Lakshmi Aparna M.,VVIT |
Rao J.A.,Chebrolu Engineering College
Materials Today: Proceedings | Year: 2015
Usage of Glass Fiber Reinforced Polymeric (GFRP) composites is increasing drastically in many fields from Aerospace to Sporting good due to light weight and low cost. An effective design of GFRP composites requires detailed understanding of material and the way of testing. Fatigue is the single largest failure that occurs in composites suddenly without any warning, and this failure is catastrophic in nature. In the past years the composites were tested under fatigue loads so that the fatigue behavior can be identified. But this can't detect the crack behavior of material at the time of testing which is a very important phenomena in identifying the stress concentration of the material. This paper discusses the application of Digital Image Correlation (DIC) technique for fatigue testing of GFRP material in order to capture anisotropic damage. DIC is a non-contact and non-destructive unique exploring full field optical method used to measure accurate displacement, surface strains usually called as speckle pattern for anisotropic material undergoing motion and deformation. In this paper we explained DIC by using Newton- Rapshon (NR) correlation analysis. DIC technique uses high speed, high resolution and accurate Charge-Coupled device (CCD) cameras for measuring displacement components on the surface of the testing material having speckle patterns. Images were captured at the time of testing at every stress cycle and these deformed patterns were correlated with a reference pattern and determining the displacements of the so called subsets. Because of fast data acquisition this technique is well suited for characterization of material properties. © 2015 Elsevier Ltd.
Rupa Ch.,VVIT |
Avadhani P.S.,Andhra University
Advances in Intelligent and Soft Computing | Year: 2012
Information technology is facing lots of problems, while transmitting sensitive data and confidential data due to rapid growth of technology. The sensitive data is intended to share between only authorized persons, not for all. Information security concentrates on sensitive knowledge pattern that can be exposed when extracting the data. Therefore, researchers, for a long time period, have been investigating paths to improve privacy for sensitive data in information security analysis task process. So, many techniques have been introduced on privacy preserving issues in information security by using cryptography, steganography and their combination. In this paper we proposed an effective and efficient approach based on cryptography and Chains Matrix Multiplication (CMM) steganography uses optimal substructure property for generating random key to hide the data. It has to be improved privacy of sensitive data in information security analysis. © 2012 Springer-Verlag GmbH.
News Article | November 4, 2016
WESTMINSTER, CO--(Marketwired - Nov 4, 2016) - Vista International Technologies, Inc. ( : VVIT), a pioneer in efficient Waste-to-Energy (WTE) technology, is pleased to announce that it has completed the construction and installation of its Pilot Waste to Energy project. The next generation Thermal Gasifier used in this project represents a significant step forward for the company's already best-in-class technology, and will showcase the improved efficiency and emissions profile of the unit. The Company will now begin testing and optimizing the unit for commercial deployment and expects the unit to be fully operational in approximately in 4-6 weeks. Shortly thereafter, it is expected that the unit will be put into commercial use and begin generating revenue for the Company. Vista International Technologies, Inc. has been producing Waste-to-Energy gasification systems for over twenty years, with installations across three continents. The Company's technology has low costs of installation and operation, and allows for the processing of virtually any hydrocarbon-based waste product, including municipal solid waste, waste tires, sewage waste, and biomass, among others. The company's Waste-to-Energy systems are emission friendly and extremely efficient, and can be used to produce heat, steam, and/or electricity. For more information, please call 303-690-8300, or email us at firstname.lastname@example.org.
