Jb Institute Of Engineering And Technology

Hyderabad, India

Jb Institute Of Engineering And Technology

Hyderabad, India

Time filter

Source Type

Udaya Kiran C.,JB Institute of Engineering and Technology | Ramachandra Reddy G.,P.A. College | Sreenivasa Rao M.,JNTUH College of Engineering
Journal of Reinforced Plastics and Composites | Year: 2014

Although natural fiber-based composite materials attract with their special features like low specific weight, biodegradability and easy processing, these fibers in combination with artificial fibers show interesting properties and are suitable for certain engineering applications. Such engineered biocomposites are needed to meet the needs of users of construction and commodity products which will simultaneously maximize the sustainability of natural resources. Various researchers researched to develop and characterize such materials. This paper throws a light on recent trends, developments, advancements and applications of hybrid composite materials. © 2014 The Author(s).


Ahmad S.J.,JB Institute of Engineering and Technology | Damodaram A.,Jawaharlal Nehru Technological University | Krishna P.R.,Infosys
Expert Systems with Applications | Year: 2015

Multimedia transmission over Mobile Ad-hoc Networks (MANETs) is crucial to many applications. However, MANETs possess several challenges including transmitting large size packets, minimizing delay, loss-tolerant and buffer size estimation. For effective multimedia transmission, delay should be minimized and packets should be received in the defined order. The existing standards such as 802.11b and 802.11e perform well in wireless networks, but exhibit poor response in MANETs for multimedia traffic, especially in multi-hop networks. In this paper, we first establish the dependency of delay on buffer size and packet size, and then present a delay optimization approach for multimedia traffic in MANETs. We use Knapsack algorithm for buffer management to maximize the in-order packets and minimize the out-of-order packets simultaneously. Our approach exploits the buffer internals and dynamically adjusts the buffer usage so that a node transmits the packets in the desired order to its successive nodes. Careful estimation of packet size and buffer size helps in minimizing the delay, improving the capability of receiving packets in the correct order and reducing out-of-order packets in the buffer at intermediate nodes. Our approach also controls the loss of multimedia data packets during transmission. We validate our approach with real-world examples using network simulator. © 2015 Elsevier Ltd. All rights reserved.


Botlagunta M.D.,Jb Institute Of Engineering And Technology | Agrawal S.,Chaitanya Bharathi Institute of Technology | Rao R.R.,Jawaharlal Nehru Technological University Kakinada
International Conference on Recent Advances and Innovations in Engineering, ICRAIE 2014 | Year: 2014

Systems where resources are shared among the processes, Deadlock often occurs due to resource contention. The existing techniques that are used to deal with it either perform stringent testing or no testing at all. In both the cases either the overhead is substantial or the technique is inefficient. This paper aims to present resource reservation technique that will reduce the overhead for deciding about the resource allocation for system consisting of shared resources. It presents a technique for resource reservation namely Worst-Case Execution Time Based Resource Reservation (ETRR). The motivational examples illustrates that the proposed technique are capable of performing resource allocation without checking the safety sequence as proposed by Banker's algorithm. The overhead of resource allocation for the proposed techniques merely O(m) as compared to Banker's algorithm of O(mn2). Further, they are able to predict a deadlock more efficiently, when some of the other existing techniques fail to do so. The simulation results indicate that the average turnaround time of the ETRR is approximately 13% better than the existing Banker's algorithm. © 2014 IEEE.


Ahmad S.J.,Jawaharlal Nehru Technological University | Ahmad S.J.,JB Institute of Engineering and Technology | Damodaram A.,Jawaharlal Nehru Technological University | Radha Krishna P.,Infosys
International Journal of Networking and Virtual Organisations | Year: 2013

Mobile ad-hoc networks (MANETs) comprise a set of powerconstrained mobile nodes. They enable multi-hop peer-to-peer routing without any requirement of predefined infrastructure for its deployment. The topology of MANETs change dynamically which necessitates development of efficient routing protocols for message packets that reduce energy consumption, congestion and propagation delays. Existing routing protocols such as BRAWN, AODV and DSDV improve the quality of service (QoS) in MANETs only when there are less number of hops and nodes close to each other. Determining an efficient route for packets considering the current location of nodes is a challenging task, especially when the distance between the nodes is too long in a MANET. In this paper, we present an efficient protocol to maintain higher QoS in MANETS. In addition to bandwidth and data rate, additional parameters namely queuing delay, distance and energy are incorporated in order to dynamically compute the paths for a specific communication with minimum delay. We provide a theoretical approach to determine multiple efficient paths and to rank them. We also use information of node position that is captured periodically for computing the latest direct distance between any two nodes. We illustrate the effectiveness of our proposed protocol with examples. Copyright © 2013 Inderscience Enterprises Ltd.


