ePrints@Bangalore University
Not a member yet
    7274 research outputs found

    Influence of Lime Sludge and Sodium Salts on the Strength and Structural Behavior of Clayey Soils–Granite Stone Slurry Dust Composite with Curing

    Get PDF
    This study aims to show the changes in the properties of clayey soils in the presence of granite stone slurry dust and lime sludge collected from granite block sawing mill and sugar industry, respectively. Clayey soils in this study refer to black cotton soil and red earth. The changes in unconfined compressive strength of clayey soils–optimum granite stone slurry dust composite with curing stabilized with lime sludge and in the presence of sodium salts have been emphasized in this study. The unconfined compressive strength of clayey soils–optimum granite stone slurry dust composite increases marginally in the presence of lime sludge and sodium salts for samples tested immediately. However, the increase in strength was significant with curing. The maximum improvement in the strength has been observed in the presence of NaOH. Scanning electron microscope studies reveal the improvement in the structural behavior of the clayey soil–optimum granite stone slurry dust composite in the presence of lime sludge and sodium salts

    Weak Ferromagnetism and Magnetoelectric Coupling through the Spin-lattice Coupling in (1−x) Pb(Fe2/3W1/3) O3-(x) BiFeO3 (x = 0.1 and 0.4) Solid Solution

    No full text
    We report on the structure, spin-lattice and magneto-electric coupling in (1−x)Pb(Fe2/3W1/3)O3-(x)BiFeO3(where x = 0.1 and 0.4) (PBFW) solid solution synthesized through two-step solid-state reaction method. The room temperature (RT) crystallographic studies were carried out using x-ray diffraction and neutron diffraction measurements which show a single-phase Pseudocubic crystal system with Pm-3m space group. Rietveld refinement was carried out to obtain the structural parameters using Fullprof software and the observed structural parameters are in good agreement with the previous reports. Temperature-dependent neutron diffraction measurements reveal the presence of commensurate G-type antiferromagnetic structure. The magnetic structure was analyzed using the propagation wave vector k ∼ ( ) for both the solid solutions. The obtained lattice constants increase linearly and the magnetic moment decrease with temperature, which shows a remarkable anomaly around the magnetic (TN ∼ 405 K for x = 0.1 and 531 K for x = 0.4) transition temperatures. This anomaly clearly indicates the existence of spin-lattice and magnetoelectric coupling. The magnetic susceptibility (ZFC and FC at 500 Oe) and M-H hysteresis loop measurements show spontaneous magnetic moment due to the Fe3+-O2−-Fe3+ superexchange interaction coexisting with the weak ferromagnetism. Bifurcation of ZFC and FC curve reveals the strong anisotropic nature. Astonishingly, magnetic measurements show the non-zero magnetic moment above TN and broadening of the magnetic transition indicates the presence of short-range uncompensated sublattice weak ferromagnetic clusters in the paramagnetic region. The Mossbauer spectroscopy and electron paramagnetic resonance studies exhibit the RT magnetically ordered system and confirm the +3 state of Fe along with the fraction of Fe2+ ions

    A new approach for the numerical solution for nonlinear Klein–Gordon equation

    No full text
    In this article, we generated a new operational matrix of integration using Clique polynomials of complete graphs and also introducing a new numerical technique to solve nonlinear Klein–Gordon equation. These equations describe a variety of physical phenomena such as ferroelectric and ferromagnetic domain walls, and DNA dynamics. We obtain an approximate solution for the nonlinear Klein–Gordon equation using the present method by transforming a system of nonlinear algebraic equations. The proposed scheme is applied to some examples and compared with another method in the literature that demonstrates the effectiveness of this method

    Compressive Behavior of Aluminum Alloy Aa6060 Subjected to Cyclic Extrusion and Compression Process

    No full text
    Cyclic Extrusion and Compression (CEC) is one of the techniques of Implementing Severe Plastic Deformation (SPD) to polycrystalline materials in order to refine the grain size ranging from submicrometer to nanometer level resulting in improved mechanical properties of the material. In this work the influence of Cyclic Extrusion and Compression (CEC) on compressive behavior of Aluminum Alloy AA6060 is studied. The results shows that there is a significant improvement in the compressive yield strength of CEC processed samples compared to sample without CEC processed. It is also noticed that the elastic property increases from 68 MPa to 87 MPa, percentage of reduction in length gets reduces from 79 % to 56% and the compressive yield strength value increases from 210 MPa to 350 MPa at the end of 3rd cycle of CEC process

    Influence of Dy3+ Ion on Physical Properties and Absorption Studies of Zirconium Based Alkali Borate Glasses

    No full text
    Influence of Dy3+ ion on physical and absorption studies of zirconium based alkali borate glasses have been prepared using muffle furnace by conventional melt quench method. Samples were analyzed using certain measurements like XRD and UV-Vis. Physical parameters like density, molar volume were calculated. XRD spectra confirm the amorphous nature of all samples as there is no sharp peaks. Uv-Visible absorption studies were carried out and by utilizing Tauc's equation direct and indirect band gap, Urbach energy was estimated. Energy band gap values are tabulated and discussed in detail for the better understanding

