|
ARPN Journal of Engineering and
Applied Sciences
March 2018 | Vol. 13 No. 5 |
|
|
Title: |
Effective utilization of quarry dust in
flexible pavements as per IRC-37:2012 |
Author (s): |
Shyam Prakash Koganti and Hanumantha Rao
Chappidi |
Abstract: |
Expansive soil is a problematic soil due to its low strength and
swell-shrink behavior. The expansive soils tend to swell and shrink with
respect to increase and decrease of moisture content. Moreover, black
cotton soil (expansive soil) is present in many parts of Krishna and
Guntur districts of Andhra Pradesh in which state’s new capital
“Amaravathi” was announced. So, it is necessary to find out cost
effective materials for stabilization of black cotton soils which will
save economy of the state while constructing flexible pavement. The
geo-technical properties like maximum dry density (MDD), optimum
moisture content (OMC) and California Bearing Ratio (CBR) are found out
for various percentages of quarry dust replacements. Influence of 10%,
20%, 30%, 40%, 50%, 60% and 70% of quarry dust on compaction and CBR are
presented. Flexible pavement thicknesses for 10%, 20%, 30%, 40%, 50%,
60% and 70% of replacement of quarry dust are also mentioned. From the
results it can be proved that up to 40% of quarry dust shows a promising
influence on strength characteristics of black cotton soil in
construction of flexible pavement. There are 4 types of flexible
pavements with bituminous course as surfacing. For easy understanding
these are named as type 1, 2, 3 and 4. Pavement thicknesses are
calculated for 2, 5, 10, 20, 30, 50, 100 and 150 msa (million standard
axles). |
|
|
Full Text |
|
|
Title: |
Total-corrosion modelling and corrosion
rate correlation for Anthocleista Djalonensis leaf-extract admixed
steel-reinforced concrete in 3.5% NaCl |
Author (s): |
Joshua Olusegun Okeniyi and Abimbola
Patricia Idowu Popoola |
Abstract: |
Assessment of admixture performance, by electrochemical monitoring
techniques, on the inhibition of concrete steel-rebar corrosion in
corrosive environments, has the potential challenge that
simpler-to-undertake methods may not indicate absolute corrosion
activity in the test-system. In this paper, total-corrosion (TC) was
modelled, as per ASTM G109, from macrocell-current measurements, using
zero-resistance ammeter (ZRA), obtained from Anthocleista djalonensis
leaf-extract admixed steel-reinforced concrete specimens that were
immersed in 3.5% NaCl, for the simulation of marine/saline environment.
In addition, corrosion rate (CR) measurements were obtained from the
steel-reinforced concrete specimens using linear-polarization-resistance
(LPR) method and the mean of corrosion rate was established from the
dataset for each specimen using a continuous probability distribution (Weibull
distribution) function. The total-corrosion model, mean of corrosion
rate and the admixture concentrations were then subjected to correlation
analysis. Results showed that, in spite of the different
instrumentations, the total-corrosion model combined the advantages of
linearized stochastic macrocell-current measurements with excellent
correlation to the corrosion rate (R2 = 99.42%), for the plant-extract
admixture concentrations. The experimental test-results and the
predictions from the correlation analysis both identified the 8.33 g/L
Anthocleista djalonensis concentration as having the optimal corrosion
inhibition efficiencies: ? = 98.65%
(experimental model) or ? = 99.00% (correlation
model). The implication of these results on the use of the macrocell
current technique as a comparably simpler-to-undertake corrosion
monitoring method than corrosion rate is detailed in the study. |
|
|
Full Text |
|
|
Title: |
Design and implementation of an algorithm
for plants identification and classification based on physical
characteristics of their leaves using computer vision |
Author (s): |
Jose Salgado Patron, Diego Sendoya-Losada
and Faiber Robayo-Betancourt |
Abstract: |
In
this paper, it’s described an algorithm for plants identification based
on leaves physical features using image processing techniques and the
feed forward neural network specialized on patterns recognition. As
fundamental step, the sobel operator is used to highlight the leaves
boundaries and veins. After obtaining those features, the new image is
transfer to the frequency space through the wavelet transform as basis
for the main vector of every sample. Finally, the results are evaluated
according to percentage of samples correctly identified. The algorithm
is adapted to a visual interface that allows the user to observe the
steps of the image processing and get the leaf information. |
|
|
Full Text |
|
|
Title: |
Distributed generation (DG) placement for
reducing power losses on radial distribution system using
K-means Clustering method |
Author (s): |
Ontoseno Penangsang, Muhammad Alief
Amanullah and Ni Ketut Aryani |
Abstract: |
To
solve power losses problem appeared on distribution system is to put
distributed generation (DG). The use of DG can be the solution improving
network ability from decreasing power loss, voltage profile
improvements, power quality, also reliability operation. But, research
shows that missing precision on DG placement can make the system get
bigger loss than the system without DG. So, we need a research and
planning before integrating DG to the distribution network. This paper
will be using K-means Clustering method which is grouping each bus from
loss sensitivity factor (LSF) characteristic operational sight and
voltage deviation (dV). Using this method, DG placement for single and
multi DG will be the solution repairing value of power loss. The B1 case
which became the base case have total 39.2436 kW power loss. After
placing single DG until multi DG based on K-means Clustering, the result
shows best power loss decreasing for B case become 6.050 kW at 3 DG
placing. |
|
|
Full Text |
|
|
Title: |
Optimizing the process parameters of AWJM
using Taguchi method and ANOVA on Inconel 625 |
Author (s): |
Viswanath J., Lakshmi Tulasi and P. C.
