Volume 09 Issue 01

2022

 

A Comparative study of inheritance in C++ and Java
Charanpreetkaur | pp: 01-05 | Download Paper | Show Abstract

Abstract: For reusability and achieving run-time polymorphism, Inheritance is one of the most important features of object-oriented programming. Java and C++ both are object-oriented programming languages and support inheritance. However, their way of inheriting classes is different from each other in some aspects. This paper articulates, the comparison of inheritance in java and C++ on the basis of eleven parameters.

separator

Internet of Things (IOT), Its Applications and Future Dependency: A Review
Dakshesh Gupta, Samli | pp: 06-10 | Download Paper | Show Abstract

Abstract: Internet of things is a technology that has become slang in today’s world. Presently the situation is that world without internet cannot exist. So due to lots of its use there are coming more updated technologies to make our life more comfortable. The main aim of this review article is to make the researchers guide through the path of Internet of Things. It will provide a comprehensive overview of this technology its further more updates, advantages, disadvantages and where it is being used presently. There are various types of fields where IOT can be implemented such as Robotics, Industry, Agriculture, Healthcare, Transportation, Smart sustainable cities and many more. In this review paper we discussed the above-mentioned fields about its present state where it is being used and based on that we made some future predictions related to IOT.

separator

ROS and Moveit Based 6 DOF Manipulator
Vineet Prajapati, Dipanshu Shrimali, Vansh Vashist, Akanksha Mishra | pp: 11-14 | Download Paper | Show Abstract

Abstract: In the modern society of 21st century Robotics has been increasingly popular, useful, and successful in the modern world. In a variety of human endeavors robotics has found applications in medical, education, the military, research, and, most notably, manufacturing. Especially manipulators are becoming the utmost important part in any big industries like automobile industries where they are deployed to carry out many tasks repetitively which are very difficult or dangerous for humans. Depending on the number of degrees of freedom robotic arm can have a wide range of motion, depending on the creator’s imagination also. These robot’s base is generally fixed at one place. That base can be moving if it is attached to different mobile robot. Generally, for large assembly lines or work floors they are programmed to do repeating tasks depending on the work required and end effector attached.

separator

Performance and Distance Enhancement of 160 Gbps IsOWC System Using Polarization Division Multiplexed 256-QAM
Kamalpreet Kaur, Baljeet Kaur, Gurjot Kaur Walia | pp: 15-20 | Download Paper | Show Abstract

Abstract: For communication in space, information transmission lines are critical for reaching the whole world. A long delay and a poor data transfer rate has been observed in radio frequency (RF) communication. Intersatellite communication has become more common in recent years and optical wireless communication (IsOWC) has advanced dramatically in recent years. Owing to its multiple advantages, including as large channel bandwidth, high-speed connectivity, and inexpensive cost, IsOWC technology is becoming popular among researchers. Uniphase modulations such as Non return to zero modulation does not have efficient spectrum for high speed inter-satellite communication. 256-Quadrature amplitude modulation (QAM) with polarization division multiplexing (PDM-256-QAM) at 160 Gbps over IsOWC channel is demonstrated in this work using matched filter and Digital signal processing (DSP). Proposed system is investigated for PDM-256-QAM at 1550 nm wavelength and results analyzed in terms of Q factor, log symbol error rate (SER) and Error vector magnitude (EVM). Results reveal that 160 Gbps data is successfully transported over a distance of 22,000 kilometres with a bit error rate (BER) that is acceptable.

separator

Comparison of Cryptographic Algorithms for Wireless Underground Sensor Networks Security
Tanveer Kaur, Simarpreet Kaur | pp: 21-28 | Download Paper | Show Abstract

Abstract: As computer networks, telecommunications, and the Internet become more interconnected and cyber-attacks more sophisticated, it is becoming increasingly critical to ensure privacy, security, authenticity, integrity, availability, and identity of data users. Cryptography is one approach to assure the privacy and security, endorsement, veracity, obtainability, in addition to identity of statistics users, as well as the data protection of data given to the user, as computer networks grow increasingly linked and cyber-attacks become more sophisticated. Cryptographic techniques are employed for data encryption and decryption. Encryption is the conversion of ordinary text into cypher text, which is unreadable by people and machines alike. A comparison of encryption methods for wireless subterranean sensor networks is carried out in this research to examine how well they function when applied to the underground network. Five algorithms were chosen to be employed on the wireless underground sensor network for security analysis after. Data Encryption Standard (DES), Triple DES (3DES), Triple Data Encryption Algorithm (TDEA), Advanced Encryption Standard (AES), Blowfish, in addition to RC4 are the five algorithms judged on their capability to safeguard records, the time it takes to scramble and decrypt data, how each technique manages keys, and how much energy each algorithm expends for encryption and decryption. The performance of the various algorithms changes depending on the inputs.

