Sie sind auf Seite 1von 1

International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 37

International Conference on Advances & Challenges in Interdisciplinary Engineering and


Management 2017 [ICACIEM 2017]

ISBN 978-81-933235-1-9 VOL 01


Website icaciem.org eMail icaciem@asdf.res.in
Received 10 January 2017 Accepted 28 - January 2017
Article ID ICACIEM073 eAID ICACIEM.2017.073

Design and Analysis of Pulse Jet Engine


R R Rathinakumar1, M Prakash Raj2, P Prabakaran3, Muhamin4, Majid5
1,2,3,4,5
UG Scholar, Department of Mechanical Engineering, Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India

Abstract: A pulse jet engine is a category of jet engine in which combustion occurs in pulses. Pulsejet engines can be made with few or no moving
parts, and are proficient of running statically. Pulse jet engines are a lightweight form of jet propulsion, but usually have a reduced compression ratio,
and hence give a low specific impulse. One notable line of research of pulsejet engines includes the pulse detonation engine which involves repeated
blowing up in the engine, and which can potentially give high solidity and good efficiency. They were invented in the early 1900s, and were cutting
edge science until after WWII. Pulsejets got deserted, many feel long before they even reached their prime .They went from being the main source of
power for tens of thousands of journey missiles. In we are mean a pulse jet engine and planned to analyse it for the rationale of get a high performance
into it.

ISBN 978-81-933235-1-9 VOL 01


Website icaciem.org eMail icaciem@asdf.res.in
Received 10 January 2017 Accepted 28 - January 2017
Article ID ICACIEM074 eAID ICACIEM.2017.074

Artificial Intelligence and Intrusion Detection Systems


D Kaviya1, V Keerthika2, B Kowsalya3, T Nirmala4
1,2,3,4
Final Year Students , Department of MCA, Vidyaa Vikas College of Engineering and Technology, Tiruchengode, India

Abstract: Although the computer systems primary defence is its access control, computer systems access control cannot be relied to safeguard against
an insider's attack. In such attacks, audit trails are the only method to detect abusive user activity. Previously, the Intrusion Detection Systems (IDS)
were built by hand, so such systems faced difficulty in successfully classifying intruders because of need of processing massive volumes of audit trails. In
order to overcome these processing overhead, Artificial Intelligence techniques like learning, data clustering, and searching are being used for data
analysis. In this paper, we survey the uses of artificial intelligence methods in Intrusion Detection.

This paper is prepared exclusively for International Conference on Advances & Challenges in Interdisciplinary Engineering and Management 2017 [ICACIEM
2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr K Samidurai and Editors
Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for
personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this
notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the
owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution.

2017 Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]

Das könnte Ihnen auch gefallen