|
Download Abstract Book
S. No
|
Volume-6 Issue-4, April 2017, ISSN: 2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.
|
Page No.
|
1.
|
Authors:
|
Nidhal Kamel Taha El-Omari, Ahmad H. Al-Omari, Ali Mohammad H. Al-Ibrahim, Tariq Alwada’n
|
Paper Title:
|
Text-Image Segmentation and Compression using Adaptive Statistical Block Based Approach
|
Abstract: Images and scanned text documents are gradually more used in a vast range of applications. To reduce the needed storage or to accelerate their move through the computers networks, the document images have to be compressed. Traditional compression mechanisms, which are generally developed with a particular image type and purpose, are facing many challenges with mixed documents. This paper describes a statistical block-based technique for an automatic document image segmentation and compression. Based on the number of detected colors in each region of the image, this approach creates a new representation of the image that can produce very highly-compressed document files that nonetheless retain excellent image quality. The proposed algorithm segments the compound document image into blocks of equal size. The blocks are classified into seven different categories. Each category represents an image part that shares the same properties. A new representation of each category is formed and the similar adjacent blocks are merged to form labeled regions sharing the same properties. At the end, to achieve better compression ratio, the different regions of the image are compressed using different compression techniques.
Keywords: Adaptive Compression, Block-Based Segmentation, Image Document Compression, Image Segmentation, Lookup Dictionary Table (LUD).
References:
1. Acharyya, M. and Kundu, M.K. (2002). “Document Image Segmentation Using Wavelet Scale-Space Features”, IEEE Transactions Circuits Syst. Video Technol., Volume 12, Issue 12, pp. 1117–1127.
2. Nidhal Kamel Taha El Omari. (2008). “A Hybrid Approach for Segmentation and Compression of Compound Images”, PhD Dissertation, the Arab Academy for Banking and Financial Sciences.
3. Nidhal Kamel Taha El-Omari and Arafat A. Awajan. (December 20-22, 2009). “Document Image Segmentation and Compression Using Artificial Neural Network Based Technique”, International Conference on Information and Communication Systems (ICICS09), pp. 320-324, Amman, Jordan.
4. Kai Uwe Barthel et al., (January 2000). “New Technology for Raster Document Image Compression”, SPIE. The International Society for Optical Engineering, Volume 3967, pp. 286-290, San Jose, CA.
5. Patrice Y. Simard et al., (March 23-25, 2004). “A Foreground/Background Separation Algorithm for Image Compression”, IEEE Data Compression Conference (DCC), pp. 498–507, Snowbird, UT, USA.
6. Ricardo L. de Queiroz et al., (February 1999). “Mixed Raster Content (MRC) Model for Compound Image Compression”, SPIE the International Society for Optical Engineering, Volume 3653, pp. 1106-1117.
7. Ricardo L. de Queiroz. (October 8-11, 2006). “Pre-Processing for MRC Layers of Scanned Images”, Proceedings of the International Conference on Image Processing (ICIP), Atlanta, Georgia, USA, pp. 3093–3096.
8. Lihong Zheng and Xiangjian He. (2004). “Edge Detection Based on Modified BP Algorithm of ANN”, Conferences in Research and Practice in Information Technology (RPIT), Volume 36, pp. 119–122.
9. Guotong Feng and Charles A. Bouman. (October 2006). “High Quality MRC Document Coding”, IEEE Transactions Image Processing, Volume 15, Issue 10, pp. 3152-3169.
10. Leon Bottou, Patrick Haffner et al., (July 1998). “High Quality Document Image Compression with DjVu”, Journal of Electronic Imaging, Volume 07, Issue 3, pp. 410-425.
11. Wenpeng Ding et al., (January 30, 2007). “Rate-Distortion Optimized Color Quantization for Compound Image Compression”, Visual Communications and Image Processing Conference, SPIE Proceedings, Volume 6508, pp. 65082Q1-65082Q9, San Jose, CA, USA.
12. Tony Lin and Pengwei Hao. (August 2005). “Compound Image Compression for Real Time Computer Screen Image Transmission”, IEEE Transactions on Image Processing, Volume 14, Issue 8, pp. 993-1005.
13. Wenpeng Ding et al., (2006). “Block-based Fast Compression for Compound Images”, ICME, paper ID 1722, pp. 809–812.
14. Debargha Mukherjee et al., (June 2002). “JPEG2000-Matched MRC Compression of Compound Documents”, IEEE International Conference on Image Processing (ICIP), Volume 3, pp. 225-228.
15. Cheng H. and Bouman C. A. (April 2001). “Document Compression Using Rate-Distortion Optimized Segmentation”, Journal of Electronic Imaging, Volume 10, Issue 2, pp. 460–474.
16. Nidhal Kamel Taha El-Omari et al., (2012). “Innoviate Text-Image Compression Technique”, European Journal of Scientific Research, © EuroJournals Publishing Inc., Volume 88, Issue 4, pp. 603-616.
17. Gnana King, G.R.1 and Seldev Christopher, C.2. (2014). “Improved block based segmentation algorithm for compression of compound images”, Journal of Intelligent & Fuzzy Systems, Volume 27, Issue 6, pp. 3213-3225.
18. Qindong Sun et al., (2015). “A Method of Image Segmentation based on the JPEG File Stream”, Journal of Computational Methods in Sciences & Engineering, Volume
15, Issue 3, pp. 467-475.
19. Bo Chen et al., (June 2015). “A new image segmentation model with local statistical characters based on variance minimization”, Applied Mathematical Modelling, Volume 39, Issue 12, pp. 3227-3235.
20. Gagan Jindal and Sikander Singh Cheema, (2016), “Review Paper of Segmentation of Natural Images using HSL Color Space Based on K- Mean Clustering”,
International Journal of Innovations & Advancement in Computer Science, Volume 5, Issue 7, pp. 26-29.
21. Zhanjiang Zhi et al., (2016), “Two-Stage Image Segmentation Scheme Based on Inexact Alternating Direction Method”, Numer. Math. Theor. Meth. Appl., Volume 9, Issue 3, pp. 451-469.
22. Haifeng Sima et al., (2016), “Objectness Supervised Merging Algorithm for Color Image Segmentation”, Mathematical Problems in Engineering, Volume 2016, Article ID 3180357, pp. 1-11.
23. S.Thayammal, and D.Selvathi., (2013), “A Review On Segmentation Based Image Compression Techniques”, Journal of Engineering Science and Technology Review, Volume 6, Issue 3, pp. 134-140.
24. Ian Sommerville, (2015), “Software Engineering”, 10th Edition, Pearson Education, Inc., ISBN-13: 978-0133943030, New York, USA.
25. Er. Kuldeep Kaur et al., (2016), “Comparative Analysis of Compression Techniques: A Survey”, International Research Journal of Engineering and Technology (IRJET), Volume 03, Issue: 04, pp. 1042-1046.
|
1-9
|
2.
|
Authors:
|
Akhilesh Kumar Sharma, Brijendra Kumar Sharma
|
Paper Title:
|
Development of Sensors on Android Platform
|
Abstract: Mobile phones play increasingly bigger role in our everyday lives. Today, most smart phones comprise a wide variety of sensors which can sense the physical environment. In this research, we propose and demonstrate my DAM4GSN architecture to capture sensor data using sensors built into the mobile phones. Specifically, we combine an open source sensor data stream processing engine called ‘Global sensor n/w (GSN)’ with the android platform to capture sensor data. We present the design, implementation, evaluation, and user experiences of the Cence-me application, which represents the first system that combines the inference of the presence of individual using off-the self sensor enabled mobile phones with sharing of this information through social networking applications such as face-book and my-space. An android based application that monitors the vehicle through an On Board Diagnostics (OBD-2) interface, being able to detect accidents.
Keywords: DAM4GSN architecture, Cence-Me application, On Board Diagonstics (OBD-2) interface.
References:
1. K. Aberer, M. Hauswirth, and A. Salehi. Infrastructure for data processing in large-scale interconnected sensor networks. In Mobile Data Management, 2007 International Conference on, pages 198–205.
2. L. Cai, S. Machiraju, and H. Chen. Defending against sensor-sniffing attacks on mobile phones. In Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, MobiHeld ’09, pages 31–36, New York, NY, USA, 2009. ACM.
3. Crossbow Technology Inc. Crossbow-manuals getting started guide. Technical report, Crossbow Technology, September 2005.
4. F. Fitzek, M. Pedersen, G. P. Perrucci, and T. Larsen. Energy and link measurements for mobile phones using ieee802.11b/g. In Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008. 6th International Symposium on, page 36, april 2008.
5. Google Inc. Android developer guide: Sensors, 2011. http://developer.android.com/guide/topics/sensors/index.html [Accessed on: 2011-12-26].
6. GSN Team. Global sensors networks. Technical report, Ecole Polytechnique Federale de Lausanne (EPFL), 2009.
7. GSN Team. Global sensor networks project, 2011. http://sourceforge.net/apps/trac/gsn/ [Accessed on: 2011-12-16].
8. P. Guillemin and P. Friess. Internet of things strategic research roadmap. echnical report, The Cluster of European Research Projects, 2009.
9. P. Klasnja, S. Consolvo, T. Choudhury, R. Beckwith, and J. Hightower. Exploring privacy concerns about personal sensing. In Proceedings of the 7th International Conference on Pervasive Computing, Pervasive ’09, pages 176–183, Berlin, Heidelberg, 2009. Springer-Verlag.
10. G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy. Smart objects as building blocks for the internet of things. Internet Computing, IEEE, 14(1):44–51, 2010.
11. N. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. Campbell. A survey of mobile phone sensing. Communications Magazine, IEEE, 48(9):140 –150, sept. 2010.
12. M. Lennighan. Total telecom: Number of phones exceeds population of world, May 2011. http://www.totaltele.com/view.aspx?ID=464922 [Accessed on: 2011-12-30].
13. Salehi. Design and implementation of an efficient data stream processing system. PhD thesis, Ecole Polytechnique Federale de Lausanne (EPFL), 2010.
14. H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelffl´e. Vision and challenges for realising the internet of things. Technical report, European Commission Information Society and Media, 2010.
|
10-14
|
3.
|
Authors:
|
Ahmed Sharieh, Raja Masadeh
|
Paper Title:
|
Implementing Fair Resource Synchronizer Algorithm for Distributed Mutual Exclusion in Mobile Computing Environment
|
Abstract: Mutual exclusion in distributed systems is a critical feature required to coordinate access to shared resources. It is highly needed to be employed in distributed systems including mobile computing environments. Dynamic Resource Synchronizer algorithm (DRS) works on decreasing the amount of messages that transferred in the system by minimizing the amount of sites that are included in the mutual exclusion. In this paper, a DRS algorithm is presented with a simulation study for distributed mutual exclusion that could be used in mobile environments in which nodes communicate with each other based onto specific conditions. Also, ring topology is used, all nodes have a unique identifier, a node failure doesn’t occur, communication links are bi-directional, and First In First Out (FIFO) priority and a partition in a network doesn’t occur. In addition, decreasing the amount of storage which is needed at various sites on the system. The DRS algorithm proved that the mutual exclusion is achieved. Whereas, deadlock and starvation are impossible to occur. Thus development mutual exclusion algorithm is one of the most appropriate for mobile computer systems.
Keywords: Distributed systems, synchronization, mutual exclusion, mobile computing.
References:
1. Sharieh, A., Itriq, M., & Dbabat, W. (2008). A dynamic resource synchronizer mutual exclusion algorithm for wired/wireless distributed systems. American Journal of Applied Sciences, 5(7), 829-834.
2. Badrinath, B. R., Acharya, A., & Imielinski, T. (1994, June). Structuring distributed algorithms for mobile hosts. In Distributed Computing Systems, 1994., Proceedings of the 14th International Conference on (pp. 21-28). IEEE.
3. Liu, D., Liu, X., Qiu, Z., & Yan, G. (2003). A high efficiency Distributed Mutual Exclusion algorithm. In Advanced Parallel Processing Technologies (pp. 75-84). Springer Berlin Heidelberg.
4. Erciyes, K. (2004). Distributed mutual exclusion algorithms on a ring of clusters.In Computational Science and Its Applications–ICCSA 2004 (pp. 518-527). Springer Berlin Heidelberg.
5. Ricart, G., & Agrawala, A. K. (1981). An optimal algorithm for mutual exclusion in computer networks. Communications of the ACM, 24(1), 9-17.
6. Lejeune, J., Arantes, L., Sopena, J., & Sens, P. (2015). A fair starvation-free prioritized mutual exclusion algorithm for distributed systems. Journal of Parallel and Distributed Computing, 83, 13-29.
7. Tamhane, S. A., & Kumar, M. (2012). A token based distributed algorithm for supporting mutual exclusion in opportunistic networks. Pervasive and Mobile Computing, 8(5), 795-809.
8. Lodha, S., & Kshemkalyani, A. (2000). A fair distributed mutual exclusion algorithm. Parallel and Distributed Systems, IEEE Transactions on, 11(6), 537-549.
9. Ding, Z., Zhou, M., & Wang, S. (2014). Ordinary Differential Equation-Based Deadlock Detection. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 44(10), 1435-1454.
10. Du, Y., & Gu, N. (2015, December). Accelerating Reachability Analysis on Petri Net for Mutual Exclusion-Based Deadlock Detection. In 2015 Third International Symposium on Computing and Networking (CANDAR) (pp. 75-81). IEEE.
11. Lodha, S., & Kshemkalyani, A. (2000). A fair distributed mutual exclusion algorithm. IEEE Transactions on Parallel and Distributed Systems, 11(6), 537-549.
12. Lamport, L. (1978). Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7), 558-565.
13. Jani, K., & Kshemkalyani, A. D. (2004, December). Performance of fair distributed mutual exclusion algorithms. In International Workshop on Distributed Computing (pp. 2-15). Springer Berlin Heidelberg.
14. Kanrar, S., Chattopadhyay, S., & Chaki, N. (2013). A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed Systems. Journal of network and systems management, 21(1), 1-24.
15. Lejeune, J., Arantes, L., Sopena, J., & Sens, P. (2015). A fair starvation-free prioritized mutual exclusion algorithm for distributed systems. Journal of Parallel and Distributed Computing, 83, 13-29.
16. Kundu, S. (2005, December). Deadlock-Free distributed relaxed mutual-exclusion without revoke-messages. In International Workshop on Distributed Computing (pp. 463-474). Springer Berlin Heidelberg.
17. Suzuki, I., & Kasami, T. (1985). A distributed mutual exclusion algorithm. ACM Transactions on Computer Systems (TOCS), 3(4), 344-349.
18. Singhal, M. (1989). A heuristically-aided algorithm for mutual exclusion in distributed systems. IEEE transactions on computers, 38(5), 651-662.
19. Raymond, K. (1989). A tree-based algorithm for distributed mutual exclusion. ACM Transactions on Computer Systems (TOCS), 7(1), 61-77.
20. Itriq, M., Dbabat, W., & Sharieh, P. (2013). Adaptive Dynamic Resource Synchronization Distributed Mutual Exclusion Algorithm (ADRS). Journal of Theoretical & Applied Information Technology, 53(3).
21. Altamony, H., Alshurideh, M., & Obeidat, B. (2012). Information Systems for Competitive Advantage: Implementation of an Organisational Strategic Management Process. Proceedings of the 18th IBIMA Conference on Innovation and Sustainable Economic Competitive Advantage: From Regional Development to World Economic, Istanbul, Turkey, 9th-10th May.
22. Alkalha, Z., Al-Zu’bi, Z., Al-Dmour, H., & Alshurideh, M. (2012). Investigating the effects of human resource policies on organizational performance: An empirical study on commercial banks operating in Jordan. European Journal of Economics, Finance and Administrative Sciences, 51, 44-64.
23. Masa’deh, R., Tayeh, M., & Al-Jarrah, I. M. (2015). Accounting vs. Market-based Measures of Firm Performance Related to Information Technology Investments. International Review of Social Sciences and Humanities, 9 (1), 129-145.
24. Shannak, R., Obeidat, B., & Almajali, D. (2010). Information Technology Investments: A Literature Review. Proceedings of the 14th IBIMA Conference on Global Business Transformation through Innovation and Knowledge Management: An Academic Perspective, Istanbul-Turkey, 23rd-24th June, pp.1356-1368.
|
15-20
|
4.
|
Authors:
|
Jincy Das, Judith Mercy Praveena S, Mirna Genesia Asian, A. Monisha, R. Sindhuja
|
Paper Title:
|
Communication and Obstacle Detection System for the Disabled using Arduino Lilypad
|
Abstract: This paper proposes the design of a hand glove using Arduino Lilypad and Zigbee for the people with disability in hearing, speaking and vision. There are nearly 900,000 people who are deaf and dumb and 285 million people who are blind. This device would help for communication by the bending of flex sensors which are fixed on the glove and the obstacles are detected by Ultrasonic sensor. And the combination of input is processed by the microcontroller Arduino Lilypad. The processed value is transmitted through the Zigbee to Microcontroller- AT89S2051 and the sign language is recognized and the corresponding value is obtained through LCD and speaker. The obstacle is sensed by Ultrasonic sensor and the person is alerted through vibration. The proposed system is compact, wireless and easy to use.
Keywords: Arduino Lilypad, Flex sensor, Hand glove, Microcontroller- AT89S2051, Ultrasonic sensor, Vibration motor, Voice module-WTV040, Zigbee-CC2500.
References:
1. Arslan Arif, Syed Tahir Hussain Rizvi, Iqra Jawaid, Muhammad Adam Waleed, Muhammad Raheel Shakeel “Techno-talk: An American Sign Language (ASL) Translator.2016 International Conference on Control, Decision and Information Technologies (CoDIT) – IEEE Conference Publications.
2. P.Vamsi Praveen, K.Satya Prasad “Electronic Voice to Deaf and Dumb People Using Flex Sensor”. International Journal of Innovative Research in Computer and Communication Engineering – Vol.4, Issue 8, August 2016.
3. Dhiraj Gupta, Pankhuri Singh, Khushbu Pandey, Jaya, Solanki “Design and Development of a Low Cost Electronic Hand Glove for Deaf and Blind”. IEEE-2015, 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
4. Neha Niharika, Heena, Bhavnesh Jaint “An Electronic Aid for the Mobility of Visual Impaired “ IEEE-2015.
5. Ranjit A Wagh, Dr.U.B.S. Chandrawat “Hand Gloves for Deaf and Mute Person using Flex Sensor a Survey”. International Conference on Global Trends in Engineering, Technology and Management ICGTETM – 2016.
6. Thuong N.Hoang, Ross T.Smith, Bruce H.Thomas “Ultrasonic Glove Input Device for Distance Based Interaction”.
7. Adam Keyes, Mathew D’Souza and Adam Postula “Navigation for the Blind Using a Wireless Sensor Haptic Glove “- 4th Mediterranean Conference on Embedded Computing MECO – 2015.
8. Mrs.Neela Harish, Dr.S.Poonguzhali “Design and Development of Hand Gesture Recognition System for Speech Impaired People”. – International Conference on Industrial Instrumentation and Control (ICIC) – 2015 May.
9. J.Thilagavathy, A.Jeyapaul Murugan, S.Darwin “Embedded Based Hand Talk Assisting System for Deaf and Dumb. International Journal of Engineering Research and Technology (IJERT) – Vol.3, Issue 3, 2014 March.
10. Leah Buchley and Michael Eisenberg. “The Lilypad Arduino: Toward Wearable Engineering for Everyone – IEEE.
|
21-23
|
5.
|
Authors:
|
Mena Ahmed, Abdul Halim Ghazali, Thamer Ahmed Mohammad, Badronnisa Yusuf, Aminuddin Abdul Ghani
|
Paper Title:
|
Hydraulic Simulation of Flow Around Spur Dikes
|
Abstract: The morphological changes of rivers, which are manifested by bed and banks deformations, show a direct relationship with water flow and sediment transport. Spur dikes are among the most common structures used to regulate velocity distribution and control sedimentation in a river section. This paper aims to simulate the hydraulic properties of steady turbulent flow in a straight rectangular open channel which has spur dikes with various configurations, such as number, alignment and lengths. The effects of the spur dikes on the velocity distribution have been evaluated three-dimensional (3D) Computational Fluid Dynamic (CFD) method. The simulated results from the model are calibrated and validated using data obtained from physical model. Different scenarios with spur dikes were simulated, and the results were demonstrated using the isovels, velocity magnitudes and mass exchange between spur dikes fields and main flow. Eventually, each scenario gives a better understanding on employing spur dikes for river restoration, enhancing navigation (by increasing water depth and rearranging the thalweg line), and protecting abutments and pump intakes against erosion as well as creating stable aquatic habitat.
Keywords: Hydraulic simulation, velocity distribution, spur dike, river restoration.
References:
1. Azinfar, H., “Flow resistance and associated backwater effect due to spur dikes in open channels,” Thesis, University of Saskatchewan, Saskatoon, Canada, 2010.
2. Chang, Y., Hsieh, T., Chen, C., & Yang, J., “Two-dimensional numerical investigation for short- and long-term effects of spur dikes on weighted usable area of rhinogobius candidianus (Goby),” Journal of Hydraulic Engineering, (December) 2013, 1297–1303.
3. Chrisohoides, A., Sotiropoulos, F., & Sturm, T.W., “Coherent structures in flat-bed abutment flow: computational fluid dynamics simulations and experiments” Journal of Hydraulic Engineering, 129(3), 2003, 177-186.
4. Dargahi, B., “Controlling mechanism of local scouring,” Journal of Hydraulic Engineering, 116 (10), 1990 , 1197-1214.
5. Engelhardt, C., Kruger, A., Sukhodolov, A., & Nicklisch, A. “A study of phytoplankton spatial distributions, flow structure and characteristics of mixing in a river reach with groynes” J. Plankton Res., 26, 2004, 1351–1366.
6. Hinterberger, C. “Three-dimensional and depth-average large eddy simulation of shallow water flows” Ph.D. thesis, Karlsruhe Univ., Karlsruhe, Germany, 2004.
7. Kuhnle, R. A., Jia, Y., & Alonso, C. V., “Measured and simulated flow near a submerged spur dike” Journal of Hydraulic Engineering, 134 (7), 2008, 916–924.
8. McCoy, A., Constantinescu, S. G., & Weber, L., “Exchange processes in a channel with two vertical emerged obstructions” Flow Turbul. Combust, 77, 2006, 97–126.
9. McCoy, A., Constantinescu, S. G., & Weber, L., “A numerical investigation of the dynamics of coherent structures and mass exchange processes in a channel flow with two lateral submerged groynes” Water Resour. Res., 43, 2007, (43)5.
10. McCoy, A., Constantinescu, G. & Weber, L. J., “Numerical investigation of flow hydrodynamics in a channel with a series of groynes” Journal of Hydraulic Engineering, 134(Feb.), 2008, 157–172.
11. Melville, B. W. “Pier and Abutment Scour: Integrated Approach” Journal of Hydraulic Engineering, 123(2), 1997, 125-136.
12. Pagliara, S., & Kurdistani, S. M. “Flume experiments on scour downstream of wood stream restoration structures” Geomorphology, 279, 2017, 141-149.
13. Reynolds, C. S. “Potomoplankton: Paradigms, paradoxes, prognoses. Algae and aquatic environment” Biopress, Bristol, U.K., 1988, 285–311.
14. Shi, F., Svendsen, I.A., Kirby, J.T. & McKee Smith, J. “A curvilinear version of a quasi 3D near shore circulation model” Coastal Engineering, 49(1–2), 2003, 99–124.15. Shields, F.D. “Fate of Lower Mississippi River habitats associated with river training dikes. Journal of Aquatic Conservation” Marine and Freshwater Conservation, 5(2), 1995, 97-108.
16. Shields, F. D., Cooper, C. M., and Knight, S. S. 1995. Experiments in stream restoration. Journal of Hydraulic Engineering, 121, 494–502.
17. Tingsanchali, T. & Maheswaran, S. “2-D depth-averaged flow computation near groyne” ASCE, Journal of Hydraulic Engineering, 116, 1990, 71-86.
18. Tominaga, A., Ijima, K. & Nakano, Y. “Flow structures around submerged spur dikes with various relative height,” Proc. of 29th IAHR Congress, Beijing, China, Theme D, Hydraulic Structures, 2001, 421-427.
19. Uijttewaal, W., & Van Schijndel, S. A. H. “The complex flow in groyne fields: Numerical modeling compared with experiments” Proc., River Flow 2004, Naples, Italy, 1331–3838.
20. Wind, H.G., Vreugdenhil, C.B. “Rip-current generation near structures’ Journal of Fluid Mechanics 171, 1986, 459–476.
