Thursday, October 3, 2019

Ethical Hacking

Today's security is that the main downside and every one the work is finished over the net mistreatment knowledge. whereas the information is out there, there square measure many varieties of users who act with knowledge and a few of them for his or her would like it all for his or her gaining data. There square measure numerous techniques used for cover of information however the hacker or cracker is a lot of intelligent to hack the security, there square measure 2 classes of hackers theyre completely different from one another on the idea of their arrange. The one who has smart plans square measure referred to as moral hackers as a result of the ethics to use their talent and techniques of hacking to supply security to the organization. this idea describes concerning the hacking, styles of hackers, rules of moral hacking and also the blessings of the moral hacking. 

by Mukesh. M | Dr. S. Vengateshkumar "Ethical Hacking"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6, October 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd29351.pdf

Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29351/ethical-hacking/mukesh-m

call for paper Gas Engineering, international journal Geological Engineering, ugc approved journals for engineering

To Study Characterstic Behaviour of Recycled Concrete Aggregate

Near about 30 of concrete is produce by concrete industry and it is calculated that in a year 165 million tonnes of concrete is used. Hence, to produce other total sources that are based on waste products, there are many significant incentives. Recycling products are used to produce aggregate Martials for unbound fills, pipe bidding and sub base as the RCA "Recycled Concrete Aggregate" or RCA is not suitable for concrete that is ready to mix because it is blended with another products. Many sites did trials with RCA that mix with ready mix concrete but it was not useful choice. Utilities organizations produce brick, containing stone, clay, Trench arising, asphalt, and concrete but that could be merged in low power concrete which were a cost effective trench product. IN trench reinstatement from RCA formed concrete is used that has 4mm fines and in formed concrete, it has ability to use burner bottom ash. BS 8500 concrete improved the potential for recycling as BS EN 12620. Presently recycled products for concrete is not available but it is a hope that they will be used in future. 

by Nitin Jain | Ashish Verma "To Study Characterstic Behaviour of Recycled Concrete Aggregate"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd29348.pdf

Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/29348/to-study-characterstic-behaviour-of-recycled-concrete-aggregate/nitin-jain

call for paper Food Engineering, international journal Nuclear Engineering, ugc approved journals for engineering

Wednesday, October 2, 2019

Smart Protocol Loading for the IoT

The Internet of Things IoT infuses our everyday life, e.g., in the area of health monitoring, wearables, industry, and home automation. It comprises devices that provide only limited resources, operate in stimulating network conditions, and are often battery powered. To embed these devices into the Internet, they are intended to operate standard events. Yet, these procedures occupy the majority of limited program memory resources. Thus, devices can neither add application logic nor apply safety updates or adopt optimizations for efficiency. This problem will further exacerbate in the future as the further ongoing infusion of smart devices in our environment demands for more and more functionality. To overcome limited functionality due to resource limitations, we show that not all functionality is required in parallel, and thus can be SPLIT in a feasible manner. This enables on demand loading of functionality outsourced as multiple modules to the significantly lesser controlled flash storage of devices. 

by J. Gokul | S. Venkateshkumar "Smart Protocol Loading for the IoT"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6, October 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd29354.pdf

Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29354/smart-protocol-loading-for-the-iot/j-gokul

call for paper Manufacturing engineering, international journal Petroleum Engineering, ugc approved journals for engineering

Internet of Nanothings A Primer

The interconnection of nanodevices with Internet has led to development of a new phase of IoT called Internet of nanothings IoNT . Thus, Internet of nanothings IoNT is essentially the interconnection of nanoscale devices with existing networks. IoNT applications are prevalent everywhere. IoNT has the potential to take medicine, energy, electronics, drug, agriculture, and many other sectors to a whole new dimension. The development of IoNT will have a great impact on almost every field in near future. This paper provides an introduction to the Internet of nanothings, its architecture, applications, benefits, and challenges. 

by Matthew N. O. Sadiku | Nishu Gupta | Sarhan M. Musa "Internet of Nanothings: A Primer"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd29298.pdf

Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/29298/internet-of-nanothings-a-primer/matthew-n-o-sadiku

call for paper Metallurgical Engineering, international journal Information Technology, ugc approved journals for engineering

Tuesday, October 1, 2019

Data Passing with High Security through Non Infected Nodes in Networks

Path based network diffusion kernel is its tenability, that it can consider different number of shortest paths in kernel computation. This resembles, vaguely, a Taylor expansion of network topology to form a diffusion kernel with different orders of expansion. One can extend this key idea to design other network diffusion kernels to approximate other general diffusion models such as SIR the challenge of determining sources is compounded as the true propagation dynamics are typically unknown, and when they have been directly measured, they rarely conform to the assumptions of any of the well studied models. In this paper introduce a method called Network Infusion NI that has been designed to circumvent these issues, making source inference practical for large, complex real world networks. A stateless receiver based multicast RBMulticast protocol that simply uses a list of the multicast members' e.g., sinks' addresses, embedded in packet headers, to enable receivers to decide the best way to forward the multicast traffic. 

