CINXE.COM
Search results for: Venkata Madhusudana Rao Kapavarapu
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: Venkata Madhusudana Rao Kapavarapu</title> <meta name="description" content="Search results for: Venkata Madhusudana Rao Kapavarapu"> <meta name="keywords" content="Venkata Madhusudana Rao Kapavarapu"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="Venkata Madhusudana Rao Kapavarapu" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="Venkata Madhusudana Rao Kapavarapu"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 66</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: Venkata Madhusudana Rao Kapavarapu</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">66</span> An Integrated Approach to Handle Sour Gas Transportation Problems and Pipeline Failures</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Madhusudana%20Rao%20Kapavarapu">Venkata Madhusudana Rao Kapavarapu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Intermediate Slug Catcher (ISC) facility was built to process nominally 234 MSCFD of export gas from the booster station on a day-to-day basis and to receive liquid slugs up to 1600 m³ (10,000 BBLS) in volume when the incoming 24” gas pipelines are pigged following upsets or production of non-dew-pointed gas from gathering centers. The maximum slug sizes expected are 812 m³ (5100 BBLS) in winter and 542 m³ (3400 BBLS) in summer after operating for a month or more at 100 MMSCFD of wet gas, being 60 MMSCFD of treated gas from the booster station, combined with 40 MMSCFD of untreated gas from gathering center. The water content is approximately 60% but may be higher if the line is not pigged for an extended period, owing to the relative volatility of the condensate compared to water. In addition to its primary function as a slug catcher, the ISC facility will receive pigged liquids from the upstream and downstream segments of the 14” condensate pipeline, returned liquids from the AGRP, pigged through the 8” pipeline, and blown-down fluids from the 14” condensate pipeline prior to maintenance. These fluids will be received in the condensate flash vessel or the condensate separator, depending on the specific operation, for the separation of water and condensate and settlement of solids scraped from the pipelines. Condensate meeting the colour and 200 ppm water specifications will be dispatched to the AGRP through the 14” pipeline, while off-spec material will be returned to BS-171 via the existing 10” condensate pipeline. When they are not in operation, the existing 24” export gas pipeline and the 10” condensate pipeline will be maintained under export gas pressure, ready for operation. The gas manifold area contains the interconnecting piping and valves needed to align the slug catcher with either of the 24” export gas pipelines from the booster station and to direct the gas to the downstream segment of either of these pipelines. The manifold enables the slug catcher to be bypassed if it needs to be maintained or if through-pigging of the gas pipelines is to be performed. All gas, whether bypassing the slug catcher or returning to the gas pipelines from it, passes through black powder filters to reduce the level of particulates in the stream. These items are connected to the closed drain vessel to drain the liquid collected. Condensate from the booster station is transported to AGRP through 14” condensate pipeline. The existing 10” condensate pipeline will be used as a standby and for utility functions such as returning condensate from AGRP to the ISC or booster station or for transporting off-spec fluids from the ISC back to booster station. The manifold contains block valves that allow the two condensate export lines to be segmented at the ISC, thus facilitating bi-directional flow independently in the upstream and downstream segments, which ensures complete pipeline integrity and facility integrity. Pipeline failures will be attended to with the latest technologies by remote techno plug techniques, and repair activities will be carried out as needed. Pipeline integrity will be evaluated with ili pigging to estimate the pipeline conditions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=integrity" title="integrity">integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=oil%20%26%20gas" title=" oil & gas"> oil & gas</a>, <a href="https://publications.waset.org/abstracts/search?q=innovation" title=" innovation"> innovation</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20technology" title=" new technology"> new technology</a> </p> <a href="https://publications.waset.org/abstracts/166960/an-integrated-approach-to-handle-sour-gas-transportation-problems-and-pipeline-failures" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166960.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">65</span> Synthesis and D.C. Conductivity Measurements of Polyaniline/CopperOxide Nanocomposites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L.%20N.%20Shubha">L. N. Shubha</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Madhusudana%20Rao"> P. Madhusudana Rao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Polyaniline / Copper Oxide(PANI / CuO) nanocomposite was prepared by solution mixing of prepared Polyaniline and copper Oxide in Dimethyl sulfoxide (DMSO). The synthesis involved the formation of dark green colored Polyaniline-Copper Oxide nanocomposite. The synthesized polymer nano composites were characterized by XRD, FTIR, SEM and UV-Visible Spectroscopy. The characteristic peaks in XRD, FTIR and UV-Visible spectra confirmed the presence of CuO in the polymer structure. SEM analysis revealed formation of PANI/CuO nano composite The D.C. conductivity measurements were performed using two probe method for various temperatures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=polyaniline%2Fcopper%20oxide%20%28PANI%2FCuO%29%20nanocomposite" title="polyaniline/copper oxide (PANI/CuO) nanocomposite">polyaniline/copper oxide (PANI/CuO) nanocomposite</a>, <a href="https://publications.waset.org/abstracts/search?q=XRD" title=" XRD"> XRD</a>, <a href="https://publications.waset.org/abstracts/search?q=SEM" title=" SEM"> SEM</a>, <a href="https://publications.waset.org/abstracts/search?q=FTIRand%20DC-%20conductivity" title=" FTIRand DC- conductivity"> FTIRand DC- conductivity</a>, <a href="https://publications.waset.org/abstracts/search?q=UV-visible%20spectra" title=" UV-visible spectra"> UV-visible spectra</a> </p> <a href="https://publications.waset.org/abstracts/44353/synthesis-and-dc-conductivity-measurements-of-polyanilinecopperoxide-nanocomposites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44353.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">64</span> Chemical Synthesis, Electrical and Antibacterial Properties of Polyaniline/Gold Nanocomposites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=L.%20N.%20Shubha">L. N. Shubha</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Kalpana"> M. Kalpana</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Madhusudana%20Rao"> P. Madhusudana Rao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Polyaniline/gold (PANI/Au) nanocomposite was prepared by in-situ chemical oxidation polymerization method. The synthesis involved the formation of polyaniline-gold nanocomposite, by in-situ redox reaction and the dispersion of gold nano particles throughout the polyaniline matrix. The nanocomposites were characterized by XRD, FTIR, TEM and UV-visible spectroscopy. The characteristic peaks in FTIR and UV-visible spectra confirmed the expected structure of polymer as reported in the literature. Further, transmission electron microscopy (TEM) confirmed the formation of gold nano particles. The crystallite size of 30 nm for nanoAu was supported by the XRD pattern. Further, the A.C. conductivity, dielectric constant (€’(w)) and dielectric loss (€’’(w)) of PANI/Au nano composite was measured using impedance analyzer. The effect of doping on the conductivity was investigated. The antibacterial activity was examined for this nano composite and it was observed that PANI/Au nanocomposite could be used as an antibacterial agent. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AC-conductivity" title="AC-conductivity">AC-conductivity</a>, <a href="https://publications.waset.org/abstracts/search?q=anti-microbial%20activity" title=" anti-microbial activity"> anti-microbial activity</a>, <a href="https://publications.waset.org/abstracts/search?q=dielectric%20constant" title=" dielectric constant"> dielectric constant</a>, <a href="https://publications.waset.org/abstracts/search?q=dielectric%20loss" title=" dielectric loss"> dielectric loss</a>, <a href="https://publications.waset.org/abstracts/search?q=polyaniline%2Fgold%20%28PANI%2FAU%29%20nanocomposite" title=" polyaniline/gold (PANI/AU) nanocomposite "> polyaniline/gold (PANI/AU) nanocomposite </a> </p> <a href="https://publications.waset.org/abstracts/15221/chemical-synthesis-electrical-and-antibacterial-properties-of-polyanilinegold-nanocomposites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15221.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">383</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">63</span> A Study on Unix Process Crash Based on Efficient Process Management Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Guo%20Haonan">Guo Haonan</a>, <a href="https://publications.waset.org/abstracts/search?q=Chen%20Peiyu"> Chen Peiyu</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhao%20Hanyu"> Zhao Hanyu</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Unix and Unix-like operating systems are widely used due to their high stability but are limited by the parent-child process structure, and the child process depends on the parent process, so the crash of a single process may cause the entire process group or even the entire system to fail. Another possibility of unexpected process termination is that the system administrator inadvertently closed the terminal or pseudo-terminal where the application was launched, causing the application process to terminate unexpectedly. This paper mainly analyzes the reasons for the problems and proposes two solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=process%20management" title="process management">process management</a>, <a href="https://publications.waset.org/abstracts/search?q=daemon" title=" daemon"> daemon</a>, <a href="https://publications.waset.org/abstracts/search?q=login-bash%20and%20non-login%20bash" title=" login-bash and non-login bash"> login-bash and non-login bash</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20group" title=" process group"> process group</a> </p> <a href="https://publications.waset.org/abstracts/153030/a-study-on-unix-process-crash-based-on-efficient-process-management-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153030.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">62</span> Practical Aspects Pertaining to the Selection of Size and Location of Source Substations in an Oil Field</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yadavalli%20Venkata%20Sridhar">Yadavalli Venkata Sridhar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Finalization of Substation sizing and location is an important task to be carried out by electrical designers in an oil field. Practical issues influence the selection of size and location of the source substations that feed multiple production facilities are listed. Importance of selection of appropriately rated short circuit level for 11KV switchboards and constraints pertaining to availability of manufacturers are highlighted. Without being lost in the research of absolute optimum solution, under time constraints, the importance of practical approach is brought out. Focus on identifying near optimum solutions by process of elimination of unfeasible substation locations with the support of cost figures, is emphasized through a case study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=substation" title="substation">substation</a>, <a href="https://publications.waset.org/abstracts/search?q=size" title=" size"> size</a>, <a href="https://publications.waset.org/abstracts/search?q=location" title=" location"> location</a>, <a href="https://publications.waset.org/abstracts/search?q=oil%20field" title=" oil field"> oil field</a> </p> <a href="https://publications.waset.org/abstracts/28734/practical-aspects-pertaining-to-the-selection-of-size-and-location-of-source-substations-in-an-oil-field" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28734.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">664</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">61</span> Effect of Design Parameters on Porpoising Instability of a High Speed Planing Craft</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lokeswara%20Rao%20P.">Lokeswara Rao P.</a>, <a href="https://publications.waset.org/abstracts/search?q=Naga%20Venkata%20Rakesh%20N."> Naga Venkata Rakesh N.</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Anantha%20Subramanian"> V. Anantha Subramanian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important to estimate, predict, and avoid the dynamic instability of high speed planing crafts. It is known that design parameters like relative location of center of gravity with respect to the dynamic lift centre and length to beam ratio of the craft have influence on the tendency to porpoise. This paper analyzes the hydrodynamic performance on the basis of the semi-empirical Savitsky method and also estimates the same by numerical simulations based on Reynolds Averaged Navier Stokes (RANS) equations using a commercial code namely, STAR- CCM+. The paper examines through the same numerical simulation considering dynamic equilibrium, the changing running trim, which results in porpoising. Some interesting results emerge from the study and this leads to early detection of the instability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CFD" title="CFD">CFD</a>, <a href="https://publications.waset.org/abstracts/search?q=planing%20hull" title=" planing hull"> planing hull</a>, <a href="https://publications.waset.org/abstracts/search?q=porpoising" title=" porpoising"> porpoising</a>, <a href="https://publications.waset.org/abstracts/search?q=Savitsky%20method" title=" Savitsky method"> Savitsky method</a> </p> <a href="https://publications.waset.org/abstracts/97595/effect-of-design-parameters-on-porpoising-instability-of-a-high-speed-planing-craft" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/97595.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">179</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">60</span> Utilization of Fly Ash as Backfilling Material in Indian Coal Mines</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20Venkata%20Karthik">P. Venkata Karthik</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Kranthi%20Kumar"> B. Kranthi Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fly ash is a solid waste product of coal based electric power generating plants. Fly ash is the finest of coal ash particles and it is transported from the combustion chamber by exhaust gases. Fly ash is removed by particulate emission control devices such as electrostatic precipitators or filter fabric bag-houses. It is a fine material with spherical particles. Large quantities of fly ash discharged from coal-fired power stations are a major problem not only in terms of scarcity of land available for its disposal, but also in environmental aspects. Fly ash can be one of the alternatives and can be a viable option to use as a filling material. This paper contains the problems associated with fly ash generation, need for its management and the efficacy of fly ash composite as a backfilling material. By conducting suitable geotechnical investigations and numerical modelling techniques, the fly ash composite material was tested. It also contains case studies of typical Indian opencast and underground coal mines. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=backfilling" title="backfilling">backfilling</a>, <a href="https://publications.waset.org/abstracts/search?q=fly%20ash" title=" fly ash"> fly ash</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20concentration%20slurry%20disposal" title=" high concentration slurry disposal"> high concentration slurry disposal</a>, <a href="https://publications.waset.org/abstracts/search?q=power%20plant" title=" power plant"> power plant</a>, <a href="https://publications.waset.org/abstracts/search?q=void%20infilling" title=" void infilling"> void infilling</a> </p> <a href="https://publications.waset.org/abstracts/57229/utilization-of-fly-ash-as-backfilling-material-in-indian-coal-mines" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57229.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">253</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">59</span> A Dirty Page Migration Method in Process of Memory Migration Based on Pre-copy Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kang%20Zijian">Kang Zijian</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhang%20Tingyu"> Zhang Tingyu</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article investigates the challenges in memory migration during the live migration of virtual machines. We found three challenges probably existing in pre-copy technology. One of the main challenges is the challenge of downtime migration. Decrease the downtime could promise the normal work for a virtual machine. Although pre-copy technology is greatly decreasing the downtime, we still need to shut down the machine in order to finish the last round of data transfer. This paper provides an optimization scheme for the problems existing in pro-copy technology, mainly the optimization of the dirty page migration mechanism. The typical pre-copy technology copy n-1th’s dirty pages in nth turn. However, our idea is to create a double iteration method to solve this problem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtual%20machine" title="virtual machine">virtual machine</a>, <a href="https://publications.waset.org/abstracts/search?q=pre-copy%20technology" title=" pre-copy technology"> pre-copy technology</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20migration%20process" title=" memory migration process"> memory migration process</a>, <a href="https://publications.waset.org/abstracts/search?q=downtime" title=" downtime"> downtime</a>, <a href="https://publications.waset.org/abstracts/search?q=dirty%20pages%20migration%20method" title=" dirty pages migration method"> dirty pages migration method</a> </p> <a href="https://publications.waset.org/abstracts/169033/a-dirty-page-migration-method-in-process-of-memory-migration-based-on-pre-copy-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169033.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">150</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">58</span> Understanding the Qualities of Indian Neighborhoods: Understanding of Social Spaces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Ravi%20Kumar%20Veluru">Venkata Ravi Kumar Veluru</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Indian traditional neighborhoods are socially active and sometimes intrusive communities, which are losing their qualities due to western influences, undermining the traditional Indian values by blind adaptation of western neighborhood concepts since the scale is not suitable to the Indian context. This paper aims to understand the qualities of Indian traditional neighborhoods by evaluating a traditional neighborhood of Jaipur, comparing it with a modern planned neighborhood of Chandigarh, designed by a foreign planner, in the neighborhood concept of the western world, to find out the special qualities of traditional Indian neighborhoods as compared to western concepts in terms of social spaces, by way of physical observation of selected neighborhoods and residents structured questionnaire survey. The combined analysis found that social spaces are abundantly available in traditional neighborhoods, which are missing in modern neighborhoods, which are the main qualities where interactions happen, aiming towards the formation of social capital. The qualities of traditional neighborhoods have to be considered while designing new neighborhoods in India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indian%20neighborhoods" title="Indian neighborhoods">Indian neighborhoods</a>, <a href="https://publications.waset.org/abstracts/search?q=modern%20neighborhoods" title=" modern neighborhoods"> modern neighborhoods</a>, <a href="https://publications.waset.org/abstracts/search?q=neighborhood%20planning" title=" neighborhood planning"> neighborhood planning</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20spaces" title=" social spaces"> social spaces</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20neighborhoods" title=" traditional neighborhoods"> traditional neighborhoods</a> </p> <a href="https://publications.waset.org/abstracts/155054/understanding-the-qualities-of-indian-neighborhoods-understanding-of-social-spaces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155054.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">120</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">57</span> Communication Apprehension among College Students in United Arab Emirates: A Case Study of Undergraduate Students of Abu Dhabi University</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nunna%20Venkata%20Prasad">Nunna Venkata Prasad</a>, <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Amoke%20Folarin"> Maryam Amoke Folarin</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Ali%20Shaukat%20Sham"> Muhammad Ali Shaukat Sham </a> </p> <p class="card-text"><strong>Abstract:</strong></p> A quantitative investigation was conducted to explore the communication apprehension among undergraduate students of Abu Dhabi University. Communication apprehension (CA) is an individual’s level of fear or anxiety associated with either real or anticipated communication with another person or persons. All individuals experience some level of communication apprehension. A total of 100 participants selected through a stratified sampling method, which includes 50 males and 50 females participated in the study. The research was conducted by distributing the personal report of communication apprehension questionnaire, randomly amongst these students. Results were affirmative with previous researches conducted. Demographics, age, or college year did not make any significant differences amongst the undergraduate students. More students were found to have high CA with public speaking rather than other scenarios. And lesser students were found to have high CA level with one-on-one conversations although a significant number of them still tested to have high CA with interpersonal communications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication%20apprehension" title="communication apprehension">communication apprehension</a>, <a href="https://publications.waset.org/abstracts/search?q=interpersonal%20communication" title=" interpersonal communication"> interpersonal communication</a>, <a href="https://publications.waset.org/abstracts/search?q=oral%20communication" title=" oral communication"> oral communication</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20speaking" title=" public speaking"> public speaking</a> </p> <a href="https://publications.waset.org/abstracts/105232/communication-apprehension-among-college-students-in-united-arab-emirates-a-case-study-of-undergraduate-students-of-abu-dhabi-university" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/105232.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">188</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">56</span> Numerical Analysis on Triceratops Restraining System: Failure Conditions of Tethers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Srinivasan%20Chandrasekaran">Srinivasan Chandrasekaran</a>, <a href="https://publications.waset.org/abstracts/search?q=Manda%20Hari%20Venkata%20Ramachandra%20Rao"> Manda Hari Venkata Ramachandra Rao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Increase in the oil and gas exploration in ultra deep-water demands an adaptive structural form of the platform. Triceratops has superior motion characteristics compared to that of the Tension Leg Platform and Single Point Anchor Reservoir platforms, which is well established in the literature. Buoyant legs that support the deck are position-restrained to the sea bed using tethers with high axial pretension. Environmental forces that act on the platform induce dynamic tension variations in the tethers, causing the failure of tethers. The present study investigates the dynamic response behavior of the restraining system of the platform under the failure of a single tether of each buoyant leg in high sea states. Using the rain-flow counting algorithm and the Goodman diagram, fatigue damage caused to the tethers is estimated, and the fatigue life is predicted. Results shows that under failure conditions, the fatigue life of the remaining tethers is quite alarmingly low. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=fatigue%20life" title="fatigue life">fatigue life</a>, <a href="https://publications.waset.org/abstracts/search?q=pm%20spectrum" title=" pm spectrum"> pm spectrum</a>, <a href="https://publications.waset.org/abstracts/search?q=rain%20flow%20counting" title=" rain flow counting"> rain flow counting</a>, <a href="https://publications.waset.org/abstracts/search?q=triceratops" title=" triceratops"> triceratops</a>, <a href="https://publications.waset.org/abstracts/search?q=failure%20analysis" title=" failure analysis"> failure analysis</a> </p> <a href="https://publications.waset.org/abstracts/110131/numerical-analysis-on-triceratops-restraining-system-failure-conditions-of-tethers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/110131.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">55</span> Comparison of Dynamic Characteristics of Railway Bridge Spans to Know the Health of Elastomeric Bearings Using Tri Axial Accelerometer Sensors</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Narayanakumar%20Somasundaram">Narayanakumar Somasundaram</a>, <a href="https://publications.waset.org/abstracts/search?q=Venkat%20Nihit%20Chirivella"> Venkat Nihit Chirivella</a>, <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Dilip%20Kumar%20Pasupuleti"> Venkata Dilip Kumar Pasupuleti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ajakool, India, has a multi-span bridge that is constructed for rail transport with a maximum operating speed of 100 km/hr. It is a standard RDSO design of a PSC box girder carrying a single railway track. The Structural Health Monitoring System (SHM) is designed and installed to compare and analyze the vibrations and displacements on the bridge due to different live loads from moving trains. The study is conducted for three different spans of the same bridge to understand the health of the elastomeric bearings. Also, to validate the same, a three-dimensional finite element model is developed, and modal analysis is carried out. The proposed methodology can help in detecting deteriorated elastomeric bearings using only wireless tri-accelerometer sensors. Detailed analysis and results are presented in terms of mode shapes, accelerations, displacements, and their importance to each other. This can be implemented with a lot of ease and can be more accurate. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dynamic%20effects" title="dynamic effects">dynamic effects</a>, <a href="https://publications.waset.org/abstracts/search?q=vibration%20analysis" title=" vibration analysis"> vibration analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=accelerometer%20sensors" title=" accelerometer sensors"> accelerometer sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20element%20analysis" title=" finite element analysis"> finite element analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20health%20monitoring" title=" structural health monitoring"> structural health monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=elastomeric%20bearing" title=" elastomeric bearing"> elastomeric bearing</a> </p> <a href="https://publications.waset.org/abstracts/154069/comparison-of-dynamic-characteristics-of-railway-bridge-spans-to-know-the-health-of-elastomeric-bearings-using-tri-axial-accelerometer-sensors" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154069.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">54</span> A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Loh%20Fu%20Quan">Loh Fu Quan</a>, <a href="https://publications.waset.org/abstracts/search?q=Fong%20Zi%20Heng"> Fong Zi Heng</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cloud%20computing" title="Cloud computing">Cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=Cloud%20security" title=" Cloud security"> Cloud security</a>, <a href="https://publications.waset.org/abstracts/search?q=Cloud%20security%20issues" title=" Cloud security issues"> Cloud security issues</a>, <a href="https://publications.waset.org/abstracts/search?q=Cloud%20security%20framework" title=" Cloud security framework"> Cloud security framework</a> </p> <a href="https://publications.waset.org/abstracts/168890/a-comprehensive-framework-to-ensure-data-security-in-cloud-computing-analysis-solutions-and-approaches" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168890.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">53</span> Hybrid PWM Techniques for the Reduction of Switching Losses and Voltage Harmonics in Cascaded Multilevel Inverters</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Reddy%20Kota">Venkata Reddy Kota</a> </p> <p class="card-text"><strong>Abstract:</strong></p> These days, the industrial trend is moving away from heavy and bulky passive components to power converter systems that use more and more semiconductor elements. Also, it is difficult to connect the traditional converters to the high and medium voltage. For these reasons, a new family of multilevel inverters has appeared as a solution for working with higher voltage levels. Different modulation topologies like Sinusoidal Pulse Width Modulation (SPWM), Selective Harmonic Elimination Pulse Width Modulation (SHE-PWM) are available for multilevel inverters. In this work, different hybrid modulation techniques which are combination of fundamental frequency modulation and multilevel sinusoidal-modulation are compared. The main characteristic of these modulations are reduction of switching losses with good harmonic performance and balanced power loss dissipation among the device. The proposed hybrid modulation schemes are developed and simulated in Matlab/Simulink for cascaded H-bridge inverter. The results validate the applicability of the proposed schemes for cascaded multilevel inverter. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hybrid%20PWM%20techniques" title="hybrid PWM techniques">hybrid PWM techniques</a>, <a href="https://publications.waset.org/abstracts/search?q=cascaded%20multilevel%20inverters" title=" cascaded multilevel inverters"> cascaded multilevel inverters</a>, <a href="https://publications.waset.org/abstracts/search?q=switching%20loss%20minimization" title=" switching loss minimization"> switching loss minimization</a> </p> <a href="https://publications.waset.org/abstracts/12634/hybrid-pwm-techniques-for-the-reduction-of-switching-losses-and-voltage-harmonics-in-cascaded-multilevel-inverters" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12634.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">616</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> Distributed Multi-Agent Based Approach on Intelligent Transportation Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Xiao%20Yihong">Xiao Yihong</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu%20Kexin"> Yu Kexin</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the accelerating process of urbanization, the problem of urban road congestion is becoming more and more serious. Intelligent transportation system combining distributed and artificial intelligence has become a research hotspot. As the core development direction of the intelligent transportation system, Cooperative Intelligent Transportation System (C-ITS) integrates advanced information technology and communication methods and realizes the integration of humans, vehicle, roadside infrastructure, and other elements through the multi-agent distributed system. By analyzing the system architecture and technical characteristics of C-ITS, the report proposes a distributed multi-agent C-ITS. The system consists of Roadside Sub-system, Vehicle Sub-system, and Personal Sub-system. At the same time, we explore the scalability of the C-ITS and put forward incorporating local rewards in the centralized training decentralized execution paradigm, hoping to add a scalable value decomposition method. In addition, we also suggest introducing blockchain to improve the safety of the traffic information transmission process. The system is expected to improve vehicle capacity and traffic safety. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20system" title="distributed system">distributed system</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-agent" title=" multi-agent"> multi-agent</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperative%20intelligent%20transportation%20system" title=" cooperative intelligent transportation system"> cooperative intelligent transportation system</a> </p> <a href="https://publications.waset.org/abstracts/152744/distributed-multi-agent-based-approach-on-intelligent-transportation-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/152744.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">214</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> Artificial Intelligence and Distributed System Computing: Application and Practice in Real Life</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lai%20Junzhe">Lai Junzhe</a>, <a href="https://publications.waset.org/abstracts/search?q=Wang%20Lihao"> Wang Lihao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, due to today's global technological advances, big data and artificial intelligence technologies have been widely used in various industries and fields, playing an important role in reducing costs and increasing efficiency. Among them, artificial intelligence has derived another branch in its own continuous progress and the continuous development of computer personnel, namely distributed artificial intelligence computing systems. Distributed AI is a method for solving complex learning, decision-making, and planning problems, characterized by the ability to take advantage of large-scale computation and the spatial distribution of resources, and accordingly, it can handle problems with large data sets. Nowadays, distributed AI is widely used in military, medical, and human daily life and brings great convenience and efficient operation to life. In this paper, we will discuss three areas of distributed AI computing systems in vision processing, blockchain, and smart home to introduce the performance of distributed systems and the role of AI in distributed systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20system" title="distributed system">distributed system</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20information%20processing" title=" visual information processing"> visual information processing</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20home" title=" smart home"> smart home</a> </p> <a href="https://publications.waset.org/abstracts/153089/artificial-intelligence-and-distributed-system-computing-application-and-practice-in-real-life" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153089.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">50</span> Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aofan%20Liu">Aofan Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Qianqian%20Tan"> Qianqian Tan</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title="data privacy">data privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20system" title=" distributed system"> distributed system</a>, <a href="https://publications.waset.org/abstracts/search?q=federated%20learning" title=" federated learning"> federated learning</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/168789/improving-security-in-healthcare-applications-using-federated-learning-system-with-blockchain-technology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168789.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">132</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> An Efficient Resource Management Algorithm for Mobility Management in Wireless Mesh Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mallikarjuna%20Rao%20Yamarthy">Mallikarjuna Rao Yamarthy</a>, <a href="https://publications.waset.org/abstracts/search?q=Subramanyam%20Makam%20Venkata"> Subramanyam Makam Venkata</a>, <a href="https://publications.waset.org/abstracts/search?q=Satya%20Prasad%20Kodati"> Satya Prasad Kodati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main objective of the proposed work is to reduce the overall network traffic incurred by mobility management, packet delivery cost and to increase the resource utilization. The proposed algorithm, An Efficient Resource Management Algorithm (ERMA) for mobility management in wireless mesh networks, relies on pointer based mobility management scheme. Whenever a mesh client moves from one mesh router to another, the pointer is set up dynamically between the previous mesh router and current mesh router based on the distance constraints. The algorithm evaluated for signaling cost, data delivery cost and total communication cost performance metrics. The proposed algorithm is demonstrated for both internet sessions and intranet sessions. The proposed algorithm yields significantly better performance in terms of signaling cost, data delivery cost, and total communication cost. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20delivery%20cost" title="data delivery cost">data delivery cost</a>, <a href="https://publications.waset.org/abstracts/search?q=mobility%20management" title=" mobility management"> mobility management</a>, <a href="https://publications.waset.org/abstracts/search?q=pointer%20forwarding" title=" pointer forwarding"> pointer forwarding</a>, <a href="https://publications.waset.org/abstracts/search?q=resource%20management" title=" resource management"> resource management</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20mesh%20networks" title=" wireless mesh networks"> wireless mesh networks</a> </p> <a href="https://publications.waset.org/abstracts/76159/an-efficient-resource-management-algorithm-for-mobility-management-in-wireless-mesh-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76159.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">367</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Venugopal%20Rao%20Gudlur">Venkata Venugopal Rao Gudlur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title="Internet of Things">Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=Process%20Management" title=" Process Management"> Process Management</a>, <a href="https://publications.waset.org/abstracts/search?q=Forensic%20Investigation" title=" Forensic Investigation"> Forensic Investigation</a>, <a href="https://publications.waset.org/abstracts/search?q=M2M%20Framework" title=" M2M Framework"> M2M Framework</a> </p> <a href="https://publications.waset.org/abstracts/154606/importance-of-new-policies-of-process-management-for-internet-of-things-based-on-forensic-investigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154606.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> UNIX Source Code Leak: Evaluation and Feasible Solutions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gu%20Dongxing">Gu Dongxing</a>, <a href="https://publications.waset.org/abstracts/search?q=Li%20Yuxuan"> Li Yuxuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Nong%20Tengxiao"> Nong Tengxiao</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20transmission" title="data transmission">data transmission</a>, <a href="https://publications.waset.org/abstracts/search?q=Linux" title=" Linux"> Linux</a>, <a href="https://publications.waset.org/abstracts/search?q=source%20code" title=" source code"> source code</a>, <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title=" operating system"> operating system</a> </p> <a href="https://publications.waset.org/abstracts/153161/unix-source-code-leak-evaluation-and-feasible-solutions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153161.