21. Yossef, M. F. M. “The effects of groynes on rivers (literature review),” Delft Cluster Report No. DC1-334-4, Delft University, the Netherlands, 2002, 57-63.
|
24-28
|
6.
|
Authors:
|
Meenal P.Talekar, Ravindra Kale
|
Paper Title:
|
Review on Cryptoleq: Single Instruction Set Abstract Machine
|
Abstract: Today data communication mainly depends upon digital data communication, where is data security is prior requirement which become crucial now days in every sector. So in order to protect it, various methods and Algorithm have been implemented. Cryptography combines Science, Mathematics, Computer Engineering and Networking. The purpose of this research paper is (i) to find the best cryptographic algorithm for computations (ii) to study the Cryptoleq system which (iii) and finally the comparison of performance of algorithm with Cryptoleq and without Cryptoleq.
Keywords: single instruction machine, heterogeneous computer, mathematical computations, encryption.
References:
1. Oleg Mazonka, Nektarios Georgios Tsoutsos, “Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation” in (2016).
2. S. Halevi and V. Shoup, “Bootstrapping for HElib,” in Advances in Cryptology. Heidelberg, Germany: Springer,, 641–670,2015.
3. J. Zimmerman, “How to obfuscate programs directly,” in Advances in Cryptology. Heidelberg, Germany: Springer, 2015, pp. 439–467.
4. S. Halevi and V. Shoup. HElib: Design and Implementation of a Homomorphic-Encryption Library, accessed on Nov. 13, 2015.
5. D. Apon, Y. Huang, J. Katz, and A. J. Malozemoff, “Implementing cryptographic program obfuscation,” in Proc. IACR Cryptol. ePrint Arch., 2014, p. 779.
6. S. Garg, C. Gentry, S. Halevi, and M. Zhandry, “Fully secure functional encryption without obfuscation,” in Proc. IACR Cryptol. ePrint Arch.,2014, p. 666.
7. P. T. Breuer and J. P. Bowen, “A fully homomorphic crypto-processor design,” in Engineering Secure Software and Systems. Heidelberg, Germany: Springer, 2013, pp. 123–138.
8. Naser A W S and Bin Md Fadli (2013), “ Use of Cryptography in Cloud Computing”, pp. 179-184, proceedings of IEEE International Conference on Control System Malaysia.
9. Shahzadi Farah et al.”An Experimental Study on Performance Evaluation of Asymmetric Encryption Algorithms”, Recent Advances in information Science, Proceeding of the 3rd European Conf. of Computer Science, (EECS-12) 2012.
10. Ramgovind S, Eloff M and smith E “ The management of security in Cloud Computing”, Proceedings of IEEE Conference 2010.
|
29-30
|
7.
|
Authors:
|
Ananya Kalita, Arnob Bormudoi, Mimi Das Saikia
|
Paper Title:
|
Probability Distribution of Rainfall and Discharge of Kulsi River Basin
|
Abstract: The frequency analysis of daily rainfall data of 24 years was carried out to determine the annual one day maximum rainfall and discharge of Ukiam. For evaluation of observed and expected values Weibull’s plotting position Gumbel, Log Pearson and Log normal probability distribution functions were fitted. For determination of goodness of fit chi square test was carried out by comparing the expected values with the observed values. The results found showed that the Log Pearson and Log Normal were the best fit probability distribution for determination of annual one day maximum rainfall and discharge for different return periods respectively.
Keywords: Probability distribution, Chi-Square Value
References:
1. Benson, M. A. (1968). Uniform flood frequency estimating methods for federal agencies. Water Resources Research, 4(5) : 891-908.
2. Bhakar S. R., Iqbal Mohammed, Devanda Mukesh, Chhajed Neeraj and Bansal Anil K.(2008). probablity analysis of rainfall at kota, Indian J. Agric. Res., 42 (3) : 201 -206.
3. Choudhury P. And Bora Kaushik (2015), “Estimation of annual maximum daily rainfall of Silchar, Assam,” International Conference on Engineering Trends and Science & Humanities ISSN: 2348 – 8352.
4. Chow, V.T., “Applied Hydrology”, McGraw-Hill Book Company Inc., NewYork, N.Y., 1988.
5. Dingre S, Atre AA(2005). Probability analysis for prediction of annual maximum daily rainfall of Srinagar region (Kashmir valley). Indian Journal of Soil Conservation , 33(3): 262-263.
6. Dzubakova,K.(2010),Rainfallrunoffmodeling:Itsdevelopment,classification and possible applications. ACTA Geographical Univerciti Comenianae, 54, 2010, N0. 2, pp 173-181.
7. Gharagozlou A., “Crisis Management (Flood) and GIS,” Geomatics College of NCC of Iran, Tehran, 2010, pp. 23-29.
8. Gumbel, E. J. (1958). Statistics of Extremes, Columbia University Press, New York.
9. Heywood LAN, S, Cornelius and S. Carver, “Cornelius-An Introduction to Geographic Information Systems,” chap., 1998, pp. 2-5
10. Jeevarathnam K. Jaykumar K(1979). Probability analysis for prediction of annual maximum daily rainfall for Ootacamund. Indian Journal of Soil Conservation, 7(1): 10-16.
11. Kumar, D. and Bhattacharya, R. (2011), Distributed Rainfall Runoff Modelling. International Journal of Earth Sciences and Engineering, 4,(6) SPL, pp 270-275.
12. Kumar, A.(2000). Prediction of annual maximum daily rainfall of Ranichauri (Tehri Garhwal) based on probability analysis. Indian Journal of Soil Conservation, 28 : 178-180.
13. Kumar, A.,K. K. Kaushal and R.D. Singh (2007). Prediction of annual maximum daily rainfall of Almora based on probability analysis . Indian Journal of Soil Conservation, 35 : 82-83.
14. Kumar Rajneesh and Bhardwaj Anil (2015). Probability analysis of return period of daily maximum rainfall in annual data set of Ludhiana, Punjab Indian J. Agric. Res., 49 (2) : 160-164.
15. Prakash C, Rao DH(1986). Frequency Analysis of rain data for crop planning (Kota). Indian Journal of Soil Conservation, 14(2):23-26.
16. Subramanya, K., “Engineering Hydrology”, McGraw-Hill Book Company Inc., New York, N.Y., 1999.
17. Subudhi, R. (2007). Probability analysis for prediction of annual maximum daily rainfall of Chakapada block of Kandhamal district in Orissa. Indian Journal of Soil Conservation, 35: 84-85.
18. Upadhaya, A. and S. R. Singh (1998). Estimation of consecutive day’s maximum rainfall by various methods and their comparison. Indian Journal of Soil Conservation, 26: 193-201.
19. Vivekanandan, N. (2012). Intercomparison of Extreme Value Distributions for Estimation of ADMR. International Journal of Applied Engineering and Technology, 2(1) : 30-37.
|
31-37
|
8.
|
Authors:
|
Sandeep C. S, Sukesh Kumar A, Susanth M. J.
|
Paper Title:
|
The Online Datasets Used to Classify the Different Stages for the Early Diagnosis of Alzheimer’s Disease (AD)
|
Abstract: Alzheimer Disease (AD) is one of the common forms of dementia which is an irreversible neurodegenerative progressive disorder of the brain which affects the elderly population above the age of 65. Alzheimer is a brain disease that causes problems with memory, thinking and behavior. It is severe enough to interfere with daily activities. Alzheimer symptoms are characterized by memory loss that affects day-to-day function, difficulty performing familiar tasks, problems with language, disorientation of time and place, poor or decreased judgment, problems with abstract thinking, misplacing things, changes in mood and behavior, changes in personality and loss of initiative. There are different types of tests associated with AD such as neuropsychological tests, laboratory tests and various imaging modalities for the early diagnosis of AD. Although these tests are available, they are inadequate for the definite diagnosis of the disease. In this paper we focus on the databases related to AD such as ADNI (Alzheimer Disease Neuroimaging Initiative), OASIS (Open Access Series of Imaging studies), Alz Gene, AD&FTDMDB (The Alzheimer Disease & Frontotemporal Dementia Mutation Database), (CAMD) Alzheimer’s disease Database and NAAC( National Alzheimer’s Coordinating Center), TREAD (Trajectory-Related Early Alzheimer’s Database), Coalition Against Major Diseases use of the soft computing techniques and image analysis from the different imaging modalities in an efficient way for making a definite diagnosis and early prediction of AD. Our aim is to predict the early diagnosis in a reliable manner such that to combine the values of different tests with the help of soft computing techniques to develop software tool for a definite diagnosis.
Keywords: Alzheimer Disease, Dementia, ADNI, OASIS, AlzGene, AD&FTDMDB, TREAD, NAAC. Soft Computing techniques, image analysis.
References:
1. Sandeep C S, Sukesh Kumar A, Susanth M J “The Early Diagnosis Of Alzheimer Disease (Ad) Using CAMD, TREAD And NAAC Databases” International Journal for Science and Advance Research In Technology, ISSN ONLINE 2359-1052, IJSART – Volume 3 Issue 3 –MARCH 2017:366-371
2. A Review on the Early Diagnosis of Alzheimer’s Disease (AD) through Different Tests, Techniques and Databases AMSE JOURNALS –2015-Series: Modelling C; Vol. 76; N° 1; pp 1-22 Submitted June 2014; Revised Dec. 26, 2014; Accepted Feb. 20, 2015
3. Sandeep C.S, Sukesh Kumar.A, “A Review Paper on the Databases Used for the Early Diagnosis of Alzheimer’s Disease(AD)”, in proceedings of the International Conference on Intelligent Engineering Systems , EASA College of Engineering, Coimbatore, India, ISBN 978-93-83459-33-9, Apr 2014, p.145
4. Sandeep C.S, Sukesh Kumar.A, “A Review Paper on the Early Diagnosis of Alzheimer’s Disease(AD) through Profiling of Human Body Parameters”, Scientistlink, Coimbatore, India, 2013, International Journal of Computer Science and Engineering Communications (IJCSEC), Vol.1 Issue.1, pp. 21-29, December 2013.
5. 2010 Alzheimer’s Disease Facts and Figures. Rep. Vol. 6. Chicago: Alzheimer’s Association, 2010. Print. Alzheimer’s and Dementia.
6. Alzheimer’s Association 2010. Web. 01 Oct. 2010. <http://alz.org>.
7. Alzheimer’s Disease International, World Alzheimer Report 2011, “The benefits of early diagnosis and intervention,” by Prof Martin Prince, Dr Renata Bryce and Dr Cleusa Ferri, Institute of Psychiatry, King’s College London, Summary, p.4
8. ADI press release (http://www.alz.co.uk/media/nr100921.html) for “Alzheimer’s Disease International World Alzheimer Report 2010: The Global Economic Impact of Dementia,” Prof Anders Wimo, Karolinska Institutet, Stockholm, Sweden Prof Martin Prince, Institute of Psychiatry, King’s College London, UK. Published by Alzheimer’s Disease International (ADI ) 21 September 2010
9. Healthy Aging-Normal Aging.” WebMD – Better Information. Better Health.Web.12Oct.2010.<http://www.webmd.com/healthy-aging/tc/healthy-aging-normal-aging?page=2>.
10. Dementia Definition – Alzheimer’s Disease Information on MedicineNet.com.” Medicine Net. 21June 2002. Web. 10 Oct.2010.
11. Mayo Clinic Medical Information and Tools for Healthy Living. 2010 Mayo Foundation for Medical Education and Research. Web. 21 Nov. 2010.
12. Frosch, M.P., D.C. Anthony and U.D. Girolami, 2010. The Central Nervous System. In: Robbins and Cotran Pathologic Basis of Disease, Robbins, S.L., V. Kumar, A.K. Abbas, R.S. Cotran and N. Fausto (Eds.), Elsevier srl, Philadelphia, ISBN-10: 1416031219, pp: 1313-1317.
13. Harvey, R.A., P.C. Champe, B.D. Fisher, 2006. Lippincott’s Illustrated Reviews: Microbiology. 2nd Edn., Lippincott Williams and Wilkins, ISBN-10: 0781782155,pp: 432.
14. Cummings, J.L., H.V. Vinters, G.M. Cole and Z.S. Khachaturian, 1998. Alzheimer’s disease: etiologies, pathophysiology, cognitive reserve and treatment opportunities. Neurology. 51: 2-17. PMID: 9674758
15. Yaari, R. and J. Corey-Bloom, 2007. Alzheimer’s disease: Pathology and pathophysiology. Semin Neurol. 27: 32-41.
16. https://www.radiologyinfo.org/
17. Meha Fatima Aftab and Rizwana S. Waraich /, a review of biochemical markers for early diagnosis of alzheimer’s disease ,American Journal of Neuroscience 3 (2) (2012) 54-62
18. http://adni.loni.usc.edu/
19. http://www.oasis-brains.org/
20. https://www.ucl.ac.uk/
21. https://www.alz.washington.edu/
22. David Darby1 , Amy Brodtmann1 , Michael Woodward1 , Colin Masters2 , 1 Florey Institute of Neuroscience and Mental Health, Parkville VIC, Australia; 2 University of Melbourne, Melbourne, VIC, Australia THE TRAJECTORY-RELATED EARLY ALZHEIMER’S DATABASE (TREAD) STUDY,P4-188
23. https://www.molgen.ua.ac.be/ADMutations/
24. https://c-path.org/programs/camd/
25. http://www.alzgene.org/
26. A good introduction to evolutionary computing: http:// www.cs.bham.ac.uk/Mirrors/ftp.de.uu.net/EC/clife/www/top.htm
|
38-45
|
9.
|
Authors:
|
Purushottam Sahu, Santosh Kumar Mishra, Shatendra Kumar Sahu
|
Paper Title:
|
Surface Alloying of Aluminum Alloy (Lm4) With Iron Powder using Tig Welding
|
Abstract: Development of Fe–Al composite layer by utilizing combination surface alloying process with blend of Al and Fe powders has been examined to enhance the surface hardness of cast aluminum amalgam LM4, business Al–Si compound substrate. Tungsten Arc welding procedure is utilized to adjust the surface. Components, for example, welding current, welding speed, terminal to work separation are changed to the composite the surface of LM4 with preplaced press covering on the substrate at different levels of welding current (3-6mm/sec) and cathode to work remove (2-3mm) in the argon gas protecting. The microstructure of the alloyed layer changed with expanding Fe content from hypo-eutectic structure to hyper-eutectic structure. Hardness of the surface changed LM4 combination shifts from HV98.96 to HV141.9 as for the elements chose and their levels [25]. The alloyed examples with low warmth input demonstrates high hardness when terminal to work separation is kept steady, as the cathode to work remove increments small scale hardness additionally increments. The greatest increment in hardness is 40.25% accomplished at Welding current 100A, welding speed 5mm/sec, Electrode to work separate 3mm because of the best possible dissemination of iron particles into the substrate bringing about the arrangement of Al-Fe intermetallic.
Keywords: HV98.96 to HV141.9, LM4, Utilizing Combination, (3-6mm/sec), Intermetallic.
References:
1. A.K. Gaiduchenko, S.G. Napara-Volgina (1995), Development of iron powder metallurgy, Powder Metallurgy and Metal Ceramics, retrieved 13 December 2013
2. “What is iron powder?”. JFE Steel Corporation. Retrieved 8 January 2014.
3. “Applications of Iron Powder”. JFE Steel Corporation. Retrieved 8 January 2014
4. http://catalog.miniscience.com/Catalog/Metals/Iron_Powder.html
5. http:/Type equation here./en.wikipedia.org/wiki/Vickers_hardness_test
6. http://www.hardnesstesters.com/Applications/Vickers-Hardness-Testing.aspx
7. R.L. Smith & G.E. Sand land, “An Accurate Method of Determining the Hardness of Metals, with Particular Reference to Those of a High Degree of Hardness,” Proceedings of the Institution of Mechanical Engineers, Vol. I, 1922, p 623–641.
8. http://www.ukcalibrations.co.uk/vickers_htm.html
9. ASTM E384-10e2
10. ISO 6507-1:2005
11. Vickers Test. Instron website.12. Smithells Metals Reference Book, 8th Edition, Ch. 22 “Hardness”.
13. http://www.aibn.no/aviation/reports/1993-02-eng
14. H.C Man, S Zhang, T.M Yue, F.T Cheng, Laser surface alloying of NiCrSiB on Al6061 aluminium alloy, Surface and Coatings Technology, Volume 148, Issues 2–3, December 2001, Pages 136-142, ISSN 0257-8972.
15. Yongqing Fu, A.W. Batchelor, Yanwei Gu, K.A. Khor, Huting Xing, Laser alloying of aluminium alloy AA 6061 with Ni and Cr. Part 1. Optimization of processing parameters by X-ray imaging, Surface and Coatings Technology, Volume 99, Issue 3, 23 February 1998, Pages 287-294, ISSN 0257-8972, http://dx.doi.org/10.1016/S0257-8972(97)00569-0.
16. Yongqing Fu, Andrew W Batchelor, Laser alloying of aluminium alloy AA 6061 with Ni and Cr. Part II. The effect of laser alloying on the fretting wear resistance, Surface and Coatings Technology, Volume 102, Issues 1–2, 1 April 1998, Pages 119-126, ISSN 0257-8972, http://dx.doi.org/10.1016/S0257-8972(97)00572-0.
17. H.C. Man, S. Zhang, F.T. Cheng, Improving the wear resistance of AA 6061 by laser surface alloying with NiTi, Materials Letters, Volume 61, Issues 19–20, August 2007, Pages 4058-4061, ISSN 0167-577X, http://dx.doi.org/10.1016/j.matlet.2007.01.016.
18. M.H. Staia, M. Cruz, Narendra B. Dahotre, Microstructural and tribological characterization of an A-356 aluminium alloy superficially modified by laser alloying, Thin Solid Films, Volumes 377–378, 1 December 2000, Pages 665-674, ISSN 0040-6090, http://dx.doi.org/10.1016/S0040-6090(00)01448-6.
19. P Petrov, Electron beam surface remitting and alloying of aluminium alloys, Vacuum, Volume 48, Issue 1, January 1997, Pages 49-50, ISSN 0042-207X, http://dx.doi.org/10.1016/S0042-207X(96)00240-0.
20. Almeida, M. Anjos, R. Vilar, R. Li, M.G.S. Ferreira, W.M. Steen, K.G. Watkins, Laser alloying of aluminium alloys with chromium, Surface and Coatings Technology, Volume 70, Issues 2–3, January 1995, Pages 221-229, ISSN 0257-8972, http://dx.doi.org/10.1016/0257-8972(94)02263-P.
21. Takashi Ishikawa, Nobuki Yukawa, Kazuhiro Suzuki, Yutaka Suzuki, Takashi Jimma, Formability of superplastic aluminium alloy processed by mechanical alloying, Journal of Materials Processing Technology, Volume 68, Issue 3, 15 August 1997, Pages 236-240, ISSN 0924-0136, http://dx.doi.org/10.1016/S0924-0136(96)00107
0.
22. K.G. Budinski, Surface Engineering for Wear Resistance, Prentice-Hall, 1988
23. J.R. Davis, Ed., Surface Engineering for Corrosion and Wear Resistance, ASM International and IOM Communications, 2001
24. G. Krauss, Advanced Surface Modification of Steels, J. Heat Treat.,Vol 9 (No.2), 1992, p 81–89
25. S. Lampman, Introduction to Surface Hardening of Steels, Heat Treating,Vol4, ASM Handbook,1991, p 259–267
|
46-52
|
10.
|
Authors:
|
Hazem Samih Mohamed
|
Paper Title:
|
Numerical analysis on Pre-Stressed Steel I-Beams
|
Abstract: Pre-stressing with external tendon is one of the most efficient techniques for rehabilitation of existing structures, strengthening of steel structures, controlling the structure deflection and reduction of the construction cost. This paper consisting of a parametric study to investigate the effect of several parameters on the structure behavior. The key variables examined were the number of deviator, eccentricity of the external tendon, pre-stressing technique. ANSYS software has been used to analyze and simulate the process of applying the pre-stressing force and the structure loads. Geometrical imperfections and buckling modes of the unloaded beam are taken into consideration as an initial condition. The results show that these variables impose additional challenges on the accurate prediction of pre-stressed steel structures performance during its service life.
Keywords: Tendon; External pre-stressing; ANSYS; Steel I-beam; Deviator
References:
1. Dunker, K. F. (1985). “Strengthening of simple span composite bridges by post-tensioning.”
2. Vernigora, E., and Marcil, J. R. M. (1969). “Bridge Rehabilitation and Strengthening by Continuous Post-Tensioning.” Prestressed concrete institute journal, 14(2), 88-104.
3. Kandall, C. (1968). “Increasing Load-Carrying Capacity Of Existing Steel Structures.” Civil Engineering, 38(10), 48-57.
4. Knee, D. (1966). “The Prestressing of Steel Girders.” Structural Engineer.
5. Troitsky, M. S. (1990). Prestressed steel bridges: Theory and design, Van Nostrand Reinhold New York.
6. Bradford, M. A. (1991). “Buckling of prestressed steel girders.” Engineering journal, 28(3), 98-101.
7. Aparicio, A. C., Ramos, G., and Casas, J. R. (2002). “Testing of externally prestressed concrete beams.” Engineering Structures, 24(1), 73-84.
8. Aravinthan, T., Witchukreangkrai, E., and Mutsuyoshi, H. (2005). “Flexural behavior of two-span continuous prestressed concrete girders with highly eccentric external tendons.” ACI Structural Journal, 102(3), 402-411.
9. El-Ariss, B. (2004). “Stiffness of reinforced concrete beams with external tendons.” Engineering Structures, 26(14), 2047-2051.
10. Lou, T. J., and Xiang, Y. Q. (2006). “Finite element modeling of concrete beams prestressed with external tendons.” Engineering Structures, 28(14), 1919-1926.
11. Ariyawardena, N., and Ghali, A. (2002). “Prestressing with unbonded internal or external tendons: analysis and computer model.” Journal of Structural Engineering, 128(12), 1493-1501.
12. Saadatmanesh, H., Albrecht, P., and Ayyub, B. M. (1989). “Experimental study of prestressed composite beams.” Journal of Structural Engineering, 115(9), 2348-2363.
13. Chen, S., and Jia, Y. (2010). “Numerical investigation of inelastic buckling of steel–concrete composite beams prestressed with external tendons.” Thin-Walled Structures, 48(3), 233-242.
14. Chen, S., and Zhang, Z. (2006). “Effective width of a concrete slab in steel–concrete composite beams prestressed with external tendons.” Journal of Constructional Steel Research, 62(5), 493-500.
15. Lorenc, W., and Kubica, E. (2006). “Behavior of composite beams prestressed with external tendons: Experimental study.” Journal of constructional steel research, 62(12), 1353-1366.
16. Oh, J. Y., Lee, D. H., and Kim, K. S. (2012). “Accordion effect of prestressed steel beams with corrugated webs.” Thin-walled structures, 57, 49-61.
17. Aydin, Z., and Cakir, E. (2015). “Cost minimization of prestressed steel trusses considering shape and size variables.” Steel and Composite Structures, 19(1), 43-58.
18. Gosaye, J., Gardner, L., Wadee, M. A., and Ellen, M. E. “Compressive behaviour and design of prestressed steel elements.” Proc., Structures, Elsevier, 76-87.
19. Saito, D., and Wadee, M. A. (2009). “Buckling behaviour of prestressed steel stayed columns with imperfections and stress limitation.” Engineering Structures, 31(1), 1-15.
20. Ellen, M. E., Gosaye, J., Gardner, L., and Wadee, M. A. “Design and construction of long-span post-tensioned tubular steel structures.” Proc., 14th International Symposium on Tubular Structures, CRC Press, 687-693.
21. Gosaye, J., Gardner, L., Wadee, M. A., and Ellen, M. E. (2014). “Tensile performance of prestressed steel elements.” Engineering Structures, 79, 234-243.
22. Bourne, S. (2013). “Prestressing: Recovery of the lost art.” The Structural Engineer, 91(2), 12-22.
23. Ponnada, M. R., and Vipparthy, R. (2013). “Improved method of estimating deflection in prestressed steel I-beams.” Asian Journal of Civil Engineering (BHRC), 14(5), 765-772.
24. Boatman, B. (2010). “Prestressed vs. steel beams: Expected service life.” Lansing: State of Michigan Department of Transportation.
25. Chen, Z., Liu, Z., and Sun, G. (2011). “Thermal behavior of steel cables in prestressed steel structures.” Journal of Materials in Civil Engineering, 23(9), 1265-1271.
26. Belletti, B., and Gasperi, A. (2010). “Behavior of prestressed steel beams.” Journal of Structural Engineering, 136(9), 1131-1139.
|
53-57
|
11.
|
Authors:
|
Akshay Ashok Sonawane, Sultan Shahajahan, Azhar Rehaman
|
Paper Title:
|
Design and Fabrication of an Inline Pipe Inspection Robot
|
Abstract: already there are various designs available in the case of an inline-pipe inspection robot. This research paper aims at preparing a new design along with its fabrication process. For a start we studied the readily available deigns and there advantages as well as limitations. We have used CATIA V5R19 to design our robot. The key factors we have considered while in the process of design are mobility, safety in operation, steer ability, and the most important one is size and shape adaptability. Our model is a wireless flexible pipe inspection robot which is capable to pass through a pipe with diameter in range of 6-9 inches. We can detect various defects such as cracks, corrosion, buckles, etc.
