There is no wealth like Knowledge
                            No Poverty like Ignorance
ARPN Journals

ARPN Journal of Engineering and Applied Sciences >> Call for Papers

ARPN Journal of Engineering and Applied Sciences                           March 2018  |  Vol. 13  No. 5
   
Title: Effective utilization of quarry dust in flexible pavements as per IRC-37:2012
Author (s): Shyam Prakash Koganti and Hanumantha Rao Chappidi
Abstract:

Expansive soil is a problematic soil due to its low strength and swell-shrink behavior. The expansive soils tend to swell and shrink with respect to increase and decrease of moisture content. Moreover, black cotton soil (expansive soil) is present in many parts of Krishna and Guntur districts of Andhra Pradesh in which state’s new capital “Amaravathi” was announced. So, it is necessary to find out cost effective materials for stabilization of black cotton soils which will save economy of the state while constructing flexible pavement. The geo-technical properties like maximum dry density (MDD), optimum moisture content (OMC) and California Bearing Ratio (CBR) are found out for various percentages of quarry dust replacements. Influence of 10%, 20%, 30%, 40%, 50%, 60% and 70% of quarry dust on compaction and CBR are presented. Flexible pavement thicknesses for 10%, 20%, 30%, 40%, 50%, 60% and 70% of replacement of quarry dust are also mentioned. From the results it can be proved that up to 40% of quarry dust shows a promising influence on strength characteristics of black cotton soil in construction of flexible pavement. There are 4 types of flexible pavements with bituminous course as surfacing. For easy understanding these are named as type 1, 2, 3 and 4. Pavement thicknesses are calculated for 2, 5, 10, 20, 30, 50, 100 and 150 msa (million standard axles).

   

Full Text

 

Title: Total-corrosion modelling and corrosion rate correlation for Anthocleista Djalonensis leaf-extract admixed steel-reinforced concrete in 3.5% NaCl
Author (s): Joshua Olusegun Okeniyi and Abimbola Patricia Idowu Popoola
Abstract:

Assessment of admixture performance, by electrochemical monitoring techniques, on the inhibition of concrete steel-rebar corrosion in corrosive environments, has the potential challenge that simpler-to-undertake methods may not indicate absolute corrosion activity in the test-system. In this paper, total-corrosion (TC) was modelled, as per ASTM G109, from macrocell-current measurements, using zero-resistance ammeter (ZRA), obtained from Anthocleista djalonensis leaf-extract admixed steel-reinforced concrete specimens that were immersed in 3.5% NaCl, for the simulation of marine/saline environment. In addition, corrosion rate (CR) measurements were obtained from the steel-reinforced concrete specimens using linear-polarization-resistance (LPR) method and the mean of corrosion rate was established from the dataset for each specimen using a continuous probability distribution (Weibull distribution) function. The total-corrosion model, mean of corrosion rate and the admixture concentrations were then subjected to correlation analysis. Results showed that, in spite of the different instrumentations, the total-corrosion model combined the advantages of linearized stochastic macrocell-current measurements with excellent correlation to the corrosion rate (R2 = 99.42%), for the plant-extract admixture concentrations. The experimental test-results and the predictions from the correlation analysis both identified the 8.33 g/L Anthocleista djalonensis concentration as having the optimal corrosion inhibition efficiencies: ? = 98.65% (experimental model) or ? = 99.00% (correlation model). The implication of these results on the use of the macrocell current technique as a comparably simpler-to-undertake corrosion monitoring method than corrosion rate is detailed in the study.

   

Full Text

 

Title: Design and implementation of an algorithm for plants identification and classification based on physical characteristics of their leaves using computer vision
Author (s): Jose Salgado Patron, Diego Sendoya-Losada and Faiber Robayo-Betancourt
Abstract:

In this paper, it’s described an algorithm for plants identification based on leaves physical features using image processing techniques and the feed forward neural network specialized on patterns recognition. As fundamental step, the sobel operator is used to highlight the leaves boundaries and veins. After obtaining those features, the new image is transfer to the frequency space through the wavelet transform as basis for the main vector of every sample. Finally, the results are evaluated according to percentage of samples correctly identified. The algorithm is adapted to a visual interface that allows the user to observe the steps of the image processing and get the leaf information.

   

Full Text

 

Title: Distributed generation (DG) placement for reducing power losses on radial distribution system using
K-means Clustering method
Author (s): Ontoseno Penangsang, Muhammad Alief Amanullah and Ni Ketut Aryani
Abstract:

To solve power losses problem appeared on distribution system is to put distributed generation (DG). The use of DG can be the solution improving network ability from decreasing power loss, voltage profile improvements, power quality, also reliability operation. But, research shows that missing precision on DG placement can make the system get bigger loss than the system without DG. So, we need a research and planning before integrating DG to the distribution network. This paper will be using K-means Clustering method which is grouping each bus from loss sensitivity factor (LSF) characteristic operational sight and voltage deviation (dV). Using this method, DG placement for single and multi DG will be the solution repairing value of power loss. The B1 case which became the base case have total 39.2436 kW power loss. After placing single DG until multi DG based on K-means Clustering, the result shows best power loss decreasing for B case become 6.050 kW at 3 DG placing.

   

Full Text

 

Title: Optimizing the process parameters of AWJM using Taguchi method and ANOVA on Inconel 625
Author (s): Viswanath J., Lakshmi Tulasi and P. C. Prakash
Abstract:

Inconel 625 has a wide range of applications because of its high resistance to corrosion cracking, pitting, and crevice formation and to a variety of mineral and organic acids along with high thermal fatigue resistance. However conventional machining of Inconel 625 is not so economical and ease, on the other hand non conventional processes like laser cutting, Abrasive Water Jet Machining (AWJM), Electric Discharge Machining (EDM), etc have a very good potential in overcoming these machining difficulties. Among these AWJM is commonly employed for very hard and brittle materials due to its economical and technical significance. In this work, research oriented experimentation on the AWJM of Inconel 625 is planned and being carried out successfully to optimize the input process parameters for fine Surface finish (SR) and high Material removal rate (MRR). Optimization was carried out by these phases SR and MRR are individually optimized as per Taguchi method by Analysis of variance (MINI TAB).

   

Full Text

 

Title: The impact of fresh water injection on heavy oil displacement from sandstone reservoirs
Author (s): Ilyas K. Turgazinov, Iskander Sh. Gussenov and Birzhan Zh. Zhappasbayev
Abstract:

In recent years, numerous studies have confirmed that in certain conditions, low salinity water flooding (LSW) may be more effective than high salinity water flooding (HSW) both in carbonate and sandstone reservoirs. The available data suggests that depending on reservoir conditions, a number of phenomena may be responsible for incremental oil recovery (IOR) during LSW. Wettability alteration, clay swelling, an increase in pH, multi-ion exchange, double layer expansion and fine migration were claimed to be the underlining mechanisms for an increase in oil recovery during LSWF. However, due to a large number of interrelated variables, the ranges of reservoir conditions in which each of these mechanisms is activated has not yet been identified. Thus, additional research is required for a better understanding of the principles and limits of LSWF. However, only a few studies have been conducted on heavy oil displacement. In this paper the higher salinity contrast between injections of reservoir brine followed by injection of fresh water into the cores were tested to define the impact of injecting water salinity on the heavy oil recovery factor. Such extreme salinity contrast of injecting water was used to demonstrate the effect of low salinity water flooding in laboratory experiments and to check the possibility of using low salinity water flooding as an EOR method. As a result, fresh water resulted in 19% of IOR after initial HSW in the preferentially oil-wet sand pack, whereas incremental recovery in the hydrophilic sand totaled only around 4%. In addition, the data collected on the injection pressure change coupled with the analysis of rock mineralogy and the effluent samples suggests that fine migration takes place during the injection of fresh water.

