Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kumar, Dinesh
- Reliability Analysis of Defence Vehicles Gear Box Assembly under Preventive Maintenance
Abstract Views :340 |
PDF Views:96
Authors
Affiliations
1 Dept. of Mechanical & Industrial Engineering, Indian Institute of Technology, Roorkee, Uttarakhand- 247667, IN
1 Dept. of Mechanical & Industrial Engineering, Indian Institute of Technology, Roorkee, Uttarakhand- 247667, IN
Source
Indian Journal of Science and Technology, Vol 3, No 3 (2010), Pagination: 328-331Abstract
In the era of advancement in technology and global competitiveness the traditional maintenance practices have become obsolete. Also in recent years sophisticated and more advanced equipments have been augmented in the armed forces hence, the role of maintenance workshops/ engineers has become very challenging. Therefore, analyzing various maintenance issues and the associated risk has become very important in the armed forces. Preventive maintenance practices assist in improving the reliability of assemblies and how it will be effective for the equipments of armed forces is illustrated in this article. Gear box assembly used in the medium size vehicles are considered for the analysis and the failure data in various operating conditions is taken from the logbooks of the vehicles. For modeling purposes the Weibull distribution has been chosen (since it has practical utility-ability to model products/systems consisting of large number of components and may have increasing/decreasing or a constant failure rate). The result will be useful to the maintenance engineer to find the unreliability of the gear box assemblies and also for future strategic decision making.Keywords
Weibull Distribution, Reliability, Preventive Maintenance, Strategic Decision MakingReferences
- Ebeling Charles E (2004) Reliability and maintainability engineering. Tata McGraw Hill, pp359-377.
- Singh IJ (1998-99) Mission reliability & availability of military equipment. Defence Management J. pp25-35.
- Smith R and Mobley RK (2008) Rules of thumb for maintenance and reliability engineers. Elsevier Butterworth Heinemann(2008), pp 3-5.
- http://www.weibull.com/SystemRelWeb/preventive_maintenance.htm
- Abernethy RB (2002) An overview of Weibull analysis. Abernethy RB, Florida, pp1-11.
- www.weibull.com/hotwire/issue14/relbasics14.htm
- A Beta Regression Model for Himalayan Medicinal Plant Disease Prediction
Abstract Views :422 |
PDF Views:0
Authors
Affiliations
1 Punjab Technical University, Punjab, IN
2 CSIR-CSIO, Chandigarh, IN
3 NIT Kurukshetra, Haryana, IN
1 Punjab Technical University, Punjab, IN
2 CSIR-CSIO, Chandigarh, IN
3 NIT Kurukshetra, Haryana, IN
Source
Indian Journal of Science and Technology, Vol 7, No 6 (2014), Pagination: 776-780Abstract
Picrorhiza kurrooa plants were grown in greenhouse and was tested for powdery mildew disease. The result of temperature and wetness duration on P.kurrooa was studied under controlled-environment to develop a disease prediction model for controlling infection.Plants were kept at a temperature ranging from 31°C to 37°C with Relative Humidity (RH) more than 90% was maintained in greenhouse and it is measured in the terms of wetness duration (in hours) from 5 to 40hr.To determine the relationship between infection index, temperature and wetness duration data for P. kurrooa were analyzed by nonlinear regression model. Beta model was used to provide the best fit to the data for modeling. Infection index on plant increased with increasing wetness duration at optimum temperature. Minimum and maximum temperatures for infection were around 31 and 37°C, respectively. At 35.5°C maximum infection was recorded, and a minimum duration of wetness that is required for germination of the fungus was 5hr. Highest infection index 0.95 was noticed at 35.5°C. Temperature and duration of wetness were recorded for each event and used in the model equation to calculate disease infection index. Regression coefficient (R2) between observed infection index and predicted infection index was 0.8103 and coefficient of determination (R) was 0.9. It indicates that the model could reliably predict the disease infection index over a wide range of temperatures and wetness durations.Keywords
Beta Regression Model, Picrorhiza Kurrooa, Powdery Mildew Prediction System- Assessment of Energy Content of some Tropical Concentrate Feeds of Ruminants Using Model of National Research Council - 2001
Abstract Views :293 |
PDF Views:0
Authors
Affiliations
1 Veterinary Dispensary, Kalampur, Kalahandi, Odisha, IN
2 Division of Dairy Cattle Nutrition, National Dairy Research Institute, Karnal, Haryana, IN
