http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Rahul Saha,Ramgopal V.S. Uppaluri,Pankaj Tiwari 한국공업화학회 2018 Journal of Industrial and Engineering Chemistry Vol.59 No.-
The current study examines the synergy of interfacial tension, emulsification, wettability alteration and extent of saponification during alkali flooding for light to moderate crude oil. The oil recovered in the effluent stream during NaOH flooding was analysed to observe the quality of water in oil (W/O) emulsion produced and the extent of saponification. Core flooding experiments showed higher oil recovery of 25.48% initial oil in place (IOIP) at 1 wt% NaOH. Effects of slug volume and injection pattern during NaOH flooding experiments were also investigated. Further, contact angle changes the wettability from water wet to favourable intermediate wet.
Combocaptcha- A New Vision in CAPTCHA World
Rahul Saha,Riyanka Manna,Dr. G. Geetha 보안공학연구지원센터 2014 International Journal of Software Engineering and Vol.8 No.11
In this paper we have introduced a new form of CAPTCHA named “Combocaptcha”. With the help of this Captcha a revolution is can be done in the field of image and imagination based Captcha. In this Captcha we have to identify the image which is basically a combination of two objects .Its efficiency and usability issues are proven here to better than original single image based or imagination based Captcha.
RAHUL KUMAR,Shouvik Saha,Sarita Dhaka,Mayur B. Kurade,강찬웅,백승한,전병훈 한국자원공학회 2017 Geosystem engineering Vol.20 No.1
Mining industry has been using cyanide for more than ten decades to recover precious metals such as gold and silver. The presence of cyanide in the environment has long been a matter of concern due to its high toxicity to human, animal, and aquatic life. The available treatment processes either physical or chemical are suffered with issues such as operating conditions, generation of secondary pollution, and lack of cost effectiveness. A number of micro-organisms are capable to consume cyanide as a source of carbon and nitrogen, and convert it into ammonia and carbonate. Some plants are also efficient in cyanide attenuation process. Bioremediation of cyanide might be an efficient, cost-effective, eco-friendly, and an attractive alternative to the conventional physical and chemical processes. This paper reviews the recent advances in remediation of cyanide contaminated tailings via micro-organisms and plants. Aspects such as speciation, toxicity, source, and degradation mechanisms of cyanide are discussed. Factors affecting functioning of micro-organisms and plants as bioremediation agents are also highlighted.
Improvement of Trust and Reputation using Intrusion Detection and Authentication in Ad Hoc Networks
Gulshan Kumar,Rahul Saha,Mritunjay Kumar Rai 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.4
The indefinite need of dynamic environment has always imposed a concern on ad hoc networks and its application. It is often found that the internal nodes in such infrastructureless network are compromising with the trust factor to forward the packets and are able to exploit the trust to create different types of attacks such as black hole, worm hole, DDoS etc. The recent literature survey in this line of study gives an impression to the fact that the trust for the internal nodes in the networks has been emphasized less while designing any security approach for the routing protocols. Besides, the concept of watchdog/pathrater has been considered to be an inefficient if used alone. Therefore, in this paper, we have proposed an algorithm using intrusion detection and authentication method to provide enough trust in the routing path. The algorithm is having two layer of security aspect: watchdog-pathrater is used as the first layer along with a threshold value and secondly, end-to-end authentication is used to maintain the trust among the nodes in the network. The results are simulated in Network Simulator-2 (NS2). The results of the simulation show that the proposed algorithm minimizes the attacks in routing path. We have also compared our proposed algorithm with the two existing algorithm recently identified in the literature. The comparison also depicts the fact of the efficiency of our algorithm.