Archives
Editorial Board
S.No.

Volume 1, Issue 1, October 2013 (Title of Paper )

Page No.
1.

Repair of Honey-Combed RC Beams Using Cementitious Materials

Authors: Samir Shihada, Yasser Oida

Abstarct- This study investigates the use of four cementitious repair materials in terms of restoring the flexural capacities of honey-combed reinforced concrete shallow beams. Fifteen reinforced concrete beams are cast with honeycombs on the tension side, repaired and then tested under four point-loading. The repair materials used include Ultra High Performance Concrete (UHPC), Ultra High Performance Fiber Reinforced Concrete (UHPFRC), Normal Strength Concrete (NSC) and Cement-based Repair Material (CRM). Added to this, three beams with no deteriorations are cast, tested and considered as control beams. The outcome of this study shows that the four repair materials can achieve flexural capacities ranging from 100 % to 130 % of the control beam capacities. In addition, mid-span deflections and crack patterns are also compared.

Keywords- Flexural capacity, honey-combed, shallow beams, stiffness, UHPFRC.

References-

[1] Elrakib, T. and Arafa, A. 2012. Experimental Evaluation of the Common Defects in the Execution of Reinforced Concrete Beams under Flexural Loading.j.hbrcj, Vol.(8), pp:47-57.

[2] Pacheco-Torgal F, Abdollahnejad Z, Miraldo S, Karahan S, Baklouti S, Ding Y. 2012. An Overview on the Potential of Geopolymers for Concrete Infrastructure Rehabilitation. J.conbuildmat. Vol.(36), No.6, pp:1053-1058.

[3] Bruhwiler, E. 2012. Rehabilitation and Strengthening of Concrete Structures using Ultra-High Performance Fibre Reinforced Concrete. Concrete Repair, Rehabilitation and Retrofitting III – Alexander et al. (eds), Taylor& Francis, London, ISBN 978-0-415-89952-9.

[4] Wang N, Xu SL. 2011. Flexural Response of Reinforced Concrete Beams Strengthened with Post-Poured Ultra High Toughness Cementitious Composites Layer. J of Central South University of Technology. Vol(18), No.3,pp:932-939.

[5] Kim SW, Yun HD. 2011. Crack-Damage Mitigation and Flexural Behavior of Flexure-Dominant Reinforced Concrete Beams Repaired with Strain-Hardening Cement-based Composite. J.compositesb.Vo. (42), no.4, pp:545-656.

[6] Diab Y. 1998. Strengthening of RC Beams by using Sprayed Concrete: Experimental Approach. Engineering Structures. Vol.(20), No.7, pp:631-643.

[7] Shihada, S. and Oida, Y. 2013. Repair of Pre-cracked RC Beams using Cementitious Materials. Journal of Scientific Research and Reports. Vol.(2), No. 2, pp:655-664.

[8] Abdel-Rohman, M. 2005. Efftiveness of Patch Repair in Reinforced Concrete Beams with Exposed Honeycombs. Kuwait J. Sci.Eng., Vol. (32), pp:187-208.

[9] Al-Salloum, Y. 2007. Flexural Performance of RC Beams Repaired with Commercial Repair Materials. J. King Saud University, Vol.(19), Eng. Sci. (2), pp:153-173.

[10] ACI Committee 318. 2011. Building code requirements for structural concrete (ACI 318M-11) and commentary, Farmington Hills.503 pp.

1-5
2.

Image Security through DWT & SVD based Watermarking and masking with Encryption

Authors: Tapas Bandyopadhyay, B Bandyopadhyay, B N Chatterji

Abstract- The rapid growth in the digital technology, image processing tools and communication revolution through Internet has made the reproduction of digitally created artifacts simple and within reach very easily. This new trend has several advantages in terms of flexibility, cost effectiveness, convenience etc., but at the same time, also raised some serious concerns in actual real life situation. Information security is an evolving phenomenon and no single technique seems sufficient enough to provide security of the images in the internet environment [1][12]. Encryption and digital watermarking techniques may be incorporated together in digital right management to achieve better security [2][3]. These two technologies are complimenting each other, and the increased security of the digital artifacts can be achieved by using benefits of the both. Encryption transforms the original digital contain into human unreadable format and watermarking leaves the digital object intact and recognizable with a permanent embedded tag of user specific information or logo embedded into it[7]. To hide the secret user specific information in the form of watermark it is encrypted using secret key based congruently generated pseudorandom number and then bitxoring to generate the encrypted watermark. The encrypted watermark is embedded in the host image using DWT and SVD based techniques and the watermarked image is further encrypted using key hashed based encryption techniques. This will prevent man in the middle attack by intercepting the watermarked image by the malicious attacker who may try to remove or distort the watermark and use it for malicious purpose. This technique makes the image human unreadable format and reduced in size while distribution and the user specific information is encrypted and permanently tagged with the host image through watermarking for authentication purpose[11]. The experimental results demonstrate the high robustness of the proposed algorithm to various image processing attacks like noise additions, rotations, cropping, filtering, compression etc.