   

Full Text

 

Title: Design optimization of a three phase tubular Linear Switched Reluctance Actuator
Author (s): C. K. Yeo, M. M. Ghazaly and S. H. Chong I. W. Jamaludin
Abstract:

This paper presents the design and optimization of tubular Linear Switched Reluctance Actuator (LSRA) without permanent magnet that has 12:8 stator-to-mover pole pairs ratio. The performances between 6:4 and 12:8 stator-to-mover pole pairs ratio tubular LSRA are compares in term of the generated thrust force. At the same excitation current, the generated thrust force of tubular LSRA with 12:8 stator-to-mover pole pairs ratio found to be more than three times as that of 6:4 stator-to-mover pole pairs tubular LSRA. In order to obtain the optimum performance of the proposed tubular LSRA, the design optimization and the influence of tooth width and mover tooth height on generated thrust force are analyzed and computed using commercial 3D Finite Element Method (FEM) analysis software (Maxwell 3D Version 17.0). The results shows that the proposed actuator with optimized design parameters generates the maximum output thrust force for approximately 2.05 N when 3 A excitation current is applied.

   

Full Text

 

Title: Fuzzy Logic Controller design for autonomous underwater vehicle (AUV)-yaw control
Author (s): Ahmad Muzaffar Abdul Kadir, Mohammad Afif Kasno, Mohd. Shahrieel Mohd. Aras, Mohd. Zaidi Mohd. Tumari and Shahrizal Saat
Abstract:

This paper describes a study of tuning process for Fuzzy Logic Controller (FLC) and Proportional Integral Derivative (PID) controller design. A PID controller is ubiquitous; while simple in theory, but design and implementation of PID controllers can be difficult and time consuming in practice. In PID design, there are three approaches to determining the optimal tuning include manual tuning, tuning heuristics, and automated methods. In FLC design, there is no systematic procedure to tune fuzzy logic controller to follow a desired set point. The tuning process of FLC using trial-and-error approach is commonly done until satisfactory results are obtained. The performance of a FLC depends on its control rules and membership functions. A method is presented for tuning fuzzy control rules by manual tuning to make the system behave as closely as possible to the expert behavior in a control process. The tuning method fits the membership functions of the fuzzy rules given by the experts with the inference system and the defuzzification strategy selected and obtaining high-performance membership functions. This paper demonstrates a difference tuning process by tuning the PID and also adjusting the FLC membership function to get desired output.

   

Full Text

 

Title: Parametric study of high thin-walled Z-purlins structural connection with additional clip
Author (s): Premysl Parenica, Oldrich Sucharda and Petr Lehner
Abstract:

The article deals with the possibilities of connecting thin-walled purlins and supporting structures. The presented research is part of it the designing of large-scale halls field. For this type of construction the using of thin-walled purlins of higher structural heights is recommended. The behavior of the structure is highly influenced by different types of joints, by their number and also by other things. For example, geometrical and physical non-linearity must be including in numerical analysis. Experimental testing is also highly required. The main aim of the article is demonstration of parametric studies of a comprehensive series of experiments. The experiment results are presented in the context of the current design code. The evaluation is performed in the form of interaction (M/N) diagrams. Parametric study includes different thicknesses of steel, selected Z-purlins heights and several connection methods. The paper also contains a detailed determination of material properties of steel by tensile tests.

   

Full Text

 

Title: Classification of voltage stability states of a multi-bus power system network using probabilistic neural network (PNN)
Author (s): Gitanjali Saha, Kabir Chakraborty and Priyanath Das
Abstract:

The work of this paper proposes a distinctive approach for classifying the voltage collapse point of a power system network using Probabilistic Neural Network (PNN) classifier with intensified feature selection and extraction techniques to establish the accuracy of the status of the system. The voltage collapse point of the network is determined using a Unified Voltage Stability Indicator (UVSI). Traditional method of stability assessment necessitates load flow analysis which makes it infeasible for real time implementation. The input data to the classifier are line flows, bus voltages, active and reactive power loading and bus angle near the voltage collapse point of the PV curve along with the voltage stability index and are trained accordingly. The PNN which is used as a classifier to determine the vulnerable point of the given network with Pattern Recognition strategy minimizes the time taken to train the input data set without devastating the accuracy of the classification results. Further, a Radial Basis Function (RBF) has been implemented to provide information regarding the operating states of the power system network which are categorized as “secure state”, “intermediary state” and “critical state”. A voltage stability indicator UVSI was also chosen to heighten the classification accuracy of PNN. The proposed technique is tested on IEEE 57-bus system.

   

Full Text

 

Title: Assessing the forest cover changes of Yankari game reserve using remote sensing and GIS techniques
Author (s): Modibbo Mohammed Aliyu and Shahidah Mohammed Ariff
Abstract:

This paper aim at assessing the Forest cover changes of Yankari game reserve in Nigeria using remote sensing and GIS techniques. The vegetation of the area consist of Savannah grass land with-developed patches of woodland. The study determine the land cover changes of the area using Land sat 4 imagery for the year 1990 and Land sat 7 Enhanced Thematic Mapper (ETM+7) for 2001 and 2011. The imageries were processed and classified using maximum likelihood classifier. The results revealed that there is a drastic decline in the vegetation cover over the period of the study. The percentage changes from forest cover to grassland was 22.93% from 1990-2001, 24.48% from 2001-2011 and 35.52% from 1990-2011.Also forest changes to open space was 18.29%, from 1990-2001, 7.78% from 2001-2011 and 13.64% from 1990-2011.While forest change to agriculture was 0.50% from 1990-2001, 2.15% from 2001-2011 and 2.98% from 1990-2011. An overall accuracy assessment of 71% for Landsat 1990, 65%, and 64% for ETM+ for 2001 and 2011 respectively. The game reserve is facing a threat in the disappearance of its forest cover and wildlife extinction in no distance time. The use remote sensing and GIS approach allowed us to quantify the extent of the forest cover changes in terms of percentages of the area affected, the rate of change as well as the nature of the change in terms of impact on natural vegetation.

   

Full Text

 

Title: Local scour around single central circular bridge piers located within 180° bend
Author (s): Jaafar S. Maatooq and Emad S. Mahmoud

Abstract:

The local scour around bridge piers is one of the most common causes of bridge failures. Many equations have been proposed for determination. Most of these equations have a reliability and are used for design, were developed when the pier located within straight reaches for both flume and field studies. However, few studies have been conducted on bridge pier located within the curved channel. A laboratory work was conducted to measure the local scour which is formed around single circular pier fixed at each 30o of the bend while adopting three different diameters. The results show that the maximum depth of scour and the maximum extents (i.e., length and width) of scour hole, and maximum modification factor due to bend have occurred when the pier is located at sector 90o of the bend. The results also show that the diameter has a significant effect on scour phenomenon.

