A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Satyanarayana, K. V. V.
- Palaeomagnetic and Low-Field AMS Studies of Proterozoic Dykes and their Basement Rocks Around Harohalli, South India
Authors
1 Indian Institute of Geomagnetism, Colaba, Mumbai - 400 005, IN
Source
Journal of Geological Society of India (Online archive from Vol 1 to Vol 78), Vol 54, No 1 (1999), Pagination: 57-67Abstract
Palaeomagnetic and Low-field Anisotropy of Magnetic Susceptibility (AMS) results are reported from 8 unmetamorphosed dolerite dykes, and from one site each of the Closepet Granite (CG), the Peninsular Gneiss (PG) and the Charnockite (Ch) in the Harohalli area of the Dharwar craton. The AMS results exhibit "normal" magnetic fabrics for three dykes. Rest of the dykes exhibit either "inverse" or "anomalous" magnetic fabrics, indicating the dominance of single domain (SD) uniaxial magnetite grains and a complex mixture of SD and multi-domain (MD) grains respectively. Almost similar AMS fabrics are exhibited by the Peninsular Gneiss, Closepet Granite and Charnockite. This magnetic fabric is in close conformity with the structural features of the terrain and indicates E-W compressional stress. Two dykes have yielded a mean characteristic remanent magnetization (ChRM) direction (D = 130°, I = -88°, α95 =33°; N=2) which is similar to a previous result from the same dyke swarm and the Tiruvannamalai dykes in the adjacent South Indian Granulite Terrain (SIGT). Thus we support the earlier suggestion (Radhakrishna and Joseph, 1993) that no relative motion took place between the granite-greenstone terrain (GGT) and the SIGT, at least since the emplacement of Tiruvannamalai dykes ca. 1600 Ma ago. The palaeomagnetic directions from the PG (D = 285°, I = 43°), CG (D = 300°, I = 43°), and Ch (D = 300°, I = 43°) are statistically indistinguishable and the corresponding pole positions fall close to those reported for 1100-1000 Ma old rocks. Thus partial remagnetization/streaking in these sites occurred probably during the Eastern Ghats orogeny. It appears that the Eastern Ghats orogeny has penetrated selectively into the adjacent Dharwar craton.Keywords
Palaemagnetism, AMS Studies, Proterozoic, Harohalli, Karnataka.- Anisotropy of Magnetic Susceptibility of Earthquake-Affected Soft Sediments: Example from Ther Village, Latur, Maharashtra, India
Authors
1 Indian Institute of Geomagnetism, Kalamboli Highway, New Panvel (W), Navi Mumbai 410 218, IN
Source
Current Science, Vol 108, No 4 (2015), Pagination: 708-712Abstract
Anisotropy of magnetic susceptibility (AMS) of deformed and undeformed unconsolidated clay samples of Deccan Trap terrain from the ~2000-year-old palaeoearthquake site of Ther village, Maharashtra, India, was studied. Such deposits are rare in this region and give an exceptional opportunity to test the efficacy of AMS and other magneto petrofabric studies, which can have a bearing on magnetic granularity ellipsoids, inclination and declination directions impacting palaeomagnetic studies. The undeformed clay samples exhibit typical sedimentary fabric with an oblate AMS ellipsoid, whereas the deformed samples are tightly grouped in the inferred compression direction, probably effected by an earthquake, exhibiting prolate as well as oblate AMS ellipsoids. The temperaturedependent magnetic susceptibility revealed the occurrence of titanomagnetite and magnetite in both the deformed and undeformed samples signifying similar sediment material. The site mean ChRM direction for undeformed clay samples is D = 3 and I = 44.7 (k = 92.7, α95 = 4.5), whereas for deformed samples D = 336 and I = 39 (k = 39, α95 = 8). The present study reveals that sediments can be severely deformed without deflecting minimum susceptibility directions. AMS methodology can be effective in the DT region and can throw up new results to build the chronology of past earthquakes.Keywords
Anisotropy of Magnetic Susceptibility, Characteristic Remanent Magnetization, Earthquake, Soft Sediments.- The Effect of Wall Properties on the Convective Peristaltic Transport of a Conducting Bingham Fluid through Porous Medium
Authors
1 Department of Mathematics, Sri Venkateswara University, Tirupati – 517502, Andhra Pradesh, IN
2 Department of Mathematics, Sree Vidyanikethan Engineering College, Tirupati – 517102, Andhra Pradesh, IN
3 Department of Mathematics, School of Advanced Sciences , VITUniversity, Vellore - 632014, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 42 (2016), Pagination:Abstract
Objective: In the present paper the influence of heat transfer, wall slip conditions, and wall properties on the peristaltic transport of an incompressible conducting Bingham fluid in a non-uniform porous channel is studied. Methods/Statistical Analysis: Exact analytical solutions have been obtained for the axial velocity and the temperature by using the assumptions of long wavelength and low-Reynolds number. Findings: The effects of the essential parameters on the velocity and temperature distributions are demonstrated through graphs. It is noticed that the presence of porous medium reduces the velocity and temperature in the peristaltic channel. Further, the size of the trapped bolus gets reduced due to the presence of porous medium/magnetic field whereas opposite behaviour is noticed with the increasing slip at the walls. Application/Improvements: The results reveal that the presence of magnetic field/porous medium has remarkable effect on the peristaltic transport of yield stress fluids (such as blood) which may lead to possible technological applications in designing bio- medical instruments.Keywords