separator

Tribological studies on the lubrication properties of journal bearing
Arjun Sikka, Nitin Sharma | pp: 29-34 | Download Paper | Show Abstract

Abstract: In rotating machinery, such as turbines and internal combustion engines, journal bearings are commonly utilized. Problems can be prevented and time-to-market can be shortened with the capacity to examine bearing behavior early in the product development process (PDP). The finite difference method (FDM) is used as a numerical technique in this work to create a simulation tool for journal bearings in MATLAB software. The simulation tool may serve as a virtual test rig to examine bearing performance in terms of pressure distribution, fluid film thickness, load carrying capability, and other parameters. The design of bearings is simplified further by this.

separator

Comprehensive Evaluation of Properties of Sands in and around Goa
Saeel Naik Chopdekar, K. G. Guptha | pp: 35-39 | Download Paper | Show Abstract

Abstract: Until recently, river sand was the only fine aggregate widely accepted in the construction industry. This material dominated the industry for a long time. This is supported by literary history. Although researchers were working on alternative materials to replace fine aggregates, it gained traction with the construction industry’s resource crunch. The industry was looking for substitute materials for river sand. The current study delves into the physical properties of available sands in and around Goa. Specific gravity, particle size distribution, form, and surface roughness are all factors that influence the properties of fine aggregates. Mineralogical composition, toughness, elastic modulus, and other factors frequently influence the chemical properties of fine aggregates. The rheological and mechanical properties of concretes and mortars have a significant impact on their compressive strength and durability. Five different sand types were investigated, and their suitability was evaluated using physical and mechanical properties. The materials used in the study include coarse silica sand, fine silica sand, river sand, manufactured sand, and standard (as defined by IS650) sand. The properties are compared to those of standard sand. The construction industry necessitates such a thorough investigation. The extensive data is more applicable to the construction industry. In this study, a comparison of 7-day compressive strength will be carried out for each type of sand.

separator

Structural Performance of Concrete Beams with Hybrid Reinforcement in Flexure
Nazim N, Bharati Raj | pp: 40-43 | Download Paper | Show Abstract

Abstract: In substitution of steel bars, fiber reinforced polymer bars have been utilised in reinforced concrete flexural members owing to their excellent corrosion resistance and strong tensile strength. This paper attempts to study the performance of concrete beams reinforced with a hybrid combination of steel and various fiber reinforced polymer bars. A three-dimensional finite element modeling of beam specimens of 1800x180x300mm was done in ANSYS Workbench (2021R2) and was subjected to a four-point bending test until it failed. An investigation was conducted to analyse the performance of the different types of fiber reinforced polymer bars and steel bars provided in the tension zone using multiple layers. The ultimate moment capacity was about 1.65 times higher for the carbon fiber reinforced polymer bars hybrid combination compared to the steel reinforced beam. Moreover, the reinforced concrete beams reinforced with carbon fiber reinforced polymer bars performed better than other fiber reinforced polymers such as Glass, Basalt, and Aramid fiber reinforced polymer bars. As a result, hybrid reinforcement will be more cost effective. The generated finite element models account for the nonlinear behaviour of the constituent materials between the reinforcing bars and concrete surfaces and can be used to predict the moment capacity and ultimate deflection of reinforced concrete beam using fiber reinforced polymer and steel bars.

separator

A REVIEW ON VIRTUAL LEARNING PLATFORM FOR STUDENTS
Suma K, Bharath Shiruru, Kirana, Deependra Hebbar K, Roshanya S | pp: 44-46 | Download Paper | Show Abstract

Abstract: At present students go through a lot of hustle to find the right study material at right time, this can consume a lot of time & human efforts finding it in traditional manner, as things progressed the mode of learning has evolved as well. From old shelf libraries to E book learning’s but one major problem students still face is the bridge between Students and The Professors due the parting of notes and its updatation in E learning platform, only way to fulfil this drought is E-learning platform.

separator

Review: Seismic Performance in High Rise Structure with Shear Wall Both with and without an Opening
Radhika Hande, V.R. Harne | pp: 47-52 | Download Paper | Show Abstract

Abstract: In the seismic performance of high-rise buildings, Shear walls are one of the most inventive earthquake-resistant design strategies. A shear wall is a vertical element or structure which resists lateral load caused due to wind and earthquakes and can protect buildings from collapse. The shear wall can resist large horizontal forces and support gravity load simultaneously. A shear wall can provide adequate strength and stiffness to the building. In this paper, we have aimed to study various research done for improving the performance of buildings having shear walls with opening and shear walls without opening with different locations, Shapes, Sizes and different parameters like displacement, storey shear, storey drift, stiffness, and bending moment shear force. Earlier work was done on the symmetric building having shear walls with opening and without an opening outline of the project work is a seismic analysis of shear walls with opening and without opening by using the response spectrum method by using software with irregular buildings with different parameters like storey drift, story stiffness, lateral displacement, shear force and bending moment.

