Engineering Management articles list

Application of artificial neural networks in predicting sub-base cbr values

Establishing a realistic working profile of soil properties has been, and is still, one of the most challenging problems facing Geo-technical engineers, especially for CBR results. In the present study a neural-network approach is used to tackle this problem. Source data of a series of California Bearing Ratio Tests (CBR) performed at the Laboratory and Geo-technical Experimental Site. This will be useful for training and testing an artificial neural network. The developed neural network will be showing the prediction of CBR values of the site studied. Data are then generated for constructing the profiles of the CBR values using the trained neural network. This study might be useful for the future as this process will reduce the work on procedure and graphical calculations.

Mayura

Geotextile can be worth their cost in pavement

Geotextiles have been successfully used for reinforcement of soils to improve the bearing capacity. In this study geotextile as a tensional material have been used for reinforcement of granular soils. Laboratory California Bearing Ratio (CBR) tests were performed to investigate the load-penetration behavior of reinforced soils with geotextile. Samples of granular soil are selected and tested without reinforcement. Then CBR tests were performed by placing geotextile in one or two layers at various depths in soil sample. The effect of the number of geotextile on the increase in bearing capacity of reinforced granular soil is discussed.

Mayura

The importance and relevance of an innovative approach to management decision-making processes

It is not possible to imagine the modern world without the product of innovation and the new evolutionary development that they bring. Many researchers believe that innovation is now the driving force behind economic and social development. In this regard, the main objective of this research is to identify the factors based on the use of the international experience that shapes the economic model of innovative development and make recommendations for the economy of Uzbekistan, to ensure the timely and high-quality performance of certain types of human society, and also study of the affective impact of high technologies as a solution and consumption on management decisions, to critically assess existing problems, to make scientific predictions for prospects. This is because the macroeconomic indicators of many leading countries in the field of innovation development, the effective functioning of financial networks, the quality and level of living of the population are inextricably linked to innovative decisions.

Ikboljon Odashev Mashrabjonovich

Performance analysis of first order digital sigma delta adc

Ever-growing era of mobile and personal wireless networks, motivated research in several fields of engineering resulted in low power and low cost consumer products. The voice band processing required in mobile applications demand for architectures, which can easily be integrated in single chip SoC applications. The conventional approach is to have a dedicated IC outside the digital ICs to perform analog to digital conversion. The motivation of single chip radios demand for integration of such ADC modules on digital cellular related ICs. Mixed signal design is very challenging and hence usually it is preferred to have separate ADC chip before the ASIC/FPGA. In this paper we present a digital sigma delta ADC architecture, which can perfectly be integrated in any digital IC with a targeted sampling rate of 20 kS/s with more than 80 dB dynamic range.

P.A. Harsha Vardhini

Analysis on digital implementation of sigma-delta adc with passive analog components

Sigma-Delta (SD) analog to digital converters (ADCs) have several advantages over the nyquist rate type ADCs. The linearity over high dynamic range makes the SD ADCs an ideal choice for voice and precise instrumentation applications. The SD-ADC architecture is well established and analyzed [5, 6]. It is heavily based on digital processing and provides a high resolution, low noise output with very low analog implementation effort. The technique of sigma delta ADC is in practice from several decades. The feature of digital dominated design of SD-ADC makes it different from other types of ADCs. As the technologies are evolving, new realization methodologies are emerging for realizing SD-ADC. The conventional approach of realizing an ADC as a separate ASIC and providing the interface to digital IC (either Microprocessor or FPGA) for providing mixed signal processing platform has following limitations.