Prakash |
Abstract: |
Inconel 625 has a wide range of applications because of its high
resistance to corrosion cracking, pitting, and crevice formation and to
a variety of mineral and organic acids along with high thermal fatigue
resistance. However conventional machining of Inconel 625 is not so
economical and ease, on the other hand non conventional processes like
laser cutting, Abrasive Water Jet Machining (AWJM), Electric Discharge
Machining (EDM), etc have a very good potential in overcoming these
machining difficulties. Among these AWJM is commonly employed for very
hard and brittle materials due to its economical and technical
significance. In this work, research oriented experimentation on the
AWJM of Inconel 625 is planned and being carried out successfully to
optimize the input process parameters for fine Surface finish (SR) and
high Material removal rate (MRR). Optimization was carried out by these
phases SR and MRR are individually optimized as per Taguchi method by
Analysis of variance (MINI TAB). |
|
|
Full Text |
|
|
Title: |
The impact of fresh water injection on
heavy oil displacement from sandstone reservoirs |
Author (s): |
Ilyas K. Turgazinov, Iskander Sh. Gussenov
and Birzhan Zh. Zhappasbayev |
Abstract: |
In
recent years, numerous studies have confirmed that in certain
conditions, low salinity water flooding (LSW) may be more effective than
high salinity water flooding (HSW) both in carbonate and sandstone
reservoirs. The available data suggests that depending on reservoir
conditions, a number of phenomena may be responsible for incremental oil
recovery (IOR) during LSW. Wettability alteration, clay swelling, an
increase in pH, multi-ion exchange, double layer expansion and fine
migration were claimed to be the underlining mechanisms for an increase
in oil recovery during LSWF. However, due to a large number of
interrelated variables, the ranges of reservoir conditions in which each
of these mechanisms is activated has not yet been identified. Thus,
additional research is required for a better understanding of the
principles and limits of LSWF. However, only a few studies have been
conducted on heavy oil displacement. In this paper the higher salinity
contrast between injections of reservoir brine followed by injection of
fresh water into the cores were tested to define the impact of injecting
water salinity on the heavy oil recovery factor. Such extreme salinity
contrast of injecting water was used to demonstrate the effect of low
salinity water flooding in laboratory experiments and to check the
possibility of using low salinity water flooding as an EOR method. As a
result, fresh water resulted in 19% of IOR after initial HSW in the
preferentially oil-wet sand pack, whereas incremental recovery in the
hydrophilic sand totaled only around 4%. In addition, the data collected
on the injection pressure change coupled with the analysis of rock
mineralogy and the effluent samples suggests that fine migration takes
place during the injection of fresh water. |
|
|
Full Text |
|
|
Title: |
Design optimization of a three phase
tubular Linear Switched Reluctance Actuator |
Author (s): |
C. K. Yeo, M. M. Ghazaly and S. H. Chong
I. W. Jamaludin |
Abstract: |
This
paper presents the design and optimization of tubular Linear Switched
Reluctance Actuator (LSRA) without permanent magnet that has 12:8
stator-to-mover pole pairs ratio. The performances between 6:4 and 12:8
stator-to-mover pole pairs ratio tubular LSRA are compares in term of
the generated thrust force. At the same excitation current, the
generated thrust force of tubular LSRA with 12:8 stator-to-mover pole
pairs ratio found to be more than three times as that of 6:4
stator-to-mover pole pairs tubular LSRA. In order to obtain the optimum
performance of the proposed tubular LSRA, the design optimization and
the influence of tooth width and mover tooth height on generated thrust
force are analyzed and computed using commercial 3D Finite Element
Method (FEM) analysis software (Maxwell 3D Version 17.0). The results
shows that the proposed actuator with optimized design parameters
generates the maximum output thrust force for approximately 2.05 N when
3 A excitation current is applied. |
|
|
Full Text |
|
|
Title: |
Fuzzy Logic Controller design for
autonomous underwater vehicle (AUV)-yaw control |
Author (s): |
Ahmad Muzaffar Abdul Kadir, Mohammad Afif
Kasno, Mohd. Shahrieel Mohd. Aras, Mohd. Zaidi Mohd. Tumari and
Shahrizal Saat |
Abstract: |
This
paper describes a study of tuning process for Fuzzy Logic Controller (FLC)
and Proportional Integral Derivative (PID) controller design. A PID
controller is ubiquitous; while simple in theory, but design and
implementation of PID controllers can be difficult and time consuming in
practice. In PID design, there are three approaches to determining the
optimal tuning include manual tuning, tuning heuristics, and automated
methods. In FLC design, there is no systematic procedure to tune fuzzy
logic controller to follow a desired set point. The tuning process of
FLC using trial-and-error approach is commonly done until satisfactory
results are obtained. The performance of a FLC depends on its control
rules and membership functions. A method is presented for tuning fuzzy
control rules by manual tuning to make the system behave as closely as
possible to the expert behavior in a control process. The tuning method
fits the membership functions of the fuzzy rules given by the experts
with the inference system and the defuzzification strategy selected and
obtaining high-performance membership functions. This paper demonstrates
a difference tuning process by tuning the PID and also adjusting the FLC
membership function to get desired output. |
|
|
Full Text |
|
|
Title: |
Parametric study of high thin-walled Z-purlins
structural connection with additional clip |
Author (s): |
Premysl Parenica, Oldrich Sucharda and
Petr Lehner |
Abstract: |
The
article deals with the possibilities of connecting thin-walled purlins
and supporting structures. The presented research is part of it the
designing of large-scale halls field. For this type of construction the
using of thin-walled purlins of higher structural heights is
recommended. The behavior of the structure is highly influenced by
different types of joints, by their number and also by other things. For
example, geometrical and physical non-linearity must be including in
numerical analysis. Experimental testing is also highly required. The
main aim of the article is demonstration of parametric studies of a
comprehensive series of experiments. The experiment results are
presented in the context of the current design code. The evaluation is
performed in the form of interaction (M/N) diagrams. Parametric study
includes different thicknesses of steel, selected Z-purlins heights and
several connection methods. The paper also contains a detailed
determination of material properties of steel by tensile tests. |
|
|
Full Text |
|
|
Title: |
Classification of voltage stability states
of a multi-bus power system network using probabilistic neural network (PNN) |
Author (s): |
Gitanjali Saha, Kabir Chakraborty and
Priyanath Das |
Abstract: |
The
work of this paper proposes a distinctive approach for classifying the
voltage collapse point of a power system network using Probabilistic
Neural Network (PNN) classifier with intensified feature selection and
extraction techniques to establish the accuracy of the status of the
system. The voltage collapse point of the network is determined using a
Unified Voltage Stability Indicator (UVSI). Traditional method of
stability assessment necessitates load flow analysis which makes it
infeasible for real time implementation. The input data to the
classifier are line flows, bus voltages, active and reactive power
loading and bus angle near the voltage collapse point of the PV curve
along with the voltage stability index and are trained accordingly. The
PNN which is used as a classifier to determine the vulnerable point of
the given network with Pattern Recognition strategy minimizes the time
taken to train the input data set without devastating the accuracy of
the classification results. Further, a Radial Basis Function (RBF) has
been implemented to provide information regarding the operating states
of the power system network which are categorized as “secure state”,
“intermediary state” and “critical state”. A voltage stability indicator
UVSI was also chosen to heighten the classification accuracy of PNN. The
proposed technique is tested on IEEE 57-bus system. |
|
|
Full Text |
|
|
Title: |
Assessing the forest cover changes of
Yankari game reserve using remote sensing and GIS techniques |
Author (s): |
Modibbo Mohammed Aliyu and Shahidah
Mohammed Ariff |
Abstract: |
This
paper aim at assessing the Forest cover changes of Yankari game reserve
in Nigeria using remote sensing and GIS techniques. The vegetation of
the area consist of Savannah grass land with-developed patches of
woodland. The study determine the land cover changes of the area using
Land sat 4 imagery for the year 1990 and Land sat 7 Enhanced Thematic
Mapper (ETM+7) for 2001 and 2011. The imageries were processed and
classified using maximum likelihood classifier. The results revealed
that there is a drastic decline in the vegetation cover over the period
of the study. The percentage changes from forest cover to grassland was
22.93% from 1990-2001, 24.48% from 2001-2011 and 35.52% from
1990-2011.Also forest changes to open space was 18.29%, from 1990-2001,
7.78% from 2001-2011 and 13.64% from 1990-2011.While forest change to
agriculture was 0.50% from 1990-2001, 2.15% from 2001-2011 and 2.98%
from 1990-2011. An overall accuracy assessment of 71% for Landsat 1990,
65%, and 64% for ETM+ for 2001 and 2011 respectively. The game reserve
is facing a threat in the disappearance of its forest cover and wildlife
extinction in no distance time. The use remote sensing and GIS approach
allowed us to quantify the extent of the forest cover changes in terms
of percentages of the area affected, the rate of change as well as the
nature of the change in terms of impact on natural vegetation. |
|
|
Full Text |
|
|
Title: |
Local scour around single central circular
bridge piers located within 180° bend |
Author (s): |
Jaafar S. Maatooq and Emad S. Mahmoud |
Abstract: |
The
local scour around bridge piers is one of the most common causes of
bridge failures. Many equations have been proposed for determination.
Most of these equations have a reliability and are used for design, were
developed when the pier located within straight reaches for both flume
and field studies. However, few studies have been conducted on bridge
pier located within the curved channel. A laboratory work was conducted
to measure the local scour which is formed around single circular pier
fixed at each 30o of the bend while adopting three different diameters.
The results show that the maximum depth of scour and the maximum extents
(i.e., length and width) of scour hole, and maximum modification factor
due to bend have occurred when the pier is located at sector 90o of the
bend. The results also show that the diameter has a significant effect
on scour phenomenon. |
|
|
Full Text |
|
|
Title: |
Proficient opportunistic routing by
queuing based optimal channel selection for the primary users in CRAHN |
Author (s): |
Hesham Mohammed Ali Abdullah and A. V.
