http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Tolerance design of mechanical assembly using NSGA II and finite element analysis
Jayaprakash Govindarajalu,Sivakumar Karuppan,Thilak Manoharan 대한기계학회 2012 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.26 No.10
The technological and financial limitations in the manufacturing process are the reason for non-achievability of nominal dimension. Therefore, tolerance allocation is of significant importance for assembly. Conventional tolerance allocation methods are limited by an assumption that all parts are rigid. Every mechanical assembly consists of at least one or more flexible parts which undergo significant deformation due to inertia effect. Finite element analysis is used to determine the deformation of components in an assembly. Therefore,integration of statistical tolerance design with finite element analysis will guarantee that the optimal tolerance values of various components of the assembly obtained as end product of the tolerance design will remain within tolerance variation. Then the product can function as intended under a wide range of operating conditions for the duration of its life. In this paper, tolerance design of a piston cylinder assembly is done to demonstrate the proposed methodology.
Mitigating Threats and Security Metrics in Cloud Computing
( Jayaprakash Kar ),( Manoj Ranjan Mishra ) 한국정보처리학회 2016 Journal of information processing systems Vol.12 No.2
Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.
Repair of precracked RC rectangular shear beams using CFRP strip technique
Jayaprakash, J.,Samad, Abdul Aziz Abdul,Abbasovich, Ashrabov Anvar,Ali, Abang Abdullah Abang Techno-Press 2007 Structural Engineering and Mechanics, An Int'l Jou Vol.26 No.4
The exploitation of fibre reinforced polymer composites, as external reinforcement is an evergreen and well-known technique for improving the structural performance of reinforced concrete structures. The demand to use FRP composites in the civil engineering industry is mainly due to its high strength, light weight, and stiffness. This paper exemplifies the shear strength of partially precracked reinforced concrete rectangular beams repaired with externally bonded Bi-Directional Carbon Fibre Reinforced Polymer (CFRP) Fabrics strips. All specimens were cast in the laboratory environment without any internal shear reinforcement. The test parameters were longitudinal tensile reinforcement, shear span to effective depth ratio, spacing of CFRP strips, and orientation of CFRP reinforcement. It mainly focuses on the shear capacity and modes of failure of the CFRP strengthened shear beams. Results have shown that the CFRP repaired beams attained a shear enhancement of 32% and 107.64% greater than the control beams. This study underscores that the CFRP strip technique significantly enhanced the shear capacity of precracked reinforced concrete rectangular beams without any internal shear reinforcement.
JAYAPRAKASH SATHTHASIVAM,GARY TANG,KIM CHOON NG 대한설비공학회 2010 International Journal Of Air-Conditioning and Refr Vol.18 No.1
The application of Fault Detection and Diagnosis (FDD) could play a key role in operating chillers at optimum e±ciency. As air-conditioning consumes a significant proportion (approximately 30% to 50%) of the total power consumption of a commercial building, an e®ective FDD tool is very much required for a reliable and economic chiller operation. In this paper, the renowned Simple Thermodynamic Model, STM (also known as Gordon and Ng Universal Chiller Model) was utilized to detect and diagnose some of the common faults in centrifugal chillers. Based on the readily available, nonintrusive, steady state measurements extracted from the on-site chillers, the STM model was regressed to obtain two physically meaningful coe±cients, namely, Thermal Resistance and Internal Entropy Generation. These information-rich coe±- cients were then analyzed to evaluate the performances and the conditions of the chillers. Despite the large and yet complex on-site chiller operations, equipped with built-in heat recovery, such as economizer and intricate control mechanisms, the predictive and diagnostic capabilities of STM in detecting chiller faults has been successfully tested and evaluated based on the data collected from on-site centrifugal chillers. Faults like condenser fouling and reduction in condenser cooling water flow rate were succinctly captured by the STM model.
An Efficient Password Security of Three-Party Key Exchange Protocol based on ECDLP
Jayaprakash Kar,Banshidhar Majhi 보안공학연구지원센터 2009 International Journal of Security and Its Applicat Vol.3 No.4
In this paper we have proposed an efficient password security of Three- Party Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem. Key exchange protocols allow two parties communicating over a public network to establish a common secret key called session key. Due to their significance by in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings. Here we have taken two one-way hash functions to build the level of security high.
V. Jayaprakash Narayanan,B. Karthik,S. Chandrasekar 대한전기학회 2014 Journal of Electrical Engineering & Technology Vol.9 No.4
Flashover of power transmission line insulators is a major threat to the reliable operation of power system. This paper deals with the flashover prediction of polymeric insulators used in power transmission line applications using the novel condition monitoring technique developed by PD signal time-frequency map and neural network technique. Laboratory experiments on polymeric insulators were carried out as per IEC 60507 under AC voltage, at different humidity and contamination levels using NaCl as a contaminant. Partial discharge signals were acquired using advanced ultra wide band detection system. Salient features from the Time-Frequency map and PRPD pattern at different pollution levels were extracted. The flashover prediction of polymeric insulators was automated using artificial neural network (ANN) with back propagation algorithm (BPA). From the results, it can be speculated that PD signal feature extraction along with back propagation classification is a well suited technique to predict flashover of polymeric insulators.
Saththasivam, Jayaprakash,Tang, Gaty,Ng, Kim Choog The Society of Air-Conditioning and Refrigerating 2010 International Journal Of Air-Conditioning and Refr Vol.18 No.1
The application of Fault Detection and Diagnosis (FDD) could play a key role in operating chillers at optimum efficiency. As air-conditioning consumes a significant proportion (approximately 30% to 50%) of the total power consumption of a commercial building, an effective FDD tool is very much required for a reliable and economic chiller operation. In this paper, the renowned Simple Thermodynamic Model, STM (also known as Gordon and Ng Universal Chiller Model) was utilized to detect and diagnose some of the common faults in centrifugal chillers. Based on the readily available, nonintrusive, steady state measurements extracted from the on-site chillers, the STM model was regressed to obtain two physically meaningful coefficients, namely, Thermal Resistance and Internal Entropy Generation. These information-rich coefficients were then analyzed to evaluate the performances and the conditions of the chillers. Despite the large and yet complex on-site chiller operations, equipped with built-in heat recovery, such as economizer and intricate control mechanisms, the predictive and diagnostic capabilities of STM in detecting chiller faults has been successfully tested and evaluated based on the data collected from on-site centrifugal chillers. Faults like condenser fouling and reduction in condenser cooling water flow rate were succinctly captured by the STM model.
Mitigating Threats and Security Metrics in Cloud Computing
Kar, Jayaprakash,Mishra, Manoj Ranjan Korea Information Processing Society 2016 Journal of information processing systems Vol.12 No.2
Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.