Int. J. Comput. Aided Eng. Technol.最新文献

筛选
英文 中文
A short review on fretting wear behaviour of Al7075 Al7075微动磨损性能综述
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-10-04 DOI: 10.1504/IJCAET.2018.10015509
G. Poomarimuthukumar, Siva Irulappasamy, M. Thirukumaran, J. Jappes
{"title":"A short review on fretting wear behaviour of Al7075","authors":"G. Poomarimuthukumar, Siva Irulappasamy, M. Thirukumaran, J. Jappes","doi":"10.1504/IJCAET.2018.10015509","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10015509","url":null,"abstract":"Generally, matting components are great in dealing with a surface of friction in contacting area gripping and is focusing the service life of the mating materials. In applied components, service life can also be measured in terms of wear. Due to their higher bearing capacity and fatigue resistance, the aluminium (Al) based alloys are preferred in high-end applications. Nevertheless, due to weakened tribological strengths, many researchers explore the possible wear mechanisms existing in worn surfaces of Al based alloys to enhance the strength. Fretting is one of the primary failure mechanisms which promote severe damage to the matting of metal parts especially in Al7075 is revealed recently by the researchers. In general, damage severity during the wear is analysed through fretting which could be the result of synergy of rubbing with matting parts and vibrations. The fretting regime represents many primary wear mechanisms. Fretting map support the cause analysis of wear from the worn morphology. The present survey dealt the utilisation of fretting regime to explore the possible wear mechanisms and factors caused the wear damages from the research outcome of leading tribo research groups.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129610467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A method for creating balanced cluster areas in wireless sensor networks 一种用于在无线传感器网络中创建平衡簇区域的方法
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10013709
Mary Wu, Hyunjin Park, Chonggun Kim
{"title":"A method for creating balanced cluster areas in wireless sensor networks","authors":"Mary Wu, Hyunjin Park, Chonggun Kim","doi":"10.1504/IJCAET.2018.10013709","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10013709","url":null,"abstract":"The balancing node energy is an important issue in sensor networks, since sensor nodes are deployed with a limited power in arbitrary regions. Clustering is one of the basic approaches for designing energy-efficient distributed sensor networks. In a representative clustering method, LEACH, cluster headers are elected based on a probability method. Therefore, cluster headers may be located by geographical randomness. Based on LEACH, there are some nodes which may do not belong within the transmission range of any cluster header or there are some nodes that are very far from their cluster header. The nodes that are far from their cluster header consume node energy quickly and it result in bad effects on working in sensor networks. The bad coverage of sensor networks gives a fatal effect on the QoS of the sensor application. In order to solve this problem, we propose a balanced clustering method that provides cluster headers to be geographically distributed evenly in entire clustered sensor networks. The experimental results show an excellent performance on the coverage of sensor networks and the life duration for the entire nodes of sensor networks.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116312075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Removed material volume calculations in CNC milling by exploiting CAD functionality 利用CAD功能消除了数控铣削中的材料体积计算
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10013720
P. Benardos, G. Vosniakos
{"title":"Removed material volume calculations in CNC milling by exploiting CAD functionality","authors":"P. Benardos, G. Vosniakos","doi":"10.1504/IJCAET.2018.10013720","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10013720","url":null,"abstract":"Material removal volume calculations in machining processes are important in a variety of milling simulation applications, including material removal rate estimation and machining force calculation. In this paper two different approaches are presented to this end, i.e., Z-maps and Boolean operations with solid models. The Z-map method is simple but results in large files and needs sophisticated routines to render acceptable accuracy. Boolean operations between accurate solid models of the tool and the workpiece is implemented on readily available CAD system application programming interface. Beside the computational load which is bound to the accuracy level, it requires a sufficient number of interpolated points through one revolution of the tool to be trustworthy. It is practical to use at particular points of interest along the toolpath.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131150730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SOSIoT: SOS optimisation to leverage the energy efficient internet of things based on route search optimisation SOSIoT: SOS优化,利用基于路线搜索优化的节能物联网
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10013714
Suresh Kallam, M. Babu