Senthil Kumar |
Abstract: |
In
cognitive radio ad-hoc networks, the selection of channels for the
primary wireless users transmitting delay-sensitive data has been a
long-standing problem. Most existing models select the channels only
based the requirement of the application layer of the users, which is
not applicable in all scenarios. Hence in this paper, optimal channel
selection based routing model is proposed. In the proposed model,
optimal channel selection based M-SMOR (OCS-M-SMOR) first the traffic
and channels conditions of the primary, as well as the secondary users
are modeled and analyzed. Then the expected delay of the users' data
based on the traffic priorities is evaluated using Priority virtual
queue interface in which the priority queuing analysis is utilized. The
users are prioritized based on the expected delay and the required
spectrum frequency for the delay sensitive data. The channel selection
strategies are determined using the Dynamic genetic algorithm, based on
which the channels are sorted in the best possible order. For ranking
the channels, the parameters namely delay; PSNR, MSE, and BER are
employed while the channels are allocated to the users based on the
pre-evaluated priorities. The experimental results illustrate that the
proposed OCS-M-SMOR model has less delay and efficient channel
transmission than the other opportunistic routing models. |
|
|
Full Text |
|
|
Title: |
The effect of weight oxide of TiO2 against
the flank wearing inserts layerTiO2-Al2O3 on the dry lathing of the
Stainless Steel AISI 301 |
Author (s): |
Obet Ranteallo, Hammada Abbas, Onny
Sutresman and Ahmad Yusran Aminy |
Abstract: |
Failure of the cutting tools was inevitable and can be experienced by
all types of tools. Wearing was a bit defect and had a negative effect
on the cutting process. Reduce wear by choosing the tool type to adjust
the cutting parameters and the correct cutting conditions. Hardness was
considered when choosing the type of cutting tool. Cutting tools that
had been proven and tested were quality. Tool inserts of TiO2-Al2O3
oxide coatings could increase the hardness of the tool, reducing the
heat by friction between the tool and the workpiece to extend the tool's
use to the cutting process. In this research, two types of TiO2-Al2O3
coated oxide beads were used with a percentage of oxide content 96.95%
TiO2;3.05% A12O3 and 98.92% TiO2;1.08% A12O3, for stainless steel AISI
301. Cutting parameters, Vc= 101.4; 119.3; 155.1 m/ min, Vt= 0.18; 0.22;
0.28 mm/ rev, a= 1.5 mm, tc= 30 min and experimental dried conditions.
The purpose of this research was to observe the effect of the TiO2 oxide
coating on wear, especially the bit shaft, resulting from the dry result
of AISI 301 Stainless Steel. The result showed that the coating
properties and the percentage of TiO2 oxide weight could affect the
amount of side wire (VB) of the tool. The maximum axis of each tool on
the weight percent 96.95% TiO2 of 0.242 mm and 98.92% TiO2 of 0.225 mm.
Cutting parameters, cutting speed, feed rate, depth of cut, cutting time
and cutting conditions could affected tool wear, cater wear, flank wear,
notch wear and flaking. Built Up Edge (BUE) was visible while cutting
the AISI 301 stainless steel. |
|
|
Full Text |
|
|
Title: |
Improve of worker performance and quality
of anchovy with ergonomic hybrid solar dryer |
Author (s): |
I. Gede Bawa Susana |
Abstract: |
The
process of drying of anchovy has traditionally caused work posture to
squat, squat while shifting, bending, and exposed to heat pressure and
drying result not yet optimal. This results in low worker performance
and the quality of anchovy. To improve the worker's performance and the
quality of the anchovy is done the design of the dryer with ergonomics
intervention. The experimental research through treatment by subject
design with a sample of 20 people. Sample performance is observed when
working traditionally and intervention of ergonomics used the ergonomic
hybrid solar dryer. Ergonomic hybrid solar dryer consist of solar
thermal dryers, biomass dryer, and work desk. Data were analyzed with a
significance level of 0.05. The results showed that the ergonomic hybrid
solar dryer increase the drying temperature 31.94% and decrease workload
14.57%, musculoskeletal complaints 27.02%, fatigue 30.43%. Laboratory
test results showed an increase anchovy quality corresponding of
national standards. It was concluded that the ergonomic hybrid solar
dryer improve performance of workers and income, as well as quality of
anchovy. |
|
|
Full Text |
|
|
Title: |
Remote laboratories using the training
module M2CI |
Author (s): |
Diego F. Sendoya-Losada, Pedro Torres
Silva and Fabian Bolivar Marin |
Abstract: |
Training module M2CI is a system that allows undergraduate students to
acquire control engineering skills and competencies related to the
automation of processes. The M2CI has several sensors and actuators for
interacting with temperature, position and liquid level plants. However,
many times the students do not have the economical means to travel or do
not have time to use the equipment on the schedules in which the
university attends the individuals, causing an underutilization of the
M2CI. In order to make better use of the M2CI, a system to control and
monitor the plants and instruments remotely has been implemented. This
article presents the design of hardware and software to perform
laboratories using the training module M2CI remotely via internet. The
hardware and software of the project is based on Arduino, with the
purpose of obtaining an economic solution. |
|
|
Full Text |
|
|
Title: |
Fabrication and mechanical analysis of
jute-sisal hybrid composite |
Author (s): |
Sharan Chandran M., Sreeja Sadasivan,
Senthilkumar P., K. Senthil kumar, Arun Jose, Shihas A. and Jacob
Kuruvila |
Abstract: |
The
eco-friendly nature as well as processing advantage, light weight and
low cost have enhanced the attraction and interest of natural fibre
reinforced composite. The objective of current study is to study
mechanical and interfacial properties of jute reinforced low density
polyethylene composites and sisal fibre low density polyethylene
composites and to compare the properties with jute-sisal reinforced
hybrid composite. The composites are to be prepared by film stacking
followed by hot compaction process. Tensile, flexural, impact and
hardness tests are to be conducted for mechanical characterization. |
|
|
Full Text |
|
|
Title: |
A state of the art review on reinforced
concrete voided slabs |
Author (s): |
Adel A. Al- Azzawi and Ali Omar |
Abstract: |
Voided slabs remove the excess concrete from the unnecessary part of the
structure slab to reduce weight. It was invented in Denmark about twenty
seven years ago. It is now gaining popularity in the world. This paper
reviewed several studies done on voided slab system. Every specialized
parameter of voided slab system on which exploratory review has been
done by author is tabulated in this paper systematically. The
realization of the proposed goals includes documentation action and
theoretical investigation of all work done by a few creators on voided
section idea. The resultant conclusion will be used in defining the
falling mechanism that can be helpful in the producing of a sufficient
numerical model. |
|
|
Full Text |
|
|
Title: |
Category-based daily pattern analysis in
an electric vehicle charging network |
Author (s): |
Junghoon Lee and Gyung-Leen Park |
Abstract: |
This
paper analyzes the daily occupancy rate pattern in an electric vehicle
charging network running over Jeju Island, aiming at discovering per
category common features. For the monitoring data archive collected from
244 DC chargers with a 5 minute period for 52 days, the daily
utilization is calculated for each operating company, area type, and
administrative region to understand inherent time series behavior for
the whole day and hot hours. Next, charger-by-charger patterns are
grouped by the hierarchical clustering scheme combined with the discrete
time warping strategy on a statistical package workspace. The analysis
finds 4 categories, one of which embraces all outliers. A strong
dependency is identified from area types and operating companies to the
utilization category. The category-based analysis can help the
development of a new supplementary service capable of compensating for
the long waiting time in battery charging. |
|
|
Full Text |
|
|
Title: |
Power efficient Wallace tree multiplier
using Full Swing Gate Diffusion Input technique |
Author (s): |
Anitha Juliette Albert, Syed Mustafaa,
Mohammed Farook and Seshasayanan Ramachandran |
Abstract: |
This
paper proposes the design and gate level implementation of a low power
and area efficient 8-bit Wallace tree multiplier design using Full Swing
Gate Diffusion Input Logic technique. The proposed design, developed
using 45nm process technology was compared with its equivalent design,
developed using conventional CMOS technology. The proposed multiplier
presented significant advantages in terms of power, delay and area.
