Pub Date : 2022-11-01DOI: 10.1016/j.gltp.2021.10.002
Tejaswini K , Umadevi V , Shashank M Kadiwal , Sanjay Revanna
Finding acceptable applicants for a vacant job might be a difficult process, especially when there are many prospects. The manual process of screening resumes could stymie the team's efforts to locate the right individual at the right moment. The laborious screening may be greatly aided by an automated technique for screening and ranking applicants. In our work, the top applicants might be rated using content-based suggestion, which uses cosine similarity to find the curriculum vitae that are the most comparable to the job description supplied and KNN algorithm is used to pick and rank Curriculum Vitaes (CV) based on job descriptions in huge quantities. Experimental results indicate the performance of the proposed system as an average text parsing accuracy of 85% and a ranking accuracy of 92%.
{"title":"Design and development of machine learning based resume ranking system","authors":"Tejaswini K , Umadevi V , Shashank M Kadiwal , Sanjay Revanna","doi":"10.1016/j.gltp.2021.10.002","DOIUrl":"10.1016/j.gltp.2021.10.002","url":null,"abstract":"<div><p>Finding acceptable applicants for a vacant job might be a difficult process, especially when there are many prospects. The manual process of screening resumes could stymie the team's efforts to locate the right individual at the right moment. The laborious screening may be greatly aided by an automated technique for screening and ranking applicants. In our work, the top applicants might be rated using content-based suggestion, which uses cosine similarity to find the curriculum vitae that are the most comparable to the job description supplied and KNN algorithm is used to pick and rank Curriculum Vitaes (CV) based on job descriptions in huge quantities. Experimental results indicate the performance of the proposed system as an average text parsing accuracy of 85% and a ranking accuracy of 92%.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 371-375"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001011/pdfft?md5=278d731e46c28d0f1c87510c36fb1467&pid=1-s2.0-S2666285X21001011-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87999136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wireless Sensor Networks (WSNs) depicts to the group of spatially distributed sensor nodes, each node is having individual battery for power consumption which senses the factors like Temperature, Pressure, Soil makeup, Vehicular movement, and checks the physical presence of objects, which are communicate through internet and passing messages between nearest neighbor nodes. WSN are extensively used in several applications like Environmental Monitoring, Area Monitoring, Engineering Monitoring, Health Care Monitoring, and Military Applications. Since WSN are highly susceptible for many attacks especially Jamming Attack. This causes high energy consumption, reduces the life time of nodes, affects the entire sensor networks and most significantly also the confidentiality and integrity of the data packets which are transmitted through dissimilar nodes in the network. In order to overcome these issues, a new bio-inspired algorithm called Intelligent Slime Mold (ISM) has been introduced for detection jamming node and to setting up of alternate optimal path form source node to destination node in WSN to avoid jammer affected nodes by applying Context Aware Decision Rule (CADR). This work ensures the confidentiality and integrity of both the network and data packets.
{"title":"Intelligent slime mold algorithm for proficient jamming attack detection in wireless sensor network","authors":"Amirthasaravanan Arivunambi, Arjun Paramarthalingam","doi":"10.1016/j.gltp.2022.06.001","DOIUrl":"10.1016/j.gltp.2022.06.001","url":null,"abstract":"<div><p>Wireless Sensor Networks (WSNs) depicts to the group of spatially distributed sensor nodes, each node is having individual battery for power consumption which senses the factors like Temperature, Pressure, Soil makeup, Vehicular movement, and checks the physical presence of objects, which are communicate through internet and passing messages between nearest neighbor nodes. WSN are extensively used in several applications like Environmental Monitoring, Area Monitoring, Engineering Monitoring, Health Care Monitoring, and Military Applications. Since WSN are highly susceptible for many attacks especially Jamming Attack. This causes high energy consumption, reduces the life time of nodes, affects the entire sensor networks and most significantly also the confidentiality and integrity of the data packets which are transmitted through dissimilar nodes in the network. In order to overcome these issues, a new bio-inspired algorithm called Intelligent Slime Mold (ISM) has been introduced for detection jamming node and to setting up of alternate optimal path form source node to destination node in WSN to avoid jammer affected nodes by applying Context Aware Decision Rule (CADR). This work ensures the confidentiality and integrity of both the network and data packets.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 386-391"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000759/pdfft?md5=ad951a2e0159b09bf13123c4b064810a&pid=1-s2.0-S2666285X22000759-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86082495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
From decades, Earth is reminding humans to find better ways to produce power rather than burning fossil fuels which would result in the emission of harmful gases into the environment. The world energy consumption is expected to increase substantially in the next decade and if the same negligence towards the environment continues, there will be a day when no clean air would be available. Traditional practices of producing energy, regularly reminds us the serious threat they pose to the environment. Thus there is a need to produce independent and clean electricity. Wave energy can be observed as a possible clean energy resource which can be exploited for power generation purposes. While this method is relatively new and economically competitive, there is a growing trend towards it, which is gaining interest from government and industries. A vital feature of these waves is that they have the highest energy density when compared to other renewable energy resources.