P.A. Harsha Vardhini

Optimum decimation and filtering for reconfigurable sigma delta adc

The Sigma Delta Analog to Digital Converter (SD-ADC) with passive analog components is presented. The digital blocks required for creating the samples with required sample rate and word length from the 1 bit ADC output are presented. The digital filters are initially modeled in MATLAB Simulink and validated in frequency domain. Further they are synthesized to Xilinx Spartan-6 FPGA technology. The synthesis results report clock speeds up to 300MHz. The simulation results are used to validate the principle and verify the performance of SD-ADC. The results demonstrate a promising technology area of realizing SD-ADC as a reconfigurable block on FPGA to meet several signal processing applications with sampling rates up to few hundreds of KHz

P.A. Harsha Vardhini

Social big data: a twitter text mining approach to the communication of universities during the lebanese protests

Since October 17, 2019, Lebanon has experienced unprecedented popular protests, demanding the departure of the entire political class, accused of being gangrened by corruption. Country paralyzed, institutions closed for more than two weeks, the eyes are turned to universities that have closed their doors but whose community (teachers and students) actively participate in the national jump. This study explores the use of social media by universities in Lebanon during the national revolution using social big data technology on Twitter in comparison to the national usage of twitter. Important information was collected, analyzed and visualized using the R language.

Katia RAYA

The effect of moisture content on the performance of melkassa multicrop thresher in some cereal crops

The threshing quality of the machine was affected by moisture content. This parameter was one of the main causes of production losses. In Ethiopia, this problem was highly observed in the farm area during threshing. Therefore, the main aim of this research was, to minimize production losses during threshing by reducing the effect of moisture content on the crop, to improve threshing capacity, threshing and cleaning efficiency, to reduces fuel consumption, and to minimize grain damage by the machine during threshing. The experiment was done at four-time replication in the moisture level of 14%, 18%, and 22% for three selected cereal crops (barley, wheat, and tef) with a completely randomized design (RCBD) and 4 replicates as-block giving 12 total experimental units. Crop moisture content, size of the grain, sphericity, angle of repose, density, thousand-grain mass and coefficient of friction as well as threshing capacity, threshing efficiency, cleaning efficiency, germination rate, fuel consumption, and grain breakages were the parameters used to evaluate the performance of the thresher. Threshing capacity, threshing and cleaning efficiency, and density of grains showed decreased, as moisture content of crops increased. The other parameters mentioned above were increased with moisture content. A combined mean analysis of variances on the performance of thresher was significant at (p 0.05). The recommended amount of moisture content in this study was 14% because the result obtained by 14% moisture level was preferable to other moisture levels. At 14% of moisture content, the threshing capacity was (208.750, 285.45 and 68.181) kg/hr, threshing, and cleaning efficiency (%) were (98.603, 99.330 and 99.49 and 97.101, 98.22 and 93.731 respectively). Percentage of germination rate was (94.25, 94.50, and 91.25) and the amount of fuel consumption was also (1.14, 1.72, 1.70) l/hr., for barley, wheat, and tef crops respectively.

Dessye

A comparative study of social and economic aspect of migration

India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.

Ekta Meena

A comparative study of social and economic aspect of migration

India is a country of immense diversity. It is home to people of many different racial, languages, ethnic, religious, and national backgrounds. Groups of people in India differ from each other not only in physical or demographic characteristics but also in distinctive patterns of behavior and these patterns are determined by social and cultural factors like language, region, religion, and caste. Apart from behaviour, economic development, level of education and political culture of the people in various social segments differ from region to region. More you can say that economy and cultures have been enriched by the contributions of migrants from round the globe. In an increasingly globalised world, migratory movements is continuously shaping the countries all over the world. Some countries like India and Ireland, which set the example of economic development and social integration, have the positive impact of the migration by globalisation and some countries like USA, which recently witness racism, xenophobia and discrimination have the negative impact on the migrants. It does not mean India do not face fragmentation and USA do not have cohesion. USA have many stories which show successful integration process, that facilitated the lives of immigrant communities, but being a developed country it still suffers from cultural alienation. In these countries, borders are built within borders to create cultural divides that do not allow people to integrate. Recently, this problem has become more prominent due to the rise of terrorism, clash of cultures in the world, leading to the glorification of stereotypes. People are becoming less accepting towards anyone who does not belong to their region. Migration does not stop after people move from one place to another place. The main question start after that ‘now what’ they will do. That is why this topic needs to be discussed thoroughly in order to find better solutions. This paper will begin with an analysis of different approaches to Migration, discuss the target groups for integration policies, provide indicators of the current situation of migrants and proceed to an analysis of integration tools: legislation, social policies and participatory processes. It will focus not only on the impact of migration but also on social integration, mix culture like indo-western culture in a comparative basis.

