65 research outputs found

    Analysis of TIG Welding Process on Mechanical Properties and Microstructure of Aa6063 Aluminum Alloy Joints

    Get PDF
    Present work pertains to testing of mechanical properties and microstructure of AA 6063 Aluminium alloy joints by Tungsten inert gas (TIG) welding. By varying weld current and maintaining all parameters constant hardness, impact and tensile strength of the welded joints are tested and finally, microstructure details are analyzed. The results showed mechanical properties linearly varies with increase in weld current

    Schema Mapper: A Visualization Tool for DL Integration

    Get PDF
    Schema mapping is a challenging problem. It has come to the fore in recent years; there are important applications like database schema integration and, more recently, digital library merging of heterogeneous data. Previous studies have approached the schema mapping process either from algorithmic or visualization perspectives, with few integrating both. With Schema Mapper we demonstrate a semi-automatic tool for schema integration that combines a novel visual interface with an algorithm-based recommendation engine. Schemas are visualized as hyperbolic trees (see Fig. 1), thus allowing more schema nodes to be displayed at one time. Matches to selections are recommended to the user, which makes the mapping operation easier and faster

    Integration of Heterogeneous Digital Libraries with Semi-automatic Mapping and Browsing: From Formalization to Specification to Visualization

    Get PDF
    In this paper, we formalize the digital library (DL) integration problem and propose an overall approach based on the 5S framework. We apply 5S to domain-specific (archaeological) DLs, illustrating our solutions for key problems in DL integration. We use ETANA-DL as a case study to describe the process of semi-automatically generating a union catalog and a unified browsing service in an archaeological DL. A visual schema mapping tool is developed for union catalog creation. A pilot user study aids tool evaluation. Our approach is further validated through application of a general browsing component to two integrated DLs

    DESIGN AND IMPLEMENT OF WIRELESS SENSOR STREET LIGHT CONTROL AND MONITORING STRATEGY ALONG WITH GUI

    Get PDF
    As of late improving the lattice unwavering quality amid the top moment is picked up a great deal of considerations. Also, utilizing renewable vitality frameworks to nourish remote regions which are not wanted to be encouraged from the utility since they are a long way from it is an another objective of numerous scientists. One out of these heaps is the road lighting particularly. In this manner, this paper proposes a standalone sunlight based vitality free framework for road lighting as there is no force requested from the matrix. The proposed framework comprises of a PV board, stockpiling framework, LED light, control molding framework (PCS) and the controller which can deal with the force bearing and framework operation. Utilizing LED as a part of lighting applications has numerous focal points contrasted with other light. It is extremely proficient (high productivity lighting source) and financially savvy (the life time is long contrast with different lights). In augmentations to, it needs low dc voltage source to be worked. The capacity framework will be charged amid the day time utilizing the accessible daylight. Then again, amid the evening time the controller will give a sign to the framework to associate the LED light to be prepared for use. Subsequent to the LED needs a low dc voltage to be worked, so a basic dc-dc converter will be sufficient for this framework bringing about diminishing the expense of the general framework. Chosen of recreation results have been given to approve the proposed framework

    Effect of potential bioinoculants and organic manures on root-rot and wilt, growth, yield and quality of organically grown Coleus forskohlii in a semiarid tropical region of Bangalore (India)

    Get PDF
    Based on earlier results obtained in pot experiments, 2-year field experiments were conducted with five bioinoculants and neem cake under organic field conditions (with vermicompost as a nutritional supplement) to evaluate their potential to control root-rot and wilt (a complex problem involving Fusarium chlamydosporum and Ralstonia solanacearum) of the medicinal plant Coleus forskohlii. Plants treated with arbuscular mycorrhizal fungus (Glomus fasciculatum), neem cake or Pseudomonas fluorescens showed significantly increased plant height (15-31%), plant spread (25-33%), number of branches (63-67%) and dry root (129-200%) yields, and reduced disease incidence (47-50%) compared to controls. Increases in yields were reflected by increases in N (51-81%), P (17-76%) and K (44-74%) uptake. The forskolin content of the roots was found not to be affected by any of the bioinoculants, but forskolin yield (calculated) was increased significantly by treatment with G. fasciculatum (227%), neem cake (222%) or P. fluorescens (159%)