   

Full Text

 

Title: Proficient opportunistic routing by queuing based optimal channel selection for the primary users in CRAHN
Author (s): Hesham Mohammed Ali Abdullah and A. V. Senthil Kumar
Abstract:

In cognitive radio ad-hoc networks, the selection of channels for the primary wireless users transmitting delay-sensitive data has been a long-standing problem. Most existing models select the channels only based the requirement of the application layer of the users, which is not applicable in all scenarios. Hence in this paper, optimal channel selection based routing model is proposed. In the proposed model, optimal channel selection based M-SMOR (OCS-M-SMOR) first the traffic and channels conditions of the primary, as well as the secondary users are modeled and analyzed. Then the expected delay of the users' data based on the traffic priorities is evaluated using Priority virtual queue interface in which the priority queuing analysis is utilized. The users are prioritized based on the expected delay and the required spectrum frequency for the delay sensitive data. The channel selection strategies are determined using the Dynamic genetic algorithm, based on which the channels are sorted in the best possible order. For ranking the channels, the parameters namely delay; PSNR, MSE, and BER are employed while the channels are allocated to the users based on the pre-evaluated priorities. The experimental results illustrate that the proposed OCS-M-SMOR model has less delay and efficient channel transmission than the other opportunistic routing models.

   

Full Text

 

Title: The effect of weight oxide of TiO2 against the flank wearing inserts layerTiO2-Al2O3 on the dry lathing of the Stainless Steel AISI 301
Author (s): Obet Ranteallo, Hammada Abbas, Onny Sutresman and Ahmad Yusran Aminy
Abstract:

Failure of the cutting tools was inevitable and can be experienced by all types of tools. Wearing was a bit defect and had a negative effect on the cutting process. Reduce wear by choosing the tool type to adjust the cutting parameters and the correct cutting conditions. Hardness was considered when choosing the type of cutting tool. Cutting tools that had been proven and tested were quality. Tool inserts of TiO2-Al2O3 oxide coatings could increase the hardness of the tool, reducing the heat by friction between the tool and the workpiece to extend the tool's use to the cutting process. In this research, two types of TiO2-Al2O3 coated oxide beads were used with a percentage of oxide content 96.95% TiO2;3.05% A12O3 and 98.92% TiO2;1.08% A12O3, for stainless steel AISI 301. Cutting parameters, Vc= 101.4; 119.3; 155.1 m/ min, Vt= 0.18; 0.22; 0.28 mm/ rev, a= 1.5 mm, tc= 30 min and experimental dried conditions. The purpose of this research was to observe the effect of the TiO2 oxide coating on wear, especially the bit shaft, resulting from the dry result of AISI 301 Stainless Steel. The result showed that the coating properties and the percentage of TiO2 oxide weight could affect the amount of side wire (VB) of the tool. The maximum axis of each tool on the weight percent 96.95% TiO2 of 0.242 mm and 98.92% TiO2 of 0.225 mm. Cutting parameters, cutting speed, feed rate, depth of cut, cutting time and cutting conditions could affected tool wear, cater wear, flank wear, notch wear and flaking. Built Up Edge (BUE) was visible while cutting the AISI 301 stainless steel.

   

Full Text

 

Title: Improve of worker performance and quality of anchovy with ergonomic hybrid solar dryer
Author (s): I. Gede Bawa Susana
Abstract:

The process of drying of anchovy has traditionally caused work posture to squat, squat while shifting, bending, and exposed to heat pressure and drying result not yet optimal. This results in low worker performance and the quality of anchovy. To improve the worker's performance and the quality of the anchovy is done the design of the dryer with ergonomics intervention. The experimental research through treatment by subject design with a sample of 20 people. Sample performance is observed when working traditionally and intervention of ergonomics used the ergonomic hybrid solar dryer. Ergonomic hybrid solar dryer consist of solar thermal dryers, biomass dryer, and work desk. Data were analyzed with a significance level of 0.05. The results showed that the ergonomic hybrid solar dryer increase the drying temperature 31.94% and decrease workload 14.57%, musculoskeletal complaints 27.02%, fatigue 30.43%. Laboratory test results showed an increase anchovy quality corresponding of national standards. It was concluded that the ergonomic hybrid solar dryer improve performance of workers and income, as well as quality of anchovy.

   

Full Text

 

Title: Remote laboratories using the training module M2CI
Author (s): Diego F. Sendoya-Losada, Pedro Torres Silva and Fabian Bolivar Marin
Abstract:

Training module M2CI is a system that allows undergraduate students to acquire control engineering skills and competencies related to the automation of processes. The M2CI has several sensors and actuators for interacting with temperature, position and liquid level plants. However, many times the students do not have the economical means to travel or do not have time to use the equipment on the schedules in which the university attends the individuals, causing an underutilization of the M2CI. In order to make better use of the M2CI, a system to control and monitor the plants and instruments remotely has been implemented. This article presents the design of hardware and software to perform laboratories using the training module M2CI remotely via internet. The hardware and software of the project is based on Arduino, with the purpose of obtaining an economic solution.

   

Full Text

 

Title: Fabrication and mechanical analysis of jute-sisal hybrid composite
Author (s): Sharan Chandran M., Sreeja Sadasivan, Senthilkumar P., K. Senthil kumar, Arun Jose, Shihas A. and Jacob Kuruvila
Abstract:

The eco-friendly nature as well as processing advantage, light weight and low cost have enhanced the attraction and interest of natural fibre reinforced composite. The objective of current study is to study mechanical and interfacial properties of jute reinforced low density polyethylene composites and sisal fibre low density polyethylene composites and to compare the properties with jute-sisal reinforced hybrid composite. The composites are to be prepared by film stacking followed by hot compaction process. Tensile, flexural, impact and hardness tests are to be conducted for mechanical characterization.

   

Full Text

 

Title: A state of the art review on reinforced concrete voided slabs
Author (s): Adel A. Al- Azzawi and Ali Omar
Abstract:

Voided slabs remove the excess concrete from the unnecessary part of the structure slab to reduce weight. It was invented in Denmark about twenty seven years ago. It is now gaining popularity in the world. This paper reviewed several studies done on voided slab system. Every specialized parameter of voided slab system on which exploratory review has been done by author is tabulated in this paper systematically. The realization of the proposed goals includes documentation action and theoretical investigation of all work done by a few creators on voided section idea. The resultant conclusion will be used in defining the falling mechanism that can be helpful in the producing of a sufficient numerical model.

   

Full Text

 

Title: Category-based daily pattern analysis in an electric vehicle charging network
Author (s): Junghoon Lee and Gyung-Leen Park
Abstract:

This paper analyzes the daily occupancy rate pattern in an electric vehicle charging network running over Jeju Island, aiming at discovering per category common features. For the monitoring data archive collected from 244 DC chargers with a 5 minute period for 52 days, the daily utilization is calculated for each operating company, area type, and administrative region to understand inherent time series behavior for the whole day and hot hours. Next, charger-by-charger patterns are grouped by the hierarchical clustering scheme combined with the discrete time warping strategy on a statistical package workspace. The analysis finds 4 categories, one of which embraces all outliers. A strong dependency is identified from area types and operating companies to the utilization category. The category-based analysis can help the development of a new supplementary service capable of compensating for the long waiting time in battery charging.