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">270</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> A Guide to User-Friendly Bash Prompt: Adding Natural Language Processing Plus Bash Explanation to the Command Interface</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Teh%20Kean%20Kheng">Teh Kean Kheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Low%20Soon%20Yee"> Low Soon Yee</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In 2022, as the future world becomes increasingly computer-related, more individuals are attempting to study coding for themselves or in school. This is because they have discovered the value of learning code and the benefits it will provide them. But learning coding is difficult for most people. Even senior programmers that have experience for a decade year still need help from the online source while coding. The reason causing this is that coding is not like talking to other people; it has the specific syntax to make the computer understand what we want it to do, so coding will be hard for normal people if they don’t have contact in this field before. Coding is hard. If a user wants to learn bash code with bash prompt, it will be harder because if we look at the bash prompt, we will find that it is just an empty box and waiting for a user to tell the computer what we want to do, if we don’t refer to the internet, we will not know what we can do with the prompt. From here, we can conclude that the bash prompt is not user-friendly for new users who are learning bash code. Our goal in writing this paper is to give an idea to implement a user-friendly Bash prompt in Ubuntu OS using Artificial Intelligent (AI) to lower the threshold of learning in Bash code, to make the user use their own words and concept to write and learn Bash code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=user-friendly" title="user-friendly">user-friendly</a>, <a href="https://publications.waset.org/abstracts/search?q=bash%20code" title=" bash code"> bash code</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=threshold" title=" threshold"> threshold</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20similarity" title=" semantic similarity"> semantic similarity</a>, <a href="https://publications.waset.org/abstracts/search?q=lexical%20similarity" title=" lexical similarity"> lexical similarity</a> </p> <a href="https://publications.waset.org/abstracts/161116/a-guide-to-user-friendly-bash-prompt-adding-natural-language-processing-plus-bash-explanation-to-the-command-interface" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161116.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">142</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> Online Yoga Asana Trainer Using Deep Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Narayana%20Chejarla">Venkata Narayana Chejarla</a>, <a href="https://publications.waset.org/abstracts/search?q=Nafisa%20Parvez%20Shaik"> Nafisa Parvez Shaik</a>, <a href="https://publications.waset.org/abstracts/search?q=Gopi%20Vara%20Prasad%20Marabathula"> Gopi Vara Prasad Marabathula</a>, <a href="https://publications.waset.org/abstracts/search?q=Deva%20Kumar%20Bejjam"> Deva Kumar Bejjam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Yoga is an advanced, well-recognized method with roots in Indian philosophy. Yoga benefits both the body and the psyche. Yoga is a regular exercise that helps people relax and sleep better while also enhancing their balance, endurance, and concentration. Yoga can be learned in a variety of settings, including at home with the aid of books and the internet as well as in yoga studios with the guidance of an instructor. Self-learning does not teach the proper yoga poses, and doing them without the right instruction could result in significant injuries. We developed "Online Yoga Asana Trainer using Deep Learning" so that people could practice yoga without a teacher. Our project is developed using Tensorflow, Movenet, and Keras models. The system makes use of data from Kaggle that includes 25 different yoga poses. The first part of the process involves applying the movement model for extracting the 17 key points of the body from the dataset, and the next part involves preprocessing, which includes building a pose classification model using neural networks. The system scores a 98.3% accuracy rate. The system is developed to work with live videos. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=yoga" title="yoga">yoga</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=movenet" title=" movenet"> movenet</a>, <a href="https://publications.waset.org/abstracts/search?q=tensorflow" title=" tensorflow"> tensorflow</a>, <a href="https://publications.waset.org/abstracts/search?q=keras" title=" keras"> keras</a>, <a href="https://publications.waset.org/abstracts/search?q=CNN" title=" CNN"> CNN</a> </p> <a href="https://publications.waset.org/abstracts/163914/online-yoga-asana-trainer-using-deep-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/163914.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">240</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> Human Rabies Survivors in India: Epidemiological, Immunological and Virological Studies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Madhusudana%20S.%20N.">Madhusudana S. N.</a>, <a href="https://publications.waset.org/abstracts/search?q=Reeta%20Mani"> Reeta Mani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashwini%20S.%20Satishchandra%20P."> Ashwini S. Satishchandra P.</a>, <a href="https://publications.waset.org/abstracts/search?q=Netravati"> Netravati</a>, <a href="https://publications.waset.org/abstracts/search?q=Udhani%20V."> Udhani V.</a>, <a href="https://publications.waset.org/abstracts/search?q=Fiaz%20A."> Fiaz A.</a>, <a href="https://publications.waset.org/abstracts/search?q=Karande%20S."> Karande S.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Rabies is an acute encephalitis which is considered 100% fatal despite occasional reports of survivors. However, in recent times more cases of human rabies survivors are being reported. In the last 5 years, there are six laboratories confirmed human rabies survivors in India alone. All cases were children below 15 years and all contracted the disease by dog bites. All of them also had received the full or partial course of rabies vaccination and 4 out of 6 had also received rabies immunoglobulin. All cases were treated in intensive care units in hospitals at Bangalore, Mumbai, Chandigarh, Lucknow and Goa. We report here the results of immunological and virological studies conducted at our laboratory on these patients. The clinical samples that were obtained from these patients were Serum, CSF, nuchal skin biopsy and saliva. Serum and CSF samples were subjected to standard RFFIT for estimation of rabies neutralizing antibodies. Skin biopsy, CSF and saliva were processed by TaqMan real-time PCR for detection of viral RNA. CSF, saliva and skin homogenates were also processed for virus isolation by inoculation of suckling mice. The PBMCs isolated from fresh blood was subjected to ELISPOT assay to determine the type of immune response (Th1/Th2). Both CSF and serum were also investigated for selected cytokines by Luminex assay. The level of antibodies to virus G protein and N protein were determined by ELISA. All survivors had very high titers of RVNA in serum and CSF 100 fold higher than non-survivors and vaccine controls. A five-fold rise in titer could be demonstrated in 4 out of 6 patients. All survivors had a significant increase in antibodies to G protein in both CSF and serum when compared to non-survivors. There was a profound and robust Th1 response in all survivors indicating that interferon gamma could play an important factor in virus clearance. We could isolate viral RNA in only one patient four years after he had developed symptoms. The partial N gene sequencing revealed 99% homology to species I strain prevalent in India. Levels of selected cytokines in CSF and serum did not reveal any difference between survivors and non-survivors. To conclude, survival from rabies is mediated by virus-specific immune responses of the host and clearance of rabies virus from CNS may involve the participation of both Th2 and Th1 immune responses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rabies" title="rabies">rabies</a>, <a href="https://publications.waset.org/abstracts/search?q=rabies%20treatment" title=" rabies treatment"> rabies treatment</a>, <a href="https://publications.waset.org/abstracts/search?q=rabies%20survivors" title=" rabies survivors"> rabies survivors</a>, <a href="https://publications.waset.org/abstracts/search?q=immune%20reponse%20in%20rabies%20encephalitis" title=" immune reponse in rabies encephalitis"> immune reponse in rabies encephalitis</a> </p> <a href="https://publications.waset.org/abstracts/25896/human-rabies-survivors-in-india-epidemiological-immunological-and-virological-studies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25896.