22 research outputs found
Design and Development of Mono Leaf Spring by using Composite Material (Epoxy-Carbon Fiber)
According to the demand of recent world, the more concentration is on weight reduction in automobiles. The possible weight reductions are wheel assembly, axles, and part of the weight of suspension spring and shock absorbers. The leaf spring accounts for 10-20% of the un-sprung weight. The composite materials made it possible to reduce the weight of machine element without any reduction of the load carrying capacity. Because of composite material\u27s high elastic strain energy storage capacity and high strength-to weight ratio compared with those of steel. FRP spring also have excellent fatigue resistance and durability. But the weight reduction of the leaf spring is achieved not only by material replacement but also by design optimization. Weight reduction has been the focus of automobile manufacturers in the present scenario. The replacement of steel with optimally designed composite leaf spring can provide 75%-78% weight reduction. The material selected is carbon epoxy against conventional steel. The optimization study consists of use of software\u27s such as NASTRAN / ANSYS software. The experimentation on UTM is carried out and results are compared. Moreover, the composite leaf spring has lower stresses compared to steel spring. All these will result in fuel saving which will make countries energy independent because fuel saved is fuel produced
Forensic Document Analysis using Apriori Algorithm
Today, we find a tremendous increase in crimes like ethical hacking, rackets on different domain packets, unauthorized entrance, in the digital world. So, we need to track such unauthorized access. Our forensic document analysis using apriori algorithm provides an approach which is used to find the evidence by analyzing such massive set of documents. In forensic analysis frequently we examine hundreds of thousands of file which is huge amount of data. Here, we group the retrieved documents into the meaningful categories list which is the most central process by using the k-representative algorithm. Hence we are specifying an approach for forensic analysis using document clustering algorithm helpful in police investigation
Outcomes from elective colorectal cancer surgery during the SARS-CoV-2 pandemic
This study aimed to describe the change in surgical practice and the impact of SARS-CoV-2 on mortality after surgical resection of colorectal cancer during the initial phases of the SARS-CoV-2 pandemic
Data Access Management Across Distributed Database Systems
Web-scale data management, especially the available-despite-failures key-value stores in the NoSQL category, a new benchmark YCSB has become accepted. The focus of this benchmark is raw performance and scalability; correctness is not measured or validated as part of the benchmark, and the operations do not fall within transactions (since these systems may not support transactions nor guarantee data consistency). YCSB is actually a flexible framework within which the workload and the measurements can be extended. Our proposed benchmark (called YCSB+T) retains the flexibility of YCSB by allowing the user to implement the DB interface to their database/data store; it allows for additional operations apart from the standard read, write, update, delete and scan; it enables defining workloads in terms of these operations; and most importantly it allows these operations to be wrapped into transactions
A Survey and Comparison on User Authentication Methods
Today security concerns are on the rise in all area such as banks, government organizations, business organizations, educational institute etc. The number of frauds and abuses are literally exploding with the increase use of internet in every field. Among all frauds and abuses, the most serious is the theft of identity which causes grave damage to the victim. The protection of digital identities is getting more and more crucial. The use of password for authentication is no longer sufficient and stronger authentication schemesare necessary factor in keeping security of your system. Authentication scheme is a fundamental and important subject for network security, because it is usually used to protect sensitive and important information to restrict the access of precious resources for legal users only. Several authentication strategies have been proposed, soma of which are very difficult to use and others might not meet company's security concern. So it has become crucial to have in depth knowledge of all authentication schemes so that user can choose best among them as per user's requirement. In this paper we have first studied different types of accounts user can have based on their sensitivity, then we have studied what is authentication
Design, Analysis and Optimization of Brake Disc Made of Composite Material for a Motor Cycle
The most important component in vehicle is suspension system which directly affects the safety performance and noise level. Suspension arm is one of the most important components in the suspension system. It is fitted in various types of the suspensions like Macpherson wishbone or double wishbone suspensions. The lower control arm is a wishboneshaped metal strut that attaches the wheel to the vehicles frame. In order to determine the deformation and stress distribution in the current design the finite element analysis is carried out. The baseline model of the lower control arm is created by using solid modeling software viz. CATIA. ANSYS Workbench is used for Finite Element Analysis This study deals with Finite Element Analysis of the Lower control arm of Mac pherson suspension system
Earthquake Detection And Reporting System
Now a day's large number of people is moving towards the social networking. Twitter is one of the bestexamples of social networking. Twitter is generally categorized as a micro-blogging service, which enables users to send brief text updates. These tweets are processed through twitter search API and crawler and used in real time event detection system such as detecting an earthquake. In proposed system semantic analysis is used to analyze the tweets. Support vector machines (SVMs) are used for classification, regression and outliers detection. The occurrence of event detection is done by spatiotemporal model by treating each twitter user as a sensor value. For the purpose of location estimation, an algorithm is used which is based on the tweet content similarity and the location transition history of twitter user
A Review on Wheat Disease Detection Using Image Processing
The presented work represents review of the existing literature and scientific works carried out by the the researchers worldwide in the area of wheat disease detection by using image processing method