Power and delay analysis of the proposed multiplier was performed for
varied gate oxide thickness and three process technologies - 130 nm,
70nm and 45 nm. The design was subjected to parametric variations, such
as gate oxide thickness and channel length. The results conclude to two
major inferences. Firstly, in applications that demand low power, the
proposed Full Swing Gate Diffusion Input Logic Wallace tree multiplier
will be an ideal replacement for conventional CMOS multiplier, owing to
reduced power and area. The proposed multiplier offers 26.21% reduction
in power, 12 % reduction in delay and 36% reduction in area when
compared to its equivalent CMOS version. Secondly, as transistor
dimensions reduce, parametric variations become more significant. This
analysis will aid in drastic reduction of parametric yield loss. |
|
|
Full Text |
|
|
Title: |
Clustering techniques of wireless sensor
networks for Internet of Things |
Author (s): |
Anagha Rajput and Vinoth Babu K. |
Abstract: |
Internet of Things (IoT) is one of the emerging and disruptive
technology. IoT based systems are used in environment surveillance,
e-healthcare, automation for industry, etc. Wireless sensor networks (WSN)
is a predominant option to realize such systems because WSN though
resource constrained but can connect cyber network and the physical real
environment. The present day requirement of IoT is densely deployed
sensor nodes over a large area. In this paper, clustering protocols for
scalability is premeditated to clip the suitability with respect to IoT
applications. The study of progressive algorithms gives a detail
explanation of mathematical models used and their effect on WSN. It also
aimed to present a comparison of performance metrics for single and
multiple hop clustering protocols. Thus, exploring challenges fronting
to refrain WSN for IoT applications. |
|
|
Full Text |
|
|
Title: |
Execution of value engineering approach
for design development and cost reduction of monoblock pump |
Author (s): |
Sri Lakshmana Kumar, S. Nallusamy and
Rakesh Modak |
Abstract: |
In
this global competitive market, the modern manufacturing industries are
moving towards the betterment of production by reducing cost with no
compromise on the customer satisfaction. This article focused the
detailed work of value engineering to be implemented for any kind of
products in order to optimize the value of a particular item. This
research work presents a case study clearly showing the development of
design and reduction of cost involved in a monoblock pump. There are few
mandatory points were observed during the study period of the product
that the cost of pump is high due to the usage of expensive material as
well as more material usage. In order reduce the cost without
sacrificing the quality of the product, few main components of the
product such as impeller, main and auxiliary winding, adaptor and end
cover which are having great scope to achieve the good customer feedback
in performance wise. The value engineering technique has been applied on
the components to enhance the design and reduce the overall cost. For
impeller material modification, for adaptor and end cover changes in
design and modifications in winding turns for coil winding has been
suggested and thereby the overall cost reduction has been achieved
through value engineering approach. From the results it was found that,
implementation of value engineering to selected four components of the
product reduces the cost about 24.84% in the overall manufacturing cost. |
|
|
Full Text |
|
|
Title: |
Interaction of local supersonic regions on
a projectile model |
Author (s): |
Alexander Kuzmin and Konstantin Babarykin |
Abstract: |
The
3D turbulent flow over a boat-tailed projectile is studied numerically
at free-stream Mach numbers from 0.932 to 0.965 and the angle of attack
of 6 deg. Formation and interaction of shock waves and local supersonic
regions is scrutinized. Solutions of the Reynolds-averaged Navier-Stokes
equations are obtained on unstructured meshes with finite-volume solvers
of second-order accuracy. The solutions demonstrate intricate behavior
of the pitching moment coefficient as a function of the free-stream Mach
number. This is accounted for by interplay of local supersonic regions
on the upper and lower surfaces of the projectile. |
|
|
Full Text |
|
|
Title: |
Efficient control of level in interacting
conical tanks using real time concepts |
Author (s): |
V. Karthikeyan |
Abstract: |
In
this research work an effort is made to design a real time control
system for a non linear system and the performance is compared with
existing methods. Level control in conical tank is a difficult task
considering its non linear design. The proposed controller algorithm is
implemented in LPC 1768 processor board along with µ cos –II real time
operating system for controlling level in the interacting conical tanks.
The algorithm is written in keil ‘C’ Platform. Process reaction curve
method is used to design a mathematical model for first order process
having dead time for each tank. The designed PID controller Algorithm is
tested in real time with conical tanks system. On comparing the work
done with existing ones it is found that interaction factor is very less
in the proposed method. The results obtained shows negligible steady
state error and very high stability compared to conventional methods. |
|
|
Full Text |
|
|
Title: |
Sweeping Inclusive Connectivity based
Routing in wireless sensor networks (WSN) |
Author (s): |
C. R. Rathish and A. Rajaram |
Abstract: |
Wireless Sensor Networks are an important area in research and
development was stimulated by military applications. Today WSN’s are
used in many industrial and consumer applications. One of the major
challenges in WSN is to produce low cost, small sensor nodes and should
be energy efficient. In order to find the cost-effective routing,
Sweeping Inclusive Connectivity based Routing Algorithm (SICRA) is
introduced. The primary goal behind the algorithm is to hold the sensors
operating for as long as possible. It contains three stages. In first
stage, secured multi-hop network is constructed. It securely forwards
the received messages. The security is provided using packet-absorb
approach. It provides rapid deployment due to multi-hop. Multi-hop
improves the long life of sensors. In second stage, the algorithm
computes the best routing path by analyzing the transmission coverage,
shorter hop, transmission delay, connectivity link. Third stage shows
the load balancing in minimal time. Sweeping Inclusive routing algorithm
selects the most favorable path so that the fault transmissions are
avoided. This causes the network to balance the load in minimal time.
This algorithm offers lower communication overhead and reduces overall
energy consumption. This reserves energy and enrich network lifetime.
