Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Study on Physical and Mechanical Behavior of Bauhinia Vahlii Fiber Filled Glass–Epoxy Hybrid Composites
    (Springer Science and Business Media Deutschland GmbH, 2023) Ray, R.; Das, S.N.; Mohapatra, A.
    Epoxy is well-suited for a number of industrial applications because of its versatility and its diversity. In many high-performance fields however, the overall use of epoxy limited its employment due to delamination, intrinsic fragility, low impact resistance and hardness to fractures. Epoxy's limitations can be overcome through inclusion and modification prior to industrial use. The present research describes the development of hybrid composites made of epoxy reinforced with glass fiber and filled with Bauhinia Vahlii fiber. Bauhinia Vahlii (BV) found to be most promising natural fiber for manufacturing composites for its superior mechanical as well as thermal properties. In this study, the incorporation of BV fiber on physical and mechanical behavior of glass–epoxy composites was investigated. Various composite compositions with three distinct natural BV fiber percentages (4, 8, 12%) were fabricated using a hand layup technique. The results showed that increasing the percentage of natural fiber concentration improves mechanical qualities, however at larger BV fiber loading, the strength reduces due to presence of more voids which signifies poor bonding. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
  • Item
    Intrusion Detection System in Networks Employing a Double-Layer Architecture Using Machine Learning Algorithms
    (Institute of Electrical and Electronics Engineers Inc., 2023) Mohapatra, A.; Jain, N.; Rudra, B.
    Monitoring both the activities of the system itself and the traffic on the network is the job of an intrusion detection system, which is more commonly referred to by its acronym, IDS. The IDS works by analyzing the network traffic or system logs, looking for patterns and signatures of known threats, or deviations from normal behavior that may indicate an attack. This may be done in response to the activity or traffic being deemed suspicious or destructive. IDS can take many different shapes, but regardless of its appearance, their primary purpose is to identify potentially harmful traffic in a number of different ways. There are primarily two types of intrusion detection systems: those that monitor networks and those that monitor individual computers. The anti - virus program and the firewall are two examples of defensive mechanisms used by the systems that detects intrusion. IDS plays a major role in providing protection to systems and computer networks out of various types of attacks, such as malware infections, hacking attempts, and unauthorized access. It alerts security administrators to potential threats, provide detailed information about the attack, and help to prevent or mitigate the damage caused by the attack. © 2023 IEEE.