{"title":"Power Generation Using Ocean Waves: A Review","authors":"Kavadiki Veerabhadrappa , B.G. Suhas , Chidanand K. Mangrulkar , R. Suresh Kumar , V.S. Mudakappanavar , Narahari , K.N. Seetharamu","doi":"10.1016/j.gltp.2022.05.001","DOIUrl":"10.1016/j.gltp.2022.05.001","url":null,"abstract":"<div><p>From decades, Earth is reminding humans to find better ways to produce power rather than burning fossil fuels which would result in the emission of harmful gases into the environment. The world energy consumption is expected to increase substantially in the next decade and if the same negligence towards the environment continues, there will be a day when no clean air would be available. Traditional practices of producing energy, regularly reminds us the serious threat they pose to the environment. Thus there is a need to produce independent and clean electricity. Wave energy can be observed as a possible clean energy resource which can be exploited for power generation purposes. While this method is relatively new and economically competitive, there is a growing trend towards it, which is gaining interest from government and industries. A vital feature of these waves is that they have the highest energy density when compared to other renewable energy resources.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 359-370"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000632/pdfft?md5=ecaf6bf4cef4f5ae1883923ef70b3188&pid=1-s2.0-S2666285X22000632-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76274836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1016/j.gltp.2021.10.003
Rajendra Prasad P , Shiva shankar
With the recent advancements in the field of wireless networks or Mobile Ad-hoc networks (MANETs), mobile computing is the most powerful use for network communication and connectivity. Effective networks come across with numerous difficulties. Networks need to be able to transmit data with acceptable precision from one system to another. A framework must ensure that the retrieved data is consistent with the transmitted data for most applications. If the frame between the two nodes is distorted in the data-link layer, it must be corrected before having driven to other nodes. However, most protocols with the link-layer simply dismiss the frame and allow the high-layer protocols to pass down the frame. In other words, information is a valuable commodity, since asset information must be protected from threats. Some applications require a network mechanism for detecting and preventing these attacks in MANETs. An important challenge in MANET is building the secure intrusion detection system in network providing security to the nodes and route paths in network. The attacks in network can threaten the security issues which have been identified in the intrusion detection system engine, later it is prevented by intrusion prevention engine in the network. A henceforth new technique to implement the security goals and prevent attacks is implemented by introducing the Secure-Intrusion Detection System (S-IDS) in the network. The research work introduced the Secure Energy Routing (SER) protocol for the MANETs. The protocol solves the issue of security in network by detecting the attacks and preventing them in the network. The simulation results show the higher packet delivery ratio and low end-to-end delay with and without attacks. The protocol performance is good in terms of its packet delivery ratio and low end-to-end delay respectively.
{"title":"Secure intrusion detection system routing protocol for mobile ad‐hoc network","authors":"Rajendra Prasad P , Shiva shankar","doi":"10.1016/j.gltp.2021.10.003","DOIUrl":"10.1016/j.gltp.2021.10.003","url":null,"abstract":"<div><p>With the recent advancements in the field of wireless networks or Mobile Ad-hoc networks (MANETs), mobile computing is the most powerful use for network communication and connectivity. Effective networks come across with numerous difficulties. Networks need to be able to transmit data with acceptable precision from one system to another. A framework must ensure that the retrieved data is consistent with the transmitted data for most applications. If the frame between the two nodes is distorted in the data-link layer, it must be corrected before having driven to other nodes. However, most protocols with the link-layer simply dismiss the frame and allow the high-layer protocols to pass down the frame. In other words, information is a valuable commodity, since asset information must be protected from threats. Some applications require a network mechanism for detecting and preventing these attacks in MANETs. An important challenge in MANET is building the secure intrusion detection system in network providing security to the nodes and route paths in network. The attacks in network can threaten the security issues which have been identified in the intrusion detection system engine, later it is prevented by intrusion prevention engine in the network. A henceforth new technique to implement the security goals and prevent attacks is implemented by introducing the Secure-Intrusion Detection System (S-IDS) in the network. The research work introduced the Secure Energy Routing (SER) protocol for the MANETs. The protocol solves the issue of security in network by detecting the attacks and preventing them in the network. The simulation results show the higher packet delivery ratio and low end-to-end delay with and without attacks. The protocol performance is good in terms of its packet delivery ratio and low end-to-end delay respectively.