAS). This MAS is due to individual Discrete fourier transform (DFT) coefficients in that particular frame, which is derived from the Energy Spreading function given by Schroeder. Using this technique one can store double the information within a given frame length i.e. overriding the watermark on the host of equal length with least perceptual distortion. The watermark is uniformly floating on the DFT components of original signal. This helps in detecting any intentional manipulations done on the watermarked audio. Also, the scheme is found robust to various signal processing attacks like presence of multiple watermarks, Additive white gaussian noise (AWGN) and mp3 compression.Keywords: Discrete Fourier Transform, Spreading Function, Watermark, Pseudo Noise Sequence, Spectral Masking Effect
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1704214 A Taguchi Approach to Investigate Impact of Factors for Reusability of Software Components
Authors: Parvinder S. Sandhu, Pavel Blecharz, Hardeep Singh
Abstract:
Quantitative Investigation of impact of the factors' contribution towards measuring the reusability of software components could be helpful in evaluating the quality of developed or developing reusable software components and in identification of reusable component from existing legacy systems; that can save cost of developing the software from scratch. But the issue of the relative significance of contributing factors has remained relatively unexplored. In this paper, we have use the Taguchi's approach in analyzing the significance of different structural attributes or factors in deciding the reusability level of a particular component. The results obtained shows that the complexity is the most important factor in deciding the better Reusability of a function oriented Software. In case of Object Oriented Software, Coupling and Complexity collectively play significant role in high reusability.Keywords: Taguchi Approach, Reusability, SoftwareComponents, Structural Attributes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1719213 Traffic Density Estimation for Multiple Segment Freeways
Authors: Karandeep Singh, Baibing Li
Abstract:
Traffic density, an indicator of traffic conditions, is one of the most critical characteristics to Intelligent Transport Systems (ITS). This paper investigates recursive traffic density estimation using the information provided from inductive loop detectors. On the basis of the phenomenological relationship between speed and density, the existing studies incorporate a state space model and update the density estimate using vehicular speed observations via the extended Kalman filter, where an approximation is made because of the linearization of the nonlinear observation equation. In practice, this may lead to substantial estimation errors. This paper incorporates a suitable transformation to deal with the nonlinear observation equation so that the approximation is avoided when using Kalman filter to estimate the traffic density. A numerical study is conducted. It is shown that the developed method outperforms the existing methods for traffic density estimation.Keywords: Density estimation, Kalman filter, speed-densityrelationship, Traffic surveillance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1837212 A Fault Tolerant Token-based Algorithm for Group Mutual Exclusion in Distributed Systems
Authors: Abhishek Swaroop, Awadhesh Kumar Singh
Abstract:
The group mutual exclusion (GME) problem is a variant of the mutual exclusion problem. In the present paper a token-based group mutual exclusion algorithm, capable of handling transient faults, is proposed. The algorithm uses the concept of dynamic request sets. A time out mechanism is used to detect the token loss; also, a distributed scheme is used to regenerate the token. The worst case message complexity of the algorithm is n+1. The maximum concurrency and forum switch complexity of the algorithm are n and min (n, m) respectively, where n is the number of processes and m is the number of groups. The algorithm also satisfies another desirable property called smooth admission. The scheme can also be adapted to handle the extended group mutual exclusion problem.Keywords: Dynamic request sets, Fault tolerance, Smoothadmission, Transient faults.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1673211 An Artificial Immune System for a Multi Agent Robotics System
Authors: Chingtham Tejbanta Singh, Shivashankar B. Nair
Abstract:
This paper explores an application of an adaptive learning mechanism for robots based on the natural immune system. Most of the research carried out so far are based either on the innate or adaptive characteristics of the immune system, we present a combination of these to achieve behavior arbitration wherein a robot learns to detect vulnerable areas of a track and adapts to the required speed over such portions. The test bed comprises of two Lego robots deployed simultaneously on two predefined near concentric tracks with the outer robot capable of helping the inner one when it misaligns. The helper robot works in a damage-control mode by realigning itself to guide the other robot back onto its track. The panic-stricken robot records the conditions under which it was misaligned and learns to detect and adapt under similar conditions thereby making the overall system immune to such failures.