Rajasekhar K.,NIC Inc | Upadhyaya N.,Jb Institute Of Engineering And Technology
Advances in Intelligent Systems and Computing | Year: 2014

The critical Communication and Information Technology Infrastructure required for delivery of financial inclusion services of the Government to Citizen services has been considered as the Critical Infrastructure for research work by authors. On the basis of practical research work a novel, efficient, effective and sustainable system for ensuring safety, security and resilience of critical IT infrastructure has been presented in this article. The various types of attacks and threats reported in the literature were studied, the main reasons of security threats and attacks analysed. The solution hypothesis proposed. A new mode of computation, Real-time Advanced Inexpensive Network (RAIN) Computing proposed and a multi-level scalable, low cost security solution with RAIN computing to safeguard and ensure resilience of the critical IT infrastructure for e-Governance projects presented. Though focus of experimentation is critical IT & C infrastructure, security methodology presented in the paper can be extended to safeguard other types of CI also. ©Springer International Publishing Switzerland 2014. © Springer International Publishing Switzerland 2014.


Rajasekhar K.,NIC Inc | Upadhayaya N.,Jb Institute Of Engineering And Technology
Proceedings - 2014 International Conference on Data Science and Engineering, ICDSE 2014 | Year: 2014

The present data driven business intelligent systems and associated technologies and protocols are not suitable for agri-business. Distribution of data, poor infrastructure, lower e-readiness and complexity of agribusiness problems pose special challenges for creating and managing data driven agri-business intelligence. A Novel RAIN computing based framework to provide data driven mobile commerce intelligence for agri-businessmen along with a case study was presented in this article. © 2014 IEEE.


Rajasekhar K.,NIC Inc | Upadhyaya N.,Jb Institute Of Engineering And Technology
Advances in Intelligent Systems and Computing | Year: 2016

For increased profitability and sustainability, the E-commerce systems should be backed by efficient and effective Supply Chain Management and Value Chain Management Systems. However, it is very difficult to build such systems as the functions are complex and systems are CAPEX and OPEX intensive. To overcome these problems, an inexpensive supply chain management system was designed and developed successfully with Real-time Advance Inexpensive Network Computing. The results of the research work are presented in this article. © Springer India 2016.


Gafur M.A.,Jawaharlal Nehru Technological University | Upadhayaya N.,JB Institute of Engineering and Technology | Sattar S.A.,Royal Institute of Technology and Science
2013 4th International Conference on Computing, Communications and Networking Technologies, ICCCNT 2013 | Year: 2013

Tremendous research effort has been made to reduce the idle time on the wireless medium of mobile adhoc network. Tradeoff among idle channel, collision and throughput was always a challenge. Hidden terminal problem creates collisions. On the other hand exposed terminal problem makes channel unnecessarily idle. Standard virtual carrier mechanism and many other alternative proposals for solving these problems make the unnecessary overhead on the nodes and delay in the network. Many of these schemes depend on the packet size to decide on a prior RTS/CTS exchange before sending data packets. In this paper we propose an enhanced virtual carrier scheme taking in to account the traffic around the nodes instead of packet size. The modified scheme splits the network virtually in to different traffic subdomains. Direct data packet transmission is allowed in low traffic scenarios. Prior RTS/CTS is exchanged only in high traffic subdomains irrespective of the data packet size. In traffic subdomains between low and high either direct transmission or prior RTS/CTS exchange is made depends on the previous subdomain of the node. We evaluated standard RTS/CTS scheme and other recent proposals and compared with our proposal. We measured the performance of our scheme against different performance metrics. Simulation result shows that our scheme outperforms the standard one in various scenarios. The outperformance of the proposed scheme is the outcome of a realistic assumption of low probability for hidden terminals in a low traffic subdomains compared to high traffic subdomains, instead of the unrealistic and pessimistic assumption of ubiquitous hidden terminals throughout the network. © 2013 IEEE.


Patnaik S.,Jb Institute Of Engineering And Technology
Communications in Computer and Information Science | Year: 2011

Though workflow technology is being used for automating enterprise activities but its uses in healthcare domain is at nascent stage. As healthcare workflow directly deals with human life, therefore it must take precautions to undesired situations during its executions. In this paper we analyze the domain and mathematical modeling is done. We present a comprehensive view on genesis of exceptions and corresponding actions. The concept is further explained with the help of a case study. © Springer-Verlag Berlin Heidelberg 2011.


Yadav S.M.,Jb Institute Of Engineering And Technology | Reddythota D.,Jawaharlal Nehru Technological University | Anjaneyulu Y.,Jackson State University
International Journal of Environment and Waste Management | Year: 2014

Leachates from unlined landfills cause environmental degradation and health hazards due to resultant ground water pollution. Their pollution potential can be measured on a comparative scale using leachate pollution index (LPI). The selection of index involves 18 pollution parameters, their weightages and the sub-index values. The concentrations of pollutants are obtained from toxicity characteristic leaching procedure (TCLP) extracts of the lime sludge and fly ash generated. A comparative study of five different indices (unweighted arithmetic leachate pollution index, arithmetic leachate pollution index, unweighted multiplicative leachate pollution index, multiplicative leachate pollution index, weighted ambiguity and eclipsity free method) is presented for assessing the pollution potential of an unlined landfill site for ITC Bhadrachalam (India) paper mill. The five parameters with the highest, medium and low weightages are considered for analysis to evaluate a correlation among indices. Finally, the most suitable index method is suggested by substantiating with sensitivity analysis. © 2014 Inderscience Enterprises Ltd.

Loading Jb Institute Of Engineering And Technology collaborators
Loading Jb Institute Of Engineering And Technology collaborators