Search results

1 – 3 of 3
Article
Publication date: 19 April 2024

Mahesh Gaikwad, Suvir Singh, N. Gopalakrishnan, Pradeep Bhargava and Ajay Chourasia

This study investigates the impact of the fire decay phase on structural damage using the sectional analysis method. The primary objective of this work is to forecast the…

Abstract

Purpose

This study investigates the impact of the fire decay phase on structural damage using the sectional analysis method. The primary objective of this work is to forecast the non-dimensional capacity parameters for the axial and flexural load-carrying capacity of reinforced concrete (RC) sections for heating and the subsequent post-heating phase (decay phase) of the fire.

Design/methodology/approach

The sectional analysis method is used to determine the moment and axial capacities. The findings of sectional analysis and heat transfer for the heating stage are initially validated, and the analysis subsequently proceeds to determine the load capacity during the fire’s heating and decay phases by appropriately incorporating non-dimensional sectional and material parameters. The numerical analysis includes four fire curves with different cooling rates and steel percentages.

Findings

The study’s findings indicate that the rate at which the cooling process occurs after undergoing heating substantially impacts the axial and flexural capacity. The maximum degradation in axial and flexural capacity occurred in the range of 15–20% for cooling rates of 3 °C/min and 5 °C/min as compared to the capacity obtained at 120 min of heating for all steel percentages. As the fire cooling rate reduced to 1 °C/min, the highest deterioration in axial and flexural capacity reached 48–50% and 42–46%, respectively, in the post-heating stage.

Research limitations/implications

The established non-dimensional parameters for axial and flexural capacity are limited to the analysed section in the study owing to the thermal profile, however, this can be modified depending on the section geometry and fire scenario.

Practical implications

The study primarily focusses on the degradation of axial and flexural capacity at various time intervals during the entire fire exposure, including heating and cooling. The findings obtained showed that following the completion of the fire’s heating phase, the structural capacity continued to decrease over the subsequent post-heating period. It is recommended that structural members' fire resistance designs encompass both the heating and cooling phases of a fire. Since the capacity degradation varies with fire duration, the conventional method is inadequate to design the load capacity for appropriate fire safety. Therefore, it is essential to adopt a performance-based approach while designing structural elements' capacity for the desired fire resistance rating. The proposed technique of using non-dimensional parameters will effectively support predicting the load capacity for required fire resistance.

Originality/value

The fire-resistant requirements for reinforced concrete structures are generally established based on standard fire exposure conditions, which account for the fire growth phase. However, it is important to note that concrete structures can experience internal damage over time during the decay phase of fires, which can be quantitatively determined using the proposed non-dimensional parameter approach.

Details

Journal of Structural Fire Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2040-2317

Keywords

Article
Publication date: 9 February 2022

S. Hemalatha, Nripendra Narayan Das, Jayanthy Ramasamy, Suman Madan and P.C. Senthil Mahesh

Internet of Things (IoT) involves connecting physical objects to the internet to provide opportunities to build smart systems or applications. IoT paradigm assumes many devices…

Abstract

Purpose

Internet of Things (IoT) involves connecting physical objects to the internet to provide opportunities to build smart systems or applications. IoT paradigm assumes many devices connected over a conventional intent network. These devices usually have restricted resources, so moving part of the service implementation to a cloud infrastructure is a prominent solution. This study aims to proposes in this project human voice as a potential interface for one or more devices in IoT ecosystem enabling issuing commands and receiving information.

Design/methodology/approach

System design is the process of defining the elements of a system such as the architecture, modules and components, the different interfaces of those components and the data that goes through that system. It is meant to satisfy specific needs and requirements of a business or organization through the engineering of a coherent and well-running system.

Findings

The main aim of this proposed work is to develop a ticket booking application that performs all the operations by speech recognition. Hence, visually impaired people can make use of this application. There are several applications that help visually impaired people. This application adds extra features to those available soft wares. Using this, visually impaired people can book the tickets without the help of personal assistants. For future research, this study hopes to extend this application to perform various other operations that will help visually impaired people to do their daily activities like normal people without the help of personal assistants. For example, making a phone call, sending text messages, booking a taxi, easy navigation, etc.

Originality/value

System design involves the identification of classes, their relationship as well as their collaboration. In objector, classes are divided into entity classes and control classes.

Details

World Journal of Engineering, vol. 20 no. 2
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 29 June 2020

Amir M.U. Wagdarikar and Ranjan K. Senapati

The technique for hiding confidential data in specific digital media by enhancing the graphical contents is known as watermarking. The dissemination of information over a secure…

Abstract

Purpose

The technique for hiding confidential data in specific digital media by enhancing the graphical contents is known as watermarking. The dissemination of information over a secure channel is essential for multimedia applications. The purpose of this study is to develop a secure communication approach for OFDM system.

Design/methodology/approach

This paper exploits a secure communication in the orthogonal frequency division multiplexing (OFDM) system using wavelet-based video watermarking technique. In this work, the Chronological-MS algorithm is used for securing the data communication in the OFDM system. Here, the secret message is embedded in video frames using wavelet transform for hiding sensitive information and the hidden information is transmitted over the OFDM system. The Chronological-MS algorithm is used for selecting the optimal regions in the video for embedding secret message. In embedding phase, wavelet coefficients are obtained by applying wavelet transform on the frame for embedding the secret message. Meanwhile, in extraction phase, the inverse wavelet transform is applied to extract the secret message.

Findings

Considering number of frames, the maximum Peak signal-to-noise ratio (PSNR) value is attained by proposed Wavelet + Chronological MS method for Video 2 with value 73.643 dB, respectively. Meanwhile, the minimum mean squared error (MSE) attained by the proposed Wavelet + Chronological MS method is when considering number of frames with MSE values as 0.001 for both Videos 1 and 2. The minimum bit error rate (BER) value is attained by the proposed method with value 0.00009 considering random noise with Video 1. Thus, the proposed Wavelet + Chronological MS have shown better results than the existing techniques.

Originality/value

This work proposes a wavelet-based watermarking method using Chronological-MS, for initiating secured communication over an OFDM. One of the main advantages of wavelets is that they offer a simultaneous localization in time and frequency domain. Hence, the proposed method offers the highly secured data transmission over the OFDM.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 3 of 3