Keywords: Adaptive, AIS, Behavior Arbitration, ClonalSelection, Immune System, Innate, Robot, Self Healing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1349210 Modeling of Reusability of Object Oriented Software System
Authors: Parvinder S. Sandhu, Harpreet Kaur, Amanpreet Singh
Abstract:
Automatic reusability appraisal is helpful in evaluating the quality of developed or developing reusable software components and in identification of reusable components from existing legacy systems; that can save cost of developing the software from scratch. But the issue of how to identify reusable components from existing systems has remained relatively unexplored. In this research work, structural attributes of software components are explored using software metrics and quality of the software is inferred by different Neural Network based approaches, taking the metric values as input. The calculated reusability value enables to identify a good quality code automatically. It is found that the reusability value determined is close to the manual analysis used to be performed by the programmers or repository managers. So, the developed system can be used to enhance the productivity and quality of software development.Keywords: Neural Network, Software Reusability, Software Metric, Accuracy, MAE, RMSE.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2081209 A Comprehensive Survey and Comparative Analysis of Black Hole Attack in Mobile Ad Hoc Network
Authors: Nidhi Gupta, Sanjoy Das, Khushal Singh
Abstract:
A Mobile Ad-hoc Network (MANET) is a self managing network consists of versatile nodes that are capable of communicating with each other without having any fixed infrastructure. These nodes may be routers and/or hosts. Due to this dynamic nature of the network, routing protocols are vulnerable to various kinds of attacks. The black hole attack is one of the conspicuous security threats in MANETs. As the route discovery process is obligatory and customary, attackers make use of this loophole to get success in their motives to destruct the network. In Black hole attack the packet is redirected to a node that actually does not exist in the network. Many researchers have proposed different techniques to detect and prevent this type of attack. In this paper, we have analyzed various routing protocols in this context. Further we have shown a critical comparison among various protocols. We have shown various routing metrics are required proper and significant analysis of the protocol.
Keywords: Black Hole, MANET, Performance Parameters, Routing Protocol.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2760208 Laser Keratoplasty in Human Eye Considering the Fluid Aqueous Humor and Vitreous Humor Fluid Flow
Authors: Dara Singh, Keikhosrow Firouzbakhsh, Mohammad Taghi Ahmadian
Abstract:
In this paper, conventional laser Keratoplasty surgeries in the human eye are studied. For this purpose, a validated 3D finite volume model of the human eye is introduced. In this model the fluid flow has also been considered. The discretized domain of the human eye incorporates a bio-heat transfer equation coupled with a Boussinesq equation. Both continuous and pulsed lasers have been modeled and the results are compared. Moreover, two different conventional surgical positions that are upright and recumbent are compared for these laser therapies. The simulation results show that in these conventional surgeries, the temperature rises above the critical values at the laser insertion areas. However, due to the short duration and the localized nature, the potential damages are restricted to very small regions and can be ignored. The conclusion is that the present day lasers are acceptably safe to the human eye.
Keywords: Eye, heat-transfer, keratoplasty laser, surgery.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 946207 Study of MHD Oblique Stagnation Point Assisting Flow on Vertical Plate with Uniform Surface Heat Flux
Authors: Phool Singh, Ashok Jangid, N.S. Tomer, Deepa Sinha
Abstract:
The aim of this paper is to study the oblique stagnation point flow on vertical plate with uniform surface heat flux in presence of magnetic field. Using Stream function, partial differential equations corresponding to the momentum and energy equations are converted into non-linear ordinary differential equations. Numerical solutions of these equations are obtained using Runge-Kutta Fehlberg method with the help of shooting technique. In the present work the effects of striking angle, magnetic field parameter, Grashoff number, the Prandtl number on velocity and heat transfer characteristics have been discussed. Effect of above mentioned parameter on the position of stagnation point are also studied.Keywords: Heat flux, Oblique stagnation point, Mixedconvection, Magneto hydrodynamics
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1918