Keywords: inline pipe-inspection, mobility, shape adaptability, wireless.
References:
1. Ankit Nayak , S. K. Pradhan, “Design of a New In-Pipe Inspection Robot,” in 12th Global congress on manufacturing and management, GCMM 2014.
2. Lee Vuen Nee, I. Elamvazuthi, Timothy Ganesan, M.K.A. Ahamed Khan and S. Parasuraman, “Development of a Laboratory-scale Pipeline Inspection Robot,” in 2015 IEEE International Symposium on Robotics and Intelligent Sensors (IRIS 2015).
3. Kentarou Nishijima, Yixiang Sun, Rupesh Kumar Srivastava Harutoshi Ogai, Bishakh Bhattacharya, “Advanced pipe inspection robot using rotating probe,” in The Fifteenth International Symposium on Artificial Life and Robotics 2010 (AROB 15th ’10), B-Con Plaza, Beppu,Oita, Japan, February 4-6, 2010.
4. Nur Shahida Roslin, Adzly Anuar, Muhammad Fairuz Abdul Jalal, Khairul Salleh Mohamed Sahari, “A Review: Hybrid Locomotion of In-pipe Inspection Robot,” in 2012 International Symposium on Robotics and Intelligent Sensors.
5. Xin Li, Wuyi Yu, Xiao Lin, and S. S. Iyengar, “On Optimizing Autonomous Pipeline Inspection,” in IEEE Transactions On Robotics, Vol. 28, No. 1, February 2012.
6. Hanaa Said Salim Al-Hajry and G.R. Rameshkumar, “Designand Testing of Pipeline Inspection Robot,” in International Journal of Engineering Innovation & Research Volume 2, Issue 4, ISSN: 2277 – 5668.
7. Ankit Nayak, S. K. Pradhan, “Investigations of Design Issues Related To In-Pipe Inspection Robots,” in International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 3, March 2014).
8. Atul A. Gargade, Dr. Shantipal S. Ohol, “Development of In-pipe Inspection Robot,” in IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684,p-ISSN: 2320-334X, Volume 13, Issue 4 Ver. VII (Jul. – Aug. 2016), PP 64-72.
9. E Navin Prasad, M Kannan, A Azarudeen and N Karuppasamy, “Defect Identification In Pipe Lines Using Pipe Inspection Robot,” in IJMERR.
10. Dr. Sharanabasappa C. Sajjan , Naveen Srivatsa H.S, Dinesh Kumar P, “Design And Development Of Pipe Inspection Robot,” in TROI.
|
58-61
|
12.
|
Authors:
|
Vivek Kumar, Namrata Patil, Bhavesh Zope
|
Paper Title:
|
Solar Panel Selection for 5KW System
|
Abstract: The theme of this project work is solar panel selection which capacity is 5KW. The first phase of the project is introduction, prospects, configuration about Photo-Voltaic systems (PV systems) and study of photo-voltaic cells, modular and array. The second phase includes the selection of solar panel, efficiency, economic considerations and calculations of the photo-voltaic system. The photo-voltaic technology is an off-shoot of the evaluation in semiconductor technology during 1980s. Several different base materials and doping materials were tried during early 1980s. By mid 1980s the silicon has been adopted as base material for producing photo-voltaic cells by almost all the photo-voltaic cell manufacturers. They work on principle of the light energy of the sun is directly converted in to electrical energy.
Keywords: photo-volatic; cell; modular; array
References:
1. Dr V.M. Domkundwar, and Anand V. Domkundwar, “Dhanpat Rai & Co. (P) LTD,” Phil. , page. 11.8-11.15.
2. D.P. Kothari, “Renewable energy source and emerging techonologies”, 2nd ed. PHI Learning PVT LTD Delhi-110092, page.129-132.
3. G.N. Tiwari, “Solar Energy Fundamental, Design, Modellingand Applictaion” Revised edition , Narosa Publication House new Delhi, page. 452.
4. J. B Gupta, “A course in electrical Power,” S.K Kataria & Sons, page. I, 131.
5. H.A. Kazem, “Renewable Energy in Oman: Status and Future Prospects”, Renewable and Sustainable Energy Review, vol. 15, page. 3465-3469, .
|
62-65
|
13.
|
Authors:
|
Nazrin Nazar, A. Nizad
|
Paper Title:
|
Effect of Treated Recycled Aggregate on the Mechanical Properties of Polypropylene Fibre Reinforced Concrete
|
Abstract: The non-availability of materials is one of the major factors affecting the progress of construction. Natural resources are becoming insufficient to meet the increasing demand in construction. As a solution to the above problems, recycled aggregates from the demolished waste are now being used as replacement of natural aggregates. But the use of recycled aggregates drastically decreases the strength of concrete. This is mainly due to old mortar on the surface of aggregate which render the surface porous and makes it of inferior quality. Recent literatures suggests surface treatment to improve the strength. Therefore in this study, recycled aggregate that is treated in dil. HCl to remove the loose mortar is used instead of recycled aggregate. Also fibre reinforced concrete is now being widely used in industry due to its abrasion resistance, shrinkage control and impact resistance. The objective of this study is to find out the combined effect of treated recycled aggregate with polypropylene fibres and the strength properties are compared with that of conventional concrete. Mix proportion is done for M25 concrete. Natural coarse aggregate is replaced by treated recycled coarse aggregate in proportions of 0, 20, 40, 60, 80 and 100%. In all mixes the proportion of polypropylene fibre is kept constant at 0.2% by volume of concrete. From the test results it is inferred that the use of concrete, containing up to 60% replacement of natural coarse aggregate with treated recycled coarse aggregate can be economically and judiciously encouraged for structural applications.
Keywords: Fibre reinforced concrete, polypropylene fibre, recycled aggregate, treated recycled aggregate.
References:
1. Akca, K. R., O. Cakik, M. Ipek (2015) Properties of polypropylene fibre reinforced concrete using recycled aggregates, Construction and Building Materials, 98, pp. 620-630.
2. Dharani, N., A. Ashwini, G. Pavitha and G. Arulraj (2013) Experimental investigation on mechanical properties of Recron 3s fibre reinforced hyposludge concrete, International Journal Of Civil Engineering And Technology, 4, pp. 182-189.
3. Dilbas, H. and O. Cakir (2014) An investigation on mechanical and physical properties of recycled aggregate concrete (RAC) with and without silica fume, Construction and Building Materials, 61, pp. 50–59.
4. Ede, A. N. and A. O. Ige (2014) Optimal polypropylene fibre content for improved compressive and flexural strength of concrete, Journal of Mechanical and Civil Engineering, 11, pp. 129-135.
5. Ismail, S. and M. Ramli (2013) Engineering properties of treated recycled concrete aggregate (RCA) for structural applications, Construction and Building Materials, 44, pp. 464–476.
6. Kakooei, S., H. M. Akil, M. Jamshidi and J. Rouhi (2012) The effects of polypropylene fibres on the properties of reinforced concrete structures, Construction and Building Materials, 27, pp. 73-77.
7. Khan, S., R. A. Khan, A. R. Khan, M. Islam and S. Nayal (2015) Mechanical properties of polypropylene fibre reinforced concrete for M 25 & M 30 mixes: A comparative study, International Journal of Scientific Engineering and Applied Science, 1, pp. 327-340.
8. Kwan, W. H., M. Ramli, K. J. Kam and M. Z. Sulieman (2012) Influence of the amount of recycled coarse aggregate in concrete design and durability properties, Construction and Building Materials, 26, pp. 565–573.
9. Madhavi, T. C., L. S. Raju and D. Mathur (2014) Polypropylene fibre reinforced concrete: A Review, International Journal of Emerging Technology and Advanced Engineering , 4, pp. 114-119.
10. Manzi, S., C. Mazzotti and M. C. Bignozzi (2013) Short and long-term behaviour of structural concrete with recycled concrete aggregate, Cement & Concrete Composites, 37, pp. 312–318.
11. Wagih, A. M., H. Z. Karmoty, M. Ebid and S. H. Okba (2013) Recycled construction and demolition concrete waste as aggregate for structural concrete, Housing and Building National Research Center, 9, pp. 193–200.
|
66-71
|
14.
|
Authors:
|
Swati A.Patil, Suraj P. Ahirrao, Priya V. Chumble, Manali R. Navale, Tausif N. Mulani
|
Paper Title:
|
Industrial Waste Water Management by Implementing Wetland Ecosystem
|
Abstract: Constructed wetlands are natural alternative to technical methods of wastewater treatment, however our understanding of the complex processes caused by the plants, micro organisms, soil matrix and the substances in the wastewater, and how they all interact with each other, is still rather incomplete. The main objective of this project is to compare the parameters of industrial waste water sample which is treated by wetland ecosystem with another industrial waste water samples without applying wetland ecosystem. The Principle of this is to perform a preliminary comparative study between some coagulants on the removal of suspended solids organic matter and testing the Chemical and Biochemical Oxygen Demand from the industrial waste water. For implementation of wetland ecosystem, we are going to study specific plants which can be used for wetland ecosystem.
Keywords: industrial wastewater, characteristics of wastewater, constructed wetland, wetland ecosystem
References:
1. Babatunde, A.O.; Zhao, Y.Q. “Constructive approaches towards water treatment works sludge management: an international review of beneficial re-uses” (2007)
2. Calheiros, C. S. C., Rangel, A. O. S. S., and Castro, P. M. L. “Constructed wetland systems vegetated with different plants applied to the treatment of tannery wastewater” Water Res., 41, 1790–1798, (2007)
3. Hans G. Peterson. “Use of constructed wetlands to process agricultural wastewater” Canadian Journal of Plant Sci. 78: 199–210(1998)
4. Kapoor, A., Viraraghavan, T. Fungal Biosorption-an alternative treatment option for heavy metal bearing wastewater: a review. Bioresource. Technol. 53: 195-206(1995)
5. Kadlec, R. H. and S. D. Wallace “Treatment Wetlands, Second Editions” Florida, CRC Press.(2009)
6. Mungur, A. S., Shutes, R. B., Revitt, D. M., and House, M. A.“An assessment of metal removal by a laboratory scale wetland.” Water Science. Technol., 35(5), 125–133(1997)
7. Villaescusa, I., Martinex, M., and Miralles, N. “Heavy metal uptake from aqueous solution by cork and yohimbe bark wastes.” J. Chem. Technol.Biotechnol., 75, 812–816(2000.)
8. Knight, R.L., and Kadlec, R. H. “Treatment wetlands”, Lewis,Boca Raton, Fla. (1996)
9. Siedel K. Patent: System for purification of polluted water. Washington DC.(1973)
10. Barker, D. J. and Stuckey, D. C.“A review of soluble microbial products (SMP) in wastewatertreatment systems.” Water Research, 33(14), 30633082(1999).
|
72-74
|
15.
|
Authors:
|
R. Rathish, P. Mahendiran, R. Manikandan, M. Naveen Kumar, A. Pravin Kumar
|
Paper Title:
|
Fabrication of Solar Power using Vehicle
|
Abstract: Now a days without electrical energy there is nothing in the world. Electrical energy can be taken from various methods like wind mills, power plants. But the raw materials which are used for producing electrical energy is not sufficient for upcoming years. In order to overcome the problem solar energy is necessary. It is an renewable, evergreen and everlasting energy. In our project we construct a solar powered vehicle prototype which convert the solar power converted into electrical power by the help of components like DC motor, Solar panel, DC battery
Keywords: Electrical, DC motor, Solar panel, DC battery.
References:
1. Jain A. Anderson, Ioannis A. Mitropoulos, Thomas McKay, Benjamin O’Brien, And Chris Melhuish, “Power For Robotic Artificial Muscles” IEEE/ASME Transaction son MechatronicsVol.16, No. 1,Feb 2011
2. J.H. Lever A. Streeter And L.R.Ray “Performance Of A Solar-Powered Robot For Polar Instrument Networks”. Cold Regions Research And Engineering Laboratory Thayer School Of Engineering US Army Engineer Research And Development Center Hanover
3. Tom´As De J. Mateo Sanguine And Justo E. Gonz´ Alez Ramos “Smart Host Micro Controller For Optimal Battery Charging In A Solar-Powered Robotic Vehicle” IEEE/ASME Transactions On ISSN (Online) 2278-1021ISSN (Print) 2319-5940
4. Theodore Amissah OCRAN, CAO Juny, CAO Binggan g, SU NXinghua,”Artificial Neural Network Maximum Power Point Tracker for Solar Electric Vehicle”Tsinghuascienceand technology, ISSN1007-021412/23 pp204-208 Volume10, , April 2005
5. Nicolet-Irina Tatu, Catlin Alexandra “Modeling and Simulation of the Tracking Mechanism for a PV String” Department of ProductDesign, Mechatronics and Environment Transylvania University ofBrasov Romania
6. Dr. R. C. Prasad “Design and Implementation of MPPT Algorithm for Solar Energy System “International Journal of Advanced Research in computer science and software engineering. Volume 3,Issue 10, October 2013
7. N. Kemal Ure, Girish Chowdhary, Member, IEEE, Tuna Toksoz,Jonathan P. How, Senior Member, IEEE, Matthew A. Vavrina, and John Vian,”An Automated Battery Management System to Enable Persistent Missions With Multiple Aerial Vehicles” IEEE/ASME transactions on mechatronics 2013.
|
75-77
|
16.
|
Authors:
|
Amruta Matkar, Tanmay Mhetre, Ashish More, Neha Gangraj
|
Paper Title:
|
Urine-The Source of Energy
|
Abstract: The proposed work is all about electricity generation, whilst cleaning the urine ‘fuel’ and producing clean water in addition to fertilizer, and is focusing on small-scale MFC units, which have been shown to be more efficient and energy-dense. The continuous flow nature of the MFC technology facilitates continuous growth of the constituent biofilm organisms, which clean the input, and can be subsequently used as fertilizer. In essence, the more powerful the MFC is, the greater are the rates of urine utilization. A microbial fuel cell is a device that uses natural biological processes of ‘electric’ bacteria to turn organic matter, such as urine, into electricity. These fuel cells are efficient and relatively cheap to run, and produce nearly zero waste compared to other methods of electricity generation. In practice, urine will pass through the microbial fuel cell for the reaction to happen. From here, electricity is generated by the bacteria which can then be stored or used to directly power electrical devices. Microbial fuel cells could be a great source of energy in developing countries, particularly in impoverished and rural areas. To have created technology that can potentially transform the lives of poor people who don’t have access to, or cannot afford electricity, is an exciting prospect. I hope this will enable those in need to enjoy a better quality of life as a result of our research.e spacing. Fore more details, please download TEMPLATE HELP FILE from the website.
Keywords: ACID (Anode Current Into Device), CCD (cathode current departs), MFC (Microbial Fuel Cell), CH4N2O (Molecular Formula of Urea), C5H4N4O3 (Uric Acid), Oxidant (Oxidizing Agent).
References:
1. Ali Abul, Jun Zhang, “MFC: Design,Control oriented Modelling”, Michigan State University in partial fulfillment of the requirements for the degree of Mechanical Engineering – Master of Science 2015.
2. Mahyudin Abdul Rachman, “Electricity from Biowaste based Gas Hydrogen as a Source of Renewable Energy”, 3rd International Conference On Informatics, Electronics & Vision 2014.
3. Amarveer Singh, “Urine Powered Battery (UPB) for Low Power Sensors”,2015 International Conference on Sustainable Energy Engineering and Application (ICSEEA)
4. Jaskiran Kaur,Amarpreet Singh, “Enhanced Urine Powered Battery (EUPB) for Low Power Applications”. IEEE WiSPNET 2016 conference.
5. Wahidul Hasan, “Generation of Electricity Using Cow Urine”,International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 9 No. 4 Dec. 2014, pp.
1465-1471.
6. Cochran, John F. and Mapother, D. E. “Superconducting Transition in Aluminum”. Physical Review 111. (1958).
7. Charles, J.; Kopf, P. W.; Toby, S. “The Reaction of Pyrophoric Lead with Oxygen”. Journal of Physical Chemistry 70: 1478:10.1021/j100877a023. (1966).
|
78-82
|
17.
|
Authors:
|
Richmond Adebiaye
|
Paper Title:
|
Interpreting Users’ Perceptions of Mobile Security Methods and Their Effectiveness
|
Abstract: The increasing adoption of open source operating system (OS) platforms, such as Android and iOS, have opened up new security vulnerabilities and threats to mobile devices and other wireless access technologies. Recent statistics show that mobile networks around the globe “generate exceedingly over 86 exabytes of traffic annually”. Thus, mobile security vulnerabilities and threats such as SMS spam, rogue apps, adware, malware, cyber-attacks and unlawful eavesdropping have become an ever-increasing problem for mobile users around the world. This paper proposes a quantitative research survey to investigate mobile device security and the implications of security application recommendations for its users. The objective is to identify increased security risks, and recommend best security practices for mobile users. To obtain quantitative values, web-based questionnaires using the Likert scale were used, and data processed by factor analysis, ANOVA and multiple regression analysis tabulated along a continuum in numerical form. The study thus identifies and reveals the impacts of smartphone security threats such as mobile adware, rogue application downloads, and considers the suitability of smartphone security solutions offered by various vendors. This paper provided insights into users’ problems of malware, attack channels, black industry ‘chain of smartphone security’, and accessibility to smartphone security solutions introduced by mobile vendors. As this study adds to the available body of knowledge, it is anticipated that future research will continue to advance the available information regarding rogue applications, adware, malware, and other security threats related to mobile technology.
Keywords: Smartphones; Mobile security; Information Security; Android O/S; Vulnerabilities and Threats; iOS
References:
1. Christian, M. (2014). Integrating Cloud Computing and Mobile Applications: A Comparative Study Based on Cloud and Sanscode, Journal of Cloud Computing. 2(14) 1-9.
2. Gao, C, and Liu J. (2013). Modeling and Restraining Mobile Virus Propagation. IEEE Transactions on Mobile Computing, 12(3): 529-541.
3. Greenberg, A. (2010). Google Pulls App that Revealed Android Flaw, Issues Fix, http://news.cnet.com/8301-270803-20022545-245.html.
4. Harris, M, and Patten, K. (2013). Mobile Device Security Considerations for Small- and Medium-Sized Enterprise Business Mobility Integrated Information
Technology, Information Management and Computer Science, 22(1): 97-144
5. Liu, D, Zhang, and Hu, K. (2013). A Survey on Smartphone Security, Applied Mechanics and Materials, (Vol 347-350): 3861-3865.
6. Mavridis, I., & Pangalos, G. (2012). Security Issues in a Mobile Computing Paradigm. In I. Mavridis, & G. Pangalos, Communications and Multimedia Security (pp. 61-76). Springer US.
7. Park, J., Yi, K and Jeong, Y. (2014). An Enhanced Smartphone Security Model based on Information Security Management Systems, Electronic Commerce Research, 14(3): 321-348.
8. Patten, K and Passerini, K. (2007). Next Generation Small and Medium Enterprises Mobility Strategy Roadmap, Proceedings of ISOneWorldConference, Las Vegas, NV, 11-13 April.
9. Waltz, M. (2011). Mobility Threats, Mobile Enterprise, 7 March, Accessed 9 Februrary 2013, http://mobileenterp rise.edgl.com/top-stories/Mobility-Threats71022
10. Wei, J and Ozok, A. (2009). Development of a Mobile Commerce Security Analysis Method. Journal of Information Privacy & Security 5: 1; 28.
11. Yaseen, B, and Tariq, M. (2012). Technical Comparison Between Android And IOS With Respect to Their Architecture. Technical Report Documentation Page,
Punjab University College of Information Technology, University (PUCIT), Report No:BCSF09A: 1- 16.
12. Lookout, 2013. “2013 Mobile Threat Predictions”, Accessed 11 Februrary 2013,https://blog.lookout.com/blog/2012/12/13/2013-mobile-threat-predictions/
13. Stat counter, 2013. “Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013”, Stat Counter Global Stats, accessed 12 February 2013,http://gs.statcounter.com/#mobile_osUS-monthly-201201-
|
83-90
|
18.
|
Authors:
|
Venkatesh Patil, Ganesh Satras, Mukund Pawar, Ranjitkumar Biradar
|
Paper Title:
|
Transformer Oil Temperature Monitoring with GSM Based Fault Detection
|
Abstract: Transformer is an important and costly device in the power system. The reliable and fault free operation of a decisive role in the availability of electricity. The ageing of transformer depends on several factors especially electrical and thermal stresses. Due to which incipient faults occurs which in turn if left undetected will cause deterioration and eventually lead to failure of the transformer. The presence of faults in transformer results in chemical decomposition of the transformer oil. The transformer oil is deteriorated due to the combination of the ageing process such as partial discharge (PD), electrical arcing and thermal ageing. But some faults occurs in the substation that faults are affect the transformer operation as well as transformer life. These faults are short circuit and open circuit faults. In this project, we will attempt to show that how to avoid such electrical equipment failures could be caused by temperature rise in transformer and short circuit, Open circuit in substation.
Keywords: AVR Microcontroller, LM35 Temperature Sensor, GSM Module Etc.
References:
1. Karthik Parihar,Devesh Singh Pangtey,Bharat Singh Rana, “Transformer Oil Temperature Monitoring With Automatic Circuit Breaker” Volume 3, Issue 4 (April 2013) (ISSN 2231-4334).
2. Piush Verma, Yog Raj Sood and Jashandeep Singh, “Review Of Important Diagnostics Parameters For Power Transformer.
3. Z. Moravej *, S. Bagheri, “Condition Monitoring Techniques of Power Transformers: A
4. Review” Vol. 3, No. 1, Winter & Spring 2015, Pages: 71-82.
5. Jaroslav LELÁK, Michal VÁRY, Juraj PACKA, Eduard FIRICKÝ, Terézia SKORŠEPOVÁ “The Effect Of Temperature And Temperature Rise Test Of Distribution Transformers”.
|
91-95
|
19.
|
Authors:
|
Johnson Y, Imthias Ahamed T P
|
Paper Title:
|
Robust Analysis with Controller Design of Forward-Velocity Dynamics of UAVs in Close Formation Flight
|
Abstract: Study of multi-UAVs (Unmanned Aerospace Vehicles) in close formation flight has received wide attention due to the significant advantages in resource mapping at greater swaths, 3-D imaging etc. The control design study and its analysis is carried out for two aerodynamically non-identical UAVs in a leader-follower pattern of flight and it can be extended for multi UAVs. The modeling includes the effect of leader-trailing-wing vortex on the follower, both for nominal and perturbed system dynamics. Robust controller design to maintain the relative velocity between two UAVs in longitudinal plane close formation flight under nominal, wind and aero-perturbed condition is the major objective of this article. The forward velocity control of the leading vehicle and its tracking by a follower are performed by a PID controller and then compared with that of a robust H_∞ controller.
Keywords: Formation flight, UAV, PID, robust H-infinity, tracking and control, wing vortex.
References:
1. Zou, Y. and Pagilla, P.R., “Distributed Formation Flight Control Using Constrained Forces”, J. of Guidance, Control and Dynamics, Vol.32, No.1, 2009
2. Paul, T., Krogstad, T.R. and Gravdahl, J.T., ‘Modeling of UAV Formation Flight Using 3D Potential Field’, Simulation Modeling Practice and Theory,Vol.16, Issue
9,pp.1453-1462,2008
3. Innocenti, M., Guilietti, F. and Pollini, L., ‘Intelligent Management Control for Unmanned Aircraft Navigation and Formation keeping’, RTO AVT Course at Belgium, May, 2002
4. How, J., King, E. and Kuwata, Y., ‘Flight Demonstration of Cooperative control for UAV Teams’, AIAA 3rd Unmanned Unlimited Technical Conference, Workshop
and Exhibit, Illinois, 2004
5. Yoon S., Bae. J, and Kim. Y, Cooperative Standoff Tracking of a Moving Target using Decentralized Extended Information Filter, KSAS (Korean Society for Aeronautical and Space Science) Spring Conference, Gyeongju, Republic of Korea, Apr 2011
6. Kim H.J., Kim. M, Lim. H, Park. C, Yoon. S, Lee. D, Oh. G, Park. J and Kim. Y, ‘Fully-Autonomous Vision- based Net-Recovery Landing System for a Fixed-Wing UAV’,IEEE/ASME Transactions on Mechatronics, accepted for publication, 2013.
7. S. Yoon, S. Park, and Y. Kim, ‘Constrained Adaptive Backstepping Controller Design for Aircraft Landing in Wind Disturbance and Actuator Stuck’,International Journal of Aeronautical and Space Sciences, Vol. 13, No. 1, pp. 101-116, 2012.
8. Proud, A., Pachter, M., and DAzzo, J. J., ‘Close Formation Control’, Proceedings of the AIAA Guidance, Navigation, and Control Conference, AIAA – 99 – 4207, pp. 123 1 – 1246, Portland, OR, August, 1999.
9. Vanek and Balint, ‘Practical approach to real-time trajectory tracking Of UAV formations’ ,Proceedings of the American Control Conference,2005.