Conducting Bingham Fluid, Convective Peristaltic Transport, Porous Medium, Trapping Phenomena, Wall Properties.- Improved Cooperative Bait Detection Method using Multiple Disjoint Path Technique
Authors
1 Department of CSE, Koneru Lakshmaiah Education Foundation (KLU), Vaddeswaram, Guntur – 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 41 (2016), Pagination:Abstract
The important aim of this research is to present the bait detection method for Mobile Ad Hoc Networks (MANETs) with goal of security and routing performance improvement. Methods/Statistical analysis: The proposed method is based on recently presented technique known as CBDS (Cooperative Bait Detection Scheme) which have been introduced for defending against different types of attacks in MANET. The practical analysis of CBDS method is conferred that performance of end to end delay and packet delivery ratio is poor in presence of attacks in network. Therefore, in this paper, improved CBDS (ICBDS) method is proposed with goal improving end to end delay and PDR performances. Findings: The simulation and practical analysis of the proposed ICBDS method is done using NS2 tool by considering the different network scenarios and attacks. The results of proposed work against existing CBDS methods claim that the performance of end to end delay and PDR is improved for any numbers of attackers in network. ICBDS technique overcomes the limitations of existing CBDS technique while preserving the MANET security as it is using disjoint path method. The performance of end to end delay is minimized by approximately 22 % whereas PDR performance is increased by 17 % approximately. Application/ Improvements: The application area for this proposed method is local banking operations, military application etc. The possible improvement to ICBDS technique will be the consideration of all types of MANET attacks.Keywords
Attacks, Bait Detection, CBDS, Disjoint Path, MANET Security.- Data Gathering in Wireless Sensor and Actor Networks
Authors
1 Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation (KLU), Green Fields, Vaddeswaram, Guntur - 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 31 (2016), Pagination:Abstract
Objective: To develop a command based active Actor node command which controls the WSAN network. Network areas of research is growing drastically in the field with the advancement of Wireless sensor network and Wireless sensor and actor network. Methods/Analysis: Data gathering method was used for collecting the information of sensor nodes in a network. Using this method, data gradients values of the nodes are stored efficiently in the cache of the actor node. Efficient path method is used to route the path from actor node to the destination node based on routing. Next load balancing method is used to balance the node efficiency in a WSAN, effectively. Lastly, we used recharge method which recharges the sensor nodes effectively using list available in actor nodes. Findings: Various experiments were conducted based on energy consumption, load balance, packet delivery, power consumption and compared with the WSN. It was shown that the entire command based Actor node gave better results in WSAN's. Application/Improvement: Hence, new commands can be written to merge different types of WSAN's based on topology structure and energy efficiency.Keywords
Data Gathering, Gradient, Path and Routing, WSAN’s.- An Efficient Scheme to Establish Content and Audit Liveness in the Cloud
Authors
1 Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation (KLU), Vaddeswarm, Guntur - 520002, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 18 (2016), Pagination:Abstract
Background/Objectives: Data Storage in the cloud based services are evident everywhere in this day and age starting from Google doc based file management services, file storage services etc. Various schemes with respect to protecting this data range from ciphering services, auditing services, migration services etc. All these services help a cloud user to preserve their data based on a certain time threshold. Methods/Statistical Analysis: The current context of the paper concentrates on delivering an efficient data audit service. Previously these Audit services used to reside within the cloud domain but due to untrustworthiness of many cloud operators, Outside Auditor (OA) implementations were gearing up to validate cloud stored data. Findings: Earlier these OA’s used to download users data at their end to check their integrity leading to users privacy problems. Also it happens to be a time complex operation. Hence we propose an efficient file chunk sampling to detect anomalous changes in the cloud stored data. Index Hash structures play a vital role in this aspect. Applications/Improvements: This process is an iterative procedure instead of one time operation happening at regular intervals and importantly preserving user’s privacy.