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">330</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> Estimation of Aquifer Properties Using Pumping Tests: Case Study of Pydibhimavaram Industrial Area, Srikakulam, India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20Venkata%20Rao">G. Venkata Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Kalpana"> P. Kalpana</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Srinivasa%20Rao"> R. Srinivasa Rao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adequate and reliable estimates of aquifer parameters are of utmost importance for proper management of vital groundwater resources. At present scenario the ground water is polluted because of industrial waste disposed over the land and the contaminants are transported in the aquifer from one area to another area which is depending on the characteristics of the aquifer and contaminants. To know the contaminant transport, the accurate estimation of aquifer properties is highly needed. Conventionally, these properties are estimated through pumping tests carried out on water wells. The occurrence and movement of ground water in the aquifer are characteristically defined by the aquifer parameters. The pumping (aquifer) test is the standard technique for estimating various hydraulic properties of aquifer systems, viz, transmissivity (T), hydraulic conductivity (K), storage coefficient (S) etc., for which the graphical method is widely used. The study area for conducting pumping test is Pydibheemavaram Industrial area near the coastal belt of Srikulam, AP, India. The main objective of the present work is to estimate the aquifer properties for developing contaminant transport model for the study area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aquifer" title="aquifer">aquifer</a>, <a href="https://publications.waset.org/abstracts/search?q=contaminant%20transport" title=" contaminant transport"> contaminant transport</a>, <a href="https://publications.waset.org/abstracts/search?q=hydraulic%20conductivity" title=" hydraulic conductivity"> hydraulic conductivity</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20waste" title=" industrial waste"> industrial waste</a>, <a href="https://publications.waset.org/abstracts/search?q=pumping%20test" title=" pumping test"> pumping test</a> </p> <a href="https://publications.waset.org/abstracts/31498/estimation-of-aquifer-properties-using-pumping-tests-case-study-of-pydibhimavaram-industrial-area-srikakulam-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31498.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">446</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhang%20Xingnan">Zhang Xingnan</a>, <a href="https://publications.waset.org/abstracts/search?q=Huang%20Jingjia"> Huang Jingjia</a>, <a href="https://publications.waset.org/abstracts/search?q=Feng%20Yue"> Feng Yue</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=operating%20system" title="operating system">operating system</a>, <a href="https://publications.waset.org/abstracts/search?q=ROP%20attacks" title=" ROP attacks"> ROP attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=returning-oriented%20programming%20attacks" title=" returning-oriented programming attacks"> returning-oriented programming attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=ASLR" title=" ASLR"> ASLR</a>, <a href="https://publications.waset.org/abstracts/search?q=LBR" title=" LBR"> LBR</a>, <a href="https://publications.waset.org/abstracts/search?q=CFI" title=" CFI"> CFI</a>, <a href="https://publications.waset.org/abstracts/search?q=DEP" title=" DEP"> DEP</a>, <a href="https://publications.waset.org/abstracts/search?q=code%20randomization" title=" code randomization"> code randomization</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware-assisted%20CFI" title=" hardware-assisted CFI"> hardware-assisted CFI</a> </p> <a href="https://publications.waset.org/abstracts/168825/a-comprehensive-approach-to-mitigate-return-oriented-programming-attacks-combining-operating-system-protection-mechanisms-and-hardware-assisted-techniques" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168825.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Groundwater Utilization and Sustainability: A Case Study of Pydibheemavaram Industrial Area, India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20Venkata%20Rao">G. Venkata Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Srinivasa%20Rao"> R. Srinivasa Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Neelima%20Sri%20Priya"> B. Neelima Sri Priya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The over extraction of groundwater from the coastal aquifers, result in reduction of groundwater resource and lowering of water level. In general, the depletion of groundwater level enhances the landward migration of saltwater wedge. Now a days the ground water extraction increases by year to year because increased population and industrialization. The ground water is the only source of irrigation, domestic and Industrial purposes at Pydibhimavaram industrial area, which is located in the coastal belt of Srikakulam district, India of Latitudes 18.145N 83.627E and Longitudes 18.099N 83.674E. The present study has been attempted to calculate amount of water getting recharged into this aquifer, status of rainfall pattern for the past two decades and the runoff is calculated by using Khosla’s formula with available rainfall and temperature in the study area. A decision support model has been developed on the basis of Monthly Extractions of the water from the ground through bore wells and the Net Recharge of the aquifer. It is concluded that the amount of extractions is exceeding the amount of recharge from May to October in a given year which will in turn damage the water balance in the subsurface layers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=aquifer" title="aquifer">aquifer</a>, <a href="https://publications.waset.org/abstracts/search?q=decision%20support%20model" title=" decision support model"> decision support model</a>, <a href="https://publications.waset.org/abstracts/search?q=groundwater%20extraction" title=" groundwater extraction"> groundwater extraction</a>, <a href="https://publications.waset.org/abstracts/search?q=run%20off%20estimation%20and%20rainfall" title=" run off estimation and rainfall"> run off estimation and rainfall</a> </p> <a href="https://publications.waset.org/abstracts/42655/groundwater-utilization-and-sustainability-a-case-study-of-pydibheemavaram-industrial-area-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> Challenges for Municipal Solid Waste Management in India: A Case Study of Eluru, Andhra Pradesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20V.%20Prasada%20Rao%20P.">V. V. Prasada Rao P.