10. Saffarian, M. and Fahimi, F., ‘Control of helicopters formation using non-iterative nonlinear model predictive approach, Proceedings of IEEE American Control Conference, pp. 3707-3712, Seattle, Washington, June 2008
11. Min,H., Decentralized UAV formation tracking flight control using gyroscopic force, IEEE International Conference on Computational Intelligence, 2009.
12. Dogan,A. and Venkataramanan,S., ‘Nonlinear control for Reconfiguration of Unmanned Aerial Vehicle Formation’, J. of Guidance, Control and Dynamics, Vol 28, No 4(2005)
13. Chichka D.F.,Speyer J.L.,Fanti C. and Park C.G., Peak-seeking Control for Drag Reduction in Formation Flight, AIAA Journal of Guidance, Control and Dynamics,University of California,2002.
14. Ning S.A., Aircraft Drag Reduction through Extended Formation Flight,PhD thesis,Dept of Aeronautics and Astronautics,Stanford University, August 2011.
15. Saban,D.,Whidborne,J.F. and Cooke A., Simulation of Wake Vortex Effects for UAV in close formation flight, Aeronautical Journal, Volume 113, Issue 1149,pp. 727-738,2009.
16. Shyy,W.,Lian Y.,Tang J.,Liu H.,Trizila P.,Stanford P.,Bernal L.,Cesnik C.,Freedmann P. and Ifju P., Computational Aerodynamics of Low Reynolds Number Plunging, Pitching and Flexible Wings for MAV Applications, Proceedings of the 46th AIAA Aerospace Sciences Meeting and Exhibit 7 – 10 January 2008.
17. Morgan M.T., A Study in Drag Reduction of Close Formation Flight accounting for trim control flight positions and Dissimilar Formations. ,thesis,M.S.Aeronautical Engineering,Air force Institute of Technology, March,2005.
18. Lewis T.A., Flight Data Analysis and Simulation of Wind Effects during Aerial Refuelling. ,thesis, M.S. Aerospace Engineering, University of Texas,Arlington,May,2008.
19. Proud, A.W., “Close Formation Flight Control”, M.S. Thesis in Electrical Engineering, Air Force Institute of Technology, Air University, March, 1999.
20. Campa,G,Gu,Y.,Design and Flight Testing of Non-linear Formation Control Law,Science Direct,Control Engineering Practise 15,pp-1077- 1092,2007.
21. Christopher G., “Modeling, Simulation and Flight test for Automatic Flight Control of the Condor Hybrid-Electric Remote Piloted Aircraft,” Thesis, M.S. Aeronautical Engineering, Presented to the faculty, Departments of System Engineering, Aeronautics and Astronautics, Air University, March, 2012
22. Nelson, R.C., “Flight Stability and Automatic Control”, Tata McGraw-Hill Publishing Company Ltd., New Delhi, 2nd edition, 2007.
23. Johnson Y. and Dasgupta S., “Robust Hurwitz Stability and Performance Analysis of H-Infinity Controlled Forward-Velocity Dynamics of UAVs in Close Formation Flight Using Bounded Phase Conditions in a Kharitonov Framework’, Int. J. Inst. Eng. India, Springer Publications, Series. C, vol 95, Issue 3, pp 223-231, July 2014.
24. Johnson Y. and Dasgupta S., “Control and Tracking of Longitudinal Dynamics of UAVs in Synchronized Motion,” Conference Proceedings, IEEE, International Conference on Control Communication and Computing (ICCC), Trivandrum, 2013
25. Scherer C., “Theory of Robust Control”, Delft University of Technology, The Netherlands, April 2001
26. Johnson Y. and Dasgupta S., “Pitch Attitude Dynamics Control and Tracking of UAVs in Close Formation Flight,” Int. Conf. on Emerging Trends in Electrial Engineering (ICETREE-14), Kollam, Kerala, India, Conference Proceedings, Elsevier Publications, 2014.
|
96-102
|
20.
|
Authors:
|
Sukanta Kumar Tulo, Madhusmruti Nayak, Manish Kumar, Khushboo
|
Paper Title:
|
Brain Tumor Detection from MRI Image using Digital Image Processing
|
Abstract: Tumor detection and removal is one medical issue that still remains challenging in field of biomedicine. Early imaging techniques had the drawback of being invasive and hence the CT and MRI imaging technique help the surgeons in providing a better vision. In this paper, tumor image processing involves three stages namely pre-processing, segmentation and morphological operation. After the acquisition of the source image, it is pre-processed by converting the original image to gray scale in addition high pass filter for noise removal and median filter for quality enhancement is provided which is followed by enhancement stage resulting with histogramic equivalent image. Finally segmentation is done by means of watershed algorithm. The above proposed methodology is helpful is generating the reports automatically in less span of time and advancement has resulted in extracting many inferior parameters of the tumor. The present work demonstrates that method can successfully detect the brain tumor and thereby help the doctors for analyzing tumor size and region .The algorithms have been developed by using MATLAB.
Keywords: Brain Tumor, MRI Image, Segmentation, Filtering
References:
1. R. Kavitha, Dr. C. Chellamuthu, Ms. KavinRupa “An Efficient Approach for Brain TumourDetection Based on Modified Region Growing and Neural Network in MRI Images” International Conference on Computing, Electronics and Electrical Technologies [ICCEET] IEEE Xplorer 2011, pp(1087 – 1096).
2. Aamir Ahmad “Pathways to Breast Cancer Recurrence” Hindawi Publishing Corporation ISRN Oncology Volume 2013, Article ID 290568, 16 pages http://dx.doi.org/10.1155/2013/290568, pp(1-17).
3. Ahmed KHARRAT Mohamed Ben MESSAOUD Nacéra BENAMRANE Mohamed ABID “Detection of Brain Tumor in Medical Images”, International Conference on Signals, Circuits and Systems 2009 IEEE, pp(1-6).
4. Bryan Cunitz, BarbrinaDunmire, Marla Paun, Oleg KaundinyaGopinath “Brain Functional Localization: Survey of Image Registration Techniques”, IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 26, NO. APRIL 2007 pp(427-450).
|
103-105
|
21.
|
Authors:
|
Janaki Sivakumar, K. Thangavel
|
Paper Title:
|
Gender Classification with Weighted Principal Component (wPC) using BPN
|
Abstract: Gender Classification in the field of forensic Science becomes essential in the case of criminal investigation. Automated tools can help forensic experts by reducing their manual efforts. Soft computing techniques like Fuzzy Computing, Neural Networks and Genetic Algorithm are all helpful to develop automated tools for human identification. Lateral Cephalogram plays a vital role in Gender Classification from skeletal remains. Principal component analysis (PCA) is a technique that is useful for the compression and classification of data. This study proposes Weighted Principal Components of lateral Cephalogram landmarks as an ideal measure .Also this study recommends BPN as an optimal classifier for Gender Classification from lateral Cephalogram.
Keywords: Lateral Cephalogram, Forensic Anthropology, Cephalofacial Landmarks, Linear Measurements, GLCM Features, Principal Components, Weighted Principal Components, Feature Extraction and Back Propagation Neural Network
References:
1. Patil KR, Mody RN. Determination of sex by discriminant function analysis and stature by regression analysis: a lateral cephalometric study. Forensic Sci. Int. 2005; 147:175-80.2.
2. Graw M, Wahl J, Ahlbrecht M. Course of the meatus acusticus internus as criterion for sex differentiation Forensic Sci. Int. 2005; 147:113-7
3. Almas Binal and BK yashoda devi,”Identification of sex using Lateral Cephalogram:Role of Cephalofacial Parameters”, JIAOMR, Oct-Dec, 2012, 24(4):280-283
4. Jonathon Shlens, “A Tutorial on Principal Component Analysis..
5. Delchambre L, Weighted principal component analysis: a weighted covariance eigen decomposition approach, Monthly Notices of Royal Astronomical Society, 446(4), December, 2014.
6. . Debbie l, A primer for using and understanding weights with national datasets, The Journal of Experimental Education, 73(3), pp: 221–248, 2005
7. Wei Lu, Neural Network Model for Distortion Buckling Behaviour of Cold-Formed Steel Compression Members, Helsinki University of Technology Laboratory of Steel Structures Publications 16, 2000
8. Haykin S, Neural Networks – A comprehensive foundation, Macmillan Press, New York,1994
9. Rinehart D.E, Hinton G.E and Williams R. J., learning internal representations by error propagation, Parallel Distributed Processing, Cambridge, MA: MIIT Press,1994
10. Lu H, Setiono R and Liu H, Effective data mining using neural networks, IEEE Transaction On Knowledge and Data Engineering,1996
11. Roy, Artificial neural networks – a science in trouble, SIGKDD Explorations, 2000
12. Raul Rojas , Neural Networks – A Systematic Introduction,The Back propagation Algorithm, 1996.
13. Robert Barry, Artificial Neural Network Prediction of Wavelet Sub-bands for Audio Compression, Thesis for Bachelor of Science, Dept. of Electrical & Computer Engineering, 2000
|
106-111
|
22.
|
Authors:
|
Prasad M. Pawar, Pooja S. Gurav, Mrunali S. Raut, Pratik P. Shinde
|
Paper Title:
|
Design and Fabrication of Coco Pith Block Making Machine
|
Abstract: Small scale industries play a major role in the economic development of India. To enhance its growth and to effectively utilize the renewable energy, waste products to be reused one such product is coir pith Coir is mainly used in exporting and in agricultural field, as it is good absorbent of the water. It maintains the moisture content of the pith to enhance the quality of the product. The Konkan as well as costal region has a tremendous plantation of coconut trees. Coconut trees are known as ‘Kalpavruksha’ i.e each n every part of it is useful. The industries manufacturing coir ropes as their main output stores coco pith which is the left over product after the production of the coir ropes,as waste material and sold to the outer agencies at a very cheaper rate. We have designed and fabricated a machine to make the blocks of the coco pith. We have designed a machine in minimum possible cost, less work space, and portable which can be used in small scale and household use also. We have applied pressure of about 4bar using a lead screw, which is driven with the help of chain drive. Analysis for lead screw for static and torsional loading is done in which maximum stress intensity for static loading is 1.3684e+009 Pa and for torsion loading 1.2467e+009 Pa. Maximum equivalent stress in static loading is 1.1879e+009 Pa and for torsional loading is 1.1732e+009 Pa.
Keywords: Coco Pith, Lead Screw, Portabl.
References:
1. Nor Mazlana Main, Rosnita A Taliba,*, Rushdan Ibrahimd, Russly Abdul Rahman,Ainun Zuriyati Mohamed (2014), “Suitability of Coir Fibers as Pulp and Paper” “ST26943”, 2nd International Conference on Agricultural and Food Engineering, CAFEi2014”.
2. 1K. Krishnamurthy, 2C. Maheswari, 2R. Udayarani and 2V. Gowtham (2009). “Design and Fabrication of Coir Pith Prequetting Machine” IDOSI Publications.
3. Abhijith R.P (2015), “ Effect of Natural Coir fibres on CBR Strength of Soil Subgrade” , International Journal of Scientific and Research Publications, Volume 5.
4. Jafferjee Brothers, Hayleys (2003), “Composite Applications using Coir Fibres in Sri Lanka”, Delft University of Technology, the Netherlands.
5. U.S. Sharma, Central Coir Research Institute; Kalavoor,Keraia-688 522 India “Eco-friendly and Versatile Coir Geotextile”, Geosynthetics Asia’97, 26-29 November, Bangalore, India.
6. V.B. Bhandari, “A book Design of Machine Elements,” Tata Mcgrav-hill publication, pp.566-604.
|
112-117
|
23.
|
Authors:
|
Joseph Zacharias, Vijayakumar Narayanan
|
Paper Title:
|
Two-Band QAM Data Transmission using Parallel Mach-Zehnder Modulators in RoF System
|
Abstract: A radio over fiber (RoF) system with the transmission of two QAM sidebands by using two parallel Mach-Zehnder modulator is proposed. Optical comb generation at the central station (CS) helps to produce two combs from a single laser diode. This RoF system uses dual parallel Mach-Zehnder modulators (MZM) for the transmission of two QAM modulated sidebands. In one branch of the MZM, 4-QAM data is transmitted while in the other 16-QAM data is transmitted. Finally the downlink performance of the RoF system can be analyzed by using signal constellations and eye diagrams.
Keywords: Comb generation, Quadrature amplitude modulation (QAM), Radio over fiber (RoF).
References:
1. J. Wells. Faster than fiber: The future of multi-g/s wireless. IEEE Microwave Magazine, 10(3):104–112, May 2009.
2. Ming Zhu, Liang Zhang, Jing Wang, Lin Cheng, Cheng Liu, and Gee-Kung Chang. Radio-over-fiber access architecture for integrated broadband wireless services. J. Lightwave Technol., 31(23):3614–3620, Dec 2013.
3. Zhensheng Jia, Jianjun Yu, Georgios Ellinas, and Gee-Kung Chang. Key enabling technologies for optical–wireless networks: Optical millimeter-wave generation, wavelength reuse, and archi- tecture. J. Lightwave Technol., 25(11):3452–3471, Nov 2007.
4. R. Herschel and C. G. Schffer. Radio-over-fiber systems for next generation wireless access. In 2011 International Students and Young Scientists Workshop ”Photonics and Microsystems”, pages 54–58, July 2011.
5. D. Y. Kim, M. Pelusi, Z. Ahmed, D. Novak, H. F. Liu, and Y. Ogawa. Ultrastable millimetre-wave signal generation using hybrid modelocking of a monolithic dbr laser. Electronics Letters, 31(9):733–734, Apr 1995.
6. L. A. Johansson and A. J. Seeds. Generation and transmission of millimeter-wave data-modulated optical signals using an op- tical injection phase-lock loop. Journal of Lightwave Technology, 21(2):511–520, Feb 2003.
7. J. Yao. Microwave photonics. Journal of Lightwave Technology, 27(3):314–335, Feb 2009.
8. L. Chen, H. Wen, and S. Wen. A radio-over-fiber system with a novel scheme for millimeter-wave generation and wavelength reuse for up-link connection. IEEE Photonics Technology Letters, 18(19):2056–2058, Oct 2006.
9. J. Ma, J. Yu, C. Yu, X. Xin, J. Zeng, and L. Chen. Fiber dispersion influence on transmission of the optical millimeter-waves gen- erated using ln-mzm intensity modulation. Journal of Lightwave Technology, 25(11):3244–3256, Nov 2007.
10. Caiqin Wu and Xiupu Zhang. Impact of nonlinear distortion in radio over fiber systems with single-sideband and tandem single- sideband subcarrier modulations. Journal of Lightwave Technology, 24(5):2076–2090, May 2006.
11. Rakesh Sambaraju, Valent´ın Polo, Juan Luis Corral, and Javier Mart´ı. Ten gigabits per second 16-level quadrature amplitude modulated millimeter-wave carrier generation using dual-drive mach–zehnder modulators incorporated photonic-vector modu- lator. Opt. Lett., 33(16):1833–1835, Aug 2008.
12. G. M. Macfarlane, A. S. Bell, E. Riis, and A. I. Ferguson. Optical comb generator as an efficient short-pulse source. Opt. Lett., 21(7):534–536, Apr 1996.
|
118-121
|
24.
|
Authors:
|
Sagar L Belgaonkar, A.Amarnath, Ismail R Garag, Manjunath S Makari, Iliyaskhan A. Desai, Rahul M. Patil
|
Paper Title:
|
Critical behavior of STILT columns in RC Framed Structures under the influence of wind
|
Abstract: Wind is horizontal movement of air due to temperature difference. Wind has significant role to play in design of high rise building because it results in static and dynamic loads. In this paper, effect of wind load on 11 Storey RCC Building having different column heights which may be due to unevenness in the slope of the ground is analyzed. Effect of wind is studied under consideration of IS 875: Part III 1987 Models are prepared and analyzed for wind effect using ETABS 2013. Models with varying slopes are studied.
Keywords: Displacement, Stilt Factor, Sloping Ground, Wind
References:
1. Shaikh Mufassir and l.G.Kalurkar, “Comparative study on Wind Analysis of Multy story RCC and composite structurefor different plan configuration ”,IOSR Journal of Mechanical and Civil Engineering.
2. Umakant Arya and Waseem Khan , “Wind Analysis of building frame on sloping ground”, International Journal of Scientific and Research Publications, Volume 4, Issue5, May 2014. ISSN 2250-3153.
3. S.Vijaya Bhaskar Reddy and etal, “Effect of wind forces on mutistoreyed structures”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN 2349-2163 Issue 6, Volume 2 (June 2015).
4. Sayed Gousepak and Prof. Vishwanath B Patil, “A review on Stability Analysis of A Multi Storey Building With Underneath Satellite Bus Stop Having Top Soft Storey And Floating Columns”, International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 03 (March – 2016).
5. Baldev D.Prajapati & D.R.Panchal, “Study of seismic and wind effect on multi storey R.C.C., Steel and composite building ”, International Journal of Advances in Engineering & Technology (IJAET), Vol. 6, Issue 4, pp. 1836-1847 ,Sept. 2013.
6. Shivanand C Gule and et al., “Study of an irregular plan with different orientation of shear wall in a high rise strucutre ” The International Journal of Science and Technology (IJST), Vol. 3, Issue 5, ISSN (2321-919X) ,May. 2015.
7. Nilesh B Mevawala & D.R.Atul K Desai, “Free Vibrating Analysis of Building resting on sloping ground with different modes of shape”, International Journal of Civil and Structural Engineering Research (IJCSER), Vol. 4, Issue 1, pp.(26-31)ISSN 2348-7607 ,September 2016.
8. (IOSR-JMCE), Vol. 13, Issue 4, pp. 42-49, ISSN:2320-334X, August. 2016 Syed Rehan and S H Mahure, “Study of seismic and wind effect on multi storey R.C.C., Steel and composite building ”, International Journal of Engineering and Innovative Technology (IJAEIT), Vol. 3, Issue 12, IISN 2277-3754, June. 2014.
9. B.C.Punmia, Ashok Kumar Jain, J Arun Kumar,Laxmi
10. Publication, New Delhi-110002, 1988.
11. IS 875 (part-II), “Code of practice for designloads for buildingsand structures”.
12. IS: 456(2000), “Indian Standard Code of Practicefor Plan and Reinforcement Concrete (Fourth Revision)” , Bureau of Indian Standards (BIS), New Delhi.
13. IS:875(Part-3):1987, “Code of Practise for Design Loads( other than earthquake loads) for Buildings and Structures” Part 3 Wind Loads,Second Revision, Bureauof Indian Standards, New Delhi 1989.
14. B.C.Punmia, Ashok Kumar Jain, J Arun Kumar,Laxmi
15. Publication, New Delhi-110002, 1988.
|
122-127
|
25.
|
Authors:
|
Diaa Eldein Mustafa Ahmed, Othman O. Khalifa
|
Paper Title:
|
An Overview of MANETs: Applications, Characteristics, Challenges and Recent Issues
|
Abstract: In recent years, due to emerging technologies in the field of wireless networks, ad hoc networks have attracted much attention from the research community and industry since has important technical advances have arisen as a consequence. Mobile ad-hoc Networks (MANETs) is a group of self-organized and self-configured wireless mobile nodes (MNs) such as mobile devices, laptops ,and PDAs , able to communicate with each other without the need of any neither fixed network infrastructure nor centralized administrative support. MANET is a network that exchanges information among the entities that are potentially mobile without any pre-defined infrastructure based communication support. These networks are of practical importance in applications like environmental monitoring, health care, military, location tracking, disaster recovery and many more. This paper provides a comprehensive study of MANETs applications scenarios, main features and characteristics, challenges facing the deployment of MANET, current issues and latest research issues.
Keywords: MANET applications, Characteristics, Challenges, recent issues
References:
1. S. PK, “Routing in Mobile Ad hoc Network: A Review,” International Journal of Advances in Computing and Information Technology, 2012.
2. L. P. K. Haohong Wang, Ajay Luthra and Song Ci. (2009). 4G WIRELESS VIDEO COMMUNICATIONS.
3. H. J. Alqaysi and G. A. Qas Marrogy, “Performance Analysis of Video Streaming Application Over MANETS Routing Protocols,” International Journal Of Research In Computer APPLICATIONS AND ROBOTICS, vol. 3, pp. 22-28, 2015.
4. C. HERNÁNDEZ and W. EDUARDO, “Quality of service routing and mechanisms for improving video streaming over mobile wireless ad hoc networks,” Editorial Universitat Politècnica de València, 2015.
5. K. S. Ali and U. Kulkarni, “Characteristics, Applications and Challenges in Mobile Ad-Hoc Networks (MANET): Overview,” Wireless Networks, vol. 3, 2015.
6. P. Arce Vila, “Hierarchical routing and cross-layer mechanisms for improving video streaming quality of service over mobile wireless ad hoc networks,” Editorial Universitat Politècnica de València, 2014.
7. H. Al-Bahadili, Simulation in Computer Network Design and Modeling: Use and Analysis: : IGI Global, 2012.
8. D. Taniar, Mobile Computing: Concepts, Methodologies, Tools, and Applications: vol. 1: IGI Global, 2008.
9. S. Dhar, “MANET: Applications, Issues, and Challenges for the Future,” International Journal of Business Data Communications and Networking (IJBDCN), vol. 1, pp. 66-92, 2005.
10. N. Kaur and T. Singh, “A Review on Different Routing Protocols in MANETS,” (IJCSIT) International Journal of Computer Science and Information Technologies, vol. 6, pp. 101-104, 2015.
11. H. k. Paramjit singh, “Review of Various MANET Protocols,” International Journal of Electrical and Electronics Engineers( IJEEE), vol. 7, pp. 318 – 329, 2015.
12. O. Bang and P. L. Ramteke, “MANET: history, challenges and applications,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, pp. 249-251, 2013.
13. K. BR, L. C. Reddy, and P. S. Hiremath, “Mobile Ad Hoc Networks: Issues, Research Trends And Experiments,” 2008.
14. M. L. Raja and C. D. S. S. Baboo, “An Overview of MANET: Applications, Attacks and Challenges,” International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 3, pp. 408 – 417, 2014.
15. S. J. Shivi Sharma, “Mobile Ad Hoc Network: Issues, Research Trend and Challenges,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, pp. 1625 – 1630, 2015.
16. T. Qiu, N. Chen, K. Li, D. Qiao, and Z. Fu, “Heterogeneous ad hoc networks: Architectures, advances and challenges,” Ad Hoc Networks, vol. 55, pp. 143-152, 2017.
17. S. K. Chaturvedi and N. Padmavathy, “Mobile Ad Hoc Network Reliability: An Imperative Research Challenge,” in Advances in Reliability and System Engineering, ed: Springer, 2017, pp. 87-119.
18. G. V. Kumar, Y. V. Reddyr, and D. M. Nagendra, “Current research work on routing protocols for MANET: a literature survey,” international Journal on computer Science and Engineering, vol. 2, pp. 706-713, 2010.
|
128-133
|
26.
|
Authors:
|
Ramya R.
|
Paper Title:
|
Acquatic Rare Species Habitat Detection and Tracking
|
Abstract: Computer vision has gained paramount significance in recent times due to the increased use of cameras as portable devices and their incorporation in standard PC hardware, mobile devices, machines etc. Computer vision techniques such as detection, tracking, segmentation, recognition and so on, aim to mimic the human vision system. Humans hardly realize the complexities involved in vision, but in fact, our eye is more powerful than it seems. It processes around 60 images per second, with each image consisting of millions of points. Computer vision is still a long away from its goal of replicating the human eye, but in the meantime various computer vision techniques are being applied to complex applications. The proposed algorithm is resistant to small illumination changes and also involves a module that reduces effects of camera movement. . In this system four static cameras are used to capture the moving objects. Background subtraction method subtracts the moving object from static underwater place. This procedure is done by pixel by pixel. Area of the species is also main consideration. Once the species are detected from static underwater place, using background subtraction method tracking is done on each of the four sides. Gaussian mixture model (GMM. and BLOB analysis method is applied for counting the rare species. Gaussian mixture model gives the better segmentation to the original images. BLOB analysis produces the bounding boxes to the species.
Keywords: Blob analysis, Gaussian Mixture Model, MATLAB.
References:
1. F. C. De Leo, C. R. Smith, A. A. Rowden, D. A. Bowden, and M. R. Clark, “Submarine canyons: hotspots of benthic biomass and productivity in the deep sea,” Proceedings of the Royal Society B: Biological Sciences, p. rspb20100462, 2010.
2. L. J. Grange and C. R. Smith, “Megafaunal communities in rapidly warming fjords along the West Antarctic Peninsula: hotspots of abundance and beta diversity,“ PloS one, vol. 8, p. e77917, 2013.
3. Di Gesu, F. Isgrò, D. Tegolo, and E. Trucco, “Finding essential features for tracking starfish in a video sequence,” in Image Analysis and Processing, 2003. Proceedings. 12th International Conference on, 2003, pp. 504-509.