    Numerical Investigation Based on Laguerre Wavelet for Solving the Hunter Saxton Equation

    No full text
    In this paper, we develop a collocation method for solving nonlinear Hunter Saxton equation using a Laguerre wavelet basis method. Properties of wavelets are presented and then used to convert the problem into a system of nonlinear algebraic equations that can be solved. Convergence analysis for the method is presented. Some test problems are introduced and the results are compared with other relevant studies from the literature. It is shown that the presented method is accurate and efficient compared to other methods

    Crupa: Collusion Resistant User Revocable Public Auditing of Shared Data in Cloud

    Get PDF
    Cloud repository is one of the most important services afforded by Cloud Computing where information is preserved, maintained, archived in distant servers and made available to the users over the Internet. Provided with the cloud repository facilities, customers can organize themselves as a cluster and distribute information with one another. In order to allow public integrity auditing on the information stored in semi-trusted cloud server, customers compute the signatures for every chunk of the shared information. When a malicious client is repudiated from the group, the chunks that were outsourced to the cloud server by this renounced customer need to be verified and re-signed by the customer present in the cluster (i.e., the straightforward approach) which results in huge transmission and reckoning cost for the customer. In order to minimize the burden of customers present in the cluster, in the existing scheme Panda, the semi-trusted Cloud Service Provider (CSP) is allowed to compute the Re-sign key. Further, the CSP audits and re-signs the revoked customer chunks by utilizing the Re-sign key. So, it is easy for the CSP by colluding with the revoked customer to find the secret keys of the existing customer. We introduce a novel Collusion Resistant User Revocable Public Auditing of Shared Data in Cloud (CRUPA) by making use of the concept of regression technique. In order to secure the secret keys of the existing customers from the CSP, we have allowed the information proprietor to compute the Re-sign key using the regression technique. Whenever the information proprietor revokes the customer from the cluster, the information proprietor computes the Re-sign key using the regression technique and sends to the CSP. Further, the CSP audits and re-signs the revoked customer chunks using the Re-sign key. The Re-sign key computed by the information proprietor using regression method is highly secure and the malicious CSP cannot find the private information of the customers in the cluster. Besides, our mechanism achieves significant improvement in the computation cost of the Re-sign key by information proprietor. Further, the proposed scheme is collusion resistant, supports effective and secure customer repudiation, multi-information proprietor batch auditing and is scalable

    SAAQ: Secure Aggregation for Approximate Queries in WSNs

    No full text
    Wireless Sensor Networks are vulnerable to communication failures and security attacks. Multipath based aggregation techniques such as synopsis diffusion are proposed to address communication failures. This chapter proposes Secure Aggregation for Approximate Queries in Wireless Sensor Networks (SAAQ) where Message Authentication Codes (MACs) are transmitted along with the synopses that are generated using primitive polynomials. SAAQ ensures data freshness and integrity at a communication cost of O(1). Simulation results show that the SAAQ protocol results in lower energy consumption and communication and computation cost compared to the state-of-art protocols [1, 2]

    Web Page Recommendations Based Web Navigation Prediction

    No full text
    A huge amount of user request data is generated in Web log. Predicting users’ future requests based on previously visited pages is important for Web page recommendation, reduction of latency and on-line advertising. These applications compromise with prediction accuracy and modelling complexity. In this chapter, a Web Navigation Prediction Framework for Web page Recommendation (WNPWR) which creates and generates a classifier based on sessions as training examples is proposed. As sessions are used as training examples, they are created by calculating the average time on visiting Web pages rather than the traditional method which uses 30 min as default time-out. The proposed method uses standard benchmark datasets to analyse and compare our framework with two-tier prediction framework. Simulation results show that our generated classifier framework WNPWR outperforms two-tier

    MCSAAR: Multi-Coefficient Spectrum Aware Based Shortest Anypath Routing in Multi-hop CRNs

    No full text
    Wireless communication technology has grown tremendously with an advancement of better communication quality. It depends on the available spectrum bands but due to increased demand, the spectrum scarcity has become a challenging issue. Recently dynamic spectrum management is proposed as a recommended solution by Federal Communication Commission (FCC) which can enhance the spectrum management. To overcome the identified problem, we look at Cognitive Capacity Harvesting network and develop a multi-hop cognitive radio network routing protocol. The proposed routing protocol Multi-Coefficient Spectrum Aware based shortest Anypath Routing in Multi-hop CRNs (MCSAAR) is designed based on the link quality, energy consumption and trust values for identifying the next-hop. The proposed approach performance is compared against existing anypath routing schemes. The obtained simulation result ensures better efficiency in terms of packet delivery ratio and end-to-end delay

    3,234

    full texts

    7,364

    metadata records
    Updated in last 30 days.
    ePrints@Bangalore University is based in India
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