Showing posts with label Journal. Show all posts
Showing posts with label Journal. Show all posts

Friday 15 August 2014

#IJSRD Optimization of Machining Parameters in CNC Turning Using Firefly Algorithm

#Ijsrd

Optimization of Machining Parameters in CNC Turning Using Firefly Algorithm

Abstract— now a day’s machining is done through various automated machines. One of the widely used machines is CNC. Even though the automated machines are used, the quality of the work is determined by parameters used. The cutting parameters of the CNC machine determine the productivity, surface finish, machining time and other qualities of the product. This study involves the optimization of those cutting parameters. In order to get optimized CNC parameters for a specific tool-work combination, Firefly Algorithm (FA) is used to compute the best parameters based on the experiments conducted on a CNC Turning center. The three cutting parameters are cutting speed (V), feed (f), and depth of cut (d). The practical constraints have been considered during both practical and experimental approaches.  The result reveals that FA is very well suited in solving parameters selection problems. 
For More Detais
Click On Below Links :
http://ijsrdejournal.wordpress.com/
http://ejournalijsrd.wordpress.com/
http://ijsrdmechdept.wordpress.com/
http://goo.gl/1Lfdz9
http://ijsrdresearchjournal.wordpress.com/

Monday 11 August 2014

#Ijsrd : Influence of Metal Temperature on Strength of Rolled Steel Product

#Ijsrd :
Influence of Metal Temperature on Strength of Rolled Steel Product

Abstract—Rolling is extensively used metal forming process. Almost 90% of cast iron or steel products pass through rolling process at least once in its life cycle. Rolling products are most extensively used in daily life. Use of these products can be seen in bridges, towers, leaf springs, boilers, constructional structural parts and also in daily life products like knives pipes etc. In today’s era, quality of products is one of most important factor considered for its use. Quality of a product can either be controlled or improved by changing in composition or by using heat treatment processes.  In rolling products composition is not only the factor which improve the quality of product but temperature plays a vital role in maintaining and improving quality. By changing temperature of rolling we can change grain structure and its mechanical properties without changing its composition.


For More Details
Click on Below Links :




Saturday 9 August 2014

#IJSRD An Automatic CAN or Plastic Bottle Crusher Machine

An Automatic CAN or Plastic Bottle Crusher Machine

Abstract :

Crushers are major size reduction equipment used in mechanical and allied industries which crushes different types of soft and hard materials. The can or bottle crusher machine is widely used in beverage industries or in scrap dealers shop (Bhangarwala) to reduce the volume of the cans/bottles solely to increase the transportation volume and thus to reduce the transportation cost. Hence in this design and analysis of various parts are necessary. This paper focuses on review of a work carried out by researchers on analysis and design of various parts due to which the design quality of that parts will be improved. There are so many researchers who have done work on design and analysis, but still there are so many areas of scope regarding this design and analysis. The Electric Motor and a microcontroller make up the backbone for this project. Overall, this project involves processes like design, fabrication and assembling procedures. Even though there are many types of the can crusher machine in the market, the completion of this new model provides a more practical usage than previous one.

Click on Below Links For More Details :
http://ijsrdimpactfactor.wordpress.com/
http://ijsrdjournals.wordpress.com/
http://journalijsrd.wordpress.com/
http://ejournalsijsrd.wordpress.com/
http://goo.gl/PDcvSb

Wednesday 23 July 2014

#IJSRD Cloud data Protection

#IJSRD E-JOunral

Protection of the privacy of the cloud Data through Multiple clouds

===============================================================
The main goal of the “Protection of the privacy of the cloud data through multiple clouds” is to identify and understand the risks associated with the cloud data and propose a distributed architecture to eliminate the risks. In particular, in current cloud architecture a client entrusts a single cloud provider with his data. It gives the provider and outside attackers having unauthorized access to cloud, an opportunity of analyzing client data over a long period to extract sensitive information that causes privacy violation of clients. Hence to overcome this we propose a distributed architecture. The distributed approach to the cloud eliminates the disadvantage of storing all data of a client to the same provider. In this approach the data sent by the client is split into different number of chunks and is distributed among multiple cloud providers. Our system consists of two major components: Cloud data distributor and Cloud providers. The Cloud Data Distributor receives the data in the form of files from many clients, splits each of the files into much number of chunks and distributes these chunks among appropriate cloud providers. Another major component which is Cloud Providers, store these chunks and responds to the chunk requests by providing the chunks.


For More Details 
Click on below Links :


Main Site :

Friday 18 July 2014

IJSRD Research Paper For Security Privacy in system

Research Paper On :

PRIVACY PRESERVING AGAINST NETWORK INTRUSION DETECTION IN VIRTUAL NETWORK SYSTEM

---------------------------------------------------------------------------------
Authors :
SHRUTHI S , RNS INSTITUTE OF TECHNOLOGY

Description :
Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual network-based countermeasures.

For more Details About Above Blog
you can Visit on Below Links :