    Effect of angiotensin-converting enzyme inhibitor and angiotensin receptor blocker initiation on organ support-free days in patients hospitalized with COVID-19

    Get PDF
    IMPORTANCE Overactivation of the renin-angiotensin system (RAS) may contribute to poor clinical outcomes in patients with COVID-19. Objective To determine whether angiotensin-converting enzyme (ACE) inhibitor or angiotensin receptor blocker (ARB) initiation improves outcomes in patients hospitalized for COVID-19. DESIGN, SETTING, AND PARTICIPANTS In an ongoing, adaptive platform randomized clinical trial, 721 critically ill and 58 non–critically ill hospitalized adults were randomized to receive an RAS inhibitor or control between March 16, 2021, and February 25, 2022, at 69 sites in 7 countries (final follow-up on June 1, 2022). INTERVENTIONS Patients were randomized to receive open-label initiation of an ACE inhibitor (n = 257), ARB (n = 248), ARB in combination with DMX-200 (a chemokine receptor-2 inhibitor; n = 10), or no RAS inhibitor (control; n = 264) for up to 10 days. MAIN OUTCOMES AND MEASURES The primary outcome was organ support–free days, a composite of hospital survival and days alive without cardiovascular or respiratory organ support through 21 days. The primary analysis was a bayesian cumulative logistic model. Odds ratios (ORs) greater than 1 represent improved outcomes. RESULTS On February 25, 2022, enrollment was discontinued due to safety concerns. Among 679 critically ill patients with available primary outcome data, the median age was 56 years and 239 participants (35.2%) were women. Median (IQR) organ support–free days among critically ill patients was 10 (–1 to 16) in the ACE inhibitor group (n = 231), 8 (–1 to 17) in the ARB group (n = 217), and 12 (0 to 17) in the control group (n = 231) (median adjusted odds ratios of 0.77 [95% bayesian credible interval, 0.58-1.06] for improvement for ACE inhibitor and 0.76 [95% credible interval, 0.56-1.05] for ARB compared with control). The posterior probabilities that ACE inhibitors and ARBs worsened organ support–free days compared with control were 94.9% and 95.4%, respectively. Hospital survival occurred in 166 of 231 critically ill participants (71.9%) in the ACE inhibitor group, 152 of 217 (70.0%) in the ARB group, and 182 of 231 (78.8%) in the control group (posterior probabilities that ACE inhibitor and ARB worsened hospital survival compared with control were 95.3% and 98.1%, respectively). CONCLUSIONS AND RELEVANCE In this trial, among critically ill adults with COVID-19, initiation of an ACE inhibitor or ARB did not improve, and likely worsened, clinical outcomes. TRIAL REGISTRATION ClinicalTrials.gov Identifier: NCT0273570

    Homomorphic Encryption: Working and Analytical Assessment : DGHV, HElib, Paillier, FHEW and HE in cloud security