   

Full Text

 

Title: Power efficient Wallace tree multiplier using Full Swing Gate Diffusion Input technique
Author (s): Anitha Juliette Albert, Syed Mustafaa, Mohammed Farook and Seshasayanan Ramachandran
Abstract:

This paper proposes the design and gate level implementation of a low power and area efficient 8-bit Wallace tree multiplier design using Full Swing Gate Diffusion Input Logic technique. The proposed design, developed using 45nm process technology was compared with its equivalent design, developed using conventional CMOS technology. The proposed multiplier presented significant advantages in terms of power, delay and area. Power and delay analysis of the proposed multiplier was performed for varied gate oxide thickness and three process technologies - 130 nm, 70nm and 45 nm. The design was subjected to parametric variations, such as gate oxide thickness and channel length. The results conclude to two major inferences. Firstly, in applications that demand low power, the proposed Full Swing Gate Diffusion Input Logic Wallace tree multiplier will be an ideal replacement for conventional CMOS multiplier, owing to reduced power and area. The proposed multiplier offers 26.21% reduction in power, 12 % reduction in delay and 36% reduction in area when compared to its equivalent CMOS version. Secondly, as transistor dimensions reduce, parametric variations become more significant. This analysis will aid in drastic reduction of parametric yield loss.

   

Full Text

 

Title: Clustering techniques of wireless sensor networks for Internet of Things
Author (s): Anagha Rajput and Vinoth Babu K.
Abstract:

Internet of Things (IoT) is one of the emerging and disruptive technology. IoT based systems are used in environment surveillance, e-healthcare, automation for industry, etc. Wireless sensor networks (WSN) is a predominant option to realize such systems because WSN though resource constrained but can connect cyber network and the physical real environment. The present day requirement of IoT is densely deployed sensor nodes over a large area. In this paper, clustering protocols for scalability is premeditated to clip the suitability with respect to IoT applications. The study of progressive algorithms gives a detail explanation of mathematical models used and their effect on WSN. It also aimed to present a comparison of performance metrics for single and multiple hop clustering protocols. Thus, exploring challenges fronting to refrain WSN for IoT applications.

   

Full Text

 

Title: Execution of value engineering approach for design development and cost reduction of monoblock pump
Author (s): Sri Lakshmana Kumar, S. Nallusamy and Rakesh Modak
Abstract:

In this global competitive market, the modern manufacturing industries are moving towards the betterment of production by reducing cost with no compromise on the customer satisfaction. This article focused the detailed work of value engineering to be implemented for any kind of products in order to optimize the value of a particular item. This research work presents a case study clearly showing the development of design and reduction of cost involved in a monoblock pump. There are few mandatory points were observed during the study period of the product that the cost of pump is high due to the usage of expensive material as well as more material usage. In order reduce the cost without sacrificing the quality of the product, few main components of the product such as impeller, main and auxiliary winding, adaptor and end cover which are having great scope to achieve the good customer feedback in performance wise. The value engineering technique has been applied on the components to enhance the design and reduce the overall cost. For impeller material modification, for adaptor and end cover changes in design and modifications in winding turns for coil winding has been suggested and thereby the overall cost reduction has been achieved through value engineering approach. From the results it was found that, implementation of value engineering to selected four components of the product reduces the cost about 24.84% in the overall manufacturing cost.

   

Full Text

 

Title: Interaction of local supersonic regions on a projectile model
Author (s): Alexander Kuzmin and Konstantin Babarykin
Abstract:

The 3D turbulent flow over a boat-tailed projectile is studied numerically at free-stream Mach numbers from 0.932 to 0.965 and the angle of attack of 6 deg. Formation and interaction of shock waves and local supersonic regions is scrutinized. Solutions of the Reynolds-averaged Navier-Stokes equations are obtained on unstructured meshes with finite-volume solvers of second-order accuracy. The solutions demonstrate intricate behavior of the pitching moment coefficient as a function of the free-stream Mach number. This is accounted for by interplay of local supersonic regions on the upper and lower surfaces of the projectile.

   

Full Text

 

Title: Efficient control of level in interacting conical tanks using real time concepts
Author (s): V. Karthikeyan
Abstract:

In this research work an effort is made to design a real time control system for a non linear system and the performance is compared with existing methods. Level control in conical tank is a difficult task considering its non linear design. The proposed controller algorithm is implemented in LPC 1768 processor board along with µ cos –II real time operating system for controlling level in the interacting conical tanks. The algorithm is written in keil ‘C’ Platform. Process reaction curve method is used to design a mathematical model for first order process having dead time for each tank. The designed PID controller Algorithm is tested in real time with conical tanks system. On comparing the work done with existing ones it is found that interaction factor is very less in the proposed method. The results obtained shows negligible steady state error and very high stability compared to conventional methods.

   

Full Text

 

Title: Sweeping Inclusive Connectivity based Routing in wireless sensor networks (WSN)
Author (s): C. R. Rathish and A. Rajaram
Abstract:

Wireless Sensor Networks are an important area in research and development was stimulated by military applications. Today WSN’s are used in many industrial and consumer applications. One of the major challenges in WSN is to produce low cost, small sensor nodes and should be energy efficient. In order to find the cost-effective routing, Sweeping Inclusive Connectivity based Routing Algorithm (SICRA) is introduced. The primary goal behind the algorithm is to hold the sensors operating for as long as possible. It contains three stages. In first stage, secured multi-hop network is constructed. It securely forwards the received messages. The security is provided using packet-absorb approach. It provides rapid deployment due to multi-hop. Multi-hop improves the long life of sensors. In second stage, the algorithm computes the best routing path by analyzing the transmission coverage, shorter hop, transmission delay, connectivity link. Third stage shows the load balancing in minimal time. Sweeping Inclusive routing algorithm selects the most favorable path so that the fault transmissions are avoided. This causes the network to balance the load in minimal time. This algorithm offers lower communication overhead and reduces overall energy consumption. This reserves energy and enrich network lifetime. This extends the battery life due to low power transmission, extends coverage and improves connectivity. The performance analysis of proposed SICRA provides better quality of service than previous strategies. It improves security, delivery ratio and reduces energy consumption, transmission delay and overhead.

   

Full Text

 

Title: Enhanced packet covering and stitching over man in the middle attacks in wireless sensor network
Author (s): G. Harikrishnan and A. Rajaram
Abstract:

Wireless sensors networks are immediately forward its packets to organizer with seed node present in network. Seed node perform vital role in wireless sensor network, for each and every movement in communication is controlled by seed node but some attacks occurred for transmission attacker node gather the information from one node forward data packet to another node. It causes network depletion during packet transmission. In proposed Enhanced packet covering and stitching algorithm (EPCSA) method covers the data packet and stitched before packet transmission. Intruder present in the network not fetch the information during communication, so network lifetime is improved and end to end delay is minimized. Seed node collects all the information from cluster head and any other node present in network. Cluster head act as anchor node to organize data such node position and coverage and connectivity to neighbor that kind of information’s are forwarded to seed node.