Keywords- watermarking, encryption, entropy, pseudorandom number, PSNR, normalized cross correlation (NCC), Normalized Hamming Distance (NHD))

References-

[1] I. J. Cox, G. Doerr, T. Furon, ”Watermarking is not Cryptography,” Proceedings of the 5th International Workshop on Digital Watermarking 2006, LNCS 4283, pp. 1-15, 2006.

[2] P. Bas, S. Katzenbeisser et al., ”First Summary Report on Hybrid Systems,” European Project IST-2002-507932, ECRYPT - Network of Excellence in Cryptology, Deliverable D.WVL.5, 2005.

[3] N. Merhav,”On Joint Coding for Watermarking and Encryption,” IEEE Transactions on Information, Theory, Vol. 52, No. 1, Jan. 2006.

[4] Chandra, D. V. S., Digital image watermarking using singular value decomposition, Proc. of the 45th Midwest Symposium on Circuits and Systems, vol.3, pp.264-267, 2002.

[5] Tapas Bandyopadhyay. Bandyopadhyay, B N Chatterji, Image Security Enhancement Through Watermarking and Cryptographic Measures, National conference : INDIACOM-2009 , New Delhi, February 2009

[6] Tapas Bandyopadhyay, Robust and secure watermarking for protecting rightful ownership, Recent Trends in Computer Technologies (RTCT) Seminar organized by B P Podder Institute of Technology and Management and CSI,28 March 2009.

[7] Chang, C. C. and Y. S. Hu, Digital watermarking scheme based on singular value decomposition, Proc. of the International Symposium on Combinatorics, Algorithms, Probabilistic and Experimental Methodologies, Hangzhou, China, to appear, 2007.

[8] Chung, K. L., C. H. Shen and L. C. Chang, A novel SVD- and VQbased image hiding scheme, Pattern Recognition Letters, vol.22, no.9, pp.1051-1058, 2001.

[9] Cox, I. J., J. Kilian, F. T. Leighton and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, vol.6, no.12, pp.1673-1687, 1997.

[10] Tapas Bandyopadhyay, B. Bandyopadhyay, B N Chatterji ” Attacks on Digital Watermarked Images in the Internet Environment and Their Counter Measures” International Journal of Advanced research in computer science, ISSN No. 09765697, Volume 4, No. 4, MarchApril 2013, page 155-159.

[11] Tapas Bandyopadhyay, B. Bandyopadhyay, B N Chatterji” Image Security through Combined Watermarking and Encryption Techniques” International Journal of electronics and Communication (IJEC), volume 1, issue 2 July 2013 Page 1-7.

6-11
3.

Audit Trail Based on Process Mining and Log

Authors: Kundan Kumar Mishra, Rahul Kaul

Abstract- An audit trail is an evidence of all procedures that take place in a system and across a network; it provides an outline of user/system events so that safety measures events can be associated to the actions of a specie individual or system element. Audit trails can be inspected for the existence or nonexistence of confident patterns. Audit trails can be used for measuring security issues, access patterns and also used for managing the performance of any employee in software industries. In this research paper, we will propose a process mining based technique to evaluate audit trails for security measures. This paper is inspiration of the work based on alpha algorithm to support security efforts at various levels ranging from low-level intrusion detection to high-level fraud prevention.

Keywords- Audit Trails, Process mining, Pattern Discovery, Log, Data Mining

References-

[1] S., Forrest; A.S., Perelson; L., Allen; R., Cherukuri; “SelfNonself-Discrimination in a Computer. Symposiumon Research in Security and Privacy”, IEEE Computer SocietyPress, Los Alamitos, California, 1994 pages 202–212.