    No full text
    Context: Secrecy has kept researchers spanning over centuries engaged in the creation of data protection techniques. With the growing rate of data breach and intervention of adversaries in confidential data storage and communication, efficient data protection has found to be a challenge. Homomorphic encryption is one such data protection technique in the cryptographic domain which can perform arbitrary computations on the enciphered data without disclosing the original plaintext or message. The first working fully homomorphic encryption scheme was proposed in the year 2009 and since then there has been a tremendous increase in the development of homomorphic encryption schemes such that they can be applied to a wide range of data services that demand security. All homomorphic encryption schemes can be categorized as partially homomorphic (PHE), somewhat homomorphic (SHE), leveled Homomorphic (LHE), and fully homomorphic encryption (FHE). Each encryption algorithm has its own importance and usage in different realms of security. DHGV, Paillier, HElib, and FHEW are the algorithms chosen in this study considering their wide usage and scope for further advancement in this subject area. A public-key algorithm named RSA is also chosen for comparison of the impact of HE and PKE (Public-key encryption) algorithm on the CPU and Memory. The utilization of various homomorphic schemes and concepts in the trending cloud storage systems is a prevailing field of research and can be expanded further by knowing the current state-of-the-art of homomorphic encryption. Hence, the necessity of comprehending the knowledge of homomorphic encryption schemes and their aspect in cloud security becomes vital. Objectives: The objective of this study is to analytically assess homomorphic encryption and various homomorphic encryption schemes. A comprehensive investigation on working and performance of the selected HE schemes is another objective of this research. Also, an experiment to run publicly available libraries of DGHV, Paillier, HElib, and FHEW is one of the main objectives. In addition to these, comprehending the impact of HE and PKE on CPU and Memory is also among the objectives of the study. The role and practice of homomorphic encryption in the cloud storage system are among the secondary objectives of this research in terms of securing confidential data. These objectives are set based on the research gap identified by conducting an exhaustive literature review. Methods: The objectives of this study are achieved by adopting the methods exhaustive literature review and experiment. Scientific databases such as IEEE Xplore, ACM Digital Library, Inspec, Springer Link etc. are used and literature is accordingly selected based on the relevance to the research topic. An exhaustive literature review is conducted and extensive bibliographic research is done to accomplish the objective of comprehending the working, applications, significance of homomorphic encryption. Apart from literature review, bibliographic research, an experiment is also conducted to run the publicly available homomorphic encryption libraries to evaluate, compare, and analyze the performance of DGHV, Paillier, HElib, and FHEW schemes. Experiment to run publicly available PKE algorithm is also conducted. Finally, the conclusion and outcome by adopting these research methods for accomplishing the objectives are theoretically presented in detail. Results: By conducting an exhaustive literature review, the importance, working, application of homomorphic encryption and its schemes is discerned. And by conducting an experiment, the impact of HE and PKE is also discerned. Apart from this, the limitations of HE and selected HE schemes along with the distinction between public and private key cryptography is understood by finding and mapping in connection with each other. From the experiment conducted, it is examined that despite the encryption libraries being publicly available for use, the possibility of running and employing few libraries successfully is remarkably low inferring that there is much improvement needed in this cryptographic discipline. Conclusions: From this research, it can be concluded that homomorphic encryption has a wide scope of extending towards efficiency and application in various fields concerned with data protection. It can also me concluded that the experimental assessment of state of the art of few HE schemes libraries that are available online are remarkably impractical for real-time practice. By analyzing the selected ii schemes, it can be concluded few HE schemes do not support any other operations on encrypted data other than addition and multiplication due to which chances of increasing noise for each encryption is relatively high. From the experiment conducted for Paillier encryption (HE) and RSA (PKE) encryption, it is concluded that both the schemes increase linearly with an increase in the input size when CPU and Memory utilization is measured. Apart from these conclusions, it can also be inferred that not all the homomorphic encryption algorithms are IND-CCA1 and IND-CCA2 secure. From this study, it can be deduced that more empirical validation and analysis of HE algorithms is required in terms of their performance and security. In order to address these problems, much research and improvement are required as it inferred from the results of this research that Homomorphic encryption is still in its early stage of development and enormous utility can be anticipated when enhanced correctly

    A holistic study of on-chip interconnect technology: From modeling theory to physical design of semiconductor ICs