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 399-411"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001023/pdfft?md5=2e47f9310aad19d4a1bbef62cee40e4b&pid=1-s2.0-S2666285X21001023-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91062900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1016/j.gltp.2021.10.004
Utpal Barman , Ridip Dev Choudhury
The citrus family provides healthy fruits to humans. The quality and quantity of the citrus fruits depend on the quality of the citrus leaves. Due to the diseases of citrus leaves, the quality and productivity of citrus fruit are degraded. This paper provides a computer automation system to detect the diseases of the citrus leaves using machine learning and deep learning techniques. In this paper, images of citrus leaves are captured using an Android Smartphone in natural environmental light. Three different classes of citrus leaves are collected using the Smartphone and destructive method. These are citrus healthy, citrus greening, and citrus CTV (Citrus Tristeza virus). Citrus images are processed for image resizing, image noise removal, image enhancement, and feature extraction. Features of the images are calculated using Gray Level Co-occurrence Matrix in the color and gray domain of the images. Finally, the detection and classification are done using K- Nearest Neighbor (KNN) and Deep Neural Network (DNN) classifier. The accuracy of the KNN classifier is 89.9% for the K value 3 whereas the accuracy of DNN is 99.89% with an error of 0.0219. The proposed system helps the farmer to detect diseases at an early stage.
{"title":"Smartphone assist deep neural network to detect the citrus diseases in Agri-informatics","authors":"Utpal Barman , Ridip Dev Choudhury","doi":"10.1016/j.gltp.2021.10.004","DOIUrl":"10.1016/j.gltp.2021.10.004","url":null,"abstract":"<div><p>The citrus family provides healthy fruits to humans. The quality and quantity of the citrus fruits depend on the quality of the citrus leaves. Due to the diseases of citrus leaves, the quality and productivity of citrus fruit are degraded. This paper provides a computer automation system to detect the diseases of the citrus leaves using machine learning and deep learning techniques. In this paper, images of citrus leaves are captured using an Android Smartphone in natural environmental light. Three different classes of citrus leaves are collected using the Smartphone and destructive method. These are citrus healthy, citrus greening, and citrus CTV (Citrus Tristeza virus). Citrus images are processed for image resizing, image noise removal, image enhancement, and feature extraction. Features of the images are calculated using Gray Level Co-occurrence Matrix in the color and gray domain of the images. Finally, the detection and classification are done using K- Nearest Neighbor (KNN) and Deep Neural Network (DNN) classifier. The accuracy of the KNN classifier is 89.9% for the <em>K</em> value 3 whereas the accuracy of DNN is 99.89% with an error of 0.0219. The proposed system helps the farmer to detect diseases at an early stage.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 392-398"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001035/pdfft?md5=27aa1987f01ab1c8bb3c415cf1f1fe5a&pid=1-s2.0-S2666285X21001035-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83776500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1016/j.gltp.2021.10.005
Sumit Trimukhe, Sanjeevkumar R A
In today's world, development in technology need good converters, among which multilevel inverter is the area to be focused as it minimizes the losses and reduces power quality issues. This research article proposes a grid connected H-bridge multilevel inverter for renewable applications. Which is interconnected to repeating units and level boosting network. The proposed system is developed to reduces the power losses as it is integrated with repeating units, which enhance the output voltage. Further reduction in power losses and increase in efficiency is achieved by generating intermediate levels with the help of level boosting network. The bidirectional flow of power is achieved with the help of grid interconnected H-bridge. The proposed multilevel inverter generates 4n + 3 number of output levels. The work is carried out using two repeating units and one level boosting network with grid integrated H-bridge for 11 levels. The main objective of the proposed method, to reduce number of switches and sources is achieved. Which influences the additional saving of generating power apart from renewable source. The analysis is carried out for different modes of operation and compared with other topologies using MATLAB Simulink.