3 Division of Animal Nutrition, Indian Veterinary Research Institute, Izatnagar, UP, IN
4 National Dairy research Institute, Karnal, Haryana, IN
1 Veterinary Dispensary, Kalampur, Kalahandi, Odisha, IN
2 Division of Dairy Cattle Nutrition, National Dairy Research Institute, Karnal, Haryana, IN
3 Division of Animal Nutrition, Indian Veterinary Research Institute, Izatnagar, UP, IN
4 National Dairy research Institute, Karnal, Haryana, IN
Source
Indian Journal of Science and Technology, Vol 7, No 12 (2014), Pagination: 1999-2006Abstract
An experiment was conducted to predict the energy content (TDN- total digestible nutrients, DE- digestible energy and ME- metabolizable energy) of some commonly used tropical concentrate feeds of ruminants using the summative approach model of National Research Council (NRC) 2001, which is based on chemical composition values of feeds rather than the values of digestion trial. Fourteen concentrate feeds (six grains, three oilcakes, two protein meals, three agro-industrial byproducts) were analyzed for their proximate principles, fiber components, neutral detergent insoluble nitrogen (NDIN), acid detergent insoluble nitrogen (ADIN) and the TDN was then calculated. DE and ME contents were estimated from the TDN value. Three types of total mixed rations (TMRs) were prepared comprising 40% concentrate mixture, 40% green fodder (berseem- Trifolium alexandrinum) and 20% wheat straw (Triticum aestivum) on dry matter basis (DMB). These TMRs were fed to three groups of growing Sahiwal calves (average body weight of 173.66±12.54 kg and average age of 12 - 18 months). The predicted TDN values of the TMRs as per NRC (2001) were 60.21, 60.14 and 60.53% of DM, respectively. The TDN values obtained by the results of the digestion trial (61.11, 61.98 and 60.56%) were in conformity with that of in vitro results. Therefore, it was concluded that the TDN based model of NRC (2001) can be successfully implemented to predict the energy density of tropical ruminant feeds. The predicted TDN values of concentrate feeds were also more or less in close proximity of their standard TDN values.Keywords
Energy Content, Nrc- 2001 Model, Ruminants, TDN, Total Mixed Rations- Resource Utilization in Cloud Computing using Hybrid Algorithm
Abstract Views :193 |
PDF Views:0
Authors
Affiliations
1 Guru Kashi University, Sardulgarh Road, Talwandi Sabo - 151302, Punjab, IN
1 Guru Kashi University, Sardulgarh Road, Talwandi Sabo - 151302, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 43 (2016), Pagination:Abstract
Objectives: The proposed algorithm represents a multivariate selection and security mechanism for the data which has to be kept at the cloud server. The paper also focuses on the prioritization of the data so that for a given span of time data with high priority is processed first. Methods/Statistical Analysis: The paper has presented a unique way to select encryption algorithm so that miss-utilization is prevented. The paper has included lattice based encryption NTRU (N-th degree Truncated Polynomial Ring Unit) and key based encryption for the security of data. Findings: The unused data bits have been optimized using GA (Genetic Algorithm) and the results have been calculated in terms of total number of completed jobs with priority and the CPU Utilization made against the Jobs. Application/Improvements: Resources which will be utilized at the cloud server would cost the user with some amount but there is optimization of resources in terms of CPU utilization and job completion.Keywords
Cloud Computing, Genetic Algorithm, NTRU Algorithm, Resource Utilization, Security.- Secure and Efficient Information Propagation using Pushback Algorithm based Routing for Wireless Networks
Abstract Views :175 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Guru Kashi University, Sardulgarh Road, Talwandi Sabo, Bathinda - 151302, Punjab, IN
1 Department of Computer Science, Guru Kashi University, Sardulgarh Road, Talwandi Sabo, Bathinda - 151302, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 45 (2016), Pagination:Abstract
Objectives: The proposed model is based upon the efficient and secure routing with the amalgamation of the authentication protocol for the realization of the secure routing protocol. Methods/Statistical Analysis: The proposed model is based upon the efficient and secure routing with the amalgamation of the authentication protocol for the realization of the secure routing protocol. The proposed model is aimed at protecting the routing mechanism from the false route injections. The proposed model utilizes the lightweight authentication scheme for the purpose of security enforcement over the wireless network. Findings: The experimental results have been collected in the form of various network and routing performance parameters, where the proposed model has been found efficient and stable in comparison with the existing model. Application/Improvements: The proposed model has been primary improved for the routing efficiency along with the security perspectives in order to protect the wireless networks from the network attacks.Keywords