4. Spampinato, D. Giordano, R. Di Salvo, Y.-H. J. Chen- Burger, R. B. Fisher, and G. Nadarajan, “Automatic fish classification for underwater species behavior understanding,” in Proceedings of the first ACM international workshop on Analysis and retrieval of tracked events and motion in imagery streams, 2010, pp. 45-50.
5. R. Edgington, D. E. Cline, D. Davis, I. Kerkez, and J. Mariette, “Detecting, tracking and classifying animals in underwater video,” in OCEANS 2006, 2006, pp. 1-5.
6. D. Smith and M. Dunbabin, “Automated Counting of the Northern Pacific Sea Star in the Derwent Using Shape Recognition”, DICTA 2007, Digital Image Computing: Techniques and Applications, pp. 500-507, 2008.
7. X. Hou and L. Zhang, “Saliency detection: A spectral residual approach,” in Computer Vision and Pattern Recognition, 2007. CVPR’07. IEEE Conference on, 2007, pp. 1-8.
8. S. Goferman, L. Zelnik-Manor, and A. Tal, “Context-aware saliency detection,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 34, pp. 1915-1926, 2012.
9. Yin, D. Makris, and S. A. Velastin, “Performance Evaluation of Object Tracking Algorithms,” in Proc. IEEE Int. Workshop Perform. Eval. Tracking Surveillance, 2007, pp. 733736.
|
134-137
|
27.
|
Authors:
|
A. Elizabeth, Bavanirajan, Kannabiran, Surendiran
|
Paper Title:
|
BLDC Motor Driven Solar PV Array Fed Water Pumping System Employing Zeta Converter
|
Abstract: This paper proposes a simple, cost effective and efficient brushless DC (BLDC) motor drive for solar photovoltaic (SPV) array fed water pumping system. A zeta converter is utilized in order to extract the maximum available power from the SPV array. The proposed control algorithm eliminates phase current sensors and adapts a fundamental frequency switching of the voltage source inverter (VSI), thus avoiding the power losses due to high frequency switching. No additional control or circuitry is used for speed control of the BLDC motor. The speed is controlled through a variable DC link voltage of VSI. The proposed water pumping system is designed and modeled such that the performance is not affected under dynamic conditions. The suitability of proposed system at practical operating conditions is demonstrated through simulation results using MATLAB/Simulink followed by an experimental validation.
Keywords: BLDC motor, SPV array, Zeta converter, INC-MPPT.
References:
1. M. Uno and A. Kukita, “Single-Switch Voltage Equalizer Using Multi-Stacked Buck-Boost Converters for Partially-Shaded Photovoltaic Modules,” IEEE Transactions on Power Electronics, no. 99, 2014.
2. R. Arulmurugan and N. Suthanthiravanitha, “Model and Design of A Fuzzy-Based Hopfield NN Tracking Controller for Standalone PV Applications,” Electr. Power Syst. Res.(2014).
3. S. Satapathy, K.M. Dash and B.C. Babu, “Variable Step Size MPPT Algorithm for Photo Voltaic Array Using Zeta Converter – A Comparative Analysis,” Students Conference on Engineering and Systems (SCES), pp.1-6, 12-14 April 2013.
4. Trejos, C.A. Ramos-Paja and S. Serna, “Compensation of DC-Link Voltage Oscillations in Grid-Connected PV Systems Based on High Order DC/DC Converters,” IEEE International Symposium on Alternative Energies and Energy Quality (SIFAE), pp.1-6, 25-26 Oct. 2012.
5. G. K. Dubey, Fundamentals of Electrical Drives, 2nd ed. New Delhi, India: Narosa Publishing House Pvt. Ltd., 2009.
6. Singh and V. Bist, “A Single Sensor Based PFC Zeta Converter Fed BLDC Motor Drive for Fan Applications,” Fifth IEEE Power India Conference, pp.1-6, 19-22 Dec. 2012.
7. R.F. Coelho, W.M. dos Santos and D.C. Martins, “Influence of Power Converters on PV Maximum Power Point Tracking Efficiency,” 10th IEEE/IAS International Conference on Industry Applications (INDUSCON),pp.1-8, 5-7 Nov. 2012.
8. Dylan D.C. Lu and Quang Ngoc Nguyen, “A Photovoltaic Panel Emulator Using A Buck-Boost DC/DC Converter and A Low Cost Micro-Controller,” Solar Energy, vol. 86, issue 5, pp. 1477-1484, May 2012.
9. Zhou Xuesong, Song Daichun, Ma Youjie and Cheng Deshu, “The Simulation and Design for MPPT of PV System Based on Incremental Conductance Method,” WASE International Conference on Information Engineering (ICIE), vol.2, pp.314-317, 14-15 Aug. 2010.
10. Ali Reza Reisi, Mohammad Hassan Moradi and Shahriar Jamasb, “Classification and Comparison of Maximum Power Point Tracking Techniques for Photovoltaic System: A review,” Renewable and Sustainable Energy Reviews, vol. 19, pp. 433-443, March 2013.
11. Shahin, A. Payman, J.-P. Martin, S. Pierfederici and F. Meibody-Tabar, “Approximate Novel Loss Formulae Estimation for Optimization of Power Controller of DC/DC Converter,” 36th Annual Conference on IEEE Industrial Electronics Society, pp.373-378, 7-10 Nov. 2010.
12. Sunmodule® Plus SW 280 mono, Performance Under Standard Test Conditions [Online]. Available: http://www.sfe-solar.com/wp-content/uploads/2013/07/SunFields-SolarWorld_SW265-270-275-280_Mono_EN.pdf
13. K.H. Ahmed, M. S. Hamad, S.J. Finney and B.W. Williams, “DC-Side Shunt Active Power Filter for Line Commutated Rectifiers to Mitigate the Output Voltage Harmonics,” IEEE Energy Conversion Congress and Exposition (ECCE), pp.151-157, 12-16 Sept. 2010. W.V. Jones, “Motor Selection Made Easy: Choosing the Right Motor for Centrifugal Pump Applications,” IEEE Industry Applications Magazine, vol.19, no.6, pp.36-45, Nov.-Dec. 2013.
14. TETRA 142TR12, Brushless Servomotors [Online]. Available: http://www.eltrexmotion.com/fileadmin/user_upload/PDF/product/Catalogue_TETRA_TR_ENG.pdf
|
138-144
|
28.
|
Authors:
|
Alkhatab Khalafalla Muslim Abdelhadi, Hala Eldaw Idris, Abdalla Abdalrahman Mohamed
|
Paper Title:
|
A QoS Analysis of UGS and ERTPS Scheduling Service Flows in video Conference over Worldwide Interoperability for Microwave Access (Wi-MAX)
|
Abstract: The IEEE 802.16e (published 2005) defined five different Quality of Service (QoS) classes including UGS, ertPS, rtPS, nrtPS and BE. It is well known that UGS and ertPS are designated to support QoS for voice applications with silence suppression. The other three classes have different applications. In this paper, we investigate the performance of UGS and ertPS QoS classes in terms of multimedia applications such as video conferencing over WiMAX network scenarios. The OPNET modeler 14.5 simulator is employed for simulation purposes in order to evaluate the performance of UGS and ertPS with a focus on video conferencing streaming and voice applications. The simulations show that the user with UGS QoS could provide higher throughput and lower delay, lower jitter, and lower queuing delay compared to the ertPS case. Consequently, we also evaluated the video conferencing/streaming application for the ertPS QoS case. Simulation results in this case show that for a defined two scenarios of network and a certain combination of users that are allocated a QoS and a selected application e.g., voice or video conferencing, UGS offers higher performance than ertPS.
Keywords: QoS, UGS, ertPS, throughput, delay, jitter, queuing delay.
References:
1. Mark C. Wood, accessed May 24, 2016, “An Analysis of the Design and Implementation of QoS over IEEE 802.16”, http://repository.mdp.ac.id/ebook/library-ref-eng/ref-eng-3/physical/wimax/wimax-qos/wimax_qos.pdf.
2. Qiang Ni, A. Vinel, Yang Xiao, A. Turlikov, Tao Jiang, 2007, IEEE Communications Magazine, “Wireless broadband access: WiMax and beyond- investigation of bandwidth request mechanisms under point-to-multipoint mode of WiMax networks1”.
3. Genc, S. Murphy, Yang Yu, J. Murphy, 2008, IEEE Wireless Communications Magazine “IEEE 802.16J relay-based wireless access networks: an overview”.
4. http://www.wimaxforum.org, Accessed May 24, 2016, WiMAX Forum.
5. IEEE Std 802.16-2009, May 2009, “IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems, ” (Revision of IEEE Std 802.16-2004), IEEE Wireless Communications Magazine.
6. Bo Li, Yang Qin, Chor Ping Low, Choon Lim Gwee, December 2007, “A Survey on Mobile WiMAX”, IEEE Communications Magazine.
7. Avni Khatkar, Yudhvir Singh, Vikas Nandal, July 2013,” A QoS Oriented Analysis of ertPS, rtPS and nrtPS flows in WiMAX”, International Journal of Advanced Research in Computer Science and Software Engineering, http://www.ijarcsse.com/docs/papers/Volume_3/7_July2013/V3I6-0680.pdf
8. ITU-T recommendation. (2001). Communications quality of service: A framework and definitions. G.1000, I.-T. R. (2001). ITU.
|
145-150
|
29.
|
Authors:
|
Sunil Kumar Singh, Mahaveer Prasad Sharma
|
Paper Title:
|
A Y-Shaped Planar Monopole Antenna for Wide Band Applications
|
Abstract: A Y shaped monopole utilizing a modified notch in the ground is presented. The monopole is developed from a triangular monopole and has increased the impedance bandwidth from ~550MHz to ~6GHz for reflection coefficient less than -10dB. Since the antenna shows a bandwidth ratio of 3.9:1, it can be considered as an Ultra Wide Band antenna. Use of stepped notch under feed line provides here the better impedance matching and increased bandwidth. We use ANSOFT High Frequency Structure Simulator (ANSOFT HFSS 13.0) which uses Finite Element Method (FEM) for its processing. The monopole is fabricated on FR4 epoxy dielectric substrate and both simulated and measured results are found to be in agreement.
Keywords: Impedance Bandwidth, Monopole Antenna, Reflection Coefficient, Ultra Wideband.
References:
1. First Report and Order, Revision of Part 15 of the commission’s Rules Regarding Ultra-Wideband Transmission Systems FCC, 2002, FCC02-48.
2. M. J. Ammann, “Control of the impedance bandwidth of wideband planar monopole antennas using a beveling technique,” Microw. Opt. Technol. Lett., vol. 30,no. 40, pp. 229-232, Aug 2001.
3. N. P. Agrawall, G. Kumar, and K. P. Ray, “Wide-band planar monopole antennas,” IEEE Trans. Antennas Propag., vol. 46, no. 2, pp. 294-295, Feb. 1998.
4. K. L. Wong and Y. F. Lin, “Stripline-fed printed triangular monopole,” Electron. Lett., vol. 33, pp. 1428-1429, Aug. 1997.
5. J. M. Johnson and Y. Rahamt-Samii, “The tab monopole,” IEEE Trans. Antennas Propag., vol. 45, no. 1, pp. 187-188, Jan. 1997.
6. Ramesh Garg, Prakash Bharatia, Inder Bahl, and Apisak Ittipiboon, “Microstrip Antenaa Design Handbook,” Artech House, Boston, London, 2001.
7. K. P. Ray, “Design aspects of printed monopole antennas for ultra-wide band applications,” International Jour. Of Antennas AndPropag., Hindawi Publishing corporation, vol. 2008, doi:10.1155/2008/713858, 8 pages.
8. Brian C. Wadell, “Transmission Line Design Handbook,” Artech House, Boston, 1991.
|
151-153
|
30.
|
Authors:
|
Tejaswini Bhandarkar, G.Rajesh Babu
|
Paper Title:
|
Enhancing Security of Android Phones
|
Abstract: Use of mobile commerce for commerce for conducting commercial transactions online is increasing rapidly. A wide range of wireless devices which includes mobile phones, tablets provide an easier way for mobile payments and M-commerce. Risk associated with such devices such as loss of private information is also increasing. The basic requirement for using secure M-Commerce application is a secure mobile operating system. Without a security feature or secure application on the device, it is not possible to have secure Mobile-transaction. Among many operating system used for mobile devices, android operating systems are widely used. Though Android Systems are good in memory management they are also vulnerable to security attacks. Such security attacks make the phone unusable, cause unwanted SMS/MMS (short message service/ multimedia messaging service) billing, or expose private information. There are two doors for attacker to attack a smart phone. The first is to get users to download, install, and run software that contain unethical codes such as virus, worms etc. and the other is to attack device directly by using software vulnerabillties. This paper presents security assessment for Android with an overview of security architecture for android. The Paper also list various threats to android devices and there countermeasures.
Keywords: Android Systems, mobile payments, software vulnerabilities.
References:
1. An Insight into the Security Issues and Their Solutions for Android Phones.[2015]
2. “Mobile Attacks and Defense”, white paper copublished by the IEEE computer and Reliabilty Societies, 2014.
3. Countering the Advance Persistent Threat challenge with deep discovery, white paper, copublished by Trend Micro white paper April 2013.
4. Sheran A.Gunasekera, “Android Architecture”, in Android Apps Security, Ed.New York: Apress, 2012.
5. Mobile Aattacks and Defense , white paper copublished by the IEEE computer and Reliability Societies,July/August 2011.
6. Google Android: A Comprehensive Security Assessment, copublished by the IEEE computer And Reliabilty Societies, March/April 2010
|
154-156
|
31.
|
Authors:
|
Ch. Sankara Rao, K. Soujanya, T. Sudhakar Reddy
|
Paper Title:
|
A Simplified Version of Multilevel Inverter with Minimal Number of Switches
|
Abstract: Multilevel inverters have created a new wave of interest in industry and research. These multilevel inverters are generally used in medium voltage high power application. In this paper a eleven level inverter is proposed which has less number of switches compared to the conventional inverter. This inverter topology reduces the size and complexity of the system. The effectiveness of the proposed topology has been demonstrated and the results are validated by simulating the proposed topology in MATLAB.
Keywords: Multilevel Inverters, circuit topology, reduced device count.
References:
1. Abdul Halim Mohamed Yatim, and Ehsan Najafi, “Design and Implementation of a New Multilevel Inverter Topology” IEEE transactions on industrial electronics, vol. 59, no. 11, November 2012.
2. A.Kirubakaran, Jacob James Nedumgatt, Vijayakumar D. Umashankar S, “A Multilevel Inverter with Reduced Number of Switches”2012, IEEE Students Conference on Electrical, Electronics and Computer Science.
3. Mariusz Malinowski,K. Gopakumar Jose Rodriguez, and Marcelo A. Pérez―A Survey on Cascaded Multilevel Inverters‖ IEEE Transactions On Industrial Electronics, Vol. 57, No. 7, July 2010.
4. José Rodríguez, Jih-Sheng Lai,, And Fang Zheng Peng, “ Multilevel Inverters: A Survey Of Topologies, Controls, And Applications” IEEE Transactions On Industrial Electronics, Vol. 49, No. 4, August 2002.
5. Oscar Lopez, Remus Teodoreescu, “Multilevel transformerless topologies for single phase grid-connected converter”, IEEE conference, 2006.
6. Johnson Uthayakumar R.1, Natarajan S.P.2, Bensraj R, “A Carrier Overlapping PWM Technique for Seven Level Asymmetrical Multilevel Inverter with various References” IOSR Journal of Engineering June. 2012.
7. N Booma, Nagisetty Sridhar, “Simulation of nine level cascaded H- bridge multilevel inverter DC-link inverter” IEEE Students Conference on Electrical, Electronics and Computer Science.2011.
8. Valsan K, Joseph K.D”A Reduced Switch Multilevel Inverter for Harmonic Reduction” IEEE Conference.2012.
9. Ahmed, R.A.; Mekhilef, S.; Hew Wooi Ping,”New multilevel inverter topology with minimum number of switches,” 2010 IEEERegion 10 Conference (TENCON 2010),vol. no.2, pp.1862-1867, Nov. 2010.
10. Hulusi Karaca “A Novel Topology for Multilevel Inverter with Reduced Number of Switches”, World Congress on Engineering and Computer Science, WCECS, 2013, SanFrancisco, USA, vol I, 23-25 October, 2013.
11. Ceglia, G., Guzman, V.; Sanchez, C.; Ibanez,F.; Walter, J.; Gimenez, M.I. “A New Simplified Multilevel Inverter Topology for DC & AC Conversion”, IEEE Transactions on Power Electronics, vol.21, no.5, pp.1311-1319, Sept. 2006.
12. Arjun J. Jariwala, Nilesh V. Shah “A new Multilevel Inverter Topology with reduced number of switches” International Journal of Current Engineering and scientific Research (IJCESR) ISSN (PRINT): 2393-8374, (Online): 2394-0697, Volume-2, Issue-7, 2015
13. Ebrahim Babaei. “A Cascade Multilevel Converter Topology with Reduced Number of Switches”. IEEE Trans. On Power electronics. 2008; 23(6): 2657-2664.
14. R Naveen Kumar. “Energy Management system for Hybrid RES with Hybrid Cascaded Multilevel inverter”. International Journal of Electrical and Computer Engineering (IJECE). 2014; 4(1): 24~30.
15. Gnana Prakash M, Balamurugan M, Umashankar S“A New Multilevel Inverter with Reduced Number of Switches”International Journal of Power Electronics and Drive System (IJPEDS)Vol. 5, No. 1, July 2014, pp. 63~70ISSN: 2088-8694
16. Aditya Parasha “International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 International Conference on Emerging Trends in Mechanical and Electrical Engineering” (ICETMEE- 13th-14th March 2014)
|
157-160
|
32.
|
Authors:
|
Ajit Kumar Senapati, Shantanu Kumar Sahoo, Saylesh Singh, Sudhakar Sah, Pratyush Ranjan Padhi, Nitesh Satapathy
|
Paper Title:
|
A Comparative Investigation on Physical and Mechanical Properties of MMC Reinforced With Waste Materials
|
Abstract: Aluminium alloy based metal matrix composites (MMC) are produced with agro waste Rice Husk Ash (RHA) and industrial waste Fly Ash as reinforcement. By the continuous stir casting method the MMCs were fabricated in a bottom pouring furnace at 7000C. A rectangular metal mould was used to prepare the casting having dimension 300x50x20 mm3. The effect of adding the different reinforcement were realized through various mechanical behaviour tests. Based upon the standards in the mechanical workshop samples were prepared for measuring mechanical properties such as Impact strength, Compression strength, Tensile strength, Brinell hardness and Density test of both the MMCs. The Fly Ash and Rice Husk distributions in the MMCs were confirmed through the examinations conducted of the microstructure on image analyzer and scanning electron micrographs. Results thus found revealed that there is a great effect of reinforcing Flyash and Rice Husk in aluminium alloy matrix composites. Fly ash gave more enhanced mechanical properties as compared to Rice Husk. Thus selection of waste material from industry based and agro based for reinforcement was found one of the most important criteria for fabricating aluminium matrix composites where as during machining process is the average surface roughness (Ra) and the cutting force required to carry an operation on it., and it is mostly caused by many machining parameters such as speed, feed , depth of cut.
Keywords: Metal Matrix Composites (MMCs), Flyash, Rice Husk Ash (RHA), Mechanical Properties, Physical properties, Surface Roughness, Speed, Feed, Depth of Cut.
References:
1. S.A. Kori, T.M. Chandrashekharaiah (2007), Studies on the dry sliding wear behavior of hypoeutectic and eutectic Al–Si alloys, Wear, vol-263, pp.745–755.
2. J. Bienia, M. Walczak, B. Surowska, J. Sobczak (2003), MICROSTRUCTURE AND CORROSION BEHAVIOUR OF ALUMINUM FLY ASH COMPOSITES, Journal of Optoelectronics and Advanced Materials Vol. 5, No. 2, June 2003, p. 493 –502
3. Y. H. Seo, and C. G. Kang (1995), “The effect of applied pressure on particle dispersion characteristics and mechanical properties in melt-stirring squeeze-cast SiC/Al composites,” J. Mater. Process. Technol., vol.55, pp. 370–379.
4. K. Purazrang, K. U. Kainer, and B. L. Mordike (1991), “Fracture toughness behavior of a magnesium alloy metal-matrix composite produced by the infiltration technique,” Composites, vol. 22 (6), pp. 456–462.
5. D. B. Miracle (2005), “Metal Matrix composites-From science to technological significance,” Composites Science and Technology, vol. 65, pp. 2526-2540.
6. S. Long.OBeffort, C. Cayron and C. Bonjour (1999), Microstructure and mechanical properties of a high volume fraction SiC particle reinforced AlCu4MgAg squeeze casting, Materials Science and Engineering, A269, pp.175-185.
7. Jung-Moo Lee, Sang-Kwan Lee, Sung-Jin Hong and Yong-Nam Kwon.(2012),Microstructures and thermal properties of A356/SiCp composites fabricated by liquid pressing method, Materials & Design, Volume 37, pp.313-316.
8. G. N. Lokesh, M. Ramachandra, K. V. Mahendra and T. Sreenith.(2013), Characterization of Al-Cu alloy reinforced fly ash metal matrix composites by squeeze casting method, International Journal of Engineering, Science and Technology, Vol. 5, No. 4, pp.71-79.
9. S.D.Saravanan and M.Senthil Kumar.(2013), Effect of Mechanical Properties on Rice Husk Ash Reinforced Aluminum alloy (AlSi10Mg) Matrix Composites, International Conference On Design And Manufacturing, pp-1505 – 1513.l
10. Chittaranjan.v, Mr. F.AnandRaju and Dr. M.L.S.Deva Kumar (2014), “Thermal Properties of Aluminium-Fly Ash Composite”, International Journal of Innovative Research in Science, Engineering and Technology, Vol 3(11), pp.17217-17220.
11. AnkushSachdeva, Ram Narayan and R.B. Gupta (2013), “Evaluation & Comparison of Mechanical Properties of Aluminium Alloy 5052 reinforced with SiC, Graphite and Fly Ash Hybrid Metal Matrix Composites”, International Journal of Engineering Science and Technology, Vol-5(10), pp.1780-1787.
12. Dr .Selvi.S, Dr. Rajasekar.E, Sathishkumar.M and Ramkumar. B (2013), “Theoretical and Experimental Investigations of Mechanical Properties of Aluminum based Metal Matrix Composite”, IRACST – Engineering Science and Technology, Vol-3(2), pp.353-358.
13. BasavarajMathpathi and Bharat S Kodli (2014), “A Study on Mechanical Properties of Aluminum, Rice Husk and Silicon Carbide Matrix Composites”, International Journal for Scientific Research & Development| Vol. 2, Issue 08, pp.13-14.
14. PallaviDeshmukh, Jatin Bhatt, DilipPeshwe and Shailkumar Pathak (2012), “Development and Characterization of Al based MMC by Using RHA and Metallurgical Grade SiO2 with Varying Percentage of Mg”, Nano Trends: A Journal of Nanotechnology and Its Applications, Vol-12(2), pp.01- 10.
15. Deepak Singla, S.R. Mediratta(2013) Evaluation of mechanical properties of Al 7075-fly ash composite material, International Journal of Innovative Research in Science, Engineering and Technology,Vol. 2, Issue 4, pp.951-959.
16. Sandeep Kumar Singh,R J Immanuel, S Babu, (2016) Influence of multi pass friction stir processing on wear behaviour and machinability of an AlSi hypoeutectic A356 alloy Journal of materials processing technology 236(2016)252 22
17. J.Jenix Rino, D.Chandramohan, K.S.Sucitharan An Overview on Development of Aluminium Metal Matrix Composites with Hybrid Reinforcement, International Journal of Science and Research (IJSR), India Online ISSN: 2319 7064
18. J Samuel, A Dikshit , R E DeVor , SG Kapoor(2009) Effect of carbon nano tube (CNT) loading on the thermo mechanical properties and the machinability of CNT-reinforced polymer composite , journal of manufacturing science and engineering by ASME P.P 131/031008-1
19. D palanisamy ,P senthil , V Senthi Kumar (2015) The effect of aging on machinability of 15Cr-5Ni precipitation harden stainless steel ,PP 1653-63
|
161-169
|
33.
|
Authors:
|
Kaushik Das, Rajkishur Mudoi
|
Paper Title:
|
Detection of Epileptic Seizure using Radius Measurement and Higher Order Moments in The EMD Domain
|
Abstract: This paper presents a method for the detection of epileptic seizure from EEG signal using empirical mode decomposition (EMD). The intrinsic mode functions (IMFs) which is generated by the EMD method can be considered as a set of amplitude and frequency modulated (AM-FM) signals. The Hilbert transformations of these IMFs which is circular form in the complex plane can be used as a feature for radius calculation and the higher order moments like variance, skewness and kurtosis are applied on the output values of Short-time Fourier transform (STFT) of the IMFs, the proposed method shows better classification result than simply applying higher order moments. The effectiveness of the proposed method is tested using the dataset which is available online. It is found that the result obtained from radius measurement and higher order statistical moments provide good discrimination performance for the detection of epileptic seizure.