   

Full Text

 

Title: Big data processing in charging infrastructures for smart transportation systems
Author (s): Junghoon Lee and Gyung-Leen Park
Abstract:

This paper presents a data processing framework for a charging infrastructure monitoring system, embracing how to acquire open raw data, to manage in the database, and to conduct diverse analysis. Real-time status reports from 49 fast chargers in the target vicinity are consistently retrieved, parsed, and stored in our local machine equipped with a variety of open software solutions. The platform implements our own map interface as well as exploits R display packages. The analysis procedure investigates the occupancy rate according to hour-of-day, day-of-week, and charger type. Its results reveal that the city achieves about 18 % utilization, while the chargers are not mainly used by commuters. In addition, charger-by-charger analysis finds out that 12.2 % of chargers show over 40 % utilization during the hot hours. It opens the integration of other big data sets such as geographic information, weather condition, and power consumption.

   

Full Text

 

Title: Improving the K-means clustering using visual correlation analysis
Author (s): A. Suresh Babu and B. Rama Subbaiah
Abstract:

In this paper, we mainly focus on tweaking the performance of clustering by K-means for the given acquisition data. The data include a lot of attributes having different categories. Mainly the attributes are categorized into Numerical attributes and Categorical attributes. By using these attributes, data can be classified into a) Numerical data having only numerical attributes b) Categorical data having only categorical attributes c) Mixed data having both Categorical and numerical attributes. Initially, the Correlation Analysis is used for knowing the relationship among the attributes in the given data. It is exceptionally hard to discover Correlation Analysis for a tremendous measure of information. It may be conceivable of missing the traits with the tremendous measure of information. So in this paper, the correlation map is constructed for visualizing the correlated attributes by leaving irrelevant attributes among the given acquisition data. This correlated data available from the correlation map are used for tweaking the performance of K-means clustering results. For extracting the correlated data and tweaking the k-means clustering results, the Correlation based K-means Clustering (CBK) algorithm is proposed. In this paper, we mainly visualize the Clustering Accuracy and Normalized Mutual Information (NMI) among the attributes using K-means and future Correlation based k-means (CBK).

   

Full Text

 

Title: Analysis of Fuzzy Logic Based Control model for water treatment plant in Indian scenario
Author (s): K. Kaleeswari, T. Johnson and C. Vijayalakshmi
Abstract:

This paper mainly deals with the design of a Fuzzy Logic Control model for water treatment in Indian scenario. The water treatment plant may differ at different places, depending on the available water and our water requirements. The numerous factors affects the quality of water as well as operation of water treatment plant .The measure of water quality in terms of the presence of different kinds of impurities in water might vary from place to place and time to time. The aim of this study is to analyze the affecting parameter of water quality that affects the water treatment process. Based on the numerical calculations and graphical representations one can identify the corrective measures for an effective water treatment process.

   

Full Text

 

Title: PLC-HMI and Fuzzy based automation in two axis profile cutting machine
Author (s): A. Selwin Mich Priyadharson, S. Vinson Joshua and B. Senthil Kumaran
Abstract:

There are existing works based on CNC machines controlled by PLC. Most modern CNC machines use various programming methods such as implementation of GK-code, M-code, etc. In this paper, a novel design based on Fuzzy Inference System (FIS) is developed using B&R (Erwin Bernecker and Josef Rainer) Industrial Automation PLC (Programmable Logic Control) - HMI (Human Machine Interface) for enhancing the real time performance of a Profile Cutting Machine is proposed. Its Objective is to design and develop two axis Profile cutting machine using PLC with Fuzzy and to visualize the working status using HMI. In this work static FIS is developed and implemented in the PLC controller to achieve the coordinates of the Profile. Instead of training the FIS for the new set of data, two more parameters are added externally to the output of FIS in order to adapt for variation in the Profile. As outcome the Profile cutting machine will cut in desired angles at desired positions by simply adding two more inputs to the actual output of the FIS structure. PLC - HMI Input/Output Modules of the Proposed Profile cutting machine are X20 BR 9300, X20 DI 9371, X20 DO 9322, X20 AI 2622, X20 AO 2622, X20 AT 2402 and with Power Panel 4PP045.0571-062 are fabricated with an objective of attaining the coordinates of the profile.

   

Full Text

 

Title: Energy competent transmission mechanism based routing approach (ECTM-MRA) for reliable video transmission in multimedia Vehicular Ad hoc Networks
Author (s): R. Tamilselvi and V. Kathiresan
Abstract:

Transmission of video without transmission errors is one of the key research issue in multimedia Vehicular Ad hoc Network (VANET). Multimedia VANETs are capable enough to capture and share environmental monitoring, surveillance, traffic accidents, and disaster-based video smart city applications. This research work aims in proposing energy competent transmission mechanism based routing approach (ECTM-MRA) for reliable video transmission in multimedia Vehicular Ad hoc Networks. ECTM-MRA has two stages. The first stage of ECTM is data gathering that contains a video review table and the vehicle information table. The second stage of ECTM is associated to the video streaming method that obtains the parameters such as vehicle's degree, residual energy and transmission speed to determine low delay and resource responsive routes for streaming the video. Simulations are carried out and the results demonstrate that the proposed ECTM-MRA performs better in terms of route length, packet end-to-end delay, freezing delay, number of delivered packets and packet loss ratio.

   

Full Text

 

Title: Demonstration of smart sensor based industrial automation system in IOT environment
Author (s): K. Manikanta S., Rajalakshmi and T. Shankar
Abstract:

Automation is the current need of industries. There are number of technologies that are growing to achieve the good automation in the plant. One of the recently popular technologies is the automation using sensors and actuators. Herein this paper development of ARM7 and uC/OS-IIRTOS based real-time industry automation system using GSM communication is presented. The proposed system is having centralized controller, sensors and relays. Centralized module is the main unit that collects the information from plant sensors and gives this information to the end user using GSM communication. Also whenever needed it control the production automatically by switching the relays and actuators. The ARM7LPC2148 is used as monitoring and controlling unit for different parameters. Sometime more than processes need to be monitor and control in real-time. To control the process in real-time uC/OS-II Real-Time Operating System and need fulfiles are dumped into ARM controller. ARM7 LPC2148 controller is programmed using Embedded C language. Results obtained show the usefulness and effectiveness of the system as planned.

   

Full Text

 

Title: Design of full swing local bitline SRAM architecture based on FinFET using SVL technique
Author (s): T. R. Dinesh Kumar, K. Mohana Sundaram and M. Anto Bennet
Abstract:

FinFET design was introduced as an alternative for CMOS due to its mitigate short channel effects at lower technology nodes and also scaling of the single bulk MOSFETs faces problems in nanometre technology due to its short scaling effect that causes leakage current to increase. Dual gate FinFET has better short channel effect because of its alignment of the gates. The previous average 8T SRAM has more area and it requires write back scheme. The full scheme local bitline (BL) swing connected to read buffer gate can be obtained with boosted word line (WL) voltage. But we cannot use this voltage because it reduces the SRAM stability and threshold voltage is high. In this paper the SRAM architecture based on FinFET using SVL circuit technique is designed. In the proposed architecture scheme of full swing is determined by cross coupled PMOSs and the gate of the read buffer is driven by full Vdd without the use of boosted wordline voltage. The SRAM based on FinFET is designed on tanner tool. By applying SVL circuit technique the leakage power and the area consumption of SRAM based on FinFET is 83.74µw and 47% which is lower than the normal FinFET based SRAM architecture.

