A unique study of structural and chemical analysis of crys-talline phases in developed agglomerated fluxes was carried out. Thirty-two fluxes were developed by using a mixture of oxides, halides, carbonates, silicates...
详细信息
A unique study of structural and chemical analysis of crys-talline phases in developed agglomerated fluxes was carried out. Thirty-two fluxes were developed by using a mixture of oxides, halides, carbonates, silicates, and ferroalloys for submerged arc welding. The present paper focuses on only ten (out of thirty-two) fluxes which were analyzed by X-ray diffraction (XRD) to know the different types of oxides formed and changed in oxidation number of metallic centers after sintering process at around 850 °C. To know the effect of temperature over phase transformation and melting of different compounds, differential thermal analysis (DTA) was carried out from 1000 to 1400 °C. This study aims to know the quantity of ions present (percentage) and melting behavior of developed agglomerated fluxes for submerged arc welding process.
In the present paper, we deal with the complex Szasz-Durrmeyer operators and study Voronovskaja type results with quantitative estimates for these operators attached to analytic functions of exponential growth on comp...
详细信息
In the present paper, we deal with the complex Szasz-Durrmeyer operators and study Voronovskaja type results with quantitative estimates for these operators attached to analytic functions of exponential growth on compact disks. Also, the exact order of approximation is found.
This paper presents the development of an Ultra Wide Band (UWB) monopole antenna with dual band notch characteristics. Modified crown-square shaped fractal slots in the ground-plane are implemented to enhance the impe...
详细信息
The objective of this experiment was to determine the best possible input EEG feature for classification of the workload while designing load balancing logic for an automated operator. The input features compared in t...
详细信息
The study of logic led directly to the invention of the programmable digital electronic computer. The theory of computation inspired us to consider the possibility of building an electronically intelligent brain leadi...
详细信息
The study of logic led directly to the invention of the programmable digital electronic computer. The theory of computation inspired us to consider the possibility of building an electronically intelligent brain leading to artificial intelligence. We have seen the 3rd generation smart phones and laptops with LED display having both resistive and capacitive touch technology. This paper presents a conceptual approach of controlling mouse movements, writing texts and sketching colored - images by simply making real time gestures in air with colored objects or colored finger caps without making any physical surface contact unlike the (Touch technology). With the help of the artificial Digital Vision we integrate Image Processing along with Gesture Recognition to generate a Graphical User Interface in order to acquire physical aerial gestures and plot 2-Dimensional curves onto the computer screen using a real time camera (computer webcam). The graphics or texts so generated on screen can be projected to a wall using a projector in a classroom which especially assists the `lecturers with paralysed legs-who cannot write on a blackboard' or `lecturers suffering from color - blindness or amblyopia'.
This paper discusses an enhanced AODV routing protocol as a method for defence against JellyFish (JF) Delay Variance attack in Mobile Ad-hoc networks. The JF delay variance attack introduces delay in forwarding the pa...
详细信息
This paper discusses an enhanced AODV routing protocol as a method for defence against JellyFish (JF) Delay Variance attack in Mobile Ad-hoc networks. The JF delay variance attack introduces delay in forwarding the packets at network layer. It uses MAC addresses to calculate the route for forwarding the packets to destination. The attacker node creates delay in forwarding the packets, which increases end-to-end delay and decreases throughput of the network. Thus the performance of network decreases drastically. We propose an enhancement in AODV protocol so as to detect the malicious nodes in a network and to remove them from the routing path without their knowledge.
Static Graphs consist of a fixed sequence of nodes and edges which does not change over time, hence lack in providing the information regarding evolution of the network. In contrast, Dynamic Graphs to a greater extent...
详细信息
Static Graphs consist of a fixed sequence of nodes and edges which does not change over time, hence lack in providing the information regarding evolution of the network. In contrast, Dynamic Graphs to a greater extent relate to real-life events and so provide complete information about the network evolution. That is why many researchers [1, 2, 3, 5, 6, 7, 8, 9 and 10] have developed interest in mining of Dynamic Graphs. We feel, that the topic can be further sub-divided structurally into four major categories, which are mining of Labeled, Edge Unlabeled, Directed and Undirected Dynamic Graphs. However, the main focus of research till now is on the mining of Edge Unlabeled Dynamic Graphs. But the limitation is that it does not provide the complete insights of graphs where edge strengths i.e. weights are also changing with time. For example in case of Coauthor network mining in Unlabeled Dynamic Graphs gives information only about the occurrence of relation whereas that in Labeled Dynamic Graphs provides more detailed information like the number of paper published jointly at different instants of time. To address this problem, the present paper proposes a novel method to find out Weighted Regular Patterns in Edge Labeled Dynamic Graphs. The proposed method consists of creating a summary graph to find weight occurrence sequence of edges enabling to determine weighted regular patterns. The method is applied to real world dataset, PACS networks, to ensure its practical feasibility and to understand how Weighted Dynamic Graphs behave regularly over time.
Existing Dynamic Graph mining algorithms focus typically on finding patterns in undirected, unweighted and weighted dynamic networks ignoring the fact that some of them could be directed also. In this paper, we focus ...
详细信息
ISBN:
(纸本)9781479930814
Existing Dynamic Graph mining algorithms focus typically on finding patterns in undirected, unweighted and weighted dynamic networks ignoring the fact that some of them could be directed also. In this paper, we focus on finding regular evolution patterns in edges, outdegree and indegree of all the nodes, featuring consecutively at fixed time intervals during the growth of an unweighted and directed dynamic graph. Such regular patterns will help in finding the characteristics (such as popularity, inactiveness) of the nodes. A methodology of occurrence rule is proposed in order to determine regular evolution patterns, which are considered to be regular if they follow the same occurrence rule. The methodology is also used to find the patterns in the outdegree and indegree of all the nodes. These patterns are used to describe exhaustively the neighbourhood properties of dynamic graphs as in the social networks. To ensure its practical feasibility, the method has been applied to real world dataset on Facebook-like Forum network, and the results have shown that 37.6% of the edges are directed regular edges, and 59% of the total users, not having their indegree patterns are unpopular users.
Scheduling enables the cloud in balancing the large amount of load present in the system for faster computation. It plays a vital and significant part in the execution of the load in the various heterogeneous systems....
详细信息
Scheduling enables the cloud in balancing the large amount of load present in the system for faster computation. It plays a vital and significant part in the execution of the load in the various heterogeneous systems. The scheduling portrays a selection of resources for the tasks for better resource utilization. This paper differentiates the various load scheduling algorithms applied in the various heterogeneous systems in detail. It plays a key role in larger resource utilization and handling. This paper defines the basic cloud computing fundamentals and the concept of load balancing i.e., scheduling of load in cloud. The applied load scheduling algorithms are elaborated and surveyed extensively.
Dynamic information network is a social network in which data and topology continuously keeps on changing. Number of users are approaching and departing the social networks and share information. Information diffusion...
详细信息
Dynamic information network is a social network in which data and topology continuously keeps on changing. Number of users are approaching and departing the social networks and share information. Information diffusion plays a key role in this information sharing. So it is very important to understand the process of information diffusion in this type of network. It also helps to analyze the effective design of advertising campaigns, viral marketing and recommender systems. In this paper two major models of information diffusion i.e. Independent Cascade Model and Linear Threshold Model are studied and implemented with respect of dynamic information network While these methods gave promising results on static networks, but because of their linear and scalable properties, they are insufficient to model dynamic information networks.
暂无评论