Keywords: Electroencephalogram (EEG), intrinsic mode functions (IMFs), empirical mode decomposition (EMD), Epileptic Seizure.
References:
1. P. C. Petrantonakis and L. J. Hadjileontiadis, “Emotion recognition from EEG using higher order crossings,” IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 2, pp. 186–197, Mar. 2010.
2. Y. Li et al., “An EEG-based BCI system for 2-D cursor control by combining mu/beta rhythm and p300 potential,” IEEE Trans. Biomed. Eng., vol. 57, no. 10, pp. 2495–2505, Oct. 2010.
3. R. Tetzlaff and V. Senger, “The seizure prediction problem in epilepsy: Cellular nonlinear networks,” IEEE Circuits Syst. Mag., vol. 12, no. 4,pp. 8–20, 2012.
4. Semah et al., “Is the underlying cause of epilepsy a major prognostic factor for recurrence?,” Neurology, vol. 51, no. 5, pp. 1256–1262, 1998.
5. H. Mohseni, A. Maghsoudi, and M. Shamsollahi, “Seizure detection in EEG signals: A comparison of different approaches,” in Proc. 28th Annu. Int. Conf. IEEE EMBS, 2006, pp. 6724–6727.
6. Adeli, H., Zhou, Z., Dadmehr, N., “Analysis of EEG records in an epileptic patient using wavelet transform,” J. Neurosci. Methods,vol . 123, pp.69-87, 2003.
7. Srinivasan, V., Eswaran, C., Sriraam, N., “Artificial neural network based epileptic detection using time-domain and frequency-domain features,” J. Med. Syst., vol. 29, pp. 647-660, 2005.
8. Accardo, A., Affinito, M., Carrozzi, M., Bouquet, F., “ Use of the fractal dimension for the analysis of electroencephalographic time series,” Biol. Cybern, vol. 77, pp. 339-350, 1997.
9. Casdagli, M.C., Iasemidis, L.D., et. al., “ Non-linearity in invasive EEG recordings from patients with temporal lobe epilepsy,” Electroencephalogr. Clin. Neurophysiol., vol. 102, pp. 98-105, 1997.
10. P. Flandrin, G. Rilling, and P. Goncalves, “Empirical mode decomposition as a filter bank,” IEEE Signal Process. Lett., vol. 11, no. 2, pp. 112–114, Feb. 2004.
11. R. J. Oweis and E. W. Abdulhay, “Seizure classification in EEG signals utilizing Hilbert-Huang transform,” Biomed. Eng. Online, vol. 10, no.1, p. 38, 2011.
12. EEG Time Series Download Page 2012 [Online]. Available: http://epileptologie-bonn.de/cms/front_content.php?idcat=193&lang3
13. N. E. Huang, Z. Shen, S. R. Long, M. C. Wu, H. H. Shih, Q. Zheng, N. C.Yen, C. C.Tung, andH.H.Liu, “The empirical mode decomposition and Hilbert spectrum for nonlinear and non-stationary time series analysis,” Proc. R. Soc. Lond. A, vol. 454, pp. 903–995, 1998.
14. M.E. Cohen, D.L. Hudson, P. Deedwania, “Applying continuous chaotic modeling to cardic signal analysis,” IEEE Eng. Med. Biol.Mag. Vol. 15, pp. 97–102. , 1996
15. Alexandros T. Tzallas, Markos G. Tsipouras, and Dimitrios I. Fotiadis, “Epileptic Seizure Detection in EEGs Using Time–Frequency Analysis,” IEEE Tran. Inf. Tech. in Bio. vol. 13, pp. 703-710, 2009
16. Mohamed Bedeeuzzaman.V, Omar Farooq, Yusuf Uzzaman Khan, “Automatic Seizure Detection Using Higher Order Moments,” IEEE Int. Conf. on Recent Trends in Information, Telecommunication and Computing, pp. 159-163, 201
|
170-174
|
34.
|
Authors:
|
Ashish Bandekar, George G. Chase
|
Paper Title:
|
Performance of an Electrowet-Coalescer
|
Abstract: Water in diesel fuel can cause corrosion and reduce engine performance. Mechanical separators are most effective when water in the fuel is in the form of drops larger than about 100 microns but often fuels contain emulsified drops smaller than 100 microns. Pre-coalescence of the emulsified drops to larger drops can improve separation performance of mechanical separators such as coalescing and membrane filters. In this work, a thin-slit radial-flow electrowet-coalescer device was experimentally tested and statistically analyzed to evaluate the performance. The effects of the slit gap distance, the diesel fuel flow rate, and the applied electric potential were evaluated. Application of a full quadratic statistical model and the response optimizer method in Minitab™ shows the applied potential and the gap distance had greater impacts on the average drop size exiting the device than did the flow rate. The analysis determined the best performance occurred with the applied potential of 380V, gap distance of 0.0007m and flow rate of 2ml/s. At these conditions the average drop size increased from 33 microns in the inlet stream to 120 microns in the exit stream. The electric power required to operate the device was less than 1 milliwatt.
Keywords: Electro wetting, Coalescence, Oil-water separation.
References:
1. French, C. C. (1969). Problems arising from the water cooling of engine components. ARCHIVE: Proceedings of the Institution of Mechanical Engineers, 184(1969), 507-542.
2. Rakopoulos, C., Rakopoulos, D., Hountalas, D., Giakoumis, E., & Andritsakis, E. (2008). Performance and emissions of bus engine using blends of diesel fuel with bio-diesel of sunflower or cottonseed oils derived from Greek feedstock. Fuel, 87(2), 147-157
3. Shin, C., & Chase, G. G. (2004). Water-in-oil coalescence in micro-nanofiber composite filters. AIChE Journal, 50(2), 343-350.
4. Stanfel, C. (2009). Fuel filtration: Protecting the diesel engine. Filtration & Separation, 46(3), 22-25.
5. Lee, J. S., Ray, R. I., & Little, B. J. (2010). An assessment of alternative diesel fuels: microbiological contamination and corrosion under storage conditions. Biofouling, 26(6), 623-635.
6. Stone, W., Bessee, G., & Stanfel, C. (2009). Diesel Fuel/Water Separation Test Methods—Where We Are and Where We Are Going. SAE Int. J. Fuels Lubr, 2(1), 317-323.
7. Lee, T., Wang, F., & Newell, R. (2006). Advances in distributed parameter approach to the dynamics and control of activated sludge processes for wastewater treatment. Water Research, 40(5), 853-869.
8. Hutten, I. M. (2016). Handbook of nonwoven filter media (2nd ed.). Oxford: Butterworth-Heinemann.
9. Vladisavljević, G. T., Tesch, S., & Schubert, H. (2002). Preparation of water-in-oil emulsions using microporous polypropylene hollow fibers: influence of some operating parameters on droplet size distribution. Chemical Engineering and Processing: Process Intensification, 41(3), 231-238.
10. Liu, M., Li, J., & Guo, Z. (2016). Polyaniline coated membranes for effective separation of oil-in-water emulsions. Journal of Colloid and Interface Science, 467, 261-270.
11. Patel, S. U., & Chase, G. G. (2014). Separation of water droplets from water-in-diesel dispersion using superhydrophobic polypropylene fibrous membranes. Separation and Purification Technology, 126, 62-68.
12. Liu, M., Li, J., Shi, L., & Guo, Z. (2015). Stable underwater superoleophobic conductive polymer coated meshes for high-efficiency oil–water separation. RSC Adv, 5(42), 33077-33082.
13. Chase, G. G., & Bandekar, A. (2016). Coalescence of Water Drops in Water-ULSD Dispersions via Electrowetting. Journal of Coating Science and Technology, 3(1),
41-49.
14. Gil, C. I., López, J. R., García, Z. J., Leguizamón, R. A., & Rodríguez, N. G. (2016). Process analysis and simulation in chemical engineering. Springer.
15. Panchenkov, G. M., & Vinogradov, V. M. (1970). Water-in-oil emulsion in a constant homogeneous electric field. Chemistry and Technology of Fuels and Oils, 6(6), 438-441.
16. Eow, J. S., Ghadiri, M., Sharif, A. O., & Williams, T. J. (2001). Electrostatic enhancement of coalescence of water droplets in oil: a review of the current understanding. Chemical Engineering Journal, 84(3), 173-192.
17. Eow, J. S., & Ghadiri, M. (2003). Drop–drop coalescence in an electric field: the effects of applied electric field and electrode geometry. Colloids and Surfaces A: Physicochemical and Engineering Aspects, 219(1-3), 253-279.
18. Taylor, S. E. (1988). Investigations into the electrical and coalescence behaviour of water-in-crude oil emulsions in high voltage gradients. Colloids and Surfaces, 29(1), 29-51.
19. Sample, S. B., Raghupathy, B., & Hendricks, C. D. (1970). Quiescent distortion and resonant oscillations of a liquid drop in an electric field. International Journal of Engineering Science, 8(1), 97-109.
20. Zhang, Y., Liu, Y., Ji, R., Wang, F., Cai, B., & Li, H. (2011). Application of variable frequency technique on electrical dehydration of water-in-oil emulsion. Colloids and Surfaces A: Physicochemical and Engineering Aspects, 386(1-3), 185-190.
21. Hafskjold, B., Morrow, T. B., Celius, H. K., & Johnson, D. R. (1994). Drop-Drop Coalescence In Oil/Water Separation. SPE Annual Technical Conference and Exhibition, 2(1), 203-213.
22. Tcholakova, S., Politova, N., & Denkov, N. (2016). Kinetics of Drop Breakage and Drop-Drop Coalescence in Turbulent Flow. Biomath Communications, 3(1).
23. Hase, M., Watanabe, S. N., & Yoshikawa, K. (2006). Rhythmic motion of a droplet under a dc electric field. Physical Review E, 74(4).
24. Liang, W., Chen, Q., Song, C., Zheng, T., & Wei, X. (2015). Motion characteristics of water droplet under AC and DC electric field. Electronic Engineering and Information Science, 99-103.
25. Chase, G. G., & Aljuhani, A. S. (2013). Electro-coalescence of Water Droplets in Air Medium by Electrowetting. SPE Eastern Regional Meeting. doi:10.2118/165674-ms.
|
175-181
|
35.
|
Authors:
|
Modi Milan, Kutwal Musarraf, Varia Akash, Goswami Parth, N. J. Parmar
|
Paper Title:
|
Study of 6s Concept and its Effect on Small Scale Industry
|
Abstract: The search for quality is never ending which involves continuous improvement process to find a way to restrict the reasons creating problems. These can be accomplished by going through stages instead of implementing a large improvement .The various concepts such as Kaizen, PDCA cycle, Quality circle, JIT, 5S, etc. Can be proven helpful in this type of improvement. Among all Kaizen have high level of difficulty as it requires huge potential steps. Due to this, as a foundation of “Kaizen” we study 6S concept. It is derived from concept of 5S. 6S concept have one more “S” which stands for safety with organization, surrounding and health. The merits of 6s concept are reduce in wastage, reduction in defects, soaring of productivity, morale of worker goes high, etc. This all combine resulted in gradual improvement of industry with reduction in environmental problems. Furthermore, it also reduced the cost of production and high product services.
Keywords: 6S, continuous improvement process, kaizen, 5S, productivity, EHS.
References:
1. J. Michalska, D. Szewieczek, The 5S methodology as a tool for improving the organisation, Journal of Achievements in Materials and Manufacturing Engineering, Volume 24(2), October 2007, 211- 214.
2. Gheorghe DULHAI, The 5S strategy for continuous improvement of the manufacturing process in autocar exhaust, Journal of Management & Marketing, Vol.3 (4), 2008, 115-120.
3. R.T. Salunkhe, G.S. Kamble, Prasad Malage, Inventory Control and Spare Part Management through 5S, KANBAN and Kaizen at ABC Industry, Journal of Mechanical and Civil Engineering (IOSR- JMCE), 43-47
4. Kaushik Kumar, SanjeevKuma, Step for implementation of 5S, Volume 2(6), June 2012, 402-416.
5. P. M. Rojasra, M. N. Qureshi, Performance Improvement through 5S in Small Scale Industry: A case study, International Journal of Modern Engineering Research (IJMER) . Vol.3 (3) May – June 2013, 1654-1660.
6. M. Mahajan, Statistical Quality Control, Dhanpat Rai & Co., 2012.
|
182-186
|
36.
|
Authors:
|
A. Rahil, Alwitaishi M., Kamel M. A., N. M. W. Al-Bustami
|
Paper Title:
|
Comparative Analysis of Two Different Adjustment Techniques as Applied to The Least Squares Processing of The Direct Linear Transformation (DLT)
|
Abstract: A simple method for close range photogrammetric data reduction with non- metric cameras developed by Abdel Aziz and Karara [ ], it establishes the direct linear transformation (DLT) between coordinates of image points, and the corresponding object- space coordinates. This paper concentrates on the method of least squares as a method for adjusting the non-linear transformation equations. Hence, there are two different adjustment techniques that can be used to the processing of the non-linear transformation equations; namely: mixed and parametric least square adjustment techniques. The two different adjustment techniques are applied for two different geometry; namely double station geometry and multi-station geometry. In this study, two different iterative least – squares adjustment techniques are developed to solve the nonlinear transformation equations incorporated with distortion corrections. The results from the two different adjustment techniques will be discussed and analyzed. The obtained results showed the superiority of the mixed adjustment technique especially in the multi- station geometry. Therefore, the least squares mixed adjustment technique is recommended to be used for solving the non-linear transformations incorporated with distortion corrections.
Keywords: About four key words or phrases in alphabetical order, separated by commas.
References:
1. Abdel Aziz and Karara, “Photogrammetric potentials of non-metric cameras” Civil Engineering studies, Photogrammetry series No.36, University of Illinois at Urbana-Champaign, 1973.
2. Abdel Aziz and Karara, “Direct Linear Transformation from comparator coordinates into object space coordinates in Closer –Range photogrammetry ” proceedings of the Asp/ui symposium on Closer –Range photogrammetry, Urbana, Illinois,1974
3. Doma, M.I., “Application of optimization theory to geodetic networks using different orders design problems”, M. Sc. thesis, Faculty of Engineering, Shebin El-Kom, Minufia University, Egypt, 2004.
4. Hottier ” Accuracy of close -Range Analytical Restitutions: Practical Experiments and Prediction” Photogrammetric Engineering and Remote sensing, Vol.42, No.3, March.1976, pp. 345-375.
5. Hirvonen,R.A , “Adjustment by least squares in geodesy and photogrammetry” Ungar, publishers, U.S.A, 1971.
6. Kenefick, “Ultra-precise Analysis”, Photogrammetric Engineering, Vol.37, No.11, Nov.1971.
7. Mikhail, E.M. and F. Ackermann (1976)” Observations and Least-Squares” Harper and Row, Inc. New York, U.S.A, 1976.
8. Nour El deen W.M., ” Use of terrestrial photogrammetry in the Documentation of Egyptian Monuments”, M.Sc., Faculty of Engineering, Ain Shams University, Cairo Egypt.
|
187-192
|
37.
|
Authors:
|
Ajit Kumar Senapati, Subham Choudhury, Snehansu Sekhar Mishra, Ravi Roushan, Subhashis Nanda, Amit Kumar Mohanta
|
Paper Title:
|
Mechanical and Tribological Analysis of Polymer Matrix Composites
|
Abstract: Polymer matrix composites are very popular in the applications of lightweight aircraft, marine and automobile structures. Particularly, epoxy resin based reinforced composites are the prepared choice because of the superior physical, thermal, electrical and mechanical properties, ease of processing, excellent wettability with various reinforcements, less moisture pick up, low density, and ductile nature of the epoxy resin. In accordance with that, the present work is aimed to study the mechanical and tribological properties of pariculate filled fibre reinforced glass Epoxy resin polymer matrix composite. At first glass Epoxy resin polymer matrix composite was prepared by filling varying wt% of Fly Ash(240 mesh size) and Carbon Powder(240 mesh size) using hand lay up technique. While preparation of the polymer matrix composite a brief study on the process of preparation and composition was studied. After that tests for mechanical and tribological properties was carried out. The mechanical property tests such as density and hardness was investigated in accordance with ASTM standards. Tribological properties i.e. two body abrasive wear study was carried out using a pin-on-disc wear tester. According to the observations the concentration of filler material best suited for different purposes was determined. Finally we have compared the properties of Fly Ash and Carbon Powder filled fibre reinforced glass Epoxy resin polymer matrix composite with each other and other polymer matrix composites. It also highlights the current application and future potential of particulate filled glass fiber reinforced polymer matrix composites in aerospace, automotive, marine and other construction industries.
Keywords: Polymer Matrix Composites (PMCs), Fly ash, Carbon Powder, Abrasive wear, Micro Hardness, Density.
References:
1. Xian, Jheng. 2003. A study on the effect of the type and content of filler in epoxy–glass composite system.
2. Dr. K.A. Rameshkumar. Investigation of Mechanical Properties on Epoxy, Fly Ash and E -Glass Fiber Reinforcement Composite Material
3. B. Suresha, G. Chandramohan, J. N. Prakash, V. Balusamy and K. Sankaranarayanasamy .2006. The role of Fillers on Friction and Slide Wear Characteristics in Glass-Epoxy Composite Systems.
4. Suresha, Kishore A, P. Sampathkumaran P. Seetharamu .2007. The role of SiC fillers in glassepoxy (G-E) composites on mechanical and dry sliding wear behavior.
5. Biswas, Satapathy.2010.Tribological and mechanical investigation on alumina filled glass-epoxy composites.
6. Basavarajappa , C.M. Manjunatha, Ramesh Bojja, N. Jagannathan .2010. Effect of SiC filler material on three-body abrasive wear behavior of glass-epoxy composites.
7. Sudarshan Rao K , Y.S Varadarajan and N Rajendra.2011. The abrasive wear behaviour of graphite filled carbon fabric reinforcement epoxy composite.
8. Mohan.N, S. Natarajana, S. Kumaresh Babu .2011. effects of silicon carbide fillers on two-body abrasive wear behavior of glass fabric-epoxy (G-E) composites.
9. Sujesh, Ganeshan .2012. Tensile behavior of bidirectional woven Glass Fiber Reinforced Epoxy Polymer (GFRP) composites filled with nano silica.
10. K. Devendra and T. Rangaswamy.2012. Mechanical behaviour of E-Glass Fiber reinforced Epoxy composite filled with varying concentration of AL2O3, Mg(OH)2 and SiC.
11. R.Satheesh Raja, K.Manisekar, V.Manikanda .2013. Effect of fly ash filler size on mechanical properties of polymer matrix composites.
12. Weikang Li, Anthony Dichiara, Junwei Zha, Zhongqing Su, Jinbo Bai .2014. A study on improvement of mechanical and thermo-mechanical properties of glass fabric/epoxy composites by incorporating CNT–Al2O3 hybrids.
13. Md Nadeem M, K Chandrashekaran,Yathisha N , Rudramurthy .2014. Effects of Carbon and glass fibre reinforcement and other fillers on elevated temperature resistant properties of ER matrix composites.
14. Aditi Kaul Shah & Sandeep K. Sodhi .2015. Effect of epoxy modifiers (Al2O3/SiC/TiO2) on the Tensile Strength of epoxy/glass fibre hybrid composites.
15. Vijay D. Karande, Prof. P.R.Kale .2015. Effect of Fly Ash as Filler on Glass Fiber Reinforced Epoxy Composite.
16. Iskender Ozsoy, Askin Demirkol, Abdullah Mimaroglu, Huseyin Unal, Zafer Demir.2015. Influence of Micro- and Nano-Filler Content on the Mechanical Properties of Epoxy Composites.
17. Prasad Galande, S. E. Zarekar(2016) Effect of Various Fillers on Mechanical Properties of Glass Fiber Reinforced Polymer Composites.
18. Mr.Chavan V.B. , Prof. Gaikwad M.U. A review on development of Glass Fiber/Epoxy Composite Material.
19. T RAM PRABHU, S BASAVARAJAPPA,R B SANTHOSH and S M ASHWINI.2016. Study on tribological and mechanical behaviour of dual-particle (nanoclay and CaSiO3)-reinforced E-glass-reinforced epoxy nano-composites.
20. Halil Burak, Kaybal1, Hasan Ulus1, Ahmet Avci .2016. Characterization of Tensile Properties And Toughness Mechanisms on Nano-Al2O3 Epoxy Nano-composites.
|
193-203
|
38.
|
Authors:
|
Kajal Sejpal
|
Paper Title:
|
Improving The Assembly Process of Down lighter by using Two Hand Process Chart
|
Abstract: The objective of this research is to improve the productivity by optimizing certain operations of the manual assembly process of a product in a manufacturing industry. By creating a standard process in manual assembly line time is saved as well as energy of the worker is also saved. This leads to increased units of production and lesser fatigue. In this paper, flow process chart of assembly line of a particular product is studied. The two hand process chart of selective time consuming operations is carried out. The time saved and improvement to the operations is noted thus improving the assembly process.
Keywords: Work flow, Two hand process, Downlighter
References:
1. Mr. Gurunath V. Shinde, Prof.V.S.Jadhav,” A Computer based novel approach of ergonomic study and analysis of a workstation in a manual process”, International Journal of Engineering Research & Technology, Vol.1 – Issue 6 (August- 2012),e-ISSN: 2278-0181
2. Durward K. Sobek, II Dept. of Mechanical and Industrial Engineering Montana State University, Cindy Jimmerson Community Medical Center,”Tool for Process Improvement “
3. George Kanawaty. Introduction to work study: International Labour Office, Geneva. 4th (revised) edition. 2000;17-108
4. Dr Ashish Jain,Dr Punit Yadav,”Application of Method Study to Improve Work Flow Process in a Dietary Facility of a Medical College”,Volume 6, Issue 3, March 2016,ISSN – 2249-555X, IF : 3.919, IC Value : 74.50
5. Chapin N. 1970. Flowcharting with the ANSI Standard: A Tutorial. Computing Surveys 1970; 2(2):119-146.
6. Md. Shakil, Md. Rahamat Ullah, and Mostafa Lutfi,”Process Flow Chart and Factor Analysis in Production of a Jute Mills”,Journal of Industrial and Intelligent Information Vol. 1, No. 4, December 2013
|
204-209
|
39.
|
Authors:
|
Mayuri Vaijanath Atre, K. Chandra Obula Reddy
|
Paper Title:
|
A Novel Hybrid Power Conditioner for Mitigation of Harmonics and Neutral Line Current in Three Phase Four Wire Distribution System
|
Abstract: In this paper, a novel hybrid power conditioner is proposed for suppressing harmonic currents and neutral-line current in three-phase four-wire distribution power systems. The proposed hybrid power conditioner is composed of a neutral-line current attenuator and a hybrid power filter. The hybrid power filter, configured by a three-phase power converter and a three-phase tuned power filter, is utilized to filter the nonzero-sequence harmonic currents in the three-phase four-wire distribution power system. The three-phase power converter is connected to the inductors of the three-phase tuned power filter in parallel, and its power rating can thus be reduced effectively. The tuned frequency of the three-phase tuned power filter is set at the fifth harmonic frequency. The neutral-line current suppressor is connected between the power capacitors of the three-phase tuned power filter and the neutral line to suppress the neutral-line current in the three-phase four-wire distribution power system. With the major fundamental voltage of the utility dropping across the power capacitors of the three-phase tuned power filter, the power rating of the neutral-line current suppressor can thus be reduced. Hence, the proposed hybrid power conditioner can effectively reduce the power rating of passive and active elements. A hardware prototype is developed to verify the performance of the proposed hybrid power conditioner. Experimental results show that the proposed hybrid power conditioner achieves expected performance.
Keywords: Harmonic, neutral-line current, power converter
References:
1. B. Singh, P. Jayaprakash, T. R. Somayajulu, and D. P. Kothari, “Reduced rating VSC with a zig-zag transformer for current compensation in a three-phase four-wire distribution system,” IEEE Trans. Power Del., vol. 24, no. 1, pp. 249–259, Jan. 2009.
2. R. M. Ciric, L. F. Ochoa, A. Padilla-Feltrin, and H. Nouri, “Fault analysis in four-wire distribution networks,” Proc. Inst. Elect. Eng., Gen., Transm. Distrib., vol. 152, no. 6, pp. 977–982, 2005.
3. J. C. Meza and A. H. Samra, “Zero-sequence harmonics current minimization using zero-blocking reactor and zig-zag transformer,” in Proc. IEEE DRPT, 2008, pp. 1758–1764.
4. H. L. Jou, J. C.Wu,K.D.Wu,W. J. Chiang, andY. H. Chen, “Analysis of zig-zag transformer applying in the three-phase four-wire distribution power system,” IEEE Trans. Power Del., vol. 20, no. 2, pt. 1, pp.1168–1178, Apr. 2005.
