A unique study of structural and chemical analysis of crystalline phases in developed agglomerated fluxes was carried out. Thirty-two fluxes were developed by using a mixture of oxides, halides, carbonates, silicates,...
A unique study of structural and chemical analysis of crystalline phases in developed agglomerated fluxes was carried out. Thirty-two fluxes were developed by using a mixture of oxides, halides, carbonates, silicates, and ferroalloys for submerged arc welding. The present paper focuses on only ten (out of thirty-two) fluxes which were analyzed by X-ray diffraction (XRD) to know the different types of oxides formed and changed in oxidation number of metallic centers after sintering process at around 850 ∘ C. To know the effect of temperature over phase transformation and melting of different compounds, differential thermal analysis (DTA) was carried out from 1000 to 1400 ∘ C. This study aims to know the quantity of ions present (percentage) and melting behavior of developed agglomerated fluxes for submerged arc welding process.
The staircase scheme is one of the important broadcasting schemes. It however does not provide the video data to all users on time. This problem has been overcome in the conservative staircase scheme at the cost of ba...
详细信息
The staircase scheme is one of the important broadcasting schemes. It however does not provide the video data to all users on time. This problem has been overcome in the conservative staircase scheme at the cost of bandwidth. The number of segments in the conservative staircase scheme is less and hence the segment size is large, which signifies the user's waiting time. Thus, the conservative staircase scheme has more user's waiting time than the staircase scheme. In this paper, we propose a hybrid scheme of the staircase and conservative staircase schemes that provides the video data to users on time and has better performance than the conservative staircase scheme for the user's waiting time.
Owing to the features of erratic speeds and varying topography and requirements of minimum delay and high application reliability in terms of data delivery and security, existing MANET routing protocols prove to be in...
Owing to the features of erratic speeds and varying topography and requirements of minimum delay and high application reliability in terms of data delivery and security, existing MANET routing protocols prove to be inefficient in VANETs. In acknowledgment to the requirement for new VANET protocols addressing issues of routing, data dissemination, data sharing and security, this paper proposes a novel geographic routing technique called GROOV, which takes into account varying topographies and densities of highways as well as cities. To increase reliability, GROOV calculates transmission feasibility for each node, based on link quality (average acceleration), range weight (weightage to relative positions of nodes) and direction, instead of traditional greedy forwarding, in the selection of the next relay node. Taking volatility of critical city intersection scenarios into account, GROOV calculates new node coordinates of vehicles at intersections to make best route selections at intersections and thus, routes the data packet through the path directed at the intended recipient. This prevents the occurrence of a routing loop, thereby, decreasing delay and increasing packet delivery ratio. Simulation results show that GROOV achieves a high level of routing performance in terms of packet delivery ratio, end-to-end delay and average number of hops in both city straight road/highway and city intersection scenarios.
One of the major issues concerning all the web application is security of data and proving authority of database. In this paper we present a robust technique of embedding watermark in a relational database with non nu...
详细信息
One of the major issues concerning all the web application is security of data and proving authority of database. In this paper we present a robust technique of embedding watermark in a relational database with non numeric attributes. In the proposed technique, an attribute is selected using a pseudorandom generator and the watermark is embedded in it. The vowel to be embedded is selected by calling a Key_Extraction ( ) on primary attribute of the same tuple. Our technique develops a secret key of embedded vowels which is provided to the user. The technique is robust against different malicious attacks and is blind and imperceptible, as proved by our analysis.
It is a known fact today that VANETs [1] are going to play an increasingly important role in vehicular communication in the future. The impact of these networks especially to solve the problem of traffic optimization ...
详细信息
ISBN:
(纸本)9781457720529
It is a known fact today that VANETs [1] are going to play an increasingly important role in vehicular communication in the future. The impact of these networks especially to solve the problem of traffic optimization and control is significant. Traffic Optimization through Information Dissemination (TOID) is an algorithm based on a mathematical model in which vehicles moving on the road can exchange information among themselves to report the average velocity and density of the roads within a certain region such that the driver has a fair idea of the traffic conditions in the region and which road to take depending upon his discretion. The algorithm ensures that the information reaches the network in a timely manner and the overheads are a minimum. The overheads are further reduced by optimizing the input parameters related to the average velocity and density in the network. The algorithm also reports the estimated density and estimated velocity in the network with a fair degree of accuracy. The effectiveness of the algorithm has been substantiated through extensive simulations using QualNet [2]. The algorithm is ideal for traffic problems in developing countries as it works for vehicular ad hoc networks that are completely infrastructure-less.
Wireless mesh networks (WMNs) have become immensely popular these days. In order to satisfy user service requirements, multimedia applications need quality of service (QoS) support. Since the mesh routers are usually ...
详细信息
Wireless mesh networks (WMNs) have become immensely popular these days. In order to satisfy user service requirements, multimedia applications need quality of service (QoS) support. Since the mesh routers are usually stationary in WMNs, a better performance is expected in WMNs as compared to ad hoc networks. But sustaining QoS in wireless mesh networks still remains a challenging task. A fundamental management function in WMNs for backing up multimedia applications is to have admission control. In this paper, we propose a protocol called Rate Adaptive Routing on Cliques Admission Control (RA-RCAC) that provides rate adaptive admission control such that the network layer provides feedback in case of network congestion at the application layer. By simulations, RA-RCAC is compared against MARIA [1] and RCAC [2], showing its superiority in terms of throughput, end-to-end delay, packet delivery ratio and loss ratio, chosen as performance metrics.
In all-optical WDM networks, feasibility of a lightpath are determined by physical layer impairment accumulation. Physical layer impairment-aware routing and wavelength assignment (PLIA-RWA) algorithms select a feasib...
详细信息
Mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other without any fixed infrastructure or a central network authority. From a security design perspective, MANETs have no clear ...
详细信息
Mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other without any fixed infrastructure or a central network authority. From a security design perspective, MANETs have no clear line of defense; i.e. no built-in security. Thus, the wireless channel is accessible to both legitimate network users and malicious attackers. A blackhole attack is a severe attack that can be easily employed against data routing in MANETs. A blackhole is a malicious node that can falsely reply for any route requests without having an active route to a specified destination and drops all the receiving data packets. In this paper, a novel scheme for Detecting Blackhole Attacks in MANETs (so-called DBA-DSR) is introduced. The BDA-DSR protocol detects and avoids the blackhole problem before the actual routing mechanism is started by using fake RREQ packets to catch the malicious nodes. Simulation results are provided, showing that the proposed DBA-DSR scheme outperforms DSR in terms of packet delivery ratio and network throughput, chosen as performance metrics, when blackhole nodes are present in the network.
Proposed work deals with the design of a family of stable IIR digital integrators via use of minimax and pole, zero, and constant optimization methods. First the minimax optimization method is used to design a family ...
Proposed work deals with the design of a family of stable IIR digital integrators via use of minimax and pole, zero, and constant optimization methods. First the minimax optimization method is used to design a family of second-, third-, and fourth-order digital integrators by optimizing the magnitude response in a min-max sense under the satisfactory condition of constant group delay. Then the magnitude and group delay response is further improved using pole, zero, and constant optimization method. Subsequently, by modifying the transfer function of all of the designed integrators appropriately, new differentiators are obtained. Simulation results show that proposed approach outperforms existing design methods in terms of both magnitude and phase response.
There have been two efforts earlier on evolving CFOA-based fully-uncoupled oscillators i.e. circuits in which none of the resistors controlling the frequency of oscillation (FO) appear in the condition of oscillation ...
详细信息
暂无评论