{"title":"SOSIoT: SOS optimisation to leverage the energy efficient internet of things based on route search optimisation","authors":"Suresh Kallam, M. Babu","doi":"10.1504/IJCAET.2018.10013714","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10013714","url":null,"abstract":"Internet of things (IoT) has become popular in smart vision of world development. It is more and more complex due to billions of heterogeneous wireless devices communicating each other. Each wireless sensor node or device consumes more energy for its communication. There are various techniques for reduction of this energy such as low energy routing algorithm by using particle swam optimisation (PSO) and advances in heuristic techniques with symbiotic organism search (SOS). But these techniques are inefficient due to direct deployment of sensor nodes in the network without considering the more energy consume when transmitting. This paper proposes an SOS internet of things (SOSIoT) technique that deals and regulates energy factors in IoT efficiently. It is a self-adaptive technique that aims to minimise the energy harvesting in significant manner on IoT. Finally, it presents a comparative result against existing methods on energy consumption factors. The impact of SOSIoT and optimal techniques battery life of smart devices increased up to the 40% to 60%.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User authentication and key agreement scheme for internet of thing - a study 物联网用户认证与密钥协议方案研究
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10009631
M. Durairaj, K. Muthuramalingam
{"title":"User authentication and key agreement scheme for internet of thing - a study","authors":"M. Durairaj, K. Muthuramalingam","doi":"10.1504/IJCAET.2018.10009631","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10009631","url":null,"abstract":"Internet of things entails different aspects of different computing devices which join together to customise a system for interdependent interactions. It determines reliability in security which appears as a challenging issue with their limited resource. To address the security issues in wireless environment those are widely used, due to the immense development of computer networks. The simplest and suitable mechanism is authentication based on password which is widely used to ensure the system resources that are not properly acknowledged. In this regard, security protocols which are capable of minimising the processing capability and saves energy which can reserve in the devices. Several studies address the security mechanisms, the main objective states analyzing security and acknowledge the characteristics for integration with minimum power. This paper presents a summary of brief reviews on some of the recent articles on addressing the security issues of IoT environments.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129034019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient storage and retrieval of medical records using fusion-based multimodal biometrics 使用基于融合的多模态生物识别技术高效存储和检索医疗记录
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10013717
N. Lalithamani, C. Amrutha
{"title":"Efficient storage and retrieval of medical records using fusion-based multimodal biometrics","authors":"N. Lalithamani, C. Amrutha","doi":"10.1504/IJCAET.2018.10013717","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10013717","url":null,"abstract":"Biometrics helps to uniquely identify a person using their biological features and hence is used to develop systems with a high level of security. Multimodal biometrics further increases the level of security and provides controlled access, using the combination of multiple traits to identify a person. This paper presents an application of multimodal biometrics to efficiently store, access and retrieve medical records of a patient, which is independent of the hospital servers across the country. In case of emergencies, where it is important to know the medical history of a patient, the record can securely be accessed from a cloud server by using their biometric traits. Here we use two traits, face print and fingerprint to simulate the process of uniquely identifying a patient's record which is stored on a cloud server. The records can only be accessed by authorised representatives of the hospitals, which preserve its confidentiality. Feature level fusion technique is used to determine if a record, corresponding to a patient is available in the database. Cryptographic methods like shuffling algorithms are applied for further security of the records.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126121557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on IMS-4G-cloud networks maintaining service continuity using distributed multi agent scheme ims - 4g云网络使用分布式多代理方案保持业务连续性的研究综述
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10013715
A. Bagubali, V. Prithiviraj, P. Mallick