Efficient Routing, Pushback Mechanism, Secure Routing, Stable Wireless Routing, Lightweight Authentication.- Image Pattern Extraction and Compression using Pixel Neighborhood and Weighted PCA Algorithm
Abstract Views :202 |
PDF Views:0
Authors
Pranab Garg
1,
Dinesh Kumar
1
Affiliations
1 Department of Computer Science, Guru Kashi University, Sardulgarh Road, Talwandi Sabo, Bathinda – 151302, Punjab, IN
1 Department of Computer Science, Guru Kashi University, Sardulgarh Road, Talwandi Sabo, Bathinda – 151302, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 28 (2016), Pagination:Abstract
Background/ Objective: An image can be compressed by compressing the patterns in itself. The patterns preserve the maximum entropy in an image. If patterns are extracted using the pattern extraction algorithm and compressed using their features, then rest of the image may be compressed to a high degree of decompression. The patterns are therefore principal components of the image and principal component analysis can be applied over that in order to achieve an efficient compression algorithm. The principal component analysis algorithm works fine when compressing the input image and outputs a reasonably good compression ratio. However, the compression ratio becomes dependent upon the number of eigen values/vectors chosen to get compressed image. Method: In the presented work, a selection criterion for selecting the Eigen values/vectors is suggested. The criteria is based on threshold selection that is computed by using different techniques and then taking the arithmetic mean of all thresholds from all techniques. Also, a weighted Eigen values are used for threshold computation and compared with the statistical threshold. The Eigen values/vector less than the threshold are taken into consideration for image compression and a well optimized compression ratio is obtained. Finding: The computation time may be improved by decomposing the input image using haar wavelet transform. The different frequency sub bands consist of low frequency (LL), high to low (HL), low to high (LH) and high (HH) frequency sub bands. As the LL sub band contains maximum information out of the four bands, the principal component algorithm is applied in this band only for compression.Keywords
Compression, Eigen Value, Eigen Vector, Otsu Algorithm, Segmentation, Threshold.- nA Robust and Secure Lightweight Authentication for the Limited Resource Wireless Ad-hoc Network
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Application, Guru Kashi University, Talwandi Sabo, Bathinda – 151302, Punjab, IN
1 Department of Computer Application, Guru Kashi University, Talwandi Sabo, Bathinda – 151302, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 47 (2016), Pagination:Abstract
Objectives: The proposed security model is specifically designed to increase the level of the security by implementing the node integrity verification and data encryption service over the wireless ad-hoc networks. Methods/Statistical Analysis: The proposed security and authentication model has been defined using the 8 bytes to 16 bytes length based variable key length authentication scheme, which is difficult to predict and cryptanalysis attacks, as there is no uniform mechanism to perform the cryptanalysis attack over the authentication data during the exchange or propagation in the wireless ad-hoc networks. Findings: In this paper, we have proposed the public cryptosystem based encryption for light and secure authentication scheme, which utilizes the RSA encryption as the public cryptosystems. The proposed security and authentication model has been deeply analyzed to protect against the variety of attacks using the primary parameter of authentication delay and data loss. This model has been analyzed over the three primary attacks for the resource jamming, which includes the Distributed Denial of Service (DDoS), selective jamming, and black hole attacks for the data dropping and jamming attacks. The proposed authentication and security model for wireless ad-hoc routing has been analyzed for its performance on the basis of the specific performance parameters. The robust and flexible performance of security and authentication based proposed model has been deeply observed from the versatile results obtained from the all paradigms of the simulation. Application/Improvements: The light weight and robust authentication based security mechanism has been proposed for the higher order suitability to serve the specific purpose of security against the attacks over the wireless networks.Keywords