This extends the battery life due to low power transmission, extends
coverage and improves connectivity. The performance analysis of proposed
SICRA provides better quality of service than previous strategies. It
improves security, delivery ratio and reduces energy consumption,
transmission delay and overhead. |
|
|
Full Text |
|
|
Title: |
Enhanced packet covering and stitching
over man in the middle attacks in wireless sensor network |
Author (s): |
G. Harikrishnan and A. Rajaram |
Abstract: |
Wireless sensors networks are immediately forward its packets to
organizer with seed node present in network. Seed node perform vital
role in wireless sensor network, for each and every movement in
communication is controlled by seed node but some attacks occurred for
transmission attacker node gather the information from one node forward
data packet to another node. It causes network depletion during packet
transmission. In proposed Enhanced packet covering and stitching
algorithm (EPCSA) method covers the data packet and stitched before
packet transmission. Intruder present in the network not fetch the
information during communication, so network lifetime is improved and
end to end delay is minimized. Seed node collects all the information
from cluster head and any other node present in network. Cluster head
act as anchor node to organize data such node position and coverage and
connectivity to neighbor that kind of information’s are forwarded to
seed node. |
|
|
Full Text |
|
|
Title: |
Big data processing in charging
infrastructures for smart transportation systems |
Author (s): |
Junghoon Lee and Gyung-Leen Park |
Abstract: |
This
paper presents a data processing framework for a charging infrastructure
monitoring system, embracing how to acquire open raw data, to manage in
the database, and to conduct diverse analysis. Real-time status reports
from 49 fast chargers in the target vicinity are consistently retrieved,
parsed, and stored in our local machine equipped with a variety of open
software solutions. The platform implements our own map interface as
well as exploits R display packages. The analysis procedure investigates
the occupancy rate according to hour-of-day, day-of-week, and charger
type. Its results reveal that the city achieves about 18 % utilization,
while the chargers are not mainly used by commuters. In addition,
charger-by-charger analysis finds out that 12.2 % of chargers show over
40 % utilization during the hot hours. It opens the integration of other
big data sets such as geographic information, weather condition, and
power consumption. |
|
|
Full Text |
|
|
Title: |
Improving the K-means clustering using
visual correlation analysis |
Author (s): |
A. Suresh Babu and B. Rama Subbaiah |
Abstract: |
In
this paper, we mainly focus on tweaking the performance of clustering by
K-means for the given acquisition data. The data include a lot of
attributes having different categories. Mainly the attributes are
categorized into Numerical attributes and Categorical attributes. By
using these attributes, data can be classified into a) Numerical data
having only numerical attributes b) Categorical data having only
categorical attributes c) Mixed data having both Categorical and
numerical attributes. Initially, the Correlation Analysis is used for
knowing the relationship among the attributes in the given data. It is
exceptionally hard to discover Correlation Analysis for a tremendous
measure of information. It may be conceivable of missing the traits with
the tremendous measure of information. So in this paper, the correlation
map is constructed for visualizing the correlated attributes by leaving
irrelevant attributes among the given acquisition data. This correlated
data available from the correlation map are used for tweaking the
performance of K-means clustering results. For extracting the correlated
data and tweaking the k-means clustering results, the Correlation based
K-means Clustering (CBK) algorithm is proposed. In this paper, we mainly
visualize the Clustering Accuracy and Normalized Mutual Information (NMI)
among the attributes using K-means and future Correlation based k-means
(CBK). |
|
|
Full Text |
|
|
Title: |
Analysis of Fuzzy Logic Based Control
model for water treatment plant in Indian scenario |
Author (s): |
K. Kaleeswari, T. Johnson and C.
Vijayalakshmi |
Abstract: |
This
paper mainly deals with the design of a Fuzzy Logic Control model for
water treatment in Indian scenario. The water treatment plant may differ
at different places, depending on the available water and our water
requirements. The numerous factors affects the quality of water as well
as operation of water treatment plant .The measure of water quality in
terms of the presence of different kinds of impurities in water might
vary from place to place and time to time. The aim of this study is to
analyze the affecting parameter of water quality that affects the water
treatment process. Based on the numerical calculations and graphical
representations one can identify the corrective measures for an
effective water treatment process. |
|
|
Full Text |
|
|
Title: |
PLC-HMI and Fuzzy based automation in two
axis profile cutting machine |
Author (s): |
A. Selwin Mich Priyadharson, S. Vinson
Joshua and B. Senthil Kumaran |
Abstract: |
There
are existing works based on CNC machines controlled by PLC. Most modern
CNC machines use various programming methods such as implementation of
GK-code, M-code, etc. In this paper, a novel design based on Fuzzy
Inference System (FIS) is developed using B&R (Erwin Bernecker and Josef
Rainer) Industrial Automation PLC (Programmable Logic Control) - HMI
(Human Machine Interface) for enhancing the real time performance of a
Profile Cutting Machine is proposed. Its Objective is to design and
develop two axis Profile cutting machine using PLC with Fuzzy and to
visualize the working status using HMI. In this work static FIS is
developed and implemented in the PLC controller to achieve the
coordinates of the Profile. Instead of training the FIS for the new set
of data, two more parameters are added externally to the output of FIS
in order to adapt for variation in the Profile. As outcome the Profile
cutting machine will cut in desired angles at desired positions by
simply adding two more inputs to the actual output of the FIS structure.
PLC - HMI Input/Output Modules of the Proposed Profile cutting machine
are X20 BR 9300, X20 DI 9371, X20 DO 9322, X20 AI 2622, X20 AO 2622, X20
AT 2402 and with Power Panel 4PP045.0571-062 are fabricated with an
objective of attaining the coordinates of the profile. |
|
|
Full Text |
|
|
Title: |
Energy competent transmission mechanism
based routing approach (ECTM-MRA) for reliable video transmission in
multimedia Vehicular Ad hoc Networks |
Author (s): |
R. Tamilselvi and V. Kathiresan |
Abstract: |
Transmission of video without transmission errors is one of the key
research issue in multimedia Vehicular Ad hoc Network (VANET).
Multimedia VANETs are capable enough to capture and share environmental
monitoring, surveillance, traffic accidents, and disaster-based video
smart city applications. This research work aims in proposing energy
competent transmission mechanism based routing approach (ECTM-MRA) for
reliable video transmission in multimedia Vehicular Ad hoc Networks.
ECTM-MRA has two stages. The first stage of ECTM is data gathering that
contains a video review table and the vehicle information table. The
second stage of ECTM is associated to the video streaming method that
obtains the parameters such as vehicle's degree, residual energy and
transmission speed to determine low delay and resource responsive routes
for streaming the video. Simulations are carried out and the results
demonstrate that the proposed ECTM-MRA performs better in terms of route
length, packet end-to-end delay, freezing delay, number of delivered
packets and packet loss ratio. |
|
|
Full Text |
|
|
Title: |
Demonstration of smart sensor based
industrial automation system in IOT environment |
Author (s): |
K. Manikanta S., Rajalakshmi and T.
Shankar |
Abstract: |
Automation is the current need of industries. There are number of
technologies that are growing to achieve the good automation in the
plant. One of the recently popular technologies is the automation using
sensors and actuators. Herein this paper development of ARM7 and uC/OS-IIRTOS
based real-time industry automation system using GSM communication is
presented. The proposed system is having centralized controller, sensors
and relays. Centralized module is the main unit that collects the
information from plant sensors and gives this information to the end
user using GSM communication. Also whenever needed it control the
production automatically by switching the relays and actuators. The
ARM7LPC2148 is used as monitoring and controlling unit for different
parameters. Sometime more than processes need to be monitor and control
in real-time. To control the process in real-time uC/OS-II Real-Time
Operating System and need fulfiles are dumped into ARM controller. ARM7
LPC2148 controller is programmed using Embedded C language. Results
obtained show the usefulness and effectiveness of the system as planned. |
|
|
Full Text |
|
|
Title: |
Design of full swing local bitline SRAM
architecture based on FinFET using SVL technique |
Author (s): |
T. R. Dinesh Kumar, K. Mohana Sundaram and
M. Anto Bennet |
Abstract: |
FinFET design was introduced as an alternative for CMOS due to its
mitigate short channel effects at lower technology nodes and also
scaling of the single bulk MOSFETs faces problems in nanometre
technology due to its short scaling effect that causes leakage current
to increase. Dual gate FinFET has better short channel effect because of
its alignment of the gates. The previous average 8T SRAM has more area
and it requires write back scheme. The full scheme local bitline (BL)