</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Venkata%20Subbaiah"> K. Venkata Subbaiah</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Sudhir%20Kumar"> J. Sudhir Kumar </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most Indian cities or townships are facing greater challenges in proper disposal of their municipal solid wastes, which are growing exponentially with the rising urban population and improvement in the living standards. As per the provisional figures, 377 million people live in the urban areas accounting for 31.16 % of the Country’s total population, and expected to grow by 3.74% every year. In India, the municipal authority is liable for the safe management & disposal of Municipal Solid Wastes. However, even with the current levels of MSW generation, a majority of the local governments are unable to comply with their constitutional responsibility due to reasons ranging from cultural aspects to technological and financial constraints. In contrast, it is expected that the MSW generation in India is likely to increase from 68.8 MTD in 2011 to 160.5 MTD by 2041. Thus, the immediate challenge before the urban local bodies in India is to evolve suitable strategies not only to cope up with the current levels, but also to address the anticipated generation levels of MSW. This paper discusses the reasons for the low levels of enforcement of MSW Rules and suggests effective management strategies for the safe disposal of MSW. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biodegradable%20waste" title="biodegradable waste">biodegradable waste</a>, <a href="https://publications.waset.org/abstracts/search?q=dumping%20sites" title=" dumping sites"> dumping sites</a>, <a href="https://publications.waset.org/abstracts/search?q=management%20strategy" title=" management strategy"> management strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=municipal%20solid%20waste%20%28MSW%29" title=" municipal solid waste (MSW)"> municipal solid waste (MSW)</a>, <a href="https://publications.waset.org/abstracts/search?q=MSW%20rules" title=" MSW rules"> MSW rules</a>, <a href="https://publications.waset.org/abstracts/search?q=vermicompost" title=" vermicompost"> vermicompost</a> </p> <a href="https://publications.waset.org/abstracts/34871/challenges-for-municipal-solid-waste-management-in-india-a-case-study-of-eluru-andhra-pradesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34871.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">306</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">39</span> Incorporating Priority Round-Robin Scheduler to Sustain Indefinite Blocking Issue and Prioritized Processes in Operating System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Heng%20Chia%20Ying">Heng Chia Ying</a>, <a href="https://publications.waset.org/abstracts/search?q=Charmaine%20Tan%20Chai%20Nie"> Charmaine Tan Chai Nie</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Process scheduling is the method of process management that determines which process the CPU will proceed with for the next task and how long it takes. Some issues were found in process management, particularly for Priority Scheduling (PS) and Round Robin Scheduling (RR). The proposed recommendations made for IPRRS are to combine the strengths of both into a combining algorithm while they draw on others to compensate for each weakness. A significant improvement on the combining technique of scheduler, Incorporating Priority Round-Robin Scheduler (IPRRS) address an algorithm for both high and low priority task to sustain the indefinite blocking issue faced in the priority scheduling algorithm and minimize the average turnaround time (ATT) and average waiting time (AWT) in RR scheduling algorithm. This paper will delve into the simple rules introduced by IPRRS and enhancements that both PS and RR bring to the execution of processes in the operating system. Furthermore, it incorporates the best aspects of each algorithm to build the optimum algorithm for a certain case in terms of prioritized processes, ATT, and AWT. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=round%20Robin%20scheduling" title="round Robin scheduling">round Robin scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=priority%20scheduling" title=" priority scheduling"> priority scheduling</a>, <a href="https://publications.waset.org/abstracts/search?q=indefinite%20blocking" title=" indefinite blocking"> indefinite blocking</a>, <a href="https://publications.waset.org/abstracts/search?q=process%20management" title=" process management"> process management</a>, <a href="https://publications.waset.org/abstracts/search?q=sustain" title=" sustain"> sustain</a>, <a href="https://publications.waset.org/abstracts/search?q=turnaround%20time" title=" turnaround time"> turnaround time</a> </p> <a href="https://publications.waset.org/abstracts/160706/incorporating-priority-round-robin-scheduler-to-sustain-indefinite-blocking-issue-and-prioritized-processes-in-operating-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160706.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">38</span> The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wu%20You">Wu You</a>, <a href="https://publications.waset.org/abstracts/search?q=Burra%20Venkata%20Durga%20Kumar"> Burra Venkata Durga Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence%20%28AI%29" title=" artificial intelligence (AI)"> artificial intelligence (AI)</a>, <a href="https://publications.waset.org/abstracts/search?q=scaled%20distributed%20systems" title=" scaled distributed systems"> scaled distributed systems</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20chain%20finance" title=" supply chain finance"> supply chain finance</a>, <a href="https://publications.waset.org/abstracts/search?q=efficiency%20and%20security" title=" efficiency and security"> efficiency and security</a> </p> <a href="https://publications.waset.org/abstracts/168642/the-fusion-of-blockchain-and-ai-in-supply-chain-finance-scalability-in-distributed-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168642.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">93</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">37</span> On Enabling Miner Self-Rescue with In-Mine Robots using Real-Time Object Detection with Thermal Images</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Cyrus%20Addy">Cyrus Addy</a>, <a href="https://publications.waset.org/abstracts/search?q=Venkata%20Sriram%20Siddhardh%20Nadendla"> Venkata Sriram Siddhardh Nadendla</a>, <a href="https://publications.waset.org/abstracts/search?q=Kwame%20Awuah-Offei"> Kwame Awuah-Offei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Surface robots in modern underground mine rescue operations suffer from several limitations in enabling a prompt self-rescue. Therefore, the possibility of designing and deploying in-mine robots to expedite miner self-rescue can have a transformative impact on miner safety. These in-mine robots for miner self-rescue can be envisioned to carry out diverse tasks such as object detection, autonomous navigation, and payload delivery. Specifically, this paper investigates the challenges in the design of object detection algorithms for in-mine robots using thermal images, especially to detect people in real-time. A total of 125 thermal images were collected in the Missouri S&T Experimental Mine with the help of student volunteers using the FLIR TG 297 infrared camera, which were pre-processed into training and validation datasets with 100 and 25 images, respectively. Three state-of-the-art, pre-trained real-time object detection models, namely YOLOv5, YOLO-FIRI, and YOLOv8, were considered and re-trained using transfer learning techniques on the training dataset. On the validation dataset, the re-trained YOLOv8 outperforms the re-trained versions of both YOLOv5, and YOLO-FIRI. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=miner%20self-rescue" title="miner self-rescue">miner self-rescue</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20detection" title=" object detection"> object detection</a>, <a href="https://publications.waset.org/abstracts/search?q=underground%20mine" title=" underground mine"> underground mine</a>, <a href="https://publications.waset.org/abstracts/search?q=YOLO" title=" YOLO"> YOLO</a> </p> <a href="https://publications.waset.org/abstracts/174124/on-enabling-miner-self-rescue-with-in-mine-robots-using-real-time-object-detection-with-thermal-images" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174124.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Madhusudana%20Rao%20Kapavarapu&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Madhusudana%20Rao%20Kapavarapu&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=Venkata%20Madhusudana%20Rao%20Kapavarapu&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>