Days
Hours
Minutes
Seconds
Submission Deadline

Transient Thermoelastic Problem of Semi- Infinite Circular Beam with Internal Heat Source

Transient Thermoelastic Problem of Semi- Infinite Circular Beam with Internal Heat Source Abstract- This paper is concerned with transient thermoelastic problem in which we need to determine the temperature distribution, displacement function and thermal stresses of a semi-infinite circular beam when the boundary conditions are known. Integral transform techniques are used to obtain the solution of the problem. Key Words: Semi-infinite circular beam, transient problem, Integral […]

Read Me

Performance Comparison of Different Sorting Algorithms

Performance Comparison of Different Sorting Algorithms Abstract— Sorting is the basic operation in most of the applications of computer science. Sorting means to arrange data in particular order inside computer. In this paper we have discussed performance of different sorting algorithms with their advantages and disadvantages. This paper also represents the application areas for different sorting algorithms. Main goal of this paper is to compare the […]

Read Me

Security Analysis of OpenStack Keystone

Security Analysis of OpenStack Keystone Abstract – OpenStack is one of the most used cloud management software today. OpenStack is a free and open-source software platform for cloud computing, mostly deployed as an infrastructure-as-a-service (IaaS). We have selected OpenStack as one of the underlying infrastructure service layer tool because OpenStack allows us to modify our cloud to fit into custom infrastructures that may be necessary […]

Read Me

Studies on Pollution and Contamination in Fishing Harbor Environment, Tamil Nadu, Southeast Coast of India

Studies on Pollution and Contamination in Fishing Harbor Environment, Tamil Nadu, Southeast Coast of India Abstract: – This study aimed to determining the pollution and contamination of fishing harbor environment. Temperature (3.12, 1.874, 1.04, 1.25 oC), Salinity (2.05, 2.50, 2.49, 2.52 ppt.), pH (0.08, 0.10, 0.04, 0.06), Dissolved oxygen (0.56, 0.52, 0.53, 0.37 ml/l), Total Nitrogen (0.05, 0.11, 0.19, 0.07 µg/g), Total phosphorous (0.03, 0.03, 0.09, […]

Read Me

Simulated Characteristics of a Nonlinear Directional Coupler Based Optical Switch

Simulated Characteristics of a Nonlinear Directional Coupler Based Optical Switch. Characteristics of Nonlinear Directional Coupler Abstract-This paper presents a nonlinear directional coupler for optical power switching. The theoretical study has been done to study the coupling characteristics of the nonlinear directional coupler. Variation of the coupling coefficients with wavelength have been done, and found that, out of all four coupling coefficients, nonlinear coupling coefficient (equivalent to selfphase […]

Read Me

Abnormality Detection of Sensors in IOT Controllers using Fuzzy Approach for Smart Home

Abnormality Detection of Sensors in IOT Controllers using Fuzzy Approach for Smart Home Abstract— Smart home innovation is developing quickly as an energizing new worldview. An extensive variety of perspectives that incorporates security, energy sparing, ventilation, shrewd kitchen is canvassed in this paper. The greater part of the above is executed with the assistance of keen gadgets, for example, remote control, security alerts, sensors and […]

Read Me

Improved Object Detection Algorithm using Ant Colony Optimization and Deep Belief Networks Based Image Segmentaion

Improved Object Detection Algorithm using Ant Colony Optimization and Deep Belief Networks Based Image Segmentaion. Abstract— Object detection is a very important application of image processing. It is of vital importance for object dynamic surveillance and other applications. So far, object detection has been widely researched. It shows an efficient coarse object locating method based on a saliency mechanism. The method could avoid an exhaustive […]

Read Me

Hybrid Technique to Prevent Multiplicative RFID Attacks using Hybrid Distance Bounding (DB) Protocols and Secure Positioning Protocols

Hybrid Technique to Prevent Multiplicative RFID Attacks using Hybrid Distance Bounding (DB) Protocols and Secure Positioning Protocols Abstract— Security concerns inhibit the fast adaption of RFID technology for many applications. the security and privacy in radio frequency identification (RFID) system are one of the main obstacles to be solved. therefore this thesis work has proposed the hybrid technique to prevent multiplicative RFID attacks using hybrid distance bounding […]

Read Me

Finite Element Modeling and Analysis of Hybrid Plate System

Finite Element Modeling and Analysis of Hybrid Plate System Abstract— This paper presents the non linear response of hybrid plate system consist of Fiber Reinforced Polymer (FRP) and ferrocement act as shell for core Reinforced Concrete (RC) by using ATENA-3D software based on Finite Element Method (FEM). In this investigation, the load displacement response of RC plate system with internal stiffened beams was carried out in […]

Read Me

Predicting Outcome of Live Cricket Match Using Duckworth- Lewis Par Score

Predicting Outcome of Live Cricket Match Using Duckworth- Lewis Par Score Abstract: Cricket is the second most watched sport in the world after soccer, and enjoys a multi-million dollar industry. There is remarkable interest in simulating cricket and more importantly in predicting the outcome of cricket match which is played in three formats namely test match, one day international and T20 match. The complex rules prevailing […]

Read Me

GET OUR MONTHLY NEWSLETTER