作者:
B VijayaS SenthilSelvanAssistant Professor
Dr.M.G.R Educational and Research Institute Chennai India Professor
Department of Civil Engineering SRM Institute of Science and Technology Kattankulathur Chennai Tamilnadu India
The present study focuses on evaluating the corrosion performance characteristics of steel embedded in concrete, in which Manufactured Sand (M-Sand) is utilized as a fractional and full replacement for natural sand. C...
The present study focuses on evaluating the corrosion performance characteristics of steel embedded in concrete, in which Manufactured Sand (M-Sand) is utilized as a fractional and full replacement for natural sand. Corrosion characteristics of steel that is fixed in concrete are analysed by accelerated corrosion test for M40 grade concrete supplanted with 60% manufactured sand for river sand which is found optimum. The modelling of corrosion currents is done using feed forward Artificial Neural Network. The test results exhibits that the durability property of concrete against the effect of corrosion is enhanced, by the partial substitution of 60 % M-Sand. Accurate modelling results for corrosion currents was obtained using Artificial Neural Network (ANN). The test results exhibits that ANN structures produced close prediction current values to that of experimental results.
The article "Prediction of autogenous shrinkage in concrete from material composition or strength calibrated by a large database, as update to model B4", written by "Mohammad Rasoolinejad, Saeed Rahimi-...
The article "Prediction of autogenous shrinkage in concrete from material composition or strength calibrated by a large database, as update to model B4", written by "Mohammad Rasoolinejad, Saeed Rahimi-Aghdam, Zdeněk P. Bažant", was originally published electronically on the publisher’s Internet portal (currently SpringerLink) on 11 March 2019 without open access.
作者:
M B SridharR SathyanathanN Sree ShivaniAssistant Professor
Department of Civil Engineering SRM Institute of Science and Technology KattankulathurChennai Tamil Nadu India. 603203 Associate Professor
Department of Civil Engineering SRM Institute of Science and Technology KattankulathurChennai Tamil Nadu India. 603203 Student
Department of Civil Engineering SRM Institute of Science and Technology Kattankulathur Chennai Tamil Nadu India. 603203
Since the late 19th century, global warming as obtained more attention as the global mean surface temperature has increased and urbanization is one of the major causes of global warming. Given the fact of the heavy mi...
Since the late 19th century, global warming as obtained more attention as the global mean surface temperature has increased and urbanization is one of the major causes of global warming. Given the fact of the heavy migration of people from rural to urban, uncontrollable growth takes place to accommodate this population. This is considered to be a major problem in developing countries. Ludhiana a city in the state of Punjab, India is considered for the study. In this study, LANDSAT 8 (2019) and LANDSAT 5 (2000 and 2009) were taken from USGS to retrieve Land Surface Temperature (LST) and Land Use Land Cover (LULC). Rapid urbanization resulted in the formation of Urban Heat Island (UHI). The UHI had a mixed pattern of temperature variation for barren, urban, water and vegetation lands. The results of the land covers were computed as normalized indices as Normalized Difference Vegetation Index (NDVI), Normalized Difference Water Index (NDWI), Normalized Difference Built-up Index (NDBI) and Normalized Difference Barren Index (NDBaI). The relationship between temperature and indices were determined, the NDBI and Normalized NDBaI produced an increase in LST as the range of NDBI and NDBaI increased.
Splicing systems was first proposed by Head on organic considerations to demonstrate indubitable chimeric behavior of DNA particles and are of current intrigue and study. In this paper, we study some of the chomskian ...
Splicing systems was first proposed by Head on organic considerations to demonstrate indubitable chimeric behavior of DNA particles and are of current intrigue and study. In this paper, we study some of the chomskian hierarchy of array grammars namely (Regular:Regular)array grammar,(Context Free:Regular)array grammar and (Regular:Context Free)array grammar using H-array system. The Array rewriting rules is limited to extent by the action of row and column splicing.
作者:
Jagan Raj JayapandiyanC. KavithaK. SakthivelResearch Scholar
Department of Computer Science Periyar University Salem Tamil Nadu India Assistant Professor
Department of Computer Science Thiruvalluvar Goverment Arts College Tamil Nadu India Professor
Department of Computer Science and Engineering K. S. Rangasamy College of Technology Tamil Nadu India
In this research work, proposing an algorithm, which dynamically selects the best compression algorithms among several compression techniques for steganography encoding. Ranking and selection of best algorithm for eac...
In this research work, proposing an algorithm, which dynamically selects the best compression algorithms among several compression techniques for steganography encoding. Ranking and selection of best algorithm for each and every steganographic transaction is based on several factors like type of cover image being used for the transmission, length of the secret message, type of the message, compression ratio of the secret message being shared, encoding ratio of secret message over the medium etc., The proposed algorithm dynamically ranks and selects the right compression algorithm to be used for the given secret file to occupy lesser embedding space in stego-image.
作者:
TS Sheela ShineyS Albert JeromeJemila RoseAssistant Professor
Department of Computer Science and Engineering St. Xavier's Catholic College of Engineering Chunkankadai Tamil Nadu India Associate Professor
Department of Biomedical Engineering Noorul Islam Centre for Higher Education Kumaracoil Tamil Nadu India Associate Professor
Department of Computer Science and Engineering St. Xavier's Catholic College of Engineering Chunkankadai Tamil Nadu India
Cervical cancer occurs in cervix region of women which is life threatening and is a key research in the field of medical diagnosis. Cervical cancer can be prevented if precancerous changes is diagnosed earlier and cur...