Ekta Meena

Study of temperature variation in human peripheral region during wound healing process due to plastic surgery

In this paper, investigations are made to analyze the human body temperature during wound healing process due to surgery. Wound is considered after the skin graft. Skin graft is a technique used in plastic surgery. Skin is the first line of defense between the human and environment, it is very susceptible to damage. Internal body or core temperature (Tb) is one of the clinical vital signs along with pulse and respiratory rates. Any disturbance in body temperature will drive complexities in wound healing process. These studies are important in the mechanism of establishing the limits of thermal regulation of human body during the healing process in different situations and conditions. The Finite element method is used to analyze tissues temperature for normal tissues (donor site) and abnormal tissues (tissues after surgery). Appropriate boundary conditions have been framed. Numerical results are obtained using Crank Nicolson Method.

Manisha Jain

A pervasive multi-distribution perceptron and hidden markov model for context aware systems

Fueled by the recent advancements in pervasive environment, affluent context aware systems is among the rousing in computing today, including embedded environment, different wireless network technology, electronic communication and so on. Context-Aware Collaborative Filtering using Genetic Algorithm approach resulted in an improved mobile business model by determining optimal similarities between contexts. In this work, we plan to devise a hybrid framework called Multi-distribution Perceptron and Hidden Markov Model to smoothen the mobile networks with different degrees of context- confidence. Initially, Multi-distribution Layer Perceptron Model is designed aiming at improving the precision rate with the aid of Multi-distribution Bayesian Posterior measure. Experimental analysis shows that the M-PHMM framework is able to reduce the computational complexity for obtaining user patterns by 26.05% and improve the precision rate by 18.90% compared to the state-of-the- art works.

Dr H Shaheen

An improved scheme for organizing ecommercebased websites using semantic web mining

In the running of the Internet world, Ecommerce industry has its own benchmark in terms of its rapid growth and has made itself an established sector that is indispensable for every industry to trade and do transactions online. As the world is rushing in a rapid manner, India is slogging in the improvisation of the online market, leading to the lack of customized needs of the customers. Bigger companies are trying to put in a different strategic approach taking that into consideration an approach of blended emining along with ecommerce has been devised. It would be a design of the semanticand neuralbased page ranking algorithm [2]. This tool upon launching would be a welldefined approach for ecommerce website ranking [1]. It would also facilitate the customers to find the relevant websites on the top of the page during their search for any particular product orbusiness. It would be further customized with all the relevant comparison of the other websites in terms of the product quality and price.

Dr H Shaheen

Secured data transmission in vanet using vehicular digital hash gen model

Vehicular adhoc structures (VANETs) handle the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs) for their security. In any PKI structure, the check of a got message is performed by checking if the check of the sender is joined into the current CRL, Verifying the reliability of the certification and standard for the sender. In this paper, it has been propose a Vehicular Digital Hash Gen show up (VDHG) for VANETs, which replaces the dull CRL checking process by a profitable revoking checking process. The renouncing check process in VDHG uses a Private Key Infrastructure (PKI), where the key used in finding the VDHG is shared particularly between On-Board Units (OBUs). In like manner, VDHG uses a novel probabilistic key stream, which extras with OBUs to trade and revive an issue key. VDHG can on a very basic level lessen the data torment in light of the message declaration deferral pulled back and the standard assistance structures using CRL

Dr H Shaheen

An integrated perspective crucial research issues in noc router design

A new reliable high throughput NOC router design is proposed with FSM based smart arbiter module for 4X4 Mesh architecture. This design is based the XY routing algorithm with prioritized round robin arbitration and synthesis of the proposed design is done on Spartan III FPGA. An enhanced work is also done in this paper to explore the drawbacks of the exceptional techniques of the existing generation and to research the scope for overall performance improvisation of the NoC designing