   

Full Text

 

Title: Concurrent dual band filters using plasmonic MIM waveguide ring resonator
Author (s): M. Vishwanath, Habibulla Khan and K. Thirupathaiah
Abstract:

This paper describes the design and analysis of metal-insulator-metal (MIM) waveguide based band-pass and band-stop filters by using ring resonators. MIM waveguide based ring resonators has been analysed in terms of their electrical parameters by using commercially available electromagnetic full-wave simulation software. A MIM waveguide based ring resonators has been designed and simulated to obtain its transmission and reflection coefficients. Ring resonator based dual band filters are more compact with reduced space and power requirements in photonic integrated circuits (PICs). By using this concept several other components can be design such as multiplexers/diplexers, directional couplers/branch line couplers and antenna.

   

Full Text

 

Title: A calculation method for estimation of the mean time to first failure of the technical systems on basis
of the topological conversion of the Markov reliability model
Author (s): Pavel Azizurovich Rahman
Abstract:

This scientific paper deals with the reliability models of technical systems on basis of continuous-time Markov chains (CTMC). An existing operator method for calculating the mean time to first failure (MTTFF), based on the reduction of Markov chain and solving the system of Kolmogorov-Chapman differential equations, is also discussed. The work also highlights the topological method offered by the author for calculating the mean time to first failure on basis of the special conversion of Markov chain. The calculation examples of MTTFF for the asymmetric computing system with triple modular redundancy by the existing operator method and the offered topological methods are also presented. The experimental research of calculation time by the operator and the topological methods are also discussed. According to the research results, the topological method offered by the author is significantly faster than existing operator method.

   

Full Text

 

Title: Multipurpose calorimeter to measure thermophysical properties
Author (s): Stanislav Proshkin
Abstract:

The article presents the methodology on the basis of which the calorimeter was made for complex automated measurement of thermophysical properties of a various materials including foodstuff. The main attention is paid to the temperature range which includes phase transitions, when thermophysical characteristics undergo significant changes. An automated experimental setup was made allowing measurements of temperature dependences of enthalpy, effective and true heat capacities, and thermal conductivity coefficients of various materials.

   

Full Text

 

Title: Algorithmic support of problems of electronic kinematics
Author (s): Inga Nikolaevna Bulatnikova and Natalja Nikolaevna Gershunina
Abstract:

This article discusses digital simulation and possible implementation of kinematic mechanisms and units on the basis of simple computational means (microprocessors). The proposed digital simulation is supported by geometrical plotting methods developed in descriptive geometry and successfully applied in engineering graphics. These methods, aided by compass, ruler, protractor and triangular ruler, make it possible to plot any trajectory, for instance, kinematic one. Technological basis of this simulation is a set of rapid algorithms based on integer arithmetic carried out by RISC microprocessors. Possibilities of this approach to designing of algorithmic support are exemplified by evolvent of circle. The obtained set of algorithms does not contain operations of multiplication and division; nevertheless, quite complex trajectories are obtained without trigonometric computations. The efficiency of the proposed procedure of algorithm designing is based on their fast operation, low cost of designing and simplicity of software implementation using microprocessors.

   

Full Text

 

Title: Effectively user pattern discover and classification from web log database
Author (s): K. Abirami and P. Mayilvaganan
Abstract:

This paper is involve the three phases on web usage mining. The first phase focused on data preprocessing stage to remove irrelevant data from web log file. In the second phase involve cleaned log file. It is used for discovering usage patterns. Final phase, the discovered the user behaviors patterns it provide to the classification of users, who have frequently visitor, rare visitor, referred by the other web site, distinct user. The cluster analysis or clustering is the task of assigning a set of objects into groups so that the objects in the same cluster are more similar to each other than to those in other clusters. This information will help to website administrators for efficient administration and personalization of their websites. Accurate analysis of these patterns leads to understanding of users visiting the web site thereby improved user satisfaction. We have conducted vivid experiments and the results are shown in this paper.

   

Full Text

 

Title: A novel face identification frame work
Author (s): T. Srinivasa Rao, V. Dilip Kumar and T. V. K. P. Prasad
Abstract:

Criminal record generally contains personal information about particular person along with photograph. To identify any criminal we need some identification regarding person, which are given by eyewitnesses. In most cases the quality and resolution of the recorded image-segments is poor and hard to identify a face. To overcome this sort of problem we are developing software. Identification can be done in many ways like fingerprint, eyes, DNA etc. One of the applications is face identification. The face is our primary focus of attention in social inter course playing a major role in conveying identity and emotion. Although the ability to infer intelligence or character from facial appearance is suspect, the human ability to recognize faces is remarkable. The operator first logs into the system by entering username and password. Then depending on the work allotted he has to select the screens from main menu screen. There are mainly three important function which he can do they are adding details, clipping image and finally construction of the face by using the eyewitness. The face that is finally formed is one the who has done the crime.

   

Full Text

 

Title: A comparative study on the advancement of text steganography techniques in digital media
Author (s): Salwa Shakir Baawi, Mohd. Rosmadi Mokhtar and Rossilawati Sulaiman
Abstract:

One of the common practices applied to ensure secrecy in the modern day is through an information hiding technique known as steganography, which dates back to the ancient Greece. This study investigates digital steganography and its techniques that primarily focus on text steganography. At the same time, it also attempts to present a distinctive classification in dealing with steganography based on each technique. Three types of steganography classifications were discussed, that consist of the type of carrier file, natural key used, and the embedding techniques. Text steganography can then be further separated into three categories: format based methods, random and statistical generation, and linguistics method. Techniques belonging to each category were studied, and comparisons between each technique are introduced by highlighting the findings. This study also confirmed that there are three principal factors that need to be further explored and taken into account in the design of future steganographic systems, which are the capacity, high transparency, and security.

   

Full Text

 

Title: Development of test site on the basis of led lamps for debugging software of wireless network for
processes automation modules
Author (s): Dmitry Alekseevich Ivanov, Danil Aleksandrovich Yaroslavsky, Marat Ferdinantovich Sadykov,
Mikhail Petrovich Goryachev and Tatyana Gennadyevna Yambaeva
Abstract:

The test site is designed for testing and debugging the software of the wireless network for processes automation (WNPA) modules; debugging and setting the function of local and remote control of objects using WNPA modules; debugging and setting the self-diagnostics function of WNPA modules and their communication channels; debugging WNPA module configuration function. The WNPA module is designed for use in embedded applications that require low data transfer rates and low power consumption. The goal is to create an inexpensive, self-organizing network with a mesh topology designed for a wide range of tasks. The network can be used in industrial control, built-in sensors, medical data collection, warning of intrusion or smoke, building and home automation, etc.

   

Full Text

 

Title: Monitoring and identifying the occurrence of oil spill in the ocean using satellite image for disaster mitigation
Author (s): Mukta Jagdish and Jerritta S.
Abstract:

In this paper an adaptive threshold techniques has been used which aimed to solve problem of oil spills in oceanic world. As we know oil spill is the biggest issue faced by marine species to overcome this problem an adaptive threshold method is applied for automatic monitoring and detection of oil spills in the ocean. This research is implemented using SAR RADARSAT-2 Narrow single beam data acquired in the Gulf of Mexico SAR image. The study demonstrates occurrence of oil spill in the ocean using image data obtained from the different satellite and detection of dark patches and bands in the images with low time complexity. In conclusion, adaptive threshold can be used as a tool for automatic detection of oil spill and SAR satellite image serves as an excellent sensor for oil spill detection and surveying.

