-
A Study of Micro Structures of Gas Metal Arc Welded Aluminium Alloy 6061-T6
Sagar R. Chikhale ; Kishor P. Kolhe; Pawan Kumar; Pankaj Kumar Verma
Mechanical Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 115 - 123
Aluminum and its alloys are having variety of applications in today’s industrial scenario. Aluminium Alloy 6061 (AA6061-T6) is an Al-Mg-Si alloy employed in Marine frames, automobiles and high speed trains due to their high strength, light weight and excellent corrosion resistance. Nine samples were prepared for toughness studies and tensile strength. The CVN samples were prepared by ASTM-E-23 standard. Also tensile specimens were prepared by using ASTM-E28/E8M-09 for identifying the tensile strength of weld specimen. The Tensile and Toughness test was carried out by using UTM and Charpy V-Notch testing machine. The Grain size and microstructures of the Gas Metal Arc Welded AA6061-T6 have been studied at various combinations of MIG welding process parameters like Current, Voltage and welding speed. The microstructure study followed of all the specimens were carried out by using Metallurgical microscope with Image Analyzer System, the Microhardness study has was carried out using Digital Vickers Microhardness tester. Also the effect of various parameters on welds microstructures and grain size distribution has been explained, the various correlations between grain size and mechanical properties are studied.
Read More...
-
Estimation of Stress Concentration Factor for Different Crack Length on Plate Under Compressive Loading on Circular Polariscope
Tushar Dnyaneshwar Kale ; Tushar D. Kale; A V. Vanalkar; S R. Ikhar
Mechanical Engineering Design
Year: 2016, Volume:3, Issue : 2
Pages: 124 - 126
In this paper an effort is made to find the stress concentration factor (Kt) near the crack tip in a plate having different crack length to width ratio by applying the compressive load on the rectangular plate with an edge crack. Firstly the material fringe value is determined or calculated by loading the circular disc on polariscope under compression. The stress concentration in the rectangular plate with an edge crack is calculated & at the end of this paper a graph is plotted between stress concentration factor and the crack length to width ratio of the rectangular plate.
Read More...
-
Energy Efficient Routing in Clustered Wireless Sensor Network Among Obstacles
B. Amarnath ; Sachinkumar Veerashetty
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 127 - 129
The routing which is present in clustered WSNs assumes that there is no barrier in a field of interest (FoI). Although it isn’t a practical statement it eliminates s the effects of obstacles in routing the sensory data. The intend of clustering technique in WSNs named energy-efficient consistent clustering that periodically selects the cluster heads according to their residual energy and secondary parameter as utility of the sensor to its neighbors. Then selected cluster heads have equal number of neighbors and residual energy. The present of route optimization technique in clustered WSNs among obstacles using Dijkstra’s shortest path algorithm. This criterion reduces average hop count, packet delay and energy-consumption of Wireless Sensor Networks.
Read More...
-
A Hierarchical Topology Based File Sharing for Faster Query Processing in Multi-Node Cluster Network
Bhaganna ; Prof. S. A. Madival
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 130 - 132
Proficient sleeve enquiry is vital to the largely feat of multi smack dossier sharing systems. Clustering nobles by their widespread safety can appreciably boost the efficiency of file uncertainty. Clustering aristocrats by their corporal closeness can also progress file uncertainty concert. Yet, few contemporary machinery are able to huddle peers base on both examine awareness and material propinquity. Although prearranged MULTINODEs offer elevated file answer effectiveness than amorphous, it is knotty to grasp it due to their sternly clear topologies. In this job, we pioneer a Proximity-Aware and Interest-clustered multimode heading partaking method based on a controlled, which forms physically-close nodes into a collect and supplementary assemblage physically-close PAIS defences the bud sift marks in order, allowing for that a freshly visit file tend to be visit another time, the bud clean based loom is superior by only scrutiny the lately extra bloom sort out in sequence to shrink file probing delay. The untried grades demonstrate the lofty efficacy of the intra-sub-cluster file sharp loom in recovering file incisive competence.
Read More...
-
Review on Hello Flood Attack in Wireless Sensor Networks
Priyanka ; Er. Dinesh Kumar
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 133 - 135
Wireless sensor networks have emerged a wide application for monitoring physical environment. Energy efficiency, Processing capability and communication range are the limitations of sensor networks. Moreover, the wireless networks are vulnerable to certain types of network attacks. One of them is the hello flood attack, in which a non- legal node in the network can flood hello requests to the legitimate nodes and break the security of WSN. The solutions for these types of attacks are mainly cryptographic that suffers from heavy computational complexity. Hence, they are less suitable for wireless sensor networks. In this paper, a new centralized intrusion detection system is proposed to detect and prevent hello flood attacks in cluster-based wireless sensors networks. The main idea of using centralized detection scheme, in which the base station decides on potential intrusions based on the control packets that are being sent from the cluster heads. The proposed energy efficient and simple intrusion detection technique is thus suitable for sensor nodes with resource constrained. Moreso, the simulation result confirms the expected performance of the proposed intrusion detection system in the terms of security and energy efficiency.