Trupti Patil

Legitimate-path formation for aodv under black hole attack in manets

Mobile Ad-hoc Network (MANET) owing to their very open characteristics are being very attractive and adaptive. With the openness comes security issues to be dealt. The most usual attack in mobile ad-hoc network is the black-hole attack. It advertises false path as shortest and newest to the destined node. On gathering packets containing data will drop them and does not send it to the destination. This paper proposes an algorithm to overcome such an attack under Ad-hoc On-demand Distance Vector (AODV) routing protocol in MANETs. The proposal aims to detect and avoid black-hole attack by using the parameters of AODV routing protocol in its enhanced form of route recovery. The proposed algorithm has two different scenarios, where first comes the detection then the avoidance. The simulation results are obtained from NS -2 to authenticate the effectiveness of proposed technique in comparison with the existing protocols in the existence of black-hole attack with respect to change in simulation end time and active number of attackers. The implementation is assessed based on delay, delivery ratio, drop, overhead, throughput and packet forwarding ratio. The results obtained from network simulator are mapped to form a dataset, which is then validated on a modelled fuzzy inference system using MatLab software.

Fahmina Taranum

Modelling and analytical proofing of low energy temperature control using earth/ground water heat exchanger

For given condition of (temperature and humidity) of suction air, the delivery air condition depends on the system parameters (depth, radius, length and air mass flow rate), thermo physical properties of the surrounding earth (thermal conductivity and specific thermal capacity) and earth surface environment (ambient temperature, ambient humidity and solar irradiance)[1,3].Sensitivity analysis of system performance is essential for understanding the relative importance of different parameters of design of a optimum system [2,5]. For the steady state periodic input air condition and the performance of the system can be measured in terms of heating potential during the winter period and cooling potential during the summer period. Sensitivity of the system performance parameters (heating potential in winter and cooling potential in summer) to the changes in system parameters or thermo physical properties of the surrounding earth has been analysed and the result is present is in this paper.

Dr H Shaheen

Effective key management in dynamic wsn

Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose a certificateless-effective key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol also supports efficient key revocation for compromised nodes and minimizes the impact of a node compromise on the security of other communication links. A security analysis of our scheme shows that our protocol is effective in defending against various attacks.We implement CL-EKM in Contiki OS and simulate it using Cooja simulator to assess its time, energy, communication, and memory performance.

Dr H Shaheen

Blue brain technology

How great would it be if you never forgot anything or never lost the ability to think and be creative? And just imagine how much more great it would be if your brain can be reconstructed so that it can stay young forever and be used to create wonders even after your death? It would be a great leap in the field of science if the brains of great minds like Steve Jobs or Albert Einstein can be recreated. That is exactly what the blue brain does. The blue brain project is an attempt to reconstruct the brain piece by piece and building a virtual brain in a supercomputer. It began in 2005 with an agreement between the EPFL and IBM, which supplied the Blue Gene/L supercomputer acquired by EPFL to build the virtual brain. The computing power needed is considerable. Each simulated neuron requires the equivalent of a laptop computer. A model of the whole brain would have billions. Supercomputing technology is rapidly approaching a level where simulating the whole brain becomes a concrete possibility. The main aim is to update the brain into a computer. As a first step, the project succeeded in simulating a rat cortical column. Efforts are now being made to simulate the human brain. In five years of work, Henry Mark ram’s team has perfected a facility that can create realistic models of one of the brains essential building blocks. This process is entirely data driven and essentially automatically executed on the supercomputer. This modeling will expand to all the areas of the brain and if successful, shed light on the relationships between genetic, molecular and cognitive functions of the brain. These models will be basic building blocks for larger scale models leading towards a complete virtual brain.

Dr H Shaheen

Metapuf: a challenge response pair generator

Physically unclonable function (PUF) is a hardware security module preferred for hardware feature based random number and secret key generation. Security of a cryptographic system relies on the quality of the challenge-response pair, it is necessary that the key generation mechanism must unpredictable and its response should constant under different operating condition. Metastable state in CMOS latch is undesirable since it response becomes unpredictable, this feature used in this work to generate a unique response. A feedback mechanism is developed which forces the latch into the metastable region; after metastable state, latch settle to high or state depends on circuit internal condition and noise which cannot be predicted. Obtained inter hamming variation for 8 PUF is 51% and average intra hamming distance is 99.76% with supply voltage variation and 96.22% with temperature variation.

Abhishek Kumar

 1 2 3 >