News Article | December 6, 2016
WESTMINSTER, CO--(Marketwired - Dec 6, 2016) - Vista International Technologies, Inc. ( : VVIT), a pioneer in efficient Waste-to-Energy (WTE) technology, is pleased to update investors with final 2016 tire facility revenue guidance and an update on testing of the company's newest Thermal Gasifier unit. Full financial results will be available when the company releases its annual report in the spring of 2017. For the current fiscal year ending December 31, 2016, the company expects annual revenue from its Hutchins, TX tire facility to reach approximately $1 million. This number represents as increase of over 30% as compared to 2015 results. The Company has benefitted from increased incoming tire tonnage, increased tipping (disposal) fees, and increased tire processing revenue as compared to 2015. The Company expects these strong results to continue into 2017. Initial testing has been completed on the Company's newest Thermal Gasifier unit with positive results. This first round of tests involved initial startup and then specific tests involving ramping up of operating temperatures and feedstock (fuel) levels. These tests culminated with the unit running for 2 hours at a full fuel load on November 30, 2016. A second round of tests involving operation for longer timeframes with various feedstocks, and optimization of operating efficiency and emissions data are scheduled for the next few weeks. Upon completion of this second round of testing the company will have a third party test the emissions of the unit and provide a report that will be used to secure air emissions permits for the Company's future projects. Vista International Technologies, Inc. has been producing Waste-to-Energy gasification systems for over twenty years, with installations across three continents. The Company's technology has low costs of installation and operation, and allows for the processing of virtually any hydrocarbon-based waste product, including municipal solid waste, waste tires, sewage waste, and biomass, among others. The company's Waste-to-Energy systems are emission friendly and extremely efficient, and can be used to produce heat, steam, and/or electricity. For more information, please call 303-690-8300, or email us at email@example.com.
News Article | February 27, 2017
WESTMINSTER, Colo., Feb. 27, 2017 (GLOBE NEWSWIRE) -- Vista International Technologies, Inc (OTCBB:VVIT) a pioneer in efficient Waste-to-Energy (WTE) technology, is pleased to give investors an update on recent events in its Waste to Energy (WTE) and tire recycling operations. Vista’s commercial scale pilot next-generation gasification unit (MFG-8 Thermal Gasifier) has recently completed its independent (third party) testing. The Company is now waiting for the results of this testing, which will be available in the next 3-4 weeks. The Company plans on presenting these results to the states where the Company has projects in development, with the goal of securing permits for these projects. This is a major step forward, as the Company continues to execute its strategic business plan. The Company also conducted its own tests concurrent with those conducted by the third party and found that the unit met or beat the Company’s internal targets for efficiency, emissions, and feedstock variability and moisture content, among other internal measures. The Company’s tire operations have continued to see strong revenues in the first quarter due to increased disposal (tipping) fees as compared to prior quarters. However, margins are currently lower, as the company has increased its hauling of scrap material to the landfill in order to clear certain areas of the facility as the Company works toward obtaining its permit for scrap tire processing and storage with the TCEQ (Texas Commission on Environmental Quality). This permit would allow the facility to continue operating for the next five years. The Company’s main stumbling block in this permit application process has been its pursuit of a variance from the Dallas County Fire Marshal which would allow the company to keep its storage piles at their current size, versus a significant reduction. So far the Company has been unsuccessful in securing this variance. Vista International Technologies, Inc. has been producing Waste-to-Energy gasification systems for over twenty years, with installations across three continents. The Company’s technology has low costs of installation and operation, and allows for the processing of virtually any hydrocarbon-based waste product, including municipal solid waste, waste tires, sewage waste, and biomass, among others. The company’s WTE systems are emission friendly and extremely efficient, and can be used to produce heat, steam, and/or electricity.
Sunil Srinivas B.,VVIT |
Sunil Srinivas B.,JNTUH College of Engineering |
Govardhan A.,JNTUH College of Engineering
Journal of Theoretical and Applied Information Technology | Year: 2016
Text categorization is a significant approach to manage the increasing text data on the Internet and is a significant research issue since the out bursting of digital and online web where numerous documents are available online and has been increased greatly in recent years. In this paper, a modified version of Table aided Matching algorithm for text categorization is proposed. This approach addressed the issue of huge dimension in order to maximize the computational efficiency and accuracy. The genetic algorithm has the ability to solve this approach. Thus, prior to classification, the dimensionality reduction technique is employed where the size of the documents in each profile is minimized. The performance evaluation of the suggested approach is matched with the two existing classification methodologies and has been demonstrated that the proposed approach has better results matched with existing approaches. © 2005 - 2016 JATIT & LLS. All rights reserved.