   

Full Text

 

Title: Medical Image Data compression using hybrid methods
Author (s): Alyaa H. Ali
Abstract:

This search focuses on Image Data compression using different methods for data compression, three images are simulated for the data compression technique based on modified method, Huffman with local and soft threshed and three block size 4×4, 8×8 and 16×16. The second one is based on using the DCT "discrete cosine transformation" and "discrete wavelet transformation" DWT these methods are applied on the stroke brain images" Computing tomography images" after using the region based segmentation method to get the region of interest which is the stroke, Completing the process by calculating quality of image compression, five parameter are used ," Peak Signal to Noise Ratio (PSNR)", "Mean Square Error (MSE)","Compression Ratio (CR)","Structural Similarity Index (SSIM)" and "Universeral Image quality Index (UIQI)".

   

Full Text

 

Title: Impact of aerosols optical depth on angstrom exponent and microphysical properties of clouds over Iraq
Author (s): Ali M. AL-Salihi
Abstract:

In this study, spatial and temporal variations of aerosol optical depth (AOD) in selected regions in Iraq, namely, Mosul, Baghdad, Rutbah, and Basrah, were investigated with spatial resolution of 1° × 1° over Iraq (28.5°–38.5°N, 38.5°– 48.25°E); data have been retrieved from January 2003 to December 2015 by Moderate Resolution Imaging Spectroradiometer (MODIS) were analyzed which can lead to modifications in the microphysics of clouds as well. The highest values for mean seasonal AOD were observed in summer and spring, and the maximum recorded AOD values ranged from 0.324 ± 0.191 to 0.378 ± 0.189. By contrast minimum AOD values ranging from 0.195 ± 0.097 to 0.216 ± 0.111 were found in winter and autumn respectively, besides analyzed the relationship between AOD and Ångström exponent (AE) that consider a perfect indicator of the size of an aerosols particles. Furthermore, the relationships between AOD and four cloud parameters, namely, cloud fraction (CF), water vapor (WV), cloud optical depth (COD) and cloud effective radius (CER) have been investigated by employing spatial correlation maps for their data values. The analysis showed a strong negative correlation between AOD and AE particularly in the middle region (Baghdad) and western region (Rutbah). The correlation between AOD and CF showed a weak negative correlation and be close to zero in the western region. The correlation between AOD and WV was positive (~ 0.4) especially in the strip joint between a northern and middle region. AOD showed a negative relationship with COD in the whole of Iraq. AOD and CER presented a positive relation along the arid desert region extended from west northern region to the west southern region passing western region of Iraq. All mentioned correlations performed on the four study regions are based on the large-scale atmospheric variations.

   

Full Text

 

Title: Support vector regression approach of modeling the superconducting transition temperature of borocarbide-based superconductors
Author (s): Nahier Aldhafferi, Taoreed O. Owolabi, Kabiru O. Akande, Sunday O. Olatunji and Abdullah Alqahtani
Abstract:

Perpetual current carrying ability of borocarbide-based superconductors renders it indispensable in many practical applications such as generation of high magnetic field. Coexistence of superconductivity and magnetism in this superconductor also allows deep understanding of the interaction between the two phenomena. The superconducting transition temperatures (TC) of these compounds are very sensitive to Ni-Ni distance which is governed by the lattice parameter that further controls the electronic structure of the Ni(3d) dominated conduction bands. For quick investigation of the effect of structural disorder (which could result from doping) on the TC of these superconductors, we develop support vector regression (SVR)-based model that estimates the TC of different borocarbide-based superconductors using lattice parameters descriptors. Comparison of the estimated TC with the measured values shows excellent agreement. The outstanding performance demonstrated by the proposed SVR-based model in estimating the TC of borocarbide-based superconductor syndicates that the model can be adopted for quick estimation of TC of fabricated borocarbides compounds thereby providing an excellent alternative to the use of sophisticated equipment which are costly and time consuming.

   

Full Text

 

Title: Fluid structure interaction analysis on failure of Francis turbine runner blades
Author (s): Salary A., Verlinski S., Levonyan H., Tyagunov A. and Tarasov D.
Abstract:

This paper describes the influence of tail profile of Francis turbine blade on creation of vortexes and cavitations and its effects on initiation of crack. Fluid structural analysis is utilized to determine the location of Von-Karman vortexes and the positions in which cavitations occurs. Incompressible viscid Navier-Stokes formula was solved by CFD numerical method, meanwhile the stress distribution on the runner blades are calculated in FEM. It led to indicate the situation of crack nucleation and the results are perceived for both existence and retrofitted blades.

   

Full Text

 

Title: Deduplication in cloud storage using hashing technique for encrypted data
Author (s): Vaishnavi Moorthy, Arpit Parwal and Udit Rout
Abstract:

Cloud storage services are widely used, due to which the volume of data on the cloud is very large. In order to avoid data redundancy and to make use of cloud storage efficiently, data deduplication is used which eliminates the storage of redundant data. Only one unique copy for each duplicate file uploaded in the cloud and the owners are referenced to that one file whenever they want to access. The objective of this paper is to automate the deduplication process while increasing confidentiality and security of the data owner and the data. The system uses user end encryption so that cloud services are not liable for data compromise. An effective comparison using hash value of different files helps in faster and secure comparison.

   

Full Text

 

Title: Photoconductivity effects in air-induced and fluoro fullerene-induced surface conducting diamond
Author (s): Fadhlia Zafarina Zakaria
Abstract:

The photoelectrical properties of the hydrogen-terminated diamond surface in the presence of a surface conducting layer has not been reported in the literature. This paper presents a preliminary study of the photoelectrical behavior of the air-induced and fluoro fullerene-induced surface conducting diamond. The photoconductivity observed is attributed to the excitation of electrons from the near-surface valence band into trap states, giving rise to a higher sub-surface hole current. A photocurrent buildup was observed upon laser exposure, with the highest photocurrent up to 56% higher than the initial (dark) current at the diamond surface in the case of doping with C60F48. This appears to be considerably higher than the same sample when doped with water. The observed behavior suggests a possible influence on the level of photoconductivity due to the nature of the acceptor layer, but may alternatively reflect a trend that a reduced (dark) surface conductivity results in a higher relative increase in the photocurrent when exposed to light. The subsequent persistent decay of the photocurrent suggests the role of charge trapping at the trap states. The decay of the photoconductivity takes the form of a stretched exponential typical of a persistent photoconductivity, with the decay exponent, ß values found to be below 0.4 and the decay constants in the range of 46-286 s.