swing connected to read buffer gate can be obtained with boosted word
line (WL) voltage. But we cannot use this voltage because it reduces the
SRAM stability and threshold voltage is high. In this paper the SRAM
architecture based on FinFET using SVL circuit technique is designed. In
the proposed architecture scheme of full swing is determined by cross
coupled PMOSs and the gate of the read buffer is driven by full Vdd
without the use of boosted wordline voltage. The SRAM based on FinFET is
designed on tanner tool. By applying SVL circuit technique the leakage
power and the area consumption of SRAM based on FinFET is 83.74µw and
47% which is lower than the normal FinFET based SRAM architecture. |
|
|
Full Text |
|
|
Title: |
Concurrent dual band filters using
plasmonic MIM waveguide ring resonator |
Author (s): |
M. Vishwanath, Habibulla Khan and K.
Thirupathaiah |
Abstract: |
This
paper describes the design and analysis of metal-insulator-metal (MIM)
waveguide based band-pass and band-stop filters by using ring
resonators. MIM waveguide based ring resonators has been analysed in
terms of their electrical parameters by using commercially available
electromagnetic full-wave simulation software. A MIM waveguide based
ring resonators has been designed and simulated to obtain its
transmission and reflection coefficients. Ring resonator based dual band
filters are more compact with reduced space and power requirements in
photonic integrated circuits (PICs). By using this concept several other
components can be design such as multiplexers/diplexers, directional
couplers/branch line couplers and antenna. |
|
|
Full Text |
|
|
Title: |
A calculation method for estimation of the
mean time to first failure of the technical systems on basis
of the topological conversion of the Markov reliability model |
Author (s): |
Pavel Azizurovich Rahman |
Abstract: |
This
scientific paper deals with the reliability models of technical systems
on basis of continuous-time Markov chains (CTMC). An existing operator
method for calculating the mean time to first failure (MTTFF), based on
the reduction of Markov chain and solving the system of Kolmogorov-Chapman
differential equations, is also discussed. The work also highlights the
topological method offered by the author for calculating the mean time
to first failure on basis of the special conversion of Markov chain. The
calculation examples of MTTFF for the asymmetric computing system with
triple modular redundancy by the existing operator method and the
offered topological methods are also presented. The experimental
research of calculation time by the operator and the topological methods
are also discussed. According to the research results, the topological
method offered by the author is significantly faster than existing
operator method. |
|
|
Full Text |
|
|
Title: |
Multipurpose calorimeter to measure
thermophysical properties |
Author (s): |
Stanislav Proshkin |
Abstract: |
The
article presents the methodology on the basis of which the calorimeter
was made for complex automated measurement of thermophysical properties
of a various materials including foodstuff. The main attention is paid
to the temperature range which includes phase transitions, when
thermophysical characteristics undergo significant changes. An automated
experimental setup was made allowing measurements of temperature
dependences of enthalpy, effective and true heat capacities, and thermal
conductivity coefficients of various materials. |
|
|
Full Text |
|
|
Title: |
Algorithmic support of problems of
electronic kinematics |
Author (s): |
Inga Nikolaevna Bulatnikova and Natalja
Nikolaevna Gershunina |
Abstract: |
This
article discusses digital simulation and possible implementation of
kinematic mechanisms and units on the basis of simple computational
means (microprocessors). The proposed digital simulation is supported by
geometrical plotting methods developed in descriptive geometry and
successfully applied in engineering graphics. These methods, aided by
compass, ruler, protractor and triangular ruler, make it possible to
plot any trajectory, for instance, kinematic one. Technological basis of
this simulation is a set of rapid algorithms based on integer arithmetic
carried out by RISC microprocessors. Possibilities of this approach to
designing of algorithmic support are exemplified by evolvent of circle.
The obtained set of algorithms does not contain operations of
multiplication and division; nevertheless, quite complex trajectories
are obtained without trigonometric computations. The efficiency of the
proposed procedure of algorithm designing is based on their fast
operation, low cost of designing and simplicity of software
implementation using microprocessors. |
|
|
Full Text |
|
|
Title: |
Effectively user pattern discover and
classification from web log database |
Author (s): |
K. Abirami and P. Mayilvaganan |
Abstract: |
This
paper is involve the three phases on web usage mining. The first phase
focused on data preprocessing stage to remove irrelevant data from web
log file. In the second phase involve cleaned log file. It is used for
discovering usage patterns. Final phase, the discovered the user
behaviors patterns it provide to the classification of users, who have
frequently visitor, rare visitor, referred by the other web site,
distinct user. The cluster analysis or clustering is the task of
assigning a set of objects into groups so that the objects in the same
cluster are more similar to each other than to those in other clusters.
This information will help to website administrators for efficient
administration and personalization of their websites. Accurate analysis
of these patterns leads to understanding of users visiting the web site
thereby improved user satisfaction. We have conducted vivid experiments
and the results are shown in this paper. |
|
|
Full Text |
|
|
Title: |
A novel face identification frame work |
Author (s): |
T. Srinivasa Rao, V. Dilip Kumar and T. V.
K. P. Prasad |
Abstract: |
Criminal record generally contains personal information about particular
person along with photograph. To identify any criminal we need some
identification regarding person, which are given by eyewitnesses. In
most cases the quality and resolution of the recorded image-segments is
poor and hard to identify a face. To overcome this sort of problem we
are developing software. Identification can be done in many ways like
fingerprint, eyes, DNA etc. One of the applications is face
identification. The face is our primary focus of attention in social
inter course playing a major role in conveying identity and emotion.
Although the ability to infer intelligence or character from facial
appearance is suspect, the human ability to recognize faces is
remarkable. The operator first logs into the system by entering username
and password. Then depending on the work allotted he has to select the
screens from main menu screen. There are mainly three important function
which he can do they are adding details, clipping image and finally
construction of the face by using the eyewitness. The face that is
finally formed is one the who has done the crime. |
|
|
Full Text |
|
|
Title: |
A comparative study on the advancement of
text steganography techniques in digital media |
Author (s): |
Salwa Shakir Baawi, Mohd. Rosmadi Mokhtar
and Rossilawati Sulaiman |
Abstract: |
One
of the common practices applied to ensure secrecy in the modern day is
through an information hiding technique known as steganography, which
dates back to the ancient Greece. This study investigates digital
steganography and its techniques that primarily focus on text
steganography. At the same time, it also attempts to present a
distinctive classification in dealing with steganography based on each
technique. Three types of steganography classifications were discussed,
that consist of the type of carrier file, natural key used, and the
embedding techniques. Text steganography can then be further separated
into three categories: format based methods, random and statistical
generation, and linguistics method. Techniques belonging to each
category were studied, and comparisons between each technique are
introduced by highlighting the findings. This study also confirmed that
there are three principal factors that need to be further explored and
taken into account in the design of future steganographic systems, which
are the capacity, high transparency, and security. |
|
|
Full Text |
|
|
Title: |
Development of test site on the basis of
led lamps for debugging software of wireless network for
processes automation modules |
Author (s): |
Dmitry Alekseevich Ivanov, Danil
Aleksandrovich Yaroslavsky, Marat Ferdinantovich Sadykov,
Mikhail Petrovich Goryachev and Tatyana Gennadyevna Yambaeva |
Abstract: |
The
test site is designed for testing and debugging the software of the
wireless network for processes automation (WNPA) modules; debugging and
setting the function of local and remote control of objects using WNPA
modules; debugging and setting the self-diagnostics function of WNPA
modules and their communication channels; debugging WNPA module
configuration function. The WNPA module is designed for use in embedded
applications that require low data transfer rates and low power
consumption. The goal is to create an inexpensive, self-organizing
network with a mesh topology designed for a wide range of tasks. The