[2] A., Wespi; M.,Dacier; H.,Debar; “Intrusion Detection Using Variable-LengthAudit Trail Patterns. In H. Debar, L. Me, and S.F. Wu, editors, RecentAdvances in Intrusion Detection” SpringerVerlag, Berlin, 2000, pages 110–129.

[3] A,Yavuz; P, Ning; M, Reiter; “Efficient,Compromise Resilient and Append-only CryptographicSchemes for Secure Audit Logging”, Financial Cryptography and Data Security, Springer 2012

[4] “Implementation of Α Algorithm for Process MiningIn Software Industry”, Certified International Journal of Engineering and Innovative Technology (IJEIT) June 2012, ISSN: 2277-3754 ISO 9001:2008 Volume 1, Issue 6,

[5] Process Mining and Security: DetectingAnomalous Process Executions and CheckingProcess Conformance,The final version will be published inElectronic Notes in Theoretical Computer ScienceURL:www.elsevier.nl/locate/entcs

[6] “Creating User-Relationship-Graph in Use of FlowNetand Log Files for Computer and NetworkAccountability and Forensics”,The 2010 Military Communications Conference - Unclassified Program - Cyber Security and Network Management, 2010 IEEE 978-1-4244-8179-8/10/$26.00

12-15
4.

Optimization of Process Parameters in Drilling of GFRP Composites Drilled by an End Mill

Abstract- Due to the superior physical and mechanical properties Glass fiber-reinforced (GFRP) composite materials are very attractive for applications like aerospace and air craft structural components. This results a large number of research papers on machining of these composite laminates. Out of all the machining operations, most commonly used operation is drilling. However, drilling operation is hard to carry out due to drilling–induced delamination. To increase drilling efficiency of GFRP composite laminates with the least waste and damages, it is essential to understand the drilling behavior by conducting a large number of drilling experiments and drilling parameters such as feed rate and spindle speed should be optimized. This paper presents delamination study of composite materials by conducting drilling experiments using Taguchi’s L25 , 5-level orthogonal array and Analysis of variance (ANOVA) was used to analyze the data obtained from the experiments and finally determine the optimal drilling parameters in drilling GFRP composite materials. Experiments were also conducted to determine whether varying feed & spindle speed during drilling could reduce the delamination.

Keywords— Drilling induced Delamination, GFRP composite, L25 orthogonal array, Taguchi approach, End mill.

References-

[1] Wong T.L, Wu S.M, Croy C.M, An analysis of delamination in drilling composite materials, In; Proceedings of 14th SAMPE Technology conference, Atlanta, GA, USA 1982, pp 471-483

[2] DeFu Liu, YongJun Tang, W.L. Cong, “A review of mechanical drilling for composite laminates,” Composite Structures 94, 2012

[3] Park KY, Choi JH and Lee DG, “Delamination-free and high efficiency drilling of carbon fiber reinforced plastics,” J Compos Mater 29, pp.1988–2002, 1995.

[4] Tsao vCC, Hocheng H. Taguchi, “Analysis of delamination associated with various drill bits in drilling of composite material,” Int J Mach Tools Manuf 44, pp. 1085–90, 2004.

[5] Ramkumar J, Aravindan S, Malhotra SK and Krishamurthy R., “An enhancement of machining performance of GFRP by oscillatory assisted drilling,” International Journal of Advance Manufacturing Technology 23, pp. 240–244, 2004.

[6] H. Hochenga, C.C. Tsao, “Effects of special drill bits on drillinginduced delamination of composite materials,” International Journal of Machine Tools Manufacture 46, 2006

[7] K. Palanikumar, “Experimental investigation and optimization in drilling of GFRP composites,” Measurement 44, pp. 2138-2148, 2011

[8] Capello E, “Work piece damping and its effects on delamination damage in drilling thin composite laminates” Journal of Materials Processing Technology, 148(2), pp.186-95, 2004.

[9] Davim J.P, P. Reis and C.C. Antonio, “ Experimental study of drilling glass fiber reinforced plastics (GFRP) manufactured by hand lay-up,” Composites Science and Technology 64, pp. 289-297, 2004.

