Time filter

Source Type

Hyderabad, India

Shafee S.,NSAKCET | Naik B.B.,JNTUCEH | Sammaiah K.,AEC
Materials Today: Proceedings | Year: 2015

Resistance spot welding process parameters are optimized to improve spot weld quality. The experimental studies are conducted under varying force of electrode, welding current flow and its time duration. The spot weld quality characteristics are shear tensile strength and direct tensile strength has been considered. Signal to noise ratio was used to establish optimal process parameters. To authenticate the contribution percentage of experimental results against specified confidence level ANOVA was used. Verification trials show that it is feasible to improve the quality characteristics considerably. The investigational repercussions proved the effectiveness of the applied Taguchi method for improving spot weld quality. © 2015 Elsevier Ltd. Source

Veeraiah D.,JNTUK | Vasumathi D.,JNTUCEH
International Journal of Applied Engineering Research | Year: 2015

A link analysis procedure is the one of the suitable technique for extracting relational models from relational data bases based on random walk model through the database defining Markov chain having as many states as elements related to database. One of the fundamental limitation of the link analysis is that relational data base could contain too many turned off elements, in which situation link analysis strategy is almost ineffective. Moreover, it is clearly not always simple to draw out a graph from a relational data source, especially when the database is large. So we propose develop Fuzzy Link based Analysis for extracting relationships in cluster database. The objective of our proposed approach is to recover not only the elements strictly submission with the restrictions of the SQL question, but also the components that almost adhere to these constraints and are therefore near to the focus on components. We will also assess the suggested technique on real cluster data sources. Our experimental results show efficient clustered documents from predefined datasets using Extended Boolean retrieval design in Fuzzy Link Based Analysis. © Research India Publications. Source

Rao G.V.,NMDC Ltd | Markandeya R.,JNTUCEH | Sharma S.K.,NMDC Ltd
Transactions of the Indian Institute of Metals | Year: 2016

During production of calibrated (sized) ore, more than 50 % of the generated fines and rejects (Slimes) cannot be directly utilised in iron making due to its unfavourable granulometry, low iron content, high alumina and silica content. Approximately 10–20 % of the process plant input is discarded as slimes into slime ponds/tailing dams. Tailing dams are now considered as a threat due to hazardous nature and acute shortage of land for storing. More over these slimes also pose threat to the environment. Recovery of iron values from slimes results in economic benefit by utilisation of waste as a resource and minimizes the land requirement, surface degradation, ground water pollution, destruction of forests. These slimes after beneficiation are agglomerated (Pelletisation) and can be used as burden for the blast furnace. This research work presents the route for beneficiation of slimes by removing gangue in the slimes to an acceptable level to produce hot metal through blast furnace route. Research has been carried out effectively and efficiently to utilise the iron ore slimes from the slime ponds of Donimalai iron ore mine. The slime sample from tailing pond of Donimalai iron ore mine was collected and transported to R&D Centre, NMDC Limited, Hyderabad. The ‘as received’ slime sample assayed 49.40 % Fe, 13.51 % SiO2, 8.44 % Al2O3, 5.16 % loss on ignition and all other trace elements were within the critical limits. The ‘as received’ sample contains around 7 % moisture. It has a bulk density of 1.74 t/m3 and specific gravity of 3.7. Screen assay analysis was carried out with the ‘as received’ sample. Optimisation studies were carried out for desliming by using hydro-cyclone. Hydro-cyclone underflow was subjected to magnetic separation. It is possible to produce a concentrate which assayed 65.93 % Fe, 1.45 % SiO2, 1.94 % Al2O3 and 1.56 % loss on ignition with a yield of 45.18 % with a recovery of 60 % iron values. © 2015, The Indian Institute of Metals - IIM. Source

Subba Rao S.P.V.,Sree Nidhi Institute of Science and Technology | Venkata Chalam S.,CVR College of Engineering | Sreenivasa Rao D.,JNTUCEH
2013 IEEE International Conference on "Smart Structures and Systems", ICSSS 2013 | Year: 2013

This paper describes the High capacity energy efficient Dynamic MAC protocol (HCEEDMAC) for WCDMA wireless multimedia networks to allocate system resources to multimedia users for QoS provisioning and for high resource utilization. The protocol is designed to support high capacity, Energy efficient and high throughput by using interference control and congestion control. High throughput is achieved by Dynamic MAC protocol (DMAC) using contention based scheduling. High capacity and Energy efficiency are achieved by using Adaptive Power Control technique (APC) which reduces the interference level and Adaptive Call Admission control (ACA) mechanism which controls the congestion by reducing the call blocking probability. By simulation results, we show that our proposed HCEEDMAC protocol achieves high capacity, Energy efficient and high throughput for multimedia data transmission. © 2013 IEEE. Source

Procedia Computer Science | Year: 2016

The instantaneous growth of mobile apps in mobile markets elevating the concerns on the protection of user's sensitive data in Smartphone's. The Majority of apps in all mobile markets are gathering the data which is insignificant to the app functionality. The mobile app collects the data of the user either users' sensitive data or device data by using orthodox permission control policy. This Permission policy in apps takes acceptance of user for installing an app and user has only one option to accept all permissions to continue the installation of app. In this work we proposed a framework PLANT which is Permission Leakage AvoidaNce Through Filteration for identifying data leakage done by mobile apps by using permissions. Finally framework gives the knowledge to the user to deny if there are any irrelevant permissions required by the app based on its functionality. © 2016 The Authors. Source

Discover hidden collaborations