This protocol, called Receiver Based Multicast, exploits the knowledge of the geographic locations of the nodes to remove the need for costly state maintenance. The key idea is that to infer the source node in the network, full characterization of diffusion dynamics, in many cases, may not be necessary. This objective is achieved by creating a diffusion kernel that well approximates standard diffusion models such as the susceptible infected diffusion model, but lends itself to inversion, by design, via likelihood maximization or error minimization. We apply NI for both single source and multi source diffusion, for both single snapshot and multi snapshot observations, and for both homogeneous and heterogeneous diffusion setups. We prove the mean field optimality of NI for different scenarios, and demonstrate its effectiveness over several synthetic networks. Moreover, we apply NI to a real data application, identifying news sources in the Digg social network, and demonstrate the effectiveness of NI compared to existing methods. 

by K. Malarvizhi | Prof. P. Parthasarathy | Dr. S. Shankar "Data Passing with High Security through Non Infected Nodes in Networks"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd29387.pdf

Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29387/data-passing-with-high-security-through-non-infected-nodes-in-networks/k-malarvizhi

call for paper Petroleum Engineering, international journal Nanotechnology, ugc approved journals for engineering

Experimental Investigation of the Wear Behaviour of Excavator Bucket Teeth by Hardfacing Technique

An excavator bucket is a connecting part for heavy equipment machinery which is designed and manufactured to be used for work in site excavation, mining and construction sites. Wear associated failure of machinery components number as one of the chief reasons for unproductive working of machines in a diversity of engineering applications. Associated with wear resistant applications in the field, in the last decade hardfacing become an issue of extreme development. Hardfacing is the method of welding consumable electrode having high wear resistance on the bucket teeth. Using DC arc welding process layers of hardfaced material is deposited on the bare bucket teeth. Field trail was conducted for 10 hours in the field. Weight measurement was done before installing bucket teeth on JCB and after the field trail. The difference in weight is analyzed to measure the wear rate of hardfacing material i.e. HAB 90 and bare tooth. Micro hardness of the cross section cutted from the hardfaced samples and un hardened sample was also studied using Brinell Hardness Testing Machine. Scanning Electron Microscopy was done to analyze the morphology of the surfaces of hardened and un hardened surfaces of samples. 

by Ashish Sharma | Sandeep Kumar "Experimental Investigation of the Wear Behaviour of Excavator Bucket Teeth by Hardfacing Technique"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd29368.pdf

Paper URL: https://www.ijtsrd.com/engineering/mechanical-engineering/29368/experimental-investigation-of-the-wear-behaviour-of-excavator-bucket-teeth-by-hardfacing-technique/ashish-sharma

call for paper Nuclear Engineering, international journal Textile Engineering, ugc approved journals for engineering

Saturday, August 31, 2019

Statistical Optimization of Synthetic Soda Ash for Water Softening

Synthesized soda ash was prepared by Solvay process with different molar ratio for application of water softening process. In urban utilization, water supply is very important for safe condition. In this research, Box Behnken experimental design was employed for optimization of soda ash. The maximum yield percent of 19.882 of soda ash was obtained by the reaction salt to ammonium hydroxide to carbon dioxide 1 3 6.8 during the reaction time 90 min. The synthesized soda ash was analyzed by X ray diffraction XRD, Scanning Electron Microscope SEM, Energy Dispersive X ray Fluorescence EDXRF and Fourier Transform Infrared Spectroscopy FTIR. Soda ash obtained from optimum condition was applied in water softening of tap water. According to the experimental results of water softening process, the maximum removal of hardness of water was observed at 3 ml of 10 lime solution with 20 ml of 5 of soda ash solution for 1000 ml of water. After treated the lime soda process, the total hardness of water was reduced to initial condition of 255 ppm to 24 ppm. 

by Su Mon Tun | May Myat Khine | Khin Thidar Cho "Statistical Optimization of Synthetic Soda Ash for Water Softening"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5, August 2019,

URL: https://www.ijtsrd.com/papers/ijtsrd27841.pdf 

Paper URL: https://www.ijtsrd.com/engineering/chemical-engineering/27841/statistical-optimization-of-synthetic-soda-ash-for-water-softening/su-mon-tun

call for paper Nuclear Engineering, international journal Textile Engineering, ugc approved journals for engineering