T R A C K       P A P E R

Login Panel

Close tab

Password Meter

International Journal of Engineering and Advanced Research Technology

Volume 1 Issue 5 (November)

S.No. Title & Authors Page No View
1

Title : New Indices of Risk Assessment for Security in Port Infrastructures

Authors : David Romero-Faz, Alberto Camarero-Orive

Click Here For Abstract

Download Certificate
Abstract :

The risk assessment in infrastructures is present in the daily policy of the different countries all over the world. From the 11th September and the bombings in Madrid and London, the most countries began to consider the international terrorist threat like a real one. Regarding to the port facilities security, in 2003 the International Maritime Organization designed its own methodology to assess the impact of an attack to any port infrastructure. From that moment the different countries implemented in few years this methodology and some countries their own one to assess the risk of an attack to their ports infrastructures. Despite this and may be because of most countries implemented their Protection Plans in their ports very quickly as the result of the risk assessment, there are some aspects which are not really well studied nowadays. After more than ten years with the Protection Plans implemented in the Spanish Port System now there are good statistics of threats to be considered to review the existing methodologies. With the target of improving the knowledge of the real risks and also the scope of the risk assessment in ports, a revision of the main methodologies was taken together with a survey to the Port Security Officers and the analysis of the threats statistics. As the result of the investigation several new indices were defined for risk assessment. Indices like intrinsic risk of the port, intrinsic risk of the type of terminal, the redefinition of accessibility, the layout of the terminal or the operative relevancy that some elements have for port operation.

1-7
2

Title : Review on Performance Evaluation for Cloud Database using Adaptive Encryption Architecture

Authors : Miss. Autade Dhanshri P., Prof. Raut S.Y.

Click Here For Abstract

Download Certificate
Abstract :

For several Internet based application, the new service is required called as cloud database. In cloud database, all information is encrypted for security purpose. Here, we present architecture for adaptive encryption of public cloud database. At design time, there is trade of between data confidentiality level and flexibility of the cloud database structure. Using software prototype, the feasibility and performance of the proposed solution is demonstrated .It is oriented to evaluation of cloud database service in plain and encrypted instances.

8-13
3

Title : Experimental Realization of Fractional order filter using PMMA coated constant phase elements

Authors : Madhab Chandra Tripathy

Click Here For Abstract

Download Certificate
Abstract :

This The basic objective of the paper is to realize a fractional order active filter using fractional order devices (FOD) [1] and study its performance. Low pass, band pass and high pass filter response have been realized.  For this, a KHN type fractional biquad filter [2] has been considered. It requires two fractional order devices of order α and β (0 < α, β ≤ 1). The frequency response of the filter, obtained experimentally has been compared with simulated results using MATLAB/SIMULINK and also with PSpice (cadence PSD 14.2), where the fractional element is approximated with a Domino Ladder circuit [3].

14-17
4

Title : P-Points in the Construction of the Real Line

Authors : Paul Corazza

Click Here For Abstract

Download Certificate
Abstract :

Contemporary constructions of the real number line, via Dedekind cuts or equivalence classes of Cauchy sequences, make no use of infinitesimals. However, using another, lesser known approach, one shows easily that the field of real numbers, in whatever way it is constructed, is distilled from a larger ordered field that includes infinitesimals. In particular,  given any complete, Archimedean, ordered field  and any nonprinicpal ultrafilter U on the set  of natural numbers, one may obtain the complete, non-Archimedean ordered field F =  – where Q is the usual representative of the set of rational numbers in F. Then  may be recovered, up to ordered field isomorphism, by forming the quotient Ffin / I, where Ffin is the set of finite elemnents of F, and I is the ideal of infinitesimals in F. We show in this paper that two natural criteria for deciding whether an element of  is an infiinitesimal are equivalent if and only if the ultrafilter U is a P-point. A P-point is a nonprincipal ultrafilter U with the property that whenever  is a partition of  by sets not belonging to U, there is a  such that  is finite for every  It is known that the existence of P-points is independent of the usual (ZFC) axioms of set theory. This observation shows that undecidable objects and independence results play an essential role in mathematical constructions even as fundamental as the construction of the real line.

18-20
5

Title : Use of index overlay model in the production of groundwater potential map in Kota Kinabalu, Sabah through the Geographic Information System (GIS) method

Authors : Zulherry Isnain

Click Here For Abstract

Download Certificate
Abstract :

Kota Kinabalu is a very fast growing area in the state of Sabah, Malaysia. This enables the rapid development of existing water sources will be more susceptible to contamination and leading to lack of clean water for domestic consumption. This study was conducted with the aim of to generate groundwater potential map of the study area. Geographic Information System (GIS) method were used in this study. There are eleven parameters used in this study, namely rainfall, drainage, soil type, landuse, lithology, lineament density, topography, slope steepness, the ratio of sand and clay, major fault zones and syncline zone. All parameters are combined using index overlay model to produce the groundwater potential map of the study area. This study includes five stages, namely collection and preparation of basic data, data analysis, development of space database, spatial analysis and space integration. The final map of groundwater potential zones in the study area is divided into five classes, which are very low, low, moderate, high and very high.

21-26
6

Title : Flow Characteristics of Viscoelastic Polymer in Microchannel

Authors : Jipeng Zheng, Yulin Ye, Liuying Yan

Click Here For Abstract

Download Certificate
Abstract :

Polymer flooding can not only accelerate the rate of oil production but also improve the efficiency of oil production. The finite volume method is used to study flow characteristics of viscoelastic polymer in microchannel. The results showed that: the displacement efficiency of the viscoelastic polymer is better than that of water. The greater the viscosity of the polymer, the greater the drag force rid of residual oil and the displacement efficiency increases as well. As the polymer’s viscosity increasing, the flow region of concave corner may increase but the retention area of residual oil may be decreased, the spread area of the polymer in the voids increase and the displacement efficiency increases. The results can provide a theoretical basis for oilfield polymer selection and optimization.

27-30
7

Title : Milling Tool Wear Estimation Based on Regression Analysis and Fuzzy Logic Model Using Cutting Power Signals

Authors : Chuangwen Xu , Ting Xu, Jianming Dou

Click Here For Abstract

Download Certificate
Abstract :

In a modern machining system, tool wear monitoring systems are needed to get higher quality production. In precision machining processes especially surface quality of the manufactured part can be related to tool wear. This increases industrial interest for in-process tool wear monitoring systems. For modern unmanned manufacturing process, an integrated system composed of sensors, signal processing interface and intelligent decision making model are required. In this study, regression analysis and fuzzy logic method use the relationship between flank wear and the resultant cutting power to estimate tool wear. A series of experiments were conducted to determine the relationship between flank wear and cutting power as well as cutting parameters. Speed, feed, depth of cutting and cutting power were used as input parameters and flank wear width and tool state were output parameters.  The network model of tool wear is established, so the inherent relation of tool wear and cutting power was reflected indirectly. It is used to cutting parameters to adjust the network part parameters in real-time so that the model has dynamic, real-time and fuzziness. In variable cutting conditions, the result indicated that the tool wear are more sensitive to cutting feed power. Because the processing situation and other factors are of different sensitivity to the model of spindle power and feed power , the further applied the tool wear method, to eliminate the false deduction and the false alarm lied in the single signal , the proposed fusion pattern is better than the single factor cutting power recognition of tool wear in full detection recognition effect. According to the proposed method, the static and dynamic power components could provide the effective means to detect milling tool wear estimation for varying cutting conditions in milling operation.

31-38