    No full text
    The objective of this research is to present a holistic study of the on-chip copper interconnect technology, from interconnect modeling to their manifestation in modern design implementations in the advanced technology landscape. With technology scaling, interconnects have become critical to optimal design and technology enablement; therefore, interconnect analysis and optimization is of utmost importance. Cu/low-k interconnects are studied in physical designs based on high-performance FinFET in the advanced technology nodes. While severe size-effects of copper rapidly increase wire resistance, FinFET technology further magnifies its contribution to the circuit delay. An alternate interconnect sizing is proposed that alleviates wire resistance at the cost of wire capacitance. This wire sizing proposal is demonstrated to improve the circuit performance upto 2x. Furthermore, lithography regimes utilized to pattern advanced interconnects (e.g., LELE and SAQP) induce large variability in interconnect resistance. A novel hybrid patterning regime is proposed, to reduce the variability in interconnect resistance and improve circuit yield. An optimal interconnect design is deduced for low-power designs based on the FDSOI and TFET architectures at the advanced process nodes. In particular, the circuit performance and power is optimized. The circuit study of TFET technology at the physical-design level reveals that these circuits are less impacted by the interconnect resistance problem and more sensitive to interconnect capacitance. A popular interconnect modeling regime based on Rent's rule is re-evaluated for its applicability to system-level modeling of modern designs in the advanced technology landscape. The historical Rent's methods are found to be inaccurate, and a modernized Rent's model is proposed to capture the rapidly evolving facets of VLSI design. Modernized Rent-based interconnect models are derived to exhibit improved calibration with data from a suite of commercial processors, forming a strong foundation for faithful design and technology benchmarking and pathfinding.Ph.D

    Implementation of IIOT technology in welding robots for improving connectivity and enhancing productivity

    No full text
    In the prevailing industrial revolution, most industries are on the path towards the digitalization journey. To incorporate several digital technologies in the organization data reliability and accuracy act as key enablers. To achieve the set goals, the connectivity of the machines is considered a prominent endeavour. Such connectivity can be achieved by implementing IIOT technology, the connected IIOT architecture enables interoperability, where the computerized machine can seamlessly communicate and transfer information among them. The purpose of this study was to examine the potential impacts of integrating IIOT into the organizational framework and further explore the advantages gained in terms of productivity and maintenance. This intended study concentrated on the welding department in VCE and prioritized specific robots for the research. In addition, to improve the connectivity and visualize the data a customizable dashboard was created to facilitate real-time tracking of the robots and an alert system was developed to notify the problems in real-time. To carry out the study this research was intended to use a particular IIOT software Thingworx from the PTC community. The research was carried out with extensive interviews and personal observation on the shop floor following a qualitative analysis methodology. Through the interviews, the prioritized entities were focused and based on the end user’s requirement the selected data tags were visualized. Furthermore, the findings from the research were analyzed and discussed on how IIOT technology could potentially benefit an organization is presented.I den rådande industriella revolutionen är de flesta industrier på väg mot digitaliseringsresan. Att införliva flera digitala teknologier i organisationen fungerar datatillförlitlighet och noggrannhet som viktiga möjliggörare. För att uppnå de uppsatta målen anses maskinernas anslutningsmöjligheter vara en framträdande strävan. Sådan anslutning kan uppnås genom att implementera IIOT-teknik, vilket möjliggör interoperabilitet, där den datoriserade maskinen sömlöst kan kommunicera och överföra information mellan dem. Syftet med denna studie var att undersöka de potentiella effekterna av att integrera IIOT i det organisatoriska ramverket och ytterligare utforska fördelarna som uppnåddes i termer av produktivitet och underhåll. Denna tilltänkta studie koncentrerade sig på svetsavdelningen i VCE och prioriterade specifika robotar för forskningen. För att förbättra anslutningen och visualisera data skapades dessutom en anpassningsbar instrumentpanel för att underlätta realtidsspårning av robotarna och ett varningssystem utvecklades för att meddela problemen i realtid. För att genomföra studien var denna forskning avsedd att använda en speciell IIOT-programvara Thingworx från PTC-gemenskapen. Forskningen genomfördes med omfattande intervjuer och observation på verkstadsgolvet enligt en kvalitativ analysmetodik. Genom intervjuerna fokuserades de prioriterade enheterna och baserat på slutanvändarens krav visualiserades de valda datataggarna. Vidare har resultaten från forskningen analyserats och diskuterats om hur IIOT-teknik potentiellt skulle kunna gynna en organisation
    corecore