Ad-Hoc Network Security, Attack Prevention, Cryptanalysis Attacks, Jamming, Light Authentication.- Pattern Recognition using Normalized Feature Vectors Analysis
Abstract Views :181 |
PDF Views:0
Authors
Pranab Garg
1,
Dinesh Kumar
1
Affiliations
1 Department of Computer science, Guru Kashi University, Talwandi Sabo – 151302, Punjab, IN
1 Department of Computer science, Guru Kashi University, Talwandi Sabo – 151302, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 25 (2016), Pagination:Abstract
Objective: To study pattern recognition and retrieval in machine vision system application. Methods/Analysis: Regular and irregular pattern recognition algorithm based on sorting of radii from centre of mass is used and other tools such as Matlab, Neural networks. Findings: The radii from centre of mass to contour of the pattern are computed and sorted in descending order. Few top radii are taken for recognition of the given pattern. As the radii are sorted in descending order, therefore, if the pattern is orientated at any angle, the top order radii are same. This enables the pattern recognition at any orientation. Further, the radii are normalized with respect to their mean radius to make them size invariant. In addition, area, perimeter and euler number are also computed for enhancing the uniqueness degree in features vector set.Keywords
CBIR, Extraction, Normalization, NN.- Elastic Modulus Behavior of Multi-Walled Carbon Nano-Tubes/Polyurethane Composites using Nano- Indentation Techniques
Abstract Views :191 |
PDF Views:0
Authors
Affiliations
1 University Institute of Engineering and Technology, Punjab University, Chandigarh – 160014, Punjab, IN
2 Indian Institute of Technology, Ropar – 140001, Punjab, IN
1 University Institute of Engineering and Technology, Punjab University, Chandigarh – 160014, Punjab, IN
2 Indian Institute of Technology, Ropar – 140001, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 10, No 17 (2017), Pagination:Abstract
Composites of uniformly dispersed Multi-Walled Carbon Nanotubes (MWCNTs)(1wt%, 3wt%, 7wt% and 10wt%) and Polyurethane(PU) were prepared by solution mixing method. Small disc shaped specimens were fabricated for static mechanical characterization using nano-indentation. Field Emission Scanning Electron Microscopy (FESEM) was done to validate the presence of MWCNTs in PU matrix. Mechanical characterization was performed on PU/MWCNTs nanocomposites by using nano-indentation techniques. It was observed that the elastic modulus of PU/MWCNTs composites with 10wt% increased by 124.5% in comparison to pure PU.Keywords
Elastic Modulus, Mechanical Properties, MWCNTs, Nano-Indentation, PU.- Balance Cluster Routing Algorithm for Expanding Wireless Networks (BaCRA-EWN)
Abstract Views :171 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Application, Guru Kashi University, Talwandi Sabo, Bathinda – 151302, Punjab, IN
1 Department of Computer Application, Guru Kashi University, Talwandi Sabo, Bathinda – 151302, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 10, No 15 (2017), Pagination:Abstract
Objectives: The wireless routing model has been specifically designed for the energy efficient and secure routing among the ad-hoc networks. Methods/Statistical Analysis: The proposed ad-hoc routing model is designed to remove the possibility of the connectivity holes, which may be produced due to the false network route injections or due to the wormhole or blackhole attacks. In this paper, a robust connectivity integrity assurance (CIA) model has been proposed based upon the genetic algorithm in order to realize the highly flexible blackhole avoidance model. Findings: The proposed model has been tested over the standard wireless ad-hoc network topology for the performance based assessment of the wireless network performance under the security paradigm where the parameters of maximum throughput, end-to-end transmission delay, and overall network load, etc. The proposed model has been found efficient under all of the experiments, and have clearly outperformed the existing paradigms and security models for the secure routing over wireless ad-hoc platforms. Application/Improvements: The proposed model has been specifically designed for the energy efficient, lifetime enhancement and higher order security and privacy of the data over the ad-hoc networks.Keywords