network can be used in industrial control, built-in sensors, medical
data collection, warning of intrusion or smoke, building and home
automation, etc. |
|
|
Full Text |
|
|
Title: |
Monitoring and identifying the occurrence
of oil spill in the ocean using satellite image for disaster mitigation |
Author (s): |
Mukta Jagdish and Jerritta S. |
Abstract: |
In
this paper an adaptive threshold techniques has been used which aimed to
solve problem of oil spills in oceanic world. As we know oil spill is
the biggest issue faced by marine species to overcome this problem an
adaptive threshold method is applied for automatic monitoring and
detection of oil spills in the ocean. This research is implemented using
SAR RADARSAT-2 Narrow single beam data acquired in the Gulf of Mexico
SAR image. The study demonstrates occurrence of oil spill in the ocean
using image data obtained from the different satellite and detection of
dark patches and bands in the images with low time complexity. In
conclusion, adaptive threshold can be used as a tool for automatic
detection of oil spill and SAR satellite image serves as an excellent
sensor for oil spill detection and surveying. |
|
|
Full Text |
|
|
Title: |
Medical Image Data compression using
hybrid methods |
Author (s): |
Alyaa H. Ali |
Abstract: |
This
search focuses on Image Data compression using different methods for
data compression, three images are simulated for the data compression
technique based on modified method, Huffman with local and soft threshed
and three block size 4×4, 8×8 and 16×16. The second one is based on
using the DCT "discrete cosine transformation" and "discrete wavelet
transformation" DWT these methods are applied on the stroke brain
images" Computing tomography images" after using the region based
segmentation method to get the region of interest which is the stroke,
Completing the process by calculating quality of image compression, five
parameter are used ," Peak Signal to Noise Ratio (PSNR)", "Mean Square
Error (MSE)","Compression Ratio (CR)","Structural Similarity Index (SSIM)"
and "Universeral Image quality Index (UIQI)". |
|
|
Full Text |
|
|
Title: |
Impact of aerosols optical depth on
angstrom exponent and microphysical properties of clouds over Iraq |
Author (s): |
Ali M. AL-Salihi |
Abstract: |
In
this study, spatial and temporal variations of aerosol optical depth (AOD)
in selected regions in Iraq, namely, Mosul, Baghdad, Rutbah, and Basrah,
were investigated with spatial resolution of 1° × 1° over Iraq
(28.5°–38.5°N, 38.5°– 48.25°E); data have been retrieved from January
2003 to December 2015 by Moderate Resolution Imaging Spectroradiometer (MODIS)
were analyzed which can lead to modifications in the microphysics of
clouds as well. The highest values for mean seasonal AOD were observed
in summer and spring, and the maximum recorded AOD values ranged from
0.324 ± 0.191 to 0.378 ± 0.189. By contrast minimum AOD values ranging
from 0.195 ± 0.097 to 0.216 ± 0.111 were found in winter and autumn
respectively, besides analyzed the relationship between AOD and Ångström
exponent (AE) that consider a perfect indicator of the size of an
aerosols particles. Furthermore, the relationships between AOD and four
cloud parameters, namely, cloud fraction (CF), water vapor (WV), cloud
optical depth (COD) and cloud effective radius (CER) have been
investigated by employing spatial correlation maps for their data
values. The analysis showed a strong negative correlation between AOD
and AE particularly in the middle region (Baghdad) and western region (Rutbah).
The correlation between AOD and CF showed a weak negative correlation
and be close to zero in the western region. The correlation between AOD
and WV was positive (~ 0.4) especially in the strip joint between a
northern and middle region. AOD showed a negative relationship with COD
in the whole of Iraq. AOD and CER presented a positive relation along
the arid desert region extended from west northern region to the west
southern region passing western region of Iraq. All mentioned
correlations performed on the four study regions are based on the
large-scale atmospheric variations. |
|
|
Full Text |
|
|
Title: |
Support vector regression approach of
modeling the superconducting transition temperature of borocarbide-based
superconductors |
Author (s): |
Nahier Aldhafferi, Taoreed O. Owolabi,
Kabiru O. Akande, Sunday O. Olatunji and Abdullah Alqahtani |
Abstract: |
Perpetual current carrying ability of borocarbide-based superconductors
renders it indispensable in many practical applications such as
generation of high magnetic field. Coexistence of superconductivity and
magnetism in this superconductor also allows deep understanding of the
interaction between the two phenomena. The superconducting transition
temperatures (TC) of these compounds are very sensitive to Ni-Ni
distance which is governed by the lattice parameter that further
controls the electronic structure of the Ni(3d) dominated conduction
bands. For quick investigation of the effect of structural disorder
(which could result from doping) on the TC of these superconductors, we
develop support vector regression (SVR)-based model that estimates the
TC of different borocarbide-based superconductors using lattice
parameters descriptors. Comparison of the estimated TC with the measured
values shows excellent agreement. The outstanding performance
demonstrated by the proposed SVR-based model in estimating the TC of
borocarbide-based superconductor syndicates that the model can be
adopted for quick estimation of TC of fabricated borocarbides compounds
thereby providing an excellent alternative to the use of sophisticated
equipment which are costly and time consuming. |
|
|
Full Text |
|
|
Title: |
Fluid structure interaction analysis on
failure of Francis turbine runner blades |
Author (s): |
Salary A., Verlinski S., Levonyan H.,
Tyagunov A. and Tarasov D. |
Abstract: |
This
paper describes the influence of tail profile of Francis turbine blade
on creation of vortexes and cavitations and its effects on initiation of
crack. Fluid structural analysis is utilized to determine the location
of Von-Karman vortexes and the positions in which cavitations occurs.
Incompressible viscid Navier-Stokes formula was solved by CFD numerical
method, meanwhile the stress distribution on the runner blades are
calculated in FEM. It led to indicate the situation of crack nucleation
and the results are perceived for both existence and retrofitted blades. |
|
|
Full Text |
|
|
Title: |
Deduplication in cloud storage using
hashing technique for encrypted data |
Author (s): |
Vaishnavi Moorthy, Arpit Parwal and Udit
Rout |
Abstract: |
Cloud
storage services are widely used, due to which the volume of data on the
cloud is very large. In order to avoid data redundancy and to make use
of cloud storage efficiently, data deduplication is used which
eliminates the storage of redundant data. Only one unique copy for each
duplicate file uploaded in the cloud and the owners are referenced to
that one file whenever they want to access. The objective of this paper
is to automate the deduplication process while increasing
confidentiality and security of the data owner and the data. The system
uses user end encryption so that cloud services are not liable for data
compromise. An effective comparison using hash value of different files
helps in faster and secure comparison. |
|
|
Full Text |
|
|
Title: |
Photoconductivity effects in air-induced
and fluoro fullerene-induced surface conducting diamond |
Author (s): |
Fadhlia Zafarina Zakaria |
Abstract: |
The
photoelectrical properties of the hydrogen-terminated diamond surface in
the presence of a surface conducting layer has not been reported in the
literature. This paper presents a preliminary study of the
photoelectrical behavior of the air-induced and fluoro fullerene-induced
surface conducting diamond. The photoconductivity observed is attributed
to the excitation of electrons from the near-surface valence band into
trap states, giving rise to a higher sub-surface hole current. A
photocurrent buildup was observed upon laser exposure, with the highest
photocurrent up to 56% higher than the initial (dark) current at the
diamond surface in the case of doping with C60F48. This appears to be
considerably higher than the same sample when doped with water. The
observed behavior suggests a possible influence on the level of
photoconductivity due to the nature of the acceptor layer, but may
alternatively reflect a trend that a reduced (dark) surface conductivity
results in a higher relative increase in the photocurrent when exposed
to light. The subsequent persistent decay of the photocurrent suggests
the role of charge trapping at the trap states. The decay of the
photoconductivity takes the form of a stretched exponential typical of a
persistent photoconductivity, with the decay exponent, ß values found to
be below 0.4 and the decay constants in the range of 46-286 s. |
|
|
Full Text |
|
|
Title: |
Intend of power-delay optimized Kogge
Stone based Carry Select Adder |
Author (s): |
Prajoona Valsalan and P. Manimegalai |
Abstract: |
In
computation designs, the arithmetic operation plays a major role in all
type of logical designs. It decides the performance of all internal
components and its behavior. Hence, recent researchers focused on
obtaining the high speed of operation with minimal power consumption.