Rajesh P.,VVIT |
Narisimha G.,JNTUH College of Engineering |
ACM International Conference Proceeding Series | Year: 2012
In recent years, there is a rapid growth with amount of data collections in hardware, software and networking, data source sharing, transaction oriented data etc., This type of stream data also contains private and sensitive information. A new topic in the area of privacy preserving data mining in stream data is quite challenging, in which data grows rapidly at an unlimited rate and patterns will also be changed in timely manner like concept drifting. Many topics have been introduced to extract patterns in streaming data and provide the privacy preserving of data streams. In this paper we proposed a new approach of reliable and efficient way for extracting hidden patterns in stream data by using Heine-Boral property and α-cut property. For each time limit T, in these two proposed methods convert high dimensional stream data objects into lower dimensions using principal component analysis. Then apply these proposed methods to stream data objects for finding patterns to classify into subsets of classes, what an user is interested in intended patterns by imposing threshold values. It also consists of a novel method to provide privacy of stream data using fuzzy logic and discussed different types of advantages by utilizing fuzzy logic in data mining. Copyright 2012 ACM.
Khamruddin M.,VVIT |
3rd Nirma University International Conference on Engineering, NUiCONE 2012 | Year: 2012
Distributed Denial of Service (DDoS) is a type of attack in which the attacker tries to degrade the performance of server (or) network so that the server may not provide service to legitimate users. Since there is a huge increase in DDoS attacks which has created many financial losses in the E-Commerce world. To avoid the losses incurred because of DDoS attacks, efficient mechanisms are required to counter these attacks. In the proposed approach routers collectively try to mitigate the DDoS attack on the server. There are three steps in the proposed approach, initially, for attack detection and classification destination router (which is attached to the victim) monitors continuously the traffic pattern. Second, once the attack is detected destination router tries to balance the load using the NAT (Network Address Translator). Third, whenever the attack is detected to mitigate different types of attacks, the signature is pushback to upstream routers so that the upstream routers start monitoring the traffic and apply the mitigation mechanism depending on type of attack detected. © 2012 IEEE.
Thirumalai R.,Kumaraguru College of Technology |
Selvarani P.,Government Polytechnic college |
International Review of Mechanical Engineering | Year: 2012
This paper describes the development of response model of flank wear for machining Inconel 718. The machining experiments are conducted based on the design of experiments by varying the cutting speed, feed, and depth of cut as machining parameters against the response flank wear. The performance of uncoated carbide cutting tool was investigated at various cutting conditions under dry machining and refrigerated coolant machining. This paper made an attempt to Taguchi optimization technique to study the machinability performances of Inconel 718. An orthogonal array of L27 was used and anova analysis was carried out to identify the significant factors. The objective of this study is to predict the optimum cutting conditions to minimize the flank wear. Taguchi's optimization analysis indicates that the factors level, its significance to influence the flank wear for the machining processes. Confirmation tests were conducted at an optimal condition to make a comparison between the experimental results foreseen from the mentioned correlations and found satisfactory. © 2012 Praise Worthy Prize S.r.l.-All rights reserved.
Rao K.P.,P.A. College |
2013 International Conference on Human Computer Interactions, ICHCI 2013 | Year: 2013
Cryptography is used to provide the security to the information. At present various security algorithms are used by the users to protect their data from intruders. Even though, attacks are being done by the assailants on the data due to rapid growth of the technology as well as its diffidence also. Hence in this paper we proposed a security approach using unit fractions of the Linear Algebra i.e Hilbert Matrix. The main important properties of the Hilbert matrix are symmetric and positive definitive, which makes determinant of every sub matrix, is positive and useful to generate different cipher texts to the same plain text. It improves the security to the data by confusing the intruders. We show that the various properties that just differ by the standard security algorithms such as RSA. Cryptanalysis of the proposed algorithm shows that it is resistant to various attacks and stronger than existed encryption algorithms. © 2013 IEEE.