separator

Analysis of Anti-Lock Braking System of an Automobile using MATLAB Simulink
Rachit Raj, Prithvi C | pp: 53-58 | Download Paper | Show Abstract

Abstract: In this paper, the analysis of the anti-lock braking system of a four-wheeler is carried out using MATLAB Simulink providing input conditions of the slip factor and vehicle velocity. The different aspects of calculations and analysis have been done MATLAB/Simulink environment. A conventional on-road 4-wheeler is considered for Analytical Modeling. A linear dynamic system of the model is created and accordingly, the mathematical equations are written. The Simulink model corresponding to the equations is made in MATLAB Simulink. The system is simulated under step input conditions to get the desired performance characteristics output.

separator

Modelling and simulation on mechanical behaviour of aluminium hybrid composites
Pankaj Kumar, N. K. Singh | pp: 59-67 | Download Paper | Show Abstract

Abstract: Aluminium hybrid composites (AHCs) are widely used in automobile, aerospace and marine industries due to their good mechanical properties, better damping capacity, outstanding corrosion and wear resistance. These composites are prepared using the commercially available aluminium alloy LM6 as the base alloy, whereas, the dried powders (60-100μm) of Mg, Ti, Cu and SiC as the particulate reinforcement (1:0.5:1:3) through stir casting route. The LM6 alloy is melted in the graphite crucible in an electrical furnace at 8500C where potassium aluminium fluoride is used as the flux to remove slag and to protect from oxidation. The composite is solidified through the gravity die casting process in the form of cylindrical rods and flat sheets, which are used in different mechanical tests (tensile, compression and three-point bending) on electromechanical universal testing machine at low strain rates/speeds. An experimental investigation on the strain rate sensitivity of the hybrid composite is presented under quasi-static tensile (0.001 s-1), compressive (0.001 s-1) and bending/flexural (1-100 mm/min) loads. The material parameters of six mathematical laws (Holloman, Swift, Ludwik, Ghosh, Voce and Hockett-Sherby) are evaluated by curve fitting method based on the experimental data. Finite element simulation is carried out using ABAQUS software. Relative errors in simulation results compared with the experimental results are 7.51% in tension, 0.85% in compression and 4.17% in flexure. The predicted results of Ghosh and Hockett-Sherby models have good agreement with the experimental results.

separator

SD-Divisibility and Some Results on SD Divisor Labeling of Graphs
K. Kasthuri, K. Karuppasamy, K. Nagarajan | pp: 68-70 | Download Paper | Show Abstract

Abstract: Let G with bijection f :V→{1, 2,…, n}, linked to S = f(x) + f(y) and D = |f(x) − f(y)| with each edge xy in E. The labeling f makes on edge labeling f* : E → {0, 1} like for any xy in E, f*(xy) = 1 if D | S and f*(xy) = 0 if D | S. We mean f is an SD-divisor labeling if f*(xy) = 1 for all xy in E. Further, G is SD-divisor if it have SD-divisor labeling. We mean f is an SD-divisor cordial labeling if | ef*(0) − ef*(1)| ≤ 1. Further, G is SD-divisor cordial if it have SD-divisor cordial labeling. In this article, we define SD-divisibility and SD-divisor pair of numbers and establish some of its properties. We also proved some standard graphs are not SD-divisor.

separator

An Efficient System for Worm hole Attack Detection in Manets
Nimisha C.J, Geetha G. | pp: 71-75 | Download Paper | Show Abstract

Abstract: Mobile Ad-hoc Networks (MANETs) are decentralized remote networks that communicate without prior in- frastructure MANET represents Mobile Ad-hoc Network which is likewise called a remote Ad-hoc network that comprises of a bunch of versatile hubs associated remotely in a self- designed, self-recuperating network without having a decent foundation. MANETs are utilized for military applications such as guaranteeing the convenient progression of data. Because of quick and simple organization they are likewise used to lay out correspondence and give salvage administrations after earth- shudders.MANETs are helpless to numerous security assaults as they utilize remote mechanism for correspondence, for example, wormhole assaults. This assault includes at least two than two malevolent hubs and the information bundle from one finish of the vindictive hub is burrowed to the next noxious hub at the other point, and these information bundles are communicated. The wormhole assault initiated when an enemy make a correspondence connect between two far off hubs by catches the bundle from one area of the organization and sends it to unauthorized area of the organization. To produce counterfeit associations, misdirect the authentic way, changing or dropping the sent bundles which will lead in giving a misleading net- work topology. Intrusion identification frameworks are the answer for distinguishing wormhole assaults in MANET.The proposed calculation uses Ad-hoc On-Demand Distance Vector (AODV) directing convention to further develop the recognition strategy.

separator