The conventional Carry Select Adder results in more area due to the
inbuilt nature of two Ripple Carry Adders in the same structure.
Similarly, the AND-OR-Invert based Carry Select Adder consists of
complex circuits for processing the basic operation. Hence, a Kogge–Stone
adder based carry select adder is designed, which is replacing the AOI
logic from the previous AND-OR-Invert based Carry Select Adder to
achieve optimization in terms of area, delay, and power. The proposed
design is synthesized and simulated under cadence 45nm CMOS technology.
The comparison shows how the proposed KS-CSLA is better than the
existing regular dual Ripple Carry Adder (RCA), modified adder with BEC
concept, Dual RCA and modified Square root adder with BEC unit. Finally,
the speed of proposed model is increased twice of the speed of dual RCA. |
|
|
Full Text |
|
|
Title: |
Improved design of air flow for a two
stroke internal combustion engine to promote cleaner combustion |
Author (s): |
Ravikumar M., Mohanraj T. and Venkatesan
D. |
Abstract: |
In
the present work, an attempt is made to reduce scavenging problems by
developing a new model of two-stroke spark-ignition engine. This model
allows a flow of fresh air through intake valves positioned at the
bottom of the cylinder and exit of burnt gases through exhaust ports
situated at the top of cylinder. The exhaust ports are closed by the
piston as it moves towards bottom of the cylinder following which
gasoline is injected minimizing the possibility of mixing of fuel with
outgoing exhaust gases. During expansion the piston unravels the exhaust
ports and the burnt gases escape to the atmosphere due to pressure
difference. Due to low density at high temperatures, the exhaust gases
naturally rise against the direction of gravity reducing the possibility
of mixing with incoming fresh air. Further, a comparative study of fuel
distribution inside the cylinder has shown greater distribution when
injection takes place against gravity than along gravity, which promotes
cleaner combustion. The combustion analysis is done using Diesel-RK
software and flow analysis is done using ANSYS FLUENT. |
|
|
Full Text |
|
|
Title: |
Response of wooden footbridge to the
dynamic load |
Author (s): |
Lenka Ponistova, Roman Fojtik, David
Marecek, Veronika Vaskova and Antonin Lokaj |
Abstract: |
Nowadays, modern bridge constructions are very sensitive to the dynamic
load due to the use of light materials with high load capacity and low
absorption. In case of the footbridges, it is an associated with the
occurrence of vibration resulting from force effects caused by
pedestrian movement. There is an excessive vibration of structure which
is a problem of the serviceability limit state rather than the problem
of the ultimate limit state. This type of load can cause the resonance
of the structure so it is necessary to prevent this problem, for example
by installing the vibration damper. The subject of this article is an
analysis of a wooden footbridge in Pribor in the Czech Republic which is
monitored for the effects of load models caused by persons. The article
describes experimental measurement focused on this problem and the
subsequent proposal for possible measures. |
|
|
Full Text |
|
|
Title: |
Classifying software faults through
Boolean classification model based
on discretized defect datasets |
Author (s): |
Pooja Kapoor, Deepak Arora and Ashwani
Kumar |
Abstract: |
Identifying software defects has always been one of the major concerns
of software designers and developers across the entire software
industry. The intend of particular software that leads to produce some
faults which is not determined previously during testing phase can lead
to complete failure of the software and definitely incurred unnecessary
cost and time inclusion. Thus the requirement of predicting faults at an
earlier stage of its development has become necessity of today’s
software development trend as the software becomes more distributed,
complex and heavily cost infusive in nature. In this research work
authors have proposed and implemented the idea of discretization of
metric values in order to get better classification results. Authors
have generated Boolean functions based on project metrics values, so
that these values could be confined in the domain of classifying and
predicting software faults. In this work authors have checked the
performance of their proposed model by considering seventeen different
software project and their version data taken from promise repository of
NASA namely: Jedit, lucene, tomcat, velocity, xerces andxalan. The
results gained after applying the proposed Boolean classifier are better
and more promising in terms of its accuracy and precision, compared with
available literature. The study claim visible increase in accuracy, as
compared to other classifiers considered in the study like: Naïve Bayes,
Random Forest, Perceptron, KNN and SOM. |
|
|
Full Text |
|
|
Title: |
On speeding up virtual machine migration
through integrated data de-duplication methods |
Author (s): |
K. Aruna Kumari, K. Raja Sekhara Rao and
J. K. R. Sastry |
Abstract: |
Virtualization is a concept implemented as a major part of cloud
computing infrastructure to offer everything as a service. Hypervisors
are supported within the cloud computing platform using which many of
the virtual machines can be created as per the demand of the end users.
The Load on the virtual machines (VM) greatly varies while some are over
used, some may be under used or average used. Migration of a process,
data and sometimes both needs to be done from one VM to other in such a
way that the load on the servers is well balanced leading to high
performance computing. Load balancing helps in a big way especially in
controlling server sprawling and efficient use of the computing
resources. Live migration has to be undertaken seamlessly without the
initiation of any process from the client application. During migration,
movement of data from one server to another has to be undertaken which
generally consume lot of time. Data stored on a server by a user is
historical and live and enormous amount of duplicated data is stored on
the server especially for maintaining different versions of the same
data. Elimination of duplicated data before migration of the same from
one server to the other will greatly enhance the speed of migration.
This paper outlines some of the strategies for implementing data
de-duplication within Migration processes. |
|
|
Full Text |
|
|
Title: |
A correlated Bayesian game theory with
extended credit score for identifying malicious and selfish node in
MANET |
Author (s): |
S. Sampath and S. Veni |
Abstract: |
Mobile ad hoc network (MANET) is infrastructures less, dynamic,
localized network of wireless mobile nodes. MANET nodes are relies upon
network cooperation mechanism to correctly work, forwarding traffic
unrelated to its personal use. In early work Bayesian Correlated
Equilibrium based IDS for MANET is used for detecting the malicious node
and normal node in the network. In this network some nodes selfishly
decide to employ partially. The presence of selfish node within the
MANET may reduce performance degradation of Network. So, the MANET
requires detecting the Selfish node and improves the cooperation of each
node. In this paper proposed the extended credit score (xCR) with game
theory to detect selfish nodes as well as malicious nodes. An efficient
proposed method constructs with maximum accuracy and less computational
overhead to detect malicious and selfish node detection along with
Bayesian correlated Equilibrium based intrusion detection system. |
|
|
Full Text |
|
|
Title: |
Corrosion effects on the flexural strength
behavior of concrete containing Manufactured Sand |
Author (s): |
B.
Vijaya and S. Senthil Selvan |
Abstract: |
The
corrosion in reinforcing steel is the most detrimental effect on
endangering the structural behavior of steel in concrete. This present
study focuses on predicting the corrosion behavior of concrete in which
Manufactured Sand (M-Sand) is used as a partial replacement for natural
sand. To retain the natural resource such as natural sand an attempt is
made in this research by partially replacing the natural sand with
M-Sand. Experimental and numerical investigation has been carried out
for three different levels of corrosion 5%, 10% and 25% to define mild,
medium and severe exposure condition. National Bureau of Standard (NBS)
beams have been casted and analysed for the corrosion performances of
steel that is embedded in concrete by accelerated corrosion technique
for concrete of grade M40 replaced with 60% manufactured sand for river
sand which is found optimum. From the experimental investigation, it has
been observed that there is adecline in the load carrying capacity of
NBS RC beams due to reinforcement corrosion. Numerical investigation was
made with concrete modelled as solid 65 element and reinforcement
modelled as Link 8 elements by ANSYS software using finite element
method. |
|
|
Full Text |
|
|
|
|
|