   

Full Text

 

Title: Intend of power-delay optimized Kogge Stone based Carry Select Adder
Author (s): Prajoona Valsalan and P. Manimegalai
Abstract:

In computation designs, the arithmetic operation plays a major role in all type of logical designs. It decides the performance of all internal components and its behavior. Hence, recent researchers focused on obtaining the high speed of operation with minimal power consumption. The conventional Carry Select Adder results in more area due to the inbuilt nature of two Ripple Carry Adders in the same structure. Similarly, the AND-OR-Invert based Carry Select Adder consists of complex circuits for processing the basic operation. Hence, a Kogge–Stone adder based carry select adder is designed, which is replacing the AOI logic from the previous AND-OR-Invert based Carry Select Adder to achieve optimization in terms of area, delay, and power. The proposed design is synthesized and simulated under cadence 45nm CMOS technology. The comparison shows how the proposed KS-CSLA is better than the existing regular dual Ripple Carry Adder (RCA), modified adder with BEC concept, Dual RCA and modified Square root adder with BEC unit. Finally, the speed of proposed model is increased twice of the speed of dual RCA.

   

Full Text

 

Title: Improved design of air flow for a two stroke internal combustion engine to promote cleaner combustion
Author (s): Ravikumar M., Mohanraj T. and Venkatesan D.
Abstract:

In the present work, an attempt is made to reduce scavenging problems by developing a new model of two-stroke spark-ignition engine. This model allows a flow of fresh air through intake valves positioned at the bottom of the cylinder and exit of burnt gases through exhaust ports situated at the top of cylinder. The exhaust ports are closed by the piston as it moves towards bottom of the cylinder following which gasoline is injected minimizing the possibility of mixing of fuel with outgoing exhaust gases. During expansion the piston unravels the exhaust ports and the burnt gases escape to the atmosphere due to pressure difference. Due to low density at high temperatures, the exhaust gases naturally rise against the direction of gravity reducing the possibility of mixing with incoming fresh air. Further, a comparative study of fuel distribution inside the cylinder has shown greater distribution when injection takes place against gravity than along gravity, which promotes cleaner combustion. The combustion analysis is done using Diesel-RK software and flow analysis is done using ANSYS FLUENT.

   

Full Text

 

Title: Response of wooden footbridge to the dynamic load
Author (s): Lenka Ponistova, Roman Fojtik, David Marecek, Veronika Vaskova and Antonin Lokaj
Abstract:

Nowadays, modern bridge constructions are very sensitive to the dynamic load due to the use of light materials with high load capacity and low absorption. In case of the footbridges, it is an associated with the occurrence of vibration resulting from force effects caused by pedestrian movement. There is an excessive vibration of structure which is a problem of the serviceability limit state rather than the problem of the ultimate limit state. This type of load can cause the resonance of the structure so it is necessary to prevent this problem, for example by installing the vibration damper. The subject of this article is an analysis of a wooden footbridge in Pribor in the Czech Republic which is monitored for the effects of load models caused by persons. The article describes experimental measurement focused on this problem and the subsequent proposal for possible measures.

   

Full Text

 

Title: Classifying software faults through Boolean classification model based on discretized defect datasets
Author (s): Pooja Kapoor, Deepak Arora and Ashwani Kumar
Abstract:

Identifying software defects has always been one of the major concerns of software designers and developers across the entire software industry. The intend of particular software that leads to produce some faults which is not determined previously during testing phase can lead to complete failure of the software and definitely incurred unnecessary cost and time inclusion. Thus the requirement of predicting faults at an earlier stage of its development has become necessity of today’s software development trend as the software becomes more distributed, complex and heavily cost infusive in nature. In this research work authors have proposed and implemented the idea of discretization of metric values in order to get better classification results. Authors have generated Boolean functions based on project metrics values, so that these values could be confined in the domain of classifying and predicting software faults. In this work authors have checked the performance of their proposed model by considering seventeen different software project and their version data taken from promise repository of NASA namely: Jedit, lucene, tomcat, velocity, xerces andxalan. The results gained after applying the proposed Boolean classifier are better and more promising in terms of its accuracy and precision, compared with available literature. The study claim visible increase in accuracy, as compared to other classifiers considered in the study like: Naïve Bayes, Random Forest, Perceptron, KNN and SOM.

   

Full Text

 

Title: On speeding up virtual machine migration through integrated data de-duplication methods
Author (s): K. Aruna Kumari, K. Raja Sekhara Rao and J. K. R. Sastry
Abstract:

Virtualization is a concept implemented as a major part of cloud computing infrastructure to offer everything as a service. Hypervisors are supported within the cloud computing platform using which many of the virtual machines can be created as per the demand of the end users. The Load on the virtual machines (VM) greatly varies while some are over used, some may be under used or average used. Migration of a process, data and sometimes both needs to be done from one VM to other in such a way that the load on the servers is well balanced leading to high performance computing. Load balancing helps in a big way especially in controlling server sprawling and efficient use of the computing resources. Live migration has to be undertaken seamlessly without the initiation of any process from the client application. During migration, movement of data from one server to another has to be undertaken which generally consume lot of time. Data stored on a server by a user is historical and live and enormous amount of duplicated data is stored on the server especially for maintaining different versions of the same data. Elimination of duplicated data before migration of the same from one server to the other will greatly enhance the speed of migration. This paper outlines some of the strategies for implementing data de-duplication within Migration processes.

   

Full Text

 

Title: A correlated Bayesian game theory with extended credit score for identifying malicious and selfish node in MANET
Author (s): S. Sampath and S. Veni
Abstract:

Mobile ad hoc network (MANET) is infrastructures less, dynamic, localized network of wireless mobile nodes. MANET nodes are relies upon network cooperation mechanism to correctly work, forwarding traffic unrelated to its personal use. In early work Bayesian Correlated Equilibrium based IDS for MANET is used for detecting the malicious node and normal node in the network. In this network some nodes selfishly decide to employ partially. The presence of selfish node within the MANET may reduce performance degradation of Network. So, the MANET requires detecting the Selfish node and improves the cooperation of each node. In this paper proposed the extended credit score (xCR) with game theory to detect selfish nodes as well as malicious nodes. An efficient proposed method constructs with maximum accuracy and less computational overhead to detect malicious and selfish node detection along with Bayesian correlated Equilibrium based intrusion detection system.

   

Full Text

 

Title: Corrosion effects on the flexural strength behavior of concrete containing Manufactured Sand
Author (s):

B. Vijaya and S. Senthil Selvan

Abstract:

The corrosion in reinforcing steel is the most detrimental effect on endangering the structural behavior of steel in concrete. This present study focuses on predicting the corrosion behavior of concrete in which Manufactured Sand (M-Sand) is used as a partial replacement for natural sand. To retain the natural resource such as natural sand an attempt is made in this research by partially replacing the natural sand with M-Sand. Experimental and numerical investigation has been carried out for three different levels of corrosion 5%, 10% and 25% to define mild, medium and severe exposure condition. National Bureau of Standard (NBS) beams have been casted and analysed for the corrosion performances of steel that is embedded in concrete by accelerated corrosion technique for concrete of grade M40 replaced with 60% manufactured sand for river sand which is found optimum. From the experimental investigation, it has been observed that there is adecline in the load carrying capacity of NBS RC beams due to reinforcement corrosion. Numerical investigation was made with concrete modelled as solid 65 element and reinforcement modelled as Link 8 elements by ANSYS software using finite element method.

   

Full Text

 


 

GoogleCustom Search



Seperator
    arpnjournals.com Publishing Policy Review Process Code of Ethics

Copyrights
© 2023 ARPN Publishers