作者:
Abhishek KumarR. DhanuskodiR. KaliappanK. NandakumarAbhishek Kumar teaches design philosophies at Anant National University
Ahmedabad. He earned his Ph.D in Management from Pondicherry University. He is an Economics graduate from Calcutta University and MBA from BIM Trichy. He has published more than 20 articles in reputed international journals has authored two books written articles and columns for newspapers and is quoted on issues related to leadership and marketing by various media platforms. His research work comprises construction of brand personality scale for media aesthetics and phenomenological design. His recent publications are on philosophy of a photograph hermeneutic reality of product and on philosophy of intimate spaces. R. Dhanuskodi has nearly 40 years of R&D experience at BHEL
India in technical areas applicable for thermal power plants. He is a life member of The Institution of Engineers (India) and The Combustion Institute. He has won two BHEL’s Excel awards under the best author category for technical papers. He has visited France Netherlands and Germany under Indo-Europe Clean Coal Development Program. He has guided 42 UG PG and PhD project works. He holds 11 patents 40 copyrights and 2 design registrations. He has presented papers in 20 conferences and published in 10 national and international journals. R. Kaliappan completed his bachelors in electrical and electronics engineering and Masters in Computer Science. He has 36 years of research experience in different fields of power generation and power plant subsystems such as heat transfer studies on boiler circulation
efficiency improvements of boiler subsystems product improvements/ enhancements and setting up test facilities for research studies. He has published a number of technical papers on MHD power generation and heat transfer studies in various national and international journals. He has more than 25 patents and copyrights on products development related to power boilers. He has won BHEL’S gold medal for product development for Smart Wall Blowing system. K. Nandakumar
Phase-change materials (PCMs) have emerged as promising active elements in silicon (Si) photonic systems. In this work, we design, fabricate, and characterize a hybrid Si-PCM optical modulator. By integrating vanadium...
详细信息
In this paper is presented a new printed monopole antenna, bio-inspired by jasmine flower, that meets the Federal Communications Commission parameters for ultra-wideband systems. The design of the printed monopole ant...
详细信息
In this paper is presented a new printed monopole antenna, bio-inspired by jasmine flower, that meets the Federal Communications Commission parameters for ultra-wideband systems. The design of the printed monopole antenna in jasmine flower has developed from a printed monopole antenna with circular geometry, with comparison results. The measured results of bio-inspired antenna in the jasmine flower showed compatibility with the parameters required by the FCC for ultra-wideband technology. It obtained bandwidth of 9.75 GHz, half-power beamwidth of 148 degrees, omnidirectional radiation pattern, gain of 5.99 dBi, power spectral density below -41.3 dBm across the bandwidth of ultra-wideband technology, small pulse distortion, and constant group delay, with variations of less than 2ns.
The growth of large area single-layer graphene (1-LG) is studied using ambient pressure chemical vapor deposition on single-crystal Ni(111), Ni(110), and Ni(100). By varying both the furnace temperature in the range o...
详细信息
The growth of large area single-layer graphene (1-LG) is studied using ambient pressure chemical vapor deposition on single-crystal Ni(111), Ni(110), and Ni(100). By varying both the furnace temperature in the range of 800–1100 °C and the gas flow through the growth chamber, uniform, high-quality 1-LG is obtained for Ni(111) and Ni(110) single crystals and for Ni(100) thin films. Surprisingly, only multilayer graphene growth could be obtained for single-crystal Ni(100). The experimental results are analyzed to determine the optimum combination of temperature and gas flow. Characterization with optical microscopy, Raman spectroscopy, and optical transmission support our findings. Density-functional theory calculations are performed to determine the energy barriers for diffusion, segregation, and adsorption, and model the kinetic pathways for formation of different carbon structures on the low-index surfaces of Ni.
A simulation model for a Brazilian pipeline network used to transport heavy oil derivatives is presented. The network has four refineries, three intermediate depots, a harbor and seven pipelines. The transport is infl...
详细信息
A simulation model for a Brazilian pipeline network used to transport heavy oil derivatives is presented. The network has four refineries, three intermediate depots, a harbor and seven pipelines. The transport is influenced by supply needs and operational constraints. The network schedule is generated online by a simulation model. The objectives are to generate the schedule in accordance with a nondeterministic arrival of ships and to compare this schedule with the one generated by a hybrid approach that combines optimization and simulation techniques. With the simulation-only approach herein proposed, the pipelines are modeled as continuous flow entities. The obtained results allow the validation of different probability distributions for the arrival of ships and they indicate the differences of both approaches: the hybrid and the simulation-only.
This work presents extensions of the general methodology of employing quadratic approximations of the objective function and constraints for handling non-linear equality constraints in single-objective optimization pr...
详细信息
This work presents extensions of the general methodology of employing quadratic approximations of the objective function and constraints for handling non-linear equality constraints in single-objective optimization problems. The methodology does not require any extra function evaluation since the quadratic approximations are constructed using only information that would be already obtained in the course of the optimization algorithms. The methodology is coupled with the Real Biased Genetic Algorithm to tackle non-linear single-objective optimization problems with two equality constraints. The modified algorithm is tested with a set of analytical problems. The results show the modified algorithm finds the constrained optima with enhanced precision and faster convergence. Considering that the new technique does not impose any additional cost to the algorithms, it can be stated that the technique is also suitable for costly black-box problems.
This paper proposes a multilevel shunt active power filter (SAPF) to deal with either harmonic currents compensation or reactive power compensation. Such a device can reduce the harmonic distortion at the grid current...
详细信息
Background: The progressive and chronic course of COPD, characterized by difficulty in breathing, can be aggravated by periods of increased symptoms (exacerbation). The treatment often involves in-hospital care and am...
详细信息
There are several ways to deal with security issues of confidential data sent via the internet, including using cryptographic techniques and steganography. Steganography is the science and art of concealing informatio...
There are several ways to deal with security issues of confidential data sent via the internet, including using cryptographic techniques and steganography. Steganography is the science and art of concealing information / messages in a media in such a way that its existence is not detected by other parties who are not entitled to the information. Instead, cryptography disguises the meaning of a message, but does not hide that there is a message because the file looks suspicious. The Steganography technique used here was End Of File (EOF). The EOF technique described how to add data or files at the end of the image file. For this technique, the size of data or files that will be hidden could be larger than the size of the image file. The hidden data will be inserted at the end of the file so that it will not affect the image. This steganography application is also equipped with a cryptographic function Data Encryption Standard (DES) at the time of insertion of data that functions as a generator code and encrypts data, so that the security of a data in the file is more protected and protected from those who are not entitled to know the data.
In this work, multiple robots circulate around the boundary of a desired region in order to create a virtual fence. The aim of the this fence is to avoid internal or external agents crossing through the delimited area...
详细信息
In this work, multiple robots circulate around the boundary of a desired region in order to create a virtual fence. The aim of the this fence is to avoid internal or external agents crossing through the delimited area. In this paper, we propose a distributed technique that allows a team of robots to plan the deformation of the boundary shape in order to escort the safe region from one place to a goal. Our proposal is composed of two parts. First, we present a distributed planning method for the dynamic boundary. We model the resulting plan as a twice differentiable function. Second, we use the obtained function to guide the robot team, where every member uses only local information for the controller. The robots distribute themselves along the time-varying perimeter and patrol around it. We show in simulation how the robots behave in partially/totally unknown environments with static obstacles.
暂无评论