{"title":"Grid interconnected H-bridge multilevel inverter for renewable power applications using repeating units and level boosting network","authors":"Sumit Trimukhe, Sanjeevkumar R A","doi":"10.1016/j.gltp.2021.10.005","DOIUrl":"10.1016/j.gltp.2021.10.005","url":null,"abstract":"<div><p>In today's world, development in technology need good converters, among which multilevel inverter is the area to be focused as it minimizes the losses and reduces power quality issues. This research article proposes a grid connected H-bridge multilevel inverter for renewable applications. Which is interconnected to repeating units and level boosting network. The proposed system is developed to reduces the power losses as it is integrated with repeating units, which enhance the output voltage. Further reduction in power losses and increase in efficiency is achieved by generating intermediate levels with the help of level boosting network. The bidirectional flow of power is achieved with the help of grid interconnected H-bridge. The proposed multilevel inverter generates 4n + 3 number of output levels. The work is carried out using two repeating units and one level boosting network with grid integrated H-bridge for 11 levels. The main objective of the proposed method, to reduce number of switches and sources is achieved. Which influences the additional saving of generating power apart from renewable source. The analysis is carried out for different modes of operation and compared with other topologies using MATLAB Simulink.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 424-431"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X21001114/pdfft?md5=89c259d8497058447835a2a8787221f9&pid=1-s2.0-S2666285X21001114-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76251088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1016/j.gltp.2022.06.002
Samah Ali Al-azani , C. Namrata Mahender , Mohammed Hasan
Many traditional question answering systems depend on an Automatic Short Answer Grading (ASAG) to evaluate misspelled multiple words short answers in an Arabic Language using common edit-based algorithms such as Hamming, Levenshtein, and Jaro_Winkler, but they ignore and hide a big amount of a significant knowledge of the student answer. In this paper, we have implemented a proposed edit-based Hierarchical question answering system (HQAS) using a traversing by Breadth-First Search (BFS) within an m-ary tree to consider the ignored significant knowledge due to the misspelling at the middle of the dual-ordered incomplete answer, the misspelling at middle and the end of the intra-ordered incomplete answer, and the misspelling due to switching in words of the intra-ordered complete answer. It can differentiate among the students based on their significant hidden knowledge and show a distribution of knowledge content on different depths of the topic to determine which of the topic depths the student has the most significant knowledge.
{"title":"Development of an Arabic HQAS-based ASAG to consider an ignored knowledge in misspelled multiple words short answers","authors":"Samah Ali Al-azani , C. Namrata Mahender , Mohammed Hasan","doi":"10.1016/j.gltp.2022.06.002","DOIUrl":"10.1016/j.gltp.2022.06.002","url":null,"abstract":"<div><p>Many traditional question answering systems depend on an Automatic Short Answer Grading (ASAG) to evaluate misspelled multiple words short answers in an Arabic Language using common edit-based algorithms such as Hamming, Levenshtein, and Jaro_Winkler, but they ignore and hide a big amount of a significant knowledge of the student answer. In this paper, we have implemented a proposed edit-based Hierarchical question answering system (HQAS) using a traversing by Breadth-First Search (BFS) within an m-ary tree to consider the ignored significant knowledge due to the misspelling at the middle of the dual-ordered incomplete answer, the misspelling at middle and the end of the intra-ordered incomplete answer, and the misspelling due to switching in words of the intra-ordered complete answer. It can differentiate among the students based on their significant hidden knowledge and show a distribution of knowledge content on different depths of the topic to determine which of the topic depths the student has the most significant knowledge.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 376-385"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000760/pdfft?md5=cd0780493798a30cd1cdc69eb33b2635&pid=1-s2.0-S2666285X22000760-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79638726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1016/j.gltp.2021.10.001
Rajendra Prasad P, Shivashankar
Wireless networks are considered the best utilized network and in particular Mobile Ad-hoc NETworks (MANETs) have found many applications for its data transmission in real time applications. The accompanying challenges restrict the current protocols for the routing being specifically used in MANETs. The design issues in this network are to restrict the usage of energy while transmitting information and provide security to the nodes. In the existing routing protocols, route comes from a source where the source node seeks a way to the target node, by transmitting messages to its adjacent nodes, and the nodes use energy to do this. Mobile Ad-hoc network faces challenges in improving the energy efficiency and providing security for the routing protocol. This research work proposes the Enhanced Energy Efficient-Secure Routing (EEE-SR) protocol as a novel security algorithm to access secure data in hostile environment. In the proposed work, to secure data transmission in the network, the nodes associates with security policy. Under this policy, both the nodes have a common enforcing policy, and then they communicate with each other. The selection of the nodes for the transmission has to prove its authentication and then selection of the routing path built on the available energy threshold at the nodes in the set-up for forwarding packets in the network. The routing protocol implements the best shortest path in network and also checks for the nodes trustworthiness by evaluating the trust policies enforcement on it. The protocol enables a node to autonomously decide whether to select the neighboring node or based on the available energy threshold and security policy enforced. The algorithm evaluates increase network lifetime and low in the energy consumption, packet loss and end-to-end delay.