{"title":"Review on IMS-4G-cloud networks maintaining service continuity using distributed multi agent scheme","authors":"A. Bagubali, V. Prithiviraj, P. Mallick","doi":"10.1504/IJCAET.2018.10013715","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10013715","url":null,"abstract":"In the current networking field, research works are going on with the aim of providing user%s desired QoS everywhere. This paper discusses the distributed multi agent scheme (DMAS) scheme used in the IMS-4G-cloud networks to support session (service) continuity. It explains the role of different agents which make use of knowledge sources in solving the problem and performing tasks. A Q-learning awareness algorithm is used to estimate the QoS by calculating cost function with the help of mathematical formulae comprising of QoS parameters like jitter, delay, packet loss, network resource availability, mobility and service fare parameter. Agents in the DMAS interact with each other and work cooperatively to provide both QoS and mobility information. Based on the type of information provided, two types of handoff came in to existence. A detailed explanation of these handoffs with phases is discussed in this paper. Finally, a comparison is made between general IMS handoff procedure and DMAS-IMS handoff procedure with the help of signal flow diagram.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Breast Cancer Diagnosis Based on Enhanced Pareto Optimal and Multilayer Perceptron Neural Network 基于增强Pareto最优和多层感知器神经网络的乳腺癌智能诊断
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10013710
Ashraf Osman Ibrahim, S. Shamsuddin
{"title":"Intelligent Breast Cancer Diagnosis Based on Enhanced Pareto Optimal and Multilayer Perceptron Neural Network","authors":"Ashraf Osman Ibrahim, S. Shamsuddin","doi":"10.1504/IJCAET.2018.10013710","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10013710","url":null,"abstract":"Among the common cancer diseases is a breast cancer. Diagnosis of this disease depends on the human experience. It is time consuming and having an element of human error in the results. The Pareto optimal evolutionary multi-objective optimisation is used to obtain multiple final results in a single run for simultaneous parameter optimisation of artificial neural networks (ANNs). In this paper, a computer-based method of an automatic classifier for the breast cancer disease diagnosis task is proposed. The proposed method applied a multilayer perceptron (MLP) neural network based on enhanced non-dominated sorting genetic algorithm (NSGA-II) to achieve an accurate classification result for the breast cancer diseases diagnosed. Moreover, it is also used to optimise the network structure and reduce the error rate of the MLP neural network simultaneously. Compared to other methods found in the literature, the proposed method is viable in breast cancer disease diagnosis.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126933459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Design of 5-3 multicolumn compressor for high performance multiplier 高性能倍增器用5-3多列压缩机的设计
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10013716
R. Marimuthu, S. Balamurugan, P. Mallick
{"title":"Design of 5-3 multicolumn compressor for high performance multiplier","authors":"R. Marimuthu, S. Balamurugan, P. Mallick","doi":"10.1504/IJCAET.2018.10013716","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10013716","url":null,"abstract":"Compressors are widely used in multiplier to reduce the partial products. This paper proposed the design of 5-3 multicolumn compressor. The proposed 5-3 multicolumn compressor is used to design the various size multipliers. In this paper, we have designed 6 × 6, 8 × 8, 10 × 10 and 12 × 12 bit multiplier using proposed 5-3 multicolumn compressor, conventional 5-3 multicolumn compressor and conventional 4-2 compressor and compared the results. Simulation result shows that the proposed architecture consumes less power and provides more speed than conventional multicolumn 5-3 compressor and conventional 4-2 compressor. Cadence RTL compiler is used to obtain the results of multiplier.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131120714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchy-based knapsack approach for network selection in HetNets 基于层次结构的HetNets网络选择背包方法
Int. J. Comput. Aided Eng. Technol. Pub Date : 2018-09-05 DOI: 10.1504/IJCAET.2018.10013718
H. Valiveti, P. Rao
{"title":"Hierarchy-based knapsack approach for network selection in HetNets","authors":"H. Valiveti, P. Rao","doi":"10.1504/IJCAET.2018.10013718","DOIUrl":"https://doi.org/10.1504/IJCAET.2018.10013718","url":null,"abstract":"In order to realise the dynamic network environment of current day wherein the end-users are equipped with various smart mobile devices and technologies, it is necessary to incorporate mechanisms which yield high speed and less end-to-end delay with minimum transition loss. Appropriate selection of the target network will help to resolve the issue to a major extent. The information regarding the next point of attachment is provided by the network to assist the node in taking decisions about altering the base station to suit to the then network situation. In this paper, an intelligent approach is incorporated by ranking the networks available in proximity and ignoring the less compatible ones. This scenario is accomplished between Wi-Fi and WiMax networks by the proposed hierarchical knapsack approach with dynamic programming, helps identifying the optimal scenario to support end-users while selecting a network for the handoff.","PeriodicalId":346646,"journal":{"name":"Int. J. Comput. Aided Eng. Technol.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信