Route Exchange Integrity, Secure connection establishment, Quality routing paradigm, connectivity hole prevention and correction, quick response fast convergence model.- Anomaly Prevention Mechanism for Wireless Networks using the Wireless Node Integrity Assessment Program
Abstract Views :184 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Guru Kashi University, Sardulgarh Road, Talwandi Sabo, Bathinda – 151302, Punjab, IN
1 Department of Computer Science, Guru Kashi University, Sardulgarh Road, Talwandi Sabo, Bathinda – 151302, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 10, No 10 (2017), Pagination:Abstract
Objectives: The wireless network security has been incorporated under this research, which has been implemented based upon the Secure Authentication Algorithm (SeAuL) for the wireless network security. Methods/Statistical Analysis: The multi-level authentication scheme has been proposed for the realization of the security among the wireless networks, which has been called Secure Authentication Algorithm (SeAuL). The proposed model has been designed in the pre-setup phase and post-setup phase for the robust authentication over the wireless networks. Findings: The proposed model has been equipped with the key based encryption using the 16-layered elliptic curve cryptography, which has been found more secure and rapid than the traditional AES algorithm in the various block sizes. The experimental results have proved the efficiency of the proposed model, when assessed on the basis of response delay for the encryption of the keys. Application/ Improvements: The anomaly prevention as well as the denial of service attack prevention has been implemented for the realization of the trusted wireless networks.Keywords
Anomaly Prevention, Intrusion Avoidance, Intrusion Prevention, Secure Data Propagation, Wireless Network.- Parameters Optimized Specifying for EDM with PM/ Conventional Electrodes on M2 Tool Steel using Taguchi and TOPSIS
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 Department of RIC, I. K. Gujral Punjab Technical University, Kapurthala - 144603, Punjab,, IN
2 Department of Mechanical Engineering, St. Soldier Institute of Engineering and Technology, Jalandhar - 144622, Punjab, IN
3 Department of Mechanical Engineering, Beant College of Engineering and Technology, Gurdaspur - 143521, Punjab, IN
1 Department of RIC, I. K. Gujral Punjab Technical University, Kapurthala - 144603, Punjab,, IN
2 Department of Mechanical Engineering, St. Soldier Institute of Engineering and Technology, Jalandhar - 144622, Punjab, IN
3 Department of Mechanical Engineering, Beant College of Engineering and Technology, Gurdaspur - 143521, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 10, No 22 (2017), Pagination:Abstract
Objectives: The scope of this experimental work of electrical discharge machining (EDM) process with and without the addition of abrasive powder while executed on M2 tool steel for the advancement in surrounding safety factors to meliorate the surface quality. Methods/Statistical Analysis: Taguchi’s L36 mixed orthogonal array is used after identification of most appropriate six input parameters (polarity, electrode type, concentration of abrasive, discharge current, and gap voltage and duty cycle) for maximum MRR and minimum TWR, and SR. Findings: To recognize the significant factors ANOVA is used and TOPSIS determine the 10.47% overall improvement in all responses with the optimal level of process parameters after confirmatory test. Energy dispersive X-ray (EDS) and Scanning electron microscope (SEM) analysis applied to examine the surface quality. Application/Improvements: This study finds the downfall of titanium from powder metallurgy tool electrode (CuTi) and deposition of aluminium material from PMEDM may also be implemented to improve the method of computation and precision.Keywords
ANOVA, EDM, EDS, M2 Tool Steel, SEM, TOPSIS- Unproblematic Technique for EDMing of M2 Tool Steel with Unlike Electrodes for Licking the Multi Response Trouble
Abstract Views :169 |
PDF Views:0
Authors
Affiliations
1 Department of RIC, I. K. Gujral Punjab Technical University, Kapurthala - 144603, Punjab, IN
2 Department of Mechanical Engineering, St. Soldier Institute of Engineering and Technology, Jalandhar - 144001, Punjab, IN
3 Department of Mechanical Engineering, Beant College of Engineering & Technology, Gurdaspur - 143521, Punjab, IN
1 Department of RIC, I. K. Gujral Punjab Technical University, Kapurthala - 144603, Punjab, IN
2 Department of Mechanical Engineering, St. Soldier Institute of Engineering and Technology, Jalandhar - 144001, Punjab, IN
3 Department of Mechanical Engineering, Beant College of Engineering & Technology, Gurdaspur - 143521, Punjab, IN