{"title":"Enhanced Energy Efficient Secure Routing Protocol for Mobile Ad-Hoc Network","authors":"Rajendra Prasad P, Shivashankar","doi":"10.1016/j.gltp.2021.10.001","DOIUrl":"10.1016/j.gltp.2021.10.001","url":null,"abstract":"<div><p>Wireless networks are considered the best utilized network and in particular Mobile Ad-hoc NETworks (MANETs) have found many applications for its data transmission in real time applications. The accompanying challenges restrict the current protocols for the routing being specifically used in MANETs. The design issues in this network are to restrict the usage of energy while transmitting information and provide security to the nodes. In the existing routing protocols, route comes from a source where the source node seeks a way to the target node, by transmitting messages to its adjacent nodes, and the nodes use energy to do this. Mobile Ad-hoc network faces challenges in improving the energy efficiency and providing security for the routing protocol. This research work proposes the Enhanced Energy Efficient-Secure Routing (EEE-SR) protocol as a novel security algorithm to access secure data in hostile environment. In the proposed work, to secure data transmission in the network, the nodes associates with security policy. Under this policy, both the nodes have a common enforcing policy, and then they communicate with each other. The selection of the nodes for the transmission has to prove its authentication and then selection of the routing path built on the available energy threshold at the nodes in the set-up for forwarding packets in the network. The routing protocol implements the best shortest path in network and also checks for the nodes trustworthiness by evaluating the trust policies enforcement on it. The protocol enables a node to autonomously decide whether to select the neighboring node or based on the available energy threshold and security policy enforced. The algorithm evaluates increase network lifetime and low in the energy consumption, packet loss and end-to-end delay.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 412-423"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2100100X/pdfft?md5=191212d0060908554c3abffa6aa90306&pid=1-s2.0-S2666285X2100100X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73940728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1016/j.gltp.2022.05.002
N. Mohan, Kavadiki Veerabhadrappa, J. Sharana Basavaraja, B.G. Suhas, R. Suresh Kumar
Precision machine accuracy is harmed by a variety of error sources, including vibration, self-weight deformation, and measurement error. Thermal deformation of the machine structure is a major source of error that reduces the accuracy of precision machines. Thermo-elastic deformations of machine tools are caused by both internal and external heat sources, resulting in geometric inaccuracies in the work piece. Thermal effects can account for up to 75% of the total inaccuracy. Precision machines must meet higher precision and productivity standards. As a result, the Johnson-Cook dynamic failure model is used in this work to reduce. The Johnson–Cook material constitutive equation, which is employed in this work, takes into account the effects of strain, strain rate, and temperature on material properties. The results obtained from the present methodology are validated with the results available from the Literature. From the present study the thermal error could be kept within 16µm. Further the same methodology can be extended to HMC's and VMC's for special purpose machines in order to control the thermal deformations.
{"title":"Thermal analysis on Ti-6AL-4V tool architecture using Johnson–Cook material model","authors":"N. Mohan, Kavadiki Veerabhadrappa, J. Sharana Basavaraja, B.G. Suhas, R. Suresh Kumar","doi":"10.1016/j.gltp.2022.05.002","DOIUrl":"https://doi.org/10.1016/j.gltp.2022.05.002","url":null,"abstract":"<div><p>Precision machine accuracy is harmed by a variety of error sources, including vibration, self-weight deformation, and measurement error. Thermal deformation of the machine structure is a major source of error that reduces the accuracy of precision machines. Thermo-elastic deformations of machine tools are caused by both internal and external heat sources, resulting in geometric inaccuracies in the work piece. Thermal effects can account for up to 75% of the total inaccuracy. Precision machines must meet higher precision and productivity standards. As a result, the Johnson-Cook dynamic failure model is used in this work to reduce. The Johnson–Cook material constitutive equation, which is employed in this work, takes into account the effects of strain, strain rate, and temperature on material properties. The results obtained from the present methodology are validated with the results available from the Literature. From the present study the thermal error could be kept within 16µm. Further the same methodology can be extended to HMC's and VMC's for special purpose machines in order to control the thermal deformations.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Pages 432-437"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000747/pdfft?md5=8acdc13cc05e4cfb819886bc45cf782c&pid=1-s2.0-S2666285X22000747-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138367542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1016/j.gltp.2020.10.001
{"title":"Erratum for Previously Published Articles","authors":"","doi":"10.1016/j.gltp.2020.10.001","DOIUrl":"https://doi.org/10.1016/j.gltp.2020.10.001","url":null,"abstract":"","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 2","pages":"Page 438"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X20300108/pdfft?md5=f43cf965505769da8bcd52378fa4cc6b&pid=1-s2.0-S2666285X20300108-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138367543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}