[10] Davim J.P, P. Reis and C.C. Antonio, “Drilling fiber reinforced plastics (FRPs) manufactured by hand lay-up: influence of matrix (Viapal VUP 9731 and ATLAC 382-05),” Journal of Materials Processing Technology, 155-156: 1828–1833. 2004

[11] H. Hochenga, C.C. Tsao, “The path towards delamination-free drilling of composite materials,” Journal of Materials Processing Technology 167, pp. 251–264, 2005

[12] Faramarz Ashenai Ghasemi, Abbas Hyvadi, Gholamhassan Payganeh, Nasrollah Bani Mostafa Arab Effects of Drilling Parameters on Delamination of Glass-Epoxy Composites Australian Journal of Basic and Applied Sciences, 5(12): 1433-1440, 2011

[13] Nilrudra Mandal, B. Doloi , B. Mondal , Reeta Das “Optimization of flank wear using Zirconia Toughened Alumina (ZTA) cutting tool: Taguchi method and Regression analysis” Measurement 44 ;2149– 2155, 2011.

16-23
5.

Optimization of Direct Tunneling Gate Leakage Current in Ultrathin Gate Oxide FET with High-K Dielectrics

Authors: Sweta Chander, Pragati Singh, S Baishya

Abstract- This paper presents the impact of parameter optimization of n-type MOSFET for direct tunneling gate current using ultrathin Si3N4 and HfO2 with EOT (Equivalent Oxide Thickness) of 1.0 nm. This work is compared with TCAD santaurus simulation results to verify that accuracy of the model and excellent reduction in gate leakage with the introduction of the high-k gate dielectrics (HfO2 & Si3N4) in place of SiO2. It also observed that highk based MOSFET exhibits improved performance of Subthreshold Swing, Ion, Ioff Ion/Ioff ratio and transconductance.

Keywords- MOSFET, TCAD

References-

[1 ] Moore, “Progress in Digital Electronics”, IEDM Tech Digest, 1975, pp11-13.

[2 ] Ashwani K.Rana, Narottam Chand and Vinod Kapoor," TCAD Based Analysis of Gate Leakage Current for High-k Stack MOSFET, ACEEE Int. J on communication, Vol.02, 2011.

[3 ] Challenges of high-k oxide N. Wang, Digital MOS Integrated Circuits, Prentice-Hall, Englewood Cliffs, NJ, 1989.

[4 ] A. Schenk and G. Heiser, ``Modeling and Simulation of Tunneling through Ultra- Thin Gate Dielectrics,'' J.Appl.Phys., vol. 81, no. 12, pp. 7900, 1997.

[5 ] Y. Taur, ``The Incredible Shrinking Transistor,’’ IEEE Spectrum, pp. 25-29, July 1999.

[6 ] S. Thompson, P. Packan, and M. Bohr, ``MOS Scaling: Transistor Challenges for the 21st Century, ‘Intel Technology Journal, vol. Q3, 1998, http://www.intel.com.tr/technology/itj.

[7 ] http.//abyss.uoregon.edu/~js/glossary/quantum_tunneling.html.

[8 ] TACAD manual

[9 ] http://en.wikipedia.org/wiki/High-k_dielectric

[10 ] J. Robertson,” High dielectric constant oxides”, Eur. Phy. J. Appl. Phys. 28, 265-291, Vol. 12, 2004.

[11 ] J. Robertson, ”High Dielectrics Constant Oxides”, J. Appl. Phys.,Vol.28,pp.265-291, 2004.

[12 ] http://en.wikipedian.org/wiki/Equivalent_oxide_thickness.

[13 ] Kaushik Roy, Saibal Mukhipadhyay and Hamid MahmoodiMeimand, "Leakage Current Mechanism and Leakage Reduction Techniques in Deep-Submicrometer CMOS Circuits,Proceeding of the IEEE,Vol. 91,No.2, February 2003.

[14 ] Zhin Chen and Jun Guo, "Dramatic reduction of gate leakage current of ultrathin oxides through oxide structure modification, Solid-State Electronics 50,2006.

[15 ] Yee Chia, Qiang Lu et al.," Direct Tunneling Leakage Current in Transistor with Ultrathin Silicon Nitride Gate Dielectric", IEEE Transaction on Electron Devices, Vol.21, No. 11, November 2000

 

24-30
6.