5. S. Choi and M. Jang, “Analysis and control of a single-phase-inverter zigzag-transformer hybrid neutral-current suppressor in three-phase four-wire systems,” IEEE Trans. Ind. Electron., vol. 54, no. 4, pp. 2201–2208, Aug. 2007.
6. J. C. Wu, H. L. Jou, K. D. Wu, and S. T. Xiao, “Single-phase inverter- based neutral-current suppressor for attenuating neutral current of three-phase four-wire distribution power system,” IET Gen., Transm. Distrib., vol. 6, no. 6, pp. 577–583, 2012, 2012.
7. B. Singh, P. Jayaprakash, and D. P. Kothari, “Three-phase four-wire dstatcom with H-bridge VSC and star/delta transformer for power quality improvement,” Proc. IEEE INDICON, vol. 2, pp. 412–417, 2008.
8. S. Inoue, T. Shimizu, and K. Wada, “Control methods and compensation characteristics of a series active filter for a neutral conductor,” IEEE Trans. Ind. Electron., vol. 54, no. 1, pp. 433–440, Feb. 2007.
9. B. Nassif,W. Xu, andW. Freitas, “An investigation on the selection of filter topologies for passive filter applications,” IEEE Trans. Power Del., vol. 24, no. 3, pp. 1710–1718, Jul. 2009.
10. G. W. Chang, H. L.Wang, G. S. Chuang, and S. Y. Chu, “Passive harmonic filter planning in a power system with considering probabilistic constraints,” IEEE Trans. Power Del., vol. 24, no. 1, pp. 208–218, Jan. 2009.
11. J. Miret, M. Castilla, J. Matas, J. M. Guerrero, and J. C. Vasquez, “Selective harmonic-compensation control for single-phase active power filter with high harmonic rejection,” IEEE Trans. Ind. Electron., vol. 56, no. 8, pp. 3117–3127, Aug. 2009.
12. B. Singh and J. Solanki, “An implementation of an adaptive control algorithm for a three-phase shunt active filter,” IEEE Trans. Ind. Electron., vol. 56, no. 8, pp. 2811–2820, Aug. 2009.
13. O. Vodyakho and C. C. Mi, “Three-level inverter-based shunt active power filter in three-phase three-wire and four-wire systems,” IEEE Trans. Power Electron., vol. 24, no. 5, pp. 1350–1363, May 2009.
14. M. Aredes, H. Akagi, E. H.Watanabe, E. V. Salgado, and L. F. Encarnacao, “Comparisons between the p-q and p-q-r theories in three-phase four-wire systems,” IEEE Trans. Power Electron., vol. 24, no. 4, pp. 924–933, Apr. 2009.
15. P. Salmeron and S. P. Litran, “Improvement of the electric power quality using series active and shunt passive filters,” IEEE Trans. Power Del., vol. 25, no. 2, pp. 1058–1067, Apr. 2010.
16. P. Salmeron and S. P. Litrán, “A control strategy for hybrid power filter to compensate four-wires three-phase systems,” IEEE Trans. Power Electron., vol. 25, no. 7, pp. 1923–1931, Jul. 2010.
17. S. P. Litrán and P. Salmeron, “Analysis and design of different control strategies of hybrid active power filter based on the state model,” IET Power Electron., vol. 5, no. 8, pp. 1341–1350, 2012.
18. S. Rahmani, A. Hamadi, N. Mendalek, K. Al-Haddad, and K. , “A new control technique for three-phase shunt hybrid power filter,” IEEE Trans. Ind. Electron., vol. 56, no. 8, pp. 2904–2915, Aug. 2009.
19. H. Akagi and T. Hatada, “Voltage balancing control for a three-level diode-clamped converter in a medium-voltage transformer less hybrid active filter,” IEEE Trans. Power Electron., vol. 24, no. 3, pp. 571–579, Mar. 2009.
20. H. L. Jou,K.D.Wu, J. C.Wu, C. H. Li, and M. S. Huang, “Novel power converter topology for three-phase four-wire hybrid power filter,” IET Power Electron., vol. 1, no. 1, pp. 164–173, Mar. 2008.
21. S. H. Hosseini, T. Nouri, and M. Sabahi, “A novel hybrid active filter for power quality improvement and neutral current cancellation,” in Proc. Int. Conf. Elect. Electron. Eng., 2009, pp. I-244–I-248.
22. L. Asiminoaei, W. Wiechowski, F. Blaabjerg, T. Krzeszowiak, and B. Kedra, “A new control structure for hybrid power filter to reduce the inverter power rating,” in Proc. IEEE IECON, 2006, pp. 2712–2717.
23. S. Rahmani, K. AI-Haddad, and F. Fnaiech, “A three phase shunt hybrid power filter adopted a general algorithm to compensate harmonics, reactive power and unbalanced load under nonideal mains voltages,” in Proc. IEEE ICIT, 2004, vol. 2, pp. 651–656.
24. Hamadi, S. Rahmani, W. Santana, and K. Al-Haddad, “Study on a novel hybrid active power filter applied to a high-voltage grid,” IEEE Trans. Power Del., vol. 24, no. 4, pp. 2344–2352, Oct. 2009.
25. J. C.Wu, H. L. Jou, K. D.Wu, and H. H. Hsiao, “Three-phase four-wire hybrid power filter using a small power converter,” Elect. Power Syst. Res., vol. 87, pp. 13–21, 2012.
|
210-214
|
40.
|
Authors:
|
Alkhatab Khalafalla Muslim Abdelhadi, Hala Eldaw Idris
|
Paper Title:
|
Performance Evaluation of ARQ Mechanism in Wimax Networks
|
Abstract: WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology, provides Broadband Wireless Access (BWA) for Metropolitan Area Networks (MAN). The Automatic Repeat request (ARQ) mechanism in WiMAX uses a feedback channel for the confirmation of error-free packet delivery or for packet retransmission request. This method can increase network throughput when radio channel condition is worse. In this paper attempt has been made to study the effect of implementation of ARQ on the performance of WiMAX network through simulation. Simulation study has been carried out for WiMAX network with and without enabling ARQ. The performance is been compared by considering the performance metrics like throughput, delay and jitter.
Keywords: WiMAX, ARQ, Base station, Subscriber Stations, Simulation.
References:
1. IEEE802.16e: IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, 2005.
2. IEEE802.16e: IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems, 2009.
3. Jeffrey G. Andrews, Anurabha Ghosh and Rias Muhamed, “Fundamentals of WiMAX”, Prentice Hall Communications.
4. Klaus Sambale, Zdeneck Becvar and Ardian Ulvan,(2008), “Identification of the MAC/PHY key reconfiguration parameters”, ICT ROCKET project milestone 5M2, ICT-215282 STP.
5. Byeong Gi Lee and Sunghyun Choi, (2008), “Broadband Wireless Access and Local Networks: Mobile WiMAX and WiFi”. Artech House.
6. Min-Seok Kang and Jaeshin Jang, (2006). “Performance evaluation of IEEE 802.16d ARQ algorithms with NS-2 simulator”, Asia-Pacific Conference on Communications, pp 1 – 5
7. Vitaliy Tykhomyrov, Alexander Sayenko, Henrik Martikainen, Olli Alanen1and Timo Hamalainen, (2007). “Performance Evaluation of the IEEE 802.16 ARQ Mechanism”, In Proceedings of 7th International Conference Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN 2007, pp. 148-161
8. Alexander Sayenko, Henrik Martikainen and Alexander Puchko, (2008). “Performance comparison of HARQ and ARQ mechanisms in IEEE 802.16 networks”, In Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems MSWiM ’08.
|
215-217
|
41.
|
Authors:
|
Saleh S. AlTayyar, Ahmed E. Negm
|
Paper Title:
|
Foot Classification and Influence of Pattern Recognition
|
Abstract: The article presents the application of neural network and decision tree techniques to investigating barometric data got with instruments measuring the weight of the human plantar onto contact surface while strolling. The examination was completed on a gathering of plantar foot photo taken while the subject remained on the reflected photograph box. We gather 35 understanding, 30 of them are male and 5 female with various ages. Numerical qualities for foot examination for every patient foot part get measuring 12 property. Some foot plant pathologies, similar to buckle and level foot, are ordinarily identified by a human master by method for impression pictures. All things considered, the absence of prepared individual to finish such huge first screening discovery endeavors blocks the routinely analytic of the previously mentioned pathologies. In this work an imaginative programmed framework for foot plant pathologies in view of neural systems (NN) and Decision Tree (DT) are introduced. The outcomes accomplished with this framework confirm the attainability of setting up programmed conclusion frameworks in light of the impression and example acknowledgment. The order settled on by the resultant choice tree was right for all the more than 94% steps. This permits to point the parameters which are the best discriminators between the explored sorts of human walk.
Keywords: Foot Deformities, Photography, Pattern Recognition, Neural Network, Decision Trees.
References:
1. M. C. J. D. S. a. L. P. Marco Mora, “Automatic Diagnosis of Foot Plant Pathologies: A Neural Networks Approach,” in International Symposium on Neural Networks, 2007.
2. M. Derlatka and M. Ihnatouski, “Decision tree approach to rules extraction for human gait analysis,” in International Conference on Artificial Intelligence and Soft Computing, 2010.
3. T. Chau, “A review of analytical techniques for gait data. Part 1: fuzzy, statistical and fractal methods,” Gait & posture, vol. 13, no. 1, pp. 49-66, 2001.
4. R. Begg and J. Kamruzzaman, “A machine learning approach for automated recognition of movement patterns using basic, kinetic and kinematic gait data,” Journal of biomechanics, vol. 38, no. 3, pp. 401-408, 2005.
5. M. Derlatka, “Application of Kernel principal component analysis in human gait,” Journal of Vibroengineering , vol. 7, no. 3, pp. 27-30, 2005.
6. M. Derlatka and J. Pauk, “Data Mining in Analysis of Biomechanical Signals,” in Solid State Phenomena, 2009.
7. S. Ghoussayni, C. Stevens, S. Durham and D. Ewins, “Assessment and validation of a simple automated method for the detection of gait events and intervals,” Gait & Posture, vol. 20, no. 3, pp. 266-272, 2004.
8. S. Wolf, T. Loose, M. Schablowski, L. Döderlein, R. Rupp, H. J. Gerner, G. Bretthauer and R. Mikut, “Automated feature assessment in instrumented gait analysis,” Gait & posture, vol. 23, no. 3, pp. 331-338, 2006.
9. J. Wu, J. Wang and L. Liu, “Kernel-based method for automated walking patterns recognition using kinematics data,” in International Conference on Natural Computation, 2006.
10. Yardimci, “Fuzzy logic based gait classification for hemiplegic patients,” in International Symposium on Intelligent Data Analysis, 2007.
11. S. J. Olney, M. P. Griffin and I. D. McBride, “Multivariate examination of data from gait analysis of persons with stroke,” Physical Therapy, American Physical Therapy Association, vol. 78, no. 8, pp. 814-828, 1998.
12. T. Chau, “A review of analytical techniques for gait data. Part 2: neural network and wavelet methods,” Gait & Posture, vol. 13, no. 2, pp. 102-120, 2001.
13. H. Liu and H. Motoda, Feature selection for knowledge discovery and data mining, vol. 454, Springer Science & Business Media, 2012. 14. L. Wang and T. S. Buchanan, “Prediction of joint moments using a neural network model of muscle activations from EMG signals,” IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 10, no. 1, pp. 30-37, 2002.
15. S. Haykin, “Neural networks: MacMillan College Publ,” Co., New York, 1994.
16. S. Armand, E. Watelain, E. Roux, M. Mercier and F.-X. Lepoutre, “Linking clinical measurements and kinematic gait patterns of toe-walking using fuzzy decision trees,” Gait & posture, vol. 25, no. 3, pp. 475-484, 2007.
17. R. Mikut, J. Jäkel and L. Gröll, “Interpretability issues in data-based learning of fuzzy systems,” Fuzzy Sets and Systems, vol. 150, no. 2, pp. 179-197, 2005.
18. W. Pretkiewicz-Abacjew and W. Erdmann, “Kinematics of walking of 6 year old children,” Journal of Human Kinetics, vol. 3, pp. 115-130, 2000.
19. Valenti, “Orthotic Treatment of Walk Alterations,” Panamerican Medicine,(in spanish), 1979.
20. Morsy and A. Hosny, “A new system for the assessment of diabetic foot planter pressure,” Engineering in Medicine and Biology Society, 2004. IEMBS’04. 26th Annual International Conference of the IEEE, vol. 1, no. IEEE, pp. 1376-1379, 2004.
21. K. Nakajima, Y. Mizukami, K. Tanaka and T. Tamura, “Footprint-based personal recognition,” IEEE Transactions on Biomedical Engineering, vol. 47, no. 11, pp. 1534-1537, 2000.
22. S. R. Shah and K. Patil, “Processing of foot pressure images and display of an advanced clinical parameter PR in diabetic neuropathy,” in Conference Proceedings. 2nd International IEEE EMBS Conference on Neural Engineering, 2005., 2005.
23. M. Mora and D. Sbarbaro, “A robust footprint detection using color images and neural networks,” in Iberoamerican Congress on Pattern Recognition, 2005.
24. N. J. I. Q. R. Chuckpaiwong B, “Correlation between static foot type measurements and clinical assessments.,” Foot Ankle Int., vol. 30, no. 3, pp. 205-212, 2009.
25. M. Razeghi M, “Foot type classification: a critical review of current methods.,” Gait Posture., vol. 15, no. 3, p. 282–91, 2002.
26. M. A. E. J. Leung AK, “Biomedical gait evaluation of the immediate effect of orthotic treatment for flexible flat foot.,” Prosthet Orthot Int. , vol. 22, no. 1, pp. 25-34, 1998.
27. M. S. Menz HB, “Validity of 3 clinical techniques for the measurement of static foot posture in older people.,” J Orthop Sports Phys Ther. , vol. 35, no. 8, p. 479–86, 2005.
28. E. J. T. C. e. a. Villarroya MA, “Foot structure in overweight and obese children.,” Int J Pediatr Obes., vol. 3, no. 1, pp. 39-45, 2008.
29. H. W. N. J. e. a. Mall NA, “The reliability and reproducibility of foot type measurements using a mirrored foot photo box and digital photography compared to caliper measurements.,” J Biomech., vol. 40, no. 5, pp. 1171-6, 2007.
30. M. McPoil TG, “Use of plantar contact area to predict medial longitudinal arch height during walking.,” J Am Podiatr Med Assoc, vol. 96, no. 6, pp. 489-94, 2006.
31. S. J. M. B. Mickle KJ, “The feet of overweight and obese young children: are they flat or fat?,” Obesity (Silver Spring)., vol. 14, no. 11, pp. 1949-53, 2006.
32. G. J. R. D. Bosch K, “Development of healthy children’s feet–nine-year results of a longitudinal investigation of plantar loading patterns.,” Gait Posture., vol. 32,
no. 4, p. 564–71, 2010.
33. M. B. S. M. Igbigbi PS, “Arch index as a predictor of pes planus: a comparative study of indigenous Kenyans and Tanzanians.,” J Am Podiatr Med Assoc. , vol. 95, no. 3, p. 273–6, 2005.
34. G. R. W. C. e. a. Xiong S, “Foot arch characterization: a review, a new metric, and a comparison.,” J Am Podiatr Med Assoc., vol. 100, no. 1, pp. 14-24, 2010.
35. G. R. A. J. e. a. Faria A, “The relationship of body mass index, age and triceps-surae musculotendinous stiffness with the foot arch structure of postmenopausal women.,” Clin Biomech (Bristol, Avon). , vol. 25, no. 6, p. 588–93., 2010;.
36. W. C. Chu, S. H. Lee, W. Chu, T.-J. Wang and M.-C. Lee, “The use of arch index to characterize arch height: a digital image processing approach,” IEEE Transactions on Biomedical Engineering, vol. 42, no. 11, pp. 1088-1093, 1995.
37. J. L. McClelland, D. E. Rumelhart and G. E. Hinton, “The appeal of parallel distributed processing,” MIT Press, Cambridge MA, pp. 3-44, 1986.
38. F. D. Foresee and M. T. Hagan, “Gauss-Newton approximation to Bayesian learning,” in Neural Networks, 1997. International Conference on, 1997.
39. J. MacKay, “Bayesian interpolation,” Neural computation, vol. 4, no. 3, pp. 415-447, 1992.
40. J. Pauk and K. Jaworek, “Parametric identification of lower limbs during walking of a man,” WIT Transactions on Ecology and the Environment, vol. 57, 2002.
41. M. Romei, M. Galli, F. Motta, M. Schwartz and M. Crivellini, “Use of the normalcy index for the evaluation of gait pathology,” Gait & posture, vol. 19, no. 1, pp. 85-90, 2004.
|
218-225
|
42.
|
Authors:
|
Saleh S. Altayyar
|
Paper Title:
|
A Comparative Study of Medical Equipment Maintenance Cost and Performance for Selected Saudi Hospitals
|
Abstract: Healthcare technology administrators are always held responsible for the poor performance of the medical equipment maintenance team, delay in response to service requests, and long down time. Customer satisfaction are just part of the challenges they are facing. The objective of this study is to analyze and compare the cost of medical equipment maintenance, performance of medical equipment maintenance team in three major hospitals in Saudi Arabia (academic, military, and public). The annual cost of maintenance per medical equipment, work load per 1 FTE (technical employee), down time, turnaround time, cost of service ratio (COSR), hourly cost of maintenance, and acquisition cost per 1 FTE (technical employee) are used in the assessment and analytical comparison. When comparing the cost of service (COSR), turnaround time, and the down time in the three hospitals, it can be seen that the academic hospital has the lowest COSR (3.7%), the lowest down time (1.2 days) and the lowest turnaround time (1.5 days). The other two hospitals (military and public) have relatively higher COSR (6.7 and 5.8 %) respectively and high down time (29 and 10.7) days respectively. it is clear from this study that hospital that uses a combination of in house, Original Equipment Manufacturer (OEM), and independent service provider (third party) contract tend to have redundancy in technical staff which results in under worked technical staff and consequently unnecessary increased spending on maintenance, and poor maintenance performance, when measured by the annual cost of maintenance of medical equipment, down time, and turnaround time. This can be seen in the public hospital which has the highest cost of medical equipment maintenance among the three hospitals ($570).
Keywords: Acquisition Cost per technician, Cost of Service (COSR), Medical equipment maintenance, Methods of Maintenance.
References:
1. Information document concerning the definition of the term “medical device”. Global Harmonization Task Force, 2005 (http://www.ghtf.org/documents/sg1/sg1n29r162005. pdf, accessed March 2011).
2. Medical equipment maintenance programme overview. WHO Medical device technical series, 2011.
3. Emily Kulenkamp what do donuts and equipment service contracts have in common?. October 03, 2015.
4. Blumberg DF. New strategic directions in acquiring and outsourcing high-tech services by hospitals and implications for clinical engineering organizations and ISOs. In: Dyro JF. Clinical engineering handbook. San Diego (United States): Elsevier Academic Press; 2004. P 137–46.
5. Global Industry Analysts, Inc. Medical devices outsourcing: a global strategic business report. 2010. Available from: www.strategyr. Com/Medical_Device_Outsourcing_Market_ Report.asp Accessed 8 March 2012.
6. Smithson P, Dickey D.Outsourcing clinical engineering service.n: Dyro JF.Clinical engineering handbook. San Diego (United States): Elsevier Academic Press; 2004.Pp135–7.
7. Ministry of Health Annual Report, Saudi Arabia (2015).
8. Direct communication with the Equipping Directorate – Ministry of Health, Saudi Arabia 2017).
9. Antonio Miguel-C; Adriana Rios-Rincón; Gregory L. Haugan. Outsourcing versus in-house maintenance of medical devices: a longitudinal, empirical study. Rev Panam Salud Publica vol.35 n.3 Washington Mar. 2014.
10. Patricia McLoughlin. OEM Mairuzntenance Contracts vs. Third Party Maintenance. Managed Maintenance. Feb 07,2012
11. Lawrence Martin. “How to compare costs between in-house and contracted services.” Executive Summary. How – to – guide #4. March 1993.
12. Larry Nguyen. Five ways hospitals can cut equipment maintenance costs. May 21, 2015.
13. Patrick E. Lynch. Measuring the cost of service. TechNation, July 2013. P46-48.
14. Michelle Bush, Matt Baretich, Frank Painter. Benchmarking solutions Healthcare technology management. A resources for clinical engineering departments. AAMI, May, 10, 2016.
15. Doug Dreps, Dave Dickey. Cost of Service Ratio Comparison: A tale of two health care systems. Mercy clinical engineering services. P 1 – 25.
|
226-231
|
43.
|
Authors:
|
Cong-Trang Nguyen, Yao-Wen Tsai
|
Paper Title:
|
A Decentralized Finite-Time Sliding Mode Controller for Large-Scale Systems: a Moore-Penrose Inverse Approach
|
Abstract: In this paper, a class of uncertain large-scale systems with mismatched uncertainties and unknown disturbances of state variables is considered. First, a novel reduced-order observer (ROO) is designed to estimate un- measurable variables. A novel decentralized finite-time sliding mode controller (DFTSMC) based on measured variables is then established to drive state trajectory of systems to a sliding surface and main a sliding motion on it thereafter in finite time. In addition, a newly appropriate linear matrix inequality (LMI) condition is given such that the system in sliding mode is asymptotically stable. Finally, a numerical simulation is performed which shows the effectiveness and advantages of proposed method.
Keywords: Decentralized Finite Time Sliding Mode Controller (DFTSMC), Reduced-Order Observer (ROO), finite-time convergence, large-scale systems.
References:
1. J. Y. Hung, W. Gao, and J. C. Hung, “Variable structure control: A survey,” IEEE Transactions on Industrial Electronics, vol. 40, no. 1, pp. 2–22, 1993.
2. S. H. Zak, Systems and Control, Novel York: Oxford Univ. Press, 2003.
3. K. Y. Chang and W. J. Wang, “H∞ norm constraint and variance control for stochastic uncertain large-scale systems via the sliding mode concept,” IEEE Trans. Circuits Syst. I, vol. 46, no. 10, pp. 1275–1280, Oct. 1999.
4. S. J. Shigemaru and H. S. Wu, “Decentralized adaptive sliding mode controllers for a class of large scale interconnected systems with uncertainties, ” International Conf on Control and Automation, Budapest, Hungary, 293-298, 2005.
5. C. C. Cheng, C. C. Wen, and W. T. Lee, “Design of decentralized sliding surfaces for a class of large-scale systems with mismatched perturbations,” Int. J. Control, vol. 82, no. 11, pp. 2013-2025, 2009.
6. K. K. Shyu, W. Liu, and K. C. Hsu, “Decentralized variable structure control of uncertain large-scale systems containing a dead-zone,” IEE Proc. Control Theory Appl., vol. 150, no. 5, pp. 467–475, Sep. 2003.
7. C. H. Chou and C. C. Cheng, “A decentralized model reference adaptive variable structure controller for large-scale time-varying delay systems,” IEEE Trans. Automat. Control, vol. 48, no. 7, pp. 1213–1217, Jul. 2003.
8. Y. W. Tsai, K. K. Shyu, and K. C. Chang, “Decentralized variable structure control for mismatched uncertain large-scale systems: A new approach,” Syst. Control Letter, vol. 43, no. 2, pp. 117–125, 2005.
9. Zamani, N. Sadati, and M. H. Zarif, “On the stability issues for fuzzy large-scale systems,” Fuzzy Sets Syst., vol. 174, no. 1, pp. 31–49, Jul. 2011.
10. B. C. Zheng and G. H. Yang, “Decentralized sliding mode quantized feedback control for a class of uncertain large-scale systems with dead-zone input,” Nonlinear Dynamics, vol. 71, no. 3, pp. 417–427, 2013.
11. X. G. Yan, S. K. Spurgeon, and C. Edwards, “Decentralized output feedback sliding mode control of nonlinear large-scale systems with uncertainties,” Journal of Optimization Theory and Applications, vol. 119, no. 3, pp. 597–614, 2003.
12. K. Kalsi, J. Lian, and S. Zak, “Decentralized dynamic output feedback control of nonlinear interconnected systems,” IEEE Transactions on Automatic Control, vol. 55, no. 8, pp. 1964–1970, 2010.
13. X. G. Yan, C. Edwards, and S. K. Spurgeon, “Dynamic sliding mode control for a class of systems with mismatched uncertainty,” Eur. J. Control, vol. 11, pp. 1–10, 2005.
14. K. Kalsi, J. Lian, and S. H. Zak, “Reduced-order observer-based decentralized control of non-linear interconnected systems,” International Journal of Control, Vol. 82 No. 6, pp. 1157–1166, 2009.
15. X. G. Yan, S. K. Spurgeon, and C. Edwards, “Decentralized sliding mode control for non-minimum phase interconnected systems based on a reduced-order compensator,” Automatica, vol. 42, no. 10, pp. 1821–1828, 2006.