Cervical cancer occurs in cervix region of women which is life threatening and is a key research in the field of medical diagnosis. Cervical cancer can be prevented if precancerous changes is diagnosed earlier and cured properly. But finding cancer at the earlier stage is a tedious process. Cervical cancer screening is crucial since utmost of the screening procedures are invasive in nature. The objective is to automatically extract the area where in the cervical cancer starts to occur. In order to diagnose cervical cancer and distinguish the malignant and benign tissues, a cytology image obtained by cervicographic or colposcopy device is used. A robust segmentation algorithm is proposed that uses superpixel for the image segmentation method. This method is regularized by the combination of structural properties such as color, texture, and spatial data present in the superpixel graph.
Stronger construction material is category from one of the steel structure are attain higher strength with stand the resistance of steel by natural as well as it could made in different shapes. The exact shape of stee...
Stronger construction material is category from one of the steel structure are attain higher strength with stand the resistance of steel by natural as well as it could made in different shapes. The exact shape of steel structure and its profile are precisely designed from cross section to ensure Indian Standard along with mechanical and chemical characteristics. All over the country's most of the industrialization is precise on sizes, shapes; strengths, storage practices and its composition of steel structure are used as per standards. cold-formed steel is effect with rolling of thin gauge steel sheet increasing the yield strength whose products are widely used in construction industries, as well as structure like columns, beams, joists, studs, floor decking, built-up section, telecommunication towers, electricity transmission steel tower, multi-storied steel structures, etc., due to its stronger and reduction in dead weight cold-formed steel is used. The dies are series of making various section of cold-formed steel structural member with different section and shapes by cold roll forming the steel to attain the preferred shape. As per the standard, nominal minimum yield strength of sheet steel rolled in cold-formed section is 250 N/mm2. However, user trend use of greater strength, but it could be lesser as 230 N/mm2.
In earlier days, welding only involves joining two metals of same kind and dissimilar metals were usually joined by fasteners. Friction Stud welding is a true engineering marvel of making welds between dissimilar meta...
In earlier days, welding only involves joining two metals of same kind and dissimilar metals were usually joined by fasteners. Friction Stud welding is a true engineering marvel of making welds between dissimilar metals without any melting or fillers involved. The friction stud welding doesn't involve heat generation from electricity and it is purely based on friction. Besides these facts the friction stud welding has numerous advantage and applications. This paper focuses on the process of stud welding, application and its limitations.
Biometric systems are the most advanced access technology developed so far in the 21st century. It does not even require to carry key cards or passwords in mind. Today most of the commercial and private entries are pr...
Biometric systems are the most advanced access technology developed so far in the 21st century. It does not even require to carry key cards or passwords in mind. Today most of the commercial and private entries are protected by biometric recognition systems like fingerprint scans facial recognition, retina scans, voice matching, etc. Even our phones, laptops, and daily access devices are equipped with biometric systems. In banks, the PCs are secured by the combination of passwords and fingerprint scans. Biometric scans are considered the most secure access technology so far. Our paper is to examine whether they are secure? Should we rely on them with our hard-earned money and social identity? Is there any way we can use these services without actually compromising our data and security? Our observation is on our digital identity. Promoting digitization in every department brings our topic in the picture. All our information is saved in our phones, our daily routine, whom we talk, what we purchase, whom we chat, where we travel, etc. Almost every smartphone has biometric fingerprint locks which means our phones have our fingerprint scans in database and with internet blend it's tethered worldwide. Our fingerprints are connected to our bank accounts, PAN Cards, Passport, and SIM Cards using Aadhar Cards. If someone has our fingerprint they can easily reach our Aadhar Card and through that to all our personal information. Most of the phone companies are Chinese, Korean, German, and American. As per their country policies, they must share their data with the governing authorities. We aim to create a security system without actually using the biometric scans. The system is an advancement of the biometric system but with better accuracy and intelligence. We interface image acquisition tools to live track the red color things. The web camera or inbuilt system lens can be used as the acquisition system. When the red color object is moved in front of the lens it shows the co
This work concentrates around the task scheduling depends on QoS and imperative of desire. Under nature of vibrant cloud computing, effectiveness improving of scheduling of task and load balancing are interminable iss...
This work concentrates around the task scheduling depends on QoS and imperative of desire. Under nature of vibrant cloud computing, effectiveness improving of scheduling of task and load balancing are interminable issues. For clients, be that as it may, it's progressively imperative to meet their necessities of QoS. This paper identifies with an improvement decency intention depends on new Berger's model under the earth of vibrant cloud computing. As indicated by the distinctive kind of task scheduling, we portray the need of decency, proficiency and the Balance among advantage and reasonableness separately. We recompile the CloudSim and recreate the three undertaking task scheduling above based on expanded CloudSim individually. The exploratory outcomes show that this calculation portion not just meet the guideline of offering need to profit with because of thought to decency, yet additionally address clients' issues of orchestrated QoS.
暂无评论