Read More...
-
Vibrational Analysis of Bicycle Chassis
Rahul J. Pawar ; Dr. Kishor P. Kolhe
Mechanical Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 136 - 148
It is important to recognize that the design of any machine is an interdisciplinary process, involving aerodynamics, thermodynamics, fluid dynamics, stress analysis, vibration analysis, the selection of materials, and the requirements for manufacturing. The operation of any mechanical system will always produce some vibration. Our goal is to minimize the effect of these vibrations, because while it is undesirable, vibration is unavoidable. The result of excess vibration can vary from nuisance disturbance to a catastrophic failure. Bicycle chassis is a major component in a system. This work involves vibration analysis to determine the key characteristics of a bicycle chassis. The dynamic characteristics of bicycle chassis such as the natural frequency and mode shape were determined by using finite element (FE) method. Al material will replace the conventional MS material. Experimental modal analysis was carried out to validate the FE models. Predicted natural frequency and mode shape were validated against the experimental results. Finally, the modification of the updated FE bicycle chassis model was proposed to reduce the vibration, improve the strength and optimize the weight of the bicycle chassis. Tools used are catiaV5 for 3D modelling, Hypermesh for meshing, and Ansys for post processing.
Read More...
-
Secure and Privacy Preserving Message Authentication with Chameleon Hashing using Proxy Vehicles in Vanets
Athira P J ; Dr. S Dhanabal; Mr. Naveen Raja S M
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 149 - 154
Several services and applications are there in daily life which requires preserving privacy and data security in communications. In Vehicular Ad-hoc Networks to improve the driving comfort and safety of information, the messages are broadcasted regularly. Because of broadcasting of messages without the security and privacy guarantees, the messages can be easily retrieved by the third party. Only the certificate authority should be able to recover vehicle’s real identity when the vehicles are in a dispute event. To overcome this issue chameleon hashing based privacy preserving method is used. This scheme uses an elliptic curve based light weight privacy preserving protocol that exploits dynamic public keys to improve the security and efficiency of VANET communications. Although it is one of the best schemes, it fails to deal with certain issues. One of the main disadvantages is that it is difficult for a single Road Side Unit (RSU) to verify each vehicle’s signature sequentially when a large number of vehicles emerge under the coverage area of an RSU. To reduce this computational difficulty, the proposed scheme uses proxy vehicles which are acting as an intermediate between RSU and vehicles. Proxy vehicles are used to authenticate multiple messages from the requested users using a verification function at the same time. The proposed system improves the total security of the existing system by adding separate secure and private authentication on messages so that the third party cannot access the messages and modify it.
Read More...
-
A Dynamic Source Routing Method For Detecting Black Hole Attacks in MANETS
Rachana Panduranga Gudi ; Savita Patil
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 155 - 157
There are many approaches with regards to the security of the MANET’s and many have been successfully implemented. But there were some issues which failed even after the implementation of so many approaches. Our aim here is to have a warning message stating that there is suspicious node in its route and hence they need to be identified and eliminated. Many algorithms have been proposed to deal with the suspicious nodes and here we are presenting a CBDS algorithm to eliminate the malicious nodes. Here this work not only deals with the suspicious nodes but also with several attacks such as black-hole attacks and gray-hole attacks. We also integrate the proactive and reactive protocols in this mechanism.
Read More...
-
Study on Agile Software Development Methodologies
Shalini Gautam ; Dr. Manoj Kumar
Computer Science and Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 158 - 164
In Today‘s challenging environment it is very much dynamic and organizations are rapidly changing their software requirements to adjust with present environment. Therefore they also need quick delivery of software products as well as for change in the requirements. In case of agile software development approaches, there has been a spectacular importance in the field of software development in recent few years. As a result of the fastness in agile approaches it brings rapid delivery of the final outcome for the life cycle of software development. With respect to the change in numerous areas that have been overblown, there is a need to realize that the components of the agile methodologies are different from the traditional one. In this paper, we have tried to describe the importance of agile software development methodologies and how the agile process can result in increasing the efficiency of the tasks.
Read More...
-
Performance Evaluation of AODV,DSDV and DSR for Avoiding Selective Jamming Attacks in WLAN
Dhaval A. Parikh ; Dr. K. H. Wandra
Computer Engineering
Year: 2016, Volume:3, Issue : 2
Pages: 165 - 174
Jamming is always an issue in wireless network. An internal threat model of wireless network is vulnerable to the selective jamming attacks. In these attacks, the adversary node with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The adversary node is active only for short period of time and selectively targets specific packets of “high†importance by exploiting his knowledge on the implementation details of network that leads network performance degradation. To reduce this attack, we develop an algorithm that prevents real-time packet classification by combining cryptographic primitives with physical-layer attributes. In NS2 simulation environment, we analyze the effects of AODV, DSDV and DSR routing protocol on selective jamming attacks and prevention of these attacks in wireless network by our proposed algorithm. The performance of network analyzed in terms of various performance parameters like packet delivery ratio (PDR), packet loss ratio (PLR), end to end delay (E2E).
Read More...