16. H. Li, P. Shi, D. Yao, and L. Wu, “Observer-based adaptive sliding mode control for nonlinear Markovian jump systems,” Automatica, vol. 64, pp. 133–142, Feb. 2016.
17. Z. Liu, L. Zhao, Y. Kao, and C. Gao, “Robust passive control for a class of uncertain neutral systems based on sliding mode observer,” ISA Transactions, http://dx.doi.org/10.1016/j.isatra.2016.10.013, 2016.
18. H. H. Choi, “An LMI-based switching surface design method for a class of mismatched uncertain systems,” IEEE Transactions on Automatic Control, vol. 48, no. 9, pp. 1634– 1638, 2003.
19. K. K. Shyu , Y. W. Tsai, and C. K. Lai, “A dynamic output feedback controllers for mismatched uncertain variable structure systems,” Automatica, Vol. 37, 2001, pp. 775-779, 2001.
20. J. H. Zhang and Y. Q. Xia, “Design of static output feedback sliding mode control for uncertain linear systems,” IEEE Trans. Ind. Electron., vol. 57, no. 6, pp.
2161–2170, Jun. 2010.
21. P. Khargonekar, I. Petersen, and K. Zhou,“Robust stabilization of uncertain linear systems: Quadratic stabilizability and control theory,” IEEE Trans. Autom. Control, vol. 35, no. 3, pp. 356–361, Mar. 1990.
22. S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan: Linear Matrix Inequalities in System and Control Theory. Siam, Philadelphia, PA 1994.
23. P. Gahinet, A. Nemirovski, A. J. Laub, and M. Chilali: LMI Control Toolbox. The MathWorks, Natick, MA 1995.
24. J. Lian and J. Zhao, “Output feedback variable structure control for a class of uncertain switched systems,” Asian J. Control, vol. 11, no. 1, pp. 31–39, 2009.
|
232-240
|
44.
|
Authors:
|
B. Sunil, V. R. Rajeev, C. Jaimon, S. Jose
|
Paper Title:
|
Numerical Simulation of Dry Reciprocating Wear Loss Characteristics of Al 6061 Alloy
|
Abstract: In this paper, attempts were made to develop a numerical wear model. The developed wear model was used to investigate the effect of parameters on the response reciprocating wear loss characteristics of Al 6061 alloy against En 31 hard steel counterface. A Box-Behnken design of experiment was used to investigate the effect of parameters such as normal load (15-45N), reciprocating velocity (0.4-0.6 m/s), and sliding distance (300-500 m) on the response reciprocating wear loss characteristics of Al 6061 alloy. The normal load (Percentage of contribution, P = 34.23%), and reciprocating velocity (P = 43.75%), sliding distance (P = 14.45%) are the controlling factors on the response wear loss behaviour of Al 6061 alloy. The interaction model term between the normal load and reciprocating velocity (P = 3.21%) was the secondary influencing factor on the response wear loss characteristics of Al 6061 alloy within the range of parameters investigated. An optimized sliding condition was identified by the genetic algorithm (GA) approach as load 15N, reciprocating velocity 0.6m/s and sliding distance 300m.
Keywords: Wear loss, Percentage of contribution, Reciprocating tribometer, Genetic algorithm.
References:
1. Ye H. “An overview of the development of Al-Si-alloy based material for engine applications”. Journal of Materials Engineering and Performance, 2003;12:288–97.
2. Molpeceres C, Porro J, Morales M. “Wear and friction of 6061-T6 aluminum alloy treated by laser shock processing”. Wear, 2006;260:847–54.
3. Man HC, Zhang S, Cheng FT. “Improving the wear resistance of AA 6061 by laser surface alloying with NiTi”. Materials Letters, 2007;61:4058–61.
4. Gopalakrishnan S, Murugan N. “Production and wear characterisation of AA 6061 matrix titanium carbide particulate reinforced composite by enhanced stir casting method”. Composites Part B: Engineering. 2012;43:302–8.
5. Andersson J, Almqvist A, Larsson R. “Numerical simulation of a wear experiment”. Wear, 2011;271:2947–52.
6. Fernández JE, Roc M, Diaz RV, Navarro RT, “Abrasive wear analysis using factorial experiment design”. Wear, 2003;255:38–43.
7. Rajeev VR, Dwivedi DK, Jain SC. “Dry reciprocating wear of Al-Si-SiCp composites: A statistical analysis”. Tribology International, 2010;43:1532–41.
8. Prakash Maran J, Manikandan S, Thirugnanasambandham K, Vigna Nivetha C, Dinesh R. “Box-Behnken design based statistical modeling for ultrasound-assisted extraction of corn silk polysaccharide”. Carbohydrate Polymers ,2013;92:604–11.
9. Rajeev VR, Dwivedi DK, Jain SC. “A fractional factorial design study of reciprocating wear behavior of Al-Si-SiC p composites at lubricated contacts”. Journal of Materials Engineering and Performance, 2011;20:368–76.
10. Ramesh CS, Keshavamurthy R, Channabasappa BH, Pramod S. “Friction and wear behavior of Ni–P coated Si3N4 reinforced Al6061 composites”. Tribiology International, 2010;43:623–34.
11. Shorowordi KM, Haseeb ASMA, Celis JP. “Velocity effects on the wear, friction and tribochemistry of aluminum MMC sliding against phenolic brake pad”. Wear, 2004;256:1176–81.
12. Meng HC, Ludema KC, “Wear Models and Predictive Equations: Their Form and Content”. Wear, 1995;181–183:443–57.
13. Ahmed H A M, El-Midany, Abdel-Khalek N A . “Statistical optimisation of some parameters affecting flocculation of Egyptian iron ore”. Mineral Processing and Extractive Metallurgy : IMM Transactions Section C, 2007;116:239–44.
14. Torabian H, Pathak JP, Tiwari SN. “Wear characteristics of Al-Si alloys”. Wear, 1994;172:49–58.
15. Alhawari KS, Omar MZ, Ghazali MJ, Salleh MS, Mohammed MN. “Evaluation of the microstructure and dry sliding wear behaviour of thixoformed A319 aluminium alloy”. Materials and Design, 2015;76:169–80.
16. Liu Y, Asthana R, Rohatgi P. “A map for wear mechanisms in aluminium alloys”. Journal of Materials Science ,1991;26:99–102.
17. Sharma SC, Girish BM, Kamath R, Satish BM. “Effect of SiC particle reinforcement on the unlubricated sliding wear behaviour of ZA-27 alloy composites”. Wear, 1997;213:33–40.
18. Zhang L, He XB, Qu XH, Duan BH, Lu X, Qin ML. “Dry sliding wear properties of high volume fraction SiCp/Cu composites produced by pressureless infiltration”. Wear, 2008;265:1848–56.
19. Iquebal MA, Ghosh H. “Genetic algorithm optimization technique for linear regression models with heteroscedastic errors”. Indian Journal of Agricultural Sciences, 2012;82:422–5.
|
241-246
|
45.
|
Authors:
|
Shruti S. Sonone, R. M. Autee
|
Paper Title:
|
Prepaid Multifunction Controlled Metering System using MATLAB GUI
|
Abstract: The system of Prepaid Multifunction Controlled Metering System using MATLAB GUI is developed for monitoring Electricity, Water & Gas consumption. Accurate billing is an important factor to manage household finances especially in difficult times. It is a tool that records amount of energy, water & gas used by a residence or Organizations. This system consists of Energy Metering IC module, Water flow sensor and Gas Detector at customer side. Prepaid services are concept of “First Pay & then use it” done using GSM module which sent SMS of low Balance Energy Meter, Water meter and Gas alert. Similarly using MATLAB GUI, real time readings of Energy Meter, Water meter and Gas alert are displayed on Graphical User Interface and LCD. This reduces wastage of Energy, Water & Gas and helps to keep a track on average domestic & commercial usage.
Keywords: Energy Metering IC, Water Flow Sensor, Gas sensor, ARM7, GSM, MATLAB GUI.
References:
1. H. G. Rodney Tan, C. H. Lee & V. H. Mok, “Automatic Power Meter Reading System using GSM Network”, IEEE-The 8th International Power Engineering Conference (IPEC 2007)
2. Ashish Shrivastava, RatneshPrabhaker, Rajeev Kumar and Rahul Verma, “Gsm Based Gas Leakage Detection System” International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 1, Issue 2 (may-june 2013), PP. 42-45
3. Manisha V Shinde, Pradip W Kulkarni, “New Development In Energy Meter Reading System” International Journal of Scientific Research and Management Studies (IJSRMS) ISSN: 2349-3771 Volume 1 Issue 4, pg: 124-129
4. HarshadaNavale, Prof.B.V.Pawar, “ARM based Gas Monitoring System”, International Journal of Scientific & Technology Research ,Vol 3, Issue 6 June 2014
5. Md. MejbaulHaque, Md. Kamal Hossain, Md. Mortuza Ali, Md. Rafiqul Islam Sheikh, “Microcontroller Based Single Phase Digital Prepaid Energy Meter for Improved Metering and Billing System”, International Journal of Power Electronics and Drive System (IJPEDS) Vol.1, No.2, December 2011, pp. 139~147 ISSN: 2088-8694
6. Yogendra P Joshi, M. B. Tadwalkar, “Automatic Water Meter Reading System Based On GSM Network”, VIII IRF International Conference 4th May-2014, Pune, India, ISBN: 978-93-84209-12-4
7. Ria Sood, Manjit Kaur, Hemant Lenka, “Design & Development of Automatic Water Flow Meter”, International Journal of Computer Science, Engineering and Applications (IJCSEA) , Vol3 , No.3 June 2013
8. Abhinandan Jain,“Smart and Intelligent GSM based Automatic Meter Reading System”, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181/ Vol. 1 Issue 3, May – 2012
9. V.Ramya,”Embedded system for Hazardous Gas detection and Alerting” International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.3, May 2012
10. Priya S.Kamble “A New Approach For Design And Implementation Of AMR In Smart Meter” (IJAEST) International Journal Of Advanced Engineering Sciences And Technologies Vol No. 2, Issue No. 1, 056 – 060
11. Yusnita Rahayu “Design and Development of Gas Leakage Monitoring System “, 30 Sep 2013
12. Harsh Rajesh Mistry, “Design and Implementation of Controller-Based Multifunction Energy Meter with Seven Segment Display”, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 / Vol. 4 Issue 05, May-2015
13. Bourdillon.O.Omijeh “Design and Simulation of Single Phase Intelligent Prepaid Energy Meter”, Innovative Systems Design and Engineering ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol.4, No.1, 2013.
|
247-249
|
46.
|
Authors:
|
Sehba Shahabuddin Siddiqui, Varsha Nagpurkar
|
Paper Title:
|
Testing Approaches for Mobile Applications using M-TaaS
|
Abstract: Due to high popularization and rapid development of cloud services along with advancement in mobile computing technology and wireless services, a new software testing service has come up called testing as a service (TaaS). Usage of wide scale mobile devices with heterogeneous environment and platform, testing as a service utilizes cloud infrastructure to provide on demand testing services for customers all time. With increase in utility of mobile applications (apps) due to ease of internet access along with rise in demand of critical applications like mobile banking, mobile social alerts for reporting accidents, apps for monitoring traffic etc. testing of mobile apps plays a vital role. M-TaaS over cloud provides a new business standard for diversified mobile applications software validation service employing pay-as-you-test model in order to attain cost sharing and reduction in mobile computing resources, networks, cloud computing and storage. Paper addresses different testing approaches for mobile applications like emulation based testing, device based testing, cloud testing, crowd-based testing in order to cope up with frequent up gradation of mobile devices and technologies, hence developers need a reusable and cost-effective environment for validating mobile applications and flexible infrastructure for supporting large scale test automation.
Keywords: mobile testing; mobile app testing; mobile TaaS; TaaS.
References:
1. Oleksii Starov,Sergiy Vilkomir,Anatoliy Gorbenko,Vyacheslav Kharchenko, “Testing-as-a-Service for Mobile Applications: State-of-the-Art Survey.” In Advances in Intelligent Systems and Computing, ISBN: 978-3-319-08964-5, vol. 307, pp. 55-71, Springer International Publishing, 2015.
2. Isabel Karina Villanes, Erick Alexandre Bezerra Costa, Arilo Claudio Dias-Neto, “Automated Mobile Testing as a Service (AM-TaaS),” in World Congress on Services, ISBN: 978-1-4673-7274-9, pp. 79-86, IEEE July 20,2015.
3. Jerry Gao, Wei-Tek Tsai, Ray Paul, Xiaoying Bai, Tadahiro Uehara, “Mobile Testing-As-A-Service(MTaaS)-Infrastructures, Issues, Solution and Needs,”in 15th
International Symposium on High-Assurance Systems Engineering, ISBN: 978-1-4799-3466-9, IEE March 06, 2014.
4. $ 200 Million Mobile Application Testing Market Boosted by Growing Deman for Automation.[Online] Available: https://www.abiresearch.com/press/200-million-mobile-application-testing-market-boos/[Accessed on October 20,2016].
5. Jerry Gao, Xiaoying Bai, W. T. Tsai, and Tadhiro Uhere, “Cloud-Testing – Issues, Challenges, Needs and Practice”, Software Engineering: An International Journal (SEIJ), Vol. 1, no. 1, pp. 9-23, September, 2011.
6. Jerry Gao, Xiaoying Bai, W. T. Tsai, Tadahiro Uehara, “Testing as a Service (TaaS) on Clouds,” Proceedings of IEEE Seventh International Symposium on Service-Oriented System Engineering, San Francisco Bay, March 25-28, 2013, ISBN: 978-0-7695-4944-6, pp. 212-222, IEEE June 10,2013.
7. J. Gao, X. Bai, W.-T. Tsai, and T. Uehara, “Mobile Application Testing: A Tutorial,” Computer (Long. Beach. Calif)., vol. 47, no. 2, pp. 46–55, 2014.
8. O. Starov and S. Vilkomir, “Integrated TaaS platform for mobile development: Architecture solutions,” in 2013 8th International Workshop on Automation of Software Test (AST), 2013, pp. 1–7.
9. Wasserman, “A: Software engineering issues for mobile application development,” In Workshop on Future of Software Engineering Research at the 18th Int. Symposium on Foundations of Software Engineering (ACM SIGSOFT), Santa Fe, USA, pp. 397–400,2010.
10. Wang Jun, Fanpeng Men, “Software Testing Based on Cloud Computing,” in International Conference on Internet Computing and Information Services, pp. 176-178,
IEEE, 2011.
11. “Google Play Store.” [Online]. Available: https://play.google.com/store. [Accessed on October 24, 2016].
|
250-253
|
47.
|
Authors:
|
Monisha Mohan, Preetha V. H
|
Paper Title:
|
A Review on Block-Key Point Based Copy Move Forgery Detection
|
Abstract: in which a part of a digital image is copied and pasted within the same image. Many algorithms have been developed for detecting the copy move forgery. Copy move forgery is mainly classified into two types which is block based and keypoint based. The block based method includes PCA, DCT, DWT etc and key point based method includes SIFT and SURF. This paper will include a detail study of different image forgery detection techniques, different tampering techniques and a detailed study of different block based and keypoint based method.
Keywords: Copy move forgery, DCT, DWT, SIFT, SURF
References:
1. Snigdha K. Mankar, Prof. Dr. Ajay A. Gurjar, ‘ Image Forgery Types and Their Detection: A Review’, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, April 2015
2. Nishtha Parashar and Nirupama Tiwari, ‘A Survey Of Digital Image Tampering Techniques’, International Journal of Signal Processing, Image Processing and Pattern RecognitionVol.8, No.10 (2015), pp.91-96
3. Ardizzone E, Bruno A, Mazzola G. Detecting multiple copies in tampered images. In: Image Processing (ICIP), 2010 17th IEEE International Conference on. IEEE; 2010. p. 2117–20.
4. R. Singh, A. Oberoi, and N. Goel, “Copymove forgery detection on digital images,”International Journal of Computer Applications, vol. 98, no. 9, pp. 17–22, 2014.
5. Y. Cao, T. Gao, L. Fan, and Q. Yang, “A robust detection algorithm for copy-move forgery in digital images,” Forensic science international, vol. 214, no. 1, pp. 33–43, 2012.
6. J. Zhao and J. Guo, “Passive forensics for copy move image forgery using a method based on DCT and SVD,” Forensic science international, vol. 233, no. 1, pp. 158–166, 2013.
7. S. Kumar, J. Desai, and S. Mukherjee, “Copy move forgery detection in contrast variant environment using binary DCT vectors,” International Journal of Image, Graphics and Signal Processing, vol. 7, no. 6, pp. 38–44, 2015.
8. Preeti Yadav, Yogesh Rathore, “Detection of Copy-Move Forgery of ImagesUsing Discrete Wavelet Transform”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 04 ,pp. 565-570, April 2012
9. C. Popescu and H. Far id, “Exposing Digital Forgeries by Detecting Duplicated Image Regions,” Technical Report, TR2004-515, Department of Computer Science, Dartmouth College, 2004
10. Swapnil HK, Gawande A. Copy-Move Attack Forgery Detection by Using SIFT. International Journal for Innovative Technology and Engineering IJITEE. 2013;2(5).
11. Chihaoui T, Bourouis S, Hamrouni K. Copy-move image forgery detection based on SIFT descriptors and SVD-matching. In: Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on. IEEE; 2014. p. 125–9.
12. Shivakumar B, Baboo LDSS. Detection of region duplication forgery in digital images using SURF. IJCSI International Journal Computer Science Issues. 2011;8(4).
13. Hashmi MF, Anand V, Keskar AG. A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms. In: Computer and Communication Technology (ICCCT), 2014 International Conference on. IEEE; 2014. p. 147–52.
|
254-257
|
48.
|
Authors:
|
Gayathri S P, Sajeer M
|
Paper Title:
|
Biometric Information Security System Based On Nonlinear Encryption Scheme
|
Abstract: With the growth of multimedia and digital technology the transmission over public channel become more common and also the issues with the confidentiality and integrity of data increases in an alarming rate. Biometric characteristics such as fingerprint , iris , palm print, gestures, handwritten signature and hand geometry have to be considered as an efficient tool for establishing the identity of an individual. Because they contain the unique characteristics of a person. So we proposed a method, to protect the biometric information from any of the unauthorized access. Which utilizes an orthogonal coding and multiplexing technique, direct LSB replacement steganography technique and finally a chaotic encryption method. Multiple biometric signatures are encoded and then multiplexed together in the form of a single image using orthogonal encoding and multiplexing.The encoded image is embedded in to the colour cover image ,which is decomposed in to three plane namely red ,green ,blue respectively. In steganography technique, the multiplexed image pixel is used to replace the LSB of corresponding colour cover image pixel for information hiding purpose. Finally, the stego image is encrypted using a non linear encryption technique.The objective of this paper is to develop a novel and efficient technique to protect the Biometric Information from any unauthorized access and also reduces the vulnerability of an intruder to retrieving any information through any steganalysis attack .In addition to this technique can also accommodate a number of different biometric information in the same cover image while maintaining the negligible amount of distortion when compared with original colour cover image. The encrypted images are random, non repeated and unpredictable. Chaotic encryption have excellent diffusion and confusion properties and can resist the any plaintext attack. The Performance of the proposed technique was investigated through matlab simulation using various biometric signatures and colour cover images.
Keywords: orthogonal transform, steganography, nonlinear encryption , chaotic system
References:
1. M.N. Islam, “Encryption and multiplexing of fingerprints for enhanced security”,in: Proceedings of IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2011.
2. M.N. Islam,” Color image encryption using multiple reference joint transform correlation”, in:Proceedings of IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2012.
3. M.F. Islam, M.N. Islam, “A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography,” in: SPIE Proceedings in Optical Pattern Recognition XXIII, 2012.
4. Yicong Zhou n, Long Bao, C.L. Philip Chen ,” A new 1D chaotic system for image encryption “ in: SignalProcessing,97(172–182 ), 2014.
5. Khan Muhammad, Jamil Ahmad, Haleem Farman, Muhammad Zubair , “A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model”,in: International Journal of Advanced Science & Technology, vol. 54, 2013.
6. Abbas Cheddad, Joan Condell, Kevin Curran and Paul McKevitt, “Biometric Inspired Digital Image Steganography”,in: 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems ,2008.
7. SunitaBarve, Uma Nagaraj and RohitGulabani ,” Efficient and Secure Biometric Image Stegnography using Discrete Wavelet Transform” in: International Journal of Computer Science & Communication Networks,Vol 1(1),September-October, 2011.
8. Mohammed abdulmajeed and Rossilawatisulaiman , “An improved lsb image steganography Technique using bit-inverse in 24 bit colourImage”,in: Journal of Theoretical and Applied Information Technology,. Vol.80. No.2 , 20th-October 2015
|
258-262
|
49.
|
Authors:
|
Manjith Shukur, U. S. P. Shet
|
Paper Title:
|
Experimental Investigations on the Performance and Efficiency of a Typical Domestic LPG Gas Stove
|
Abstract: Industrial, commercial and domestic gas appliances cover an extremely wide range of requirements with regard to flame stability, flame temperature, shape, size and aeration which need to be satisfied for optimum performance. With the wide spread use of LPG in industrial, commercial and domestic appliances, it should be our endeavor to design efficient burner systems not only to conserve fuel but also to keep our environment clean and green. In atmospheric burner primary air is entrained by momentum sharing between the gas and the surrounding air. The amount of air induced in this way is generally about 50 to 70 % of the stoichiometric air requirement. Two types of atmospheric burners may be distinguished, those in which the gas issues at normal supply pressure and those in which the gas is supplied from a compressor or high pressure supply. The importance of the former type, e.g., the Bunsen burner type heralded a new phase in gas utilization development when it was first introduced. Low-pressure atmospheric burners are restricted to industrial appliances, however they have been adopted on a limited scale. The present experiment consist of measuring the thermal efficiency of a LPG gas stove without wire mesh with varying heights of the vessel above the stove head: the height at which the thermal efficiency is maximum is noted for two burners i.e. BIG BURNER and SMALL BURNER for two gas input rates, i.e., the SIM (LOW) Flame and HIGH Flame position.
Keywords: Domestic Lpg Gas Stove, burner, flame.
References:
1. H. R. N. Jones, Domestic Gs Burner Design, E & FN. Spon, British Gas 1989.
2. T.N. Singh, Effect of Flame Ring Design on Thermal Efficiencies of the Pressure Stoves, Narosa, Delhi 2000.
3. T.N. Singh, K.N. Dobhal, A.L. Arora and K.K.Gandhi, Effect of Design Parameters on Thermal Efficiency of Pressure Stove, Narosa, Delhi 2000.
4. K.N.Dobhal and S.K.Khanna, Thermal Efficiency with Respect to Clearance in Domestic Heating Appliances, Narosa, Delhi 2000.
5. Dougworth, M.R. and Melvin, A, The proceeding of the16th Symposium (International) on Combustion, 255 (1977).
|
263-265
|
50.
|
Authors:
|
Manjith Shukur, U. S. P. Shet
|
Paper Title:
|
Experimental Investigations on the Efficacy Augmentation of a Domestic LPG Gas Stove using an Add-on Wire Mesh
|
Abstract: There have been several attempts to improve thermal efficiency of gas stoves by improving various parameters like flame stability, flame temperature, shape, size and aeration etc. including the burner heads. The spacing of ports, inclination of the flame cones, port geometry are also important parameters which govern the flow pattern of hot gases impinging on the heat exchanger vessel. Several gadgets are displayed on the market, claiming that they can improve thermal efficiency of the gas stove. One such gadget is the wire mesh disc, which placed over the burner head is claimed to improve thermal efficiency of the stove. The mesh is made of durable special compound metal alloy to withstand vigorous LPG heat. Interwoven wires enable concentrated high flame. Also, the utensils do not get blackened as no unburned hydrocarbons are produced. This work aims at quantifying the effect of add-on disc holding wire-mesh above the burner head on the thermal efficiency of the gas stove and to determine its optimum location to further improve the thermal efficiency. The experiments suggest that the use of wire mesh on burner head improves gas stove thermal efficiency. Use of this gadget will be beneficial, as it leads to saving of LPG, however small, and on a global scale, it will be a major step towards energy conservation as millions of stove operate globally.
Keywords: Efficacy Augmentation, Domestic LPG Gas Stove, Add-on Wire Mesh
References:
1. H.R.N.Jones, Domestic Gs Burner Design, E & FN. Spon, British Gas 1989.
2. T.N. Singh, Effect of Flame Ring Design on Thermal Efficiencies of the Pressure Stoves, Narosa, Delhi 2000.
3. T.N. Singh, K.N. Dobhal, A.L. Arora and K.K.Gandhi, Effect of Design Parameters on Thermal Efficiency of Pressure Stove, Narosa, Delhi 2000.
4. K.N.Dobhal and S.K.Khanna, Thermal Efficiency with Respect to Clearance in Domestic Heating Appliances, Narosa, Delhi 2000.
5. Dougworth, M.R. and Melvin, A, The proceeding of the16th Symposium (International) on Combustion, 255 (1977).
|
266-268
|
|
|