Impact of Body Coefficient and Threshold Voltage on CNTFET with Varying Oxide Thickness

Authors: Sanjeet Kumar Sinha, Saurabh Chaudhury

Abstract- In this paper we analyze threshold voltage and body coefficient (ϒ) on varying the oxide thickness in CNTFET. Simulation analysis of drain current and drain voltage characteristic is discussed and found that due to decreasing nature of quantum capacitance in CNTFET, the factor (ϒ) has still impact on device and it is not negligible in deep nano regime. We also observed from simulation on nanohub, that the above mention characteristic is increasing while reducing the threshold voltage along with oxide thickness.

Keywords- CNTFET, MOSFET, Quantum Capacitance, Threshold Voltage, Body Coefficient.

References-

[1] G. Moore, “Progress in Digital Electronics”, IEDM Tech Digest, 1975, pp11-13

[2] A. Bathtold, P. Hadley, T. Nakanishi, and C. Dekker, “Logic circuits with carbon nanotube transistors,” Science, vol. 294, no. 5545, pp. 1317–1320,Nov. 2001.

[3] A. Javey, H. Kim, M. Brink, Q. Wang, A. Ural, J. Guo, P. McIntyre, P. McEuen, M. Lundstrom, and H. Dai, “High-κ dielectrics for advanced carbon nanotube transistors and logic gates,” Nat. Mater., vol. 1, no. 4, pp. 241–246, Dec. 2002.

[4] V. Derycke, R. Martel, J. Appenzeller , and P. Avouris, “Carbon nanotube inter- and intramolecular logic gates,” Nano Lett., vol. 1, no. 9, pp. 453–456, Sep. 2001.

[5] Y. M. Lin, J. Appenzeller, J. Knoch, and P. Avouris, “Highperformance carbon nanotube field- effect transistor with tunable polarities,” IEEE Trans. Nanotechnology., vol. 4, no. 5, pp. 481– 489, Sep. 2005.

[6] S. H. Hur, M. H. Yoon, A . Gaur, M. Shim, A. Facchetti, T. J. Marks, and J. A . Rogers, “Organic nanodielectrics for low voltage carbon nanotube thin film transistors and complementary logic gates,” J. Amer. Chem. Soc., vol. 127, no. 40 , pp. 13808–13809, Sep.2005

[7] A. Raychowdhury, S. Mukhopadhyay, and K. Roy, “A circuitcompatible model of ballistic carbon nanotube field-effect transistors,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 23, no. 10, pp. 1411– 1420, Oct. 2004.

[8] S. Fregonese, H. C. d’Honincthun, J. Goguet, C. Maneux, T. Zimmer, J. P. Bourgoin, P. Dollfus, and S. G. Retailleau, “Computationally efficient physics-based compact CNTFET model for circuit design,” IEEE Trans. Electron Devices, vol. 55, no. 6, pp. 1317–1327, Jun. 2008.

[9] J. Deng and H.-S. P.Wong, “A compact SPICE model for carbon nanotube field-effect transistors including non-idealities and its application—Part I: Model of the intrinsic channel region,” IEEE Trans. Electron Devices, vol. 54, no. 12, pp. 3186–3194, Dec. 2007.

[10] S. N. Pu, W. Y. Yin, J. F. Mao, and Q. H. Liu, “Crosstalk prediction of single- and double-walled carbon-nanotube (SWCNT/DWCNT) bundle interconnects,” IEEE Trans. Electron Devices, vol. 56, no. 4, pp. 560–568, Apr. 2009.

[11] S. Ijiima, “Helical microtubules of graphitic carbon,” Nature, vol. 354,pp. 56–58, 1991.

[12] J. Appenzeller, “Carbon nanotubes for high- performance electronics Progress and prospect electronics Progress and prospect, 2008.

[13] Y. Ohno , S. Kishimoto, T. Mizutani, T. Okazaki, and H. Shinohara, “Chirality assignment of individual single-walled carbon nanotubes in Carbon nanotube field-effect transistors bymicro-photocurrent spectroscopy,” Appl. Phys. Lett., vol. 84, no. 8, pp. 1368– 1370, Feb. 2004

[14] J. Deng and H.-S. P.Wong, “A compact SPICE model for carbon- Nanotube field-effect transistors including nonidealities and its application—Part II: Full device model and circuit performance benchmarking,” IEEE Trans. Electron Device, vol. 54, no. 12, pp. 3195–3205, Dec. 2007.

 

31-35