Version - 1 (April 2014) |
Ahmed LAABIDI, Lahsen GOURARI, Abdellah EL HMAIDI, Mohamed AARAB, Mostafa GRETAA |
||||||||||||
Caractérisation géomorphologique, litho stratigraphique et sédimenntologique des dépôts quaternaires de l'Oued Bou Salloum (Haute Moulouya, Maroc) |
||||||||||||
The region of Sidi Abdalwahd is located in the High Moulouya, about 3 km NE of Mibladane. It occupies the SE of the Mibladane-Ahouli Paleozoic-buttonhole. The geological map, drawn, shows a geological substratum with varied backgrounds ranging from Paleozoic to Jurassic. These lands are capped by current and quaternary deposits. Current deposits, composed of detritus, are deposits of slope, spreading alluvial fans and / or bottom of the valley. These deposits were created by landslides and intermittent flow, diffuse type of concentrated torrential. Quaternary deposits are in the form of three terraces (T3, T1 and T2) to staggered nested. These deposits, sedimentological characteristics similar to the current deposits, were established by flow intermittent torrential type in bioclimatic conditions comparable to current conditions. Deposits recorded neotectonic events that have been expressed by joints and faults, having a role in the drainage pattern and the current route of the valley of the Oued Bou Salloum and by tilting of layers.
Quaternary deposits, geomorphology, lithostratigraphy, sedimentology, Oued Bou Salloum, Mibladane, High Moulouya, Morocco
[1]. Combe, M., & Simonot, M., "La Haute Moulouya, le sillon d'Itzer et le massif de Boumia-Aouli. Ressources en eaux du Maroc", Notes et Mémoires du Service de Géologie du Maroc, 1975, 213, pp. 193-201.
[2]. Raynal, R., "Plaines et piémonts du bassin de la Moulouya (Maroc oriental) : Etude géomorphologique", Thèse de Doctorat d'Etat, Université Mohammed V, Rabat, 1961, 671 p. [3]. Lefèvre, D., "Les formations plio-pléistocènes du bassin de Ksabi (Moyenne Moulouya, Maroc)", Thèse de Doctorat, Université Bordeaux I, Talence, 1985, 243 p. [4]. Bouabdelli, A., Saidi, N., M'Rabet, S., Escarre, J. & Leblanc, M., "Oued Moulouya : vecteur des métaux lourds (Maroc) ", Revue des Sciences de l'eau, 2005, 18 (2), pp. 199-213.
|
||||||||||||
Rosinei B. Ribeiro, José W. J. Silva, Bianca S. M. Domingos, Jorge L. Rosa and, Nilo A. S. Sampaio |
||||||||||||
Microstructural Characterization and Pits Morphology Analysis on Austenitic Stainless Steel Aisi 304 | ||||||||||||
This paper aims to study the evolution establishing distribution and classification of pits in austenitic stainless steels AISI 304 obtained in state as received and heat-treated under different exposure times via Salt Spray. The work methodology started from the following steps: metallography preparation, corrosion tests via salt spray in different conditions, microstructural analysis, analysis of pits profiles, digital processing and images analysis for purposes of characterizing distribution, morphology and size of pits. In results obtained in digital processing and images analysis of profiles, the data were statistically analyzed using the median as evaluation parameter in the alloy as received and treated. The alloy, as received, exhibited the following morphology: hemispherical pits > transition region A > transition region B > irregular > conical. The pits amount in alloy treated in each exposure time is of the same order: transition region B > Hemispheric > transition region A > conical > irregular.
Pitting Corrosion, Austenitic Stainless Steel 304, Salt Spray, Metallography, Microstructure.
[1] Uhlig HH. Corrosion and Corrosion Control. New York: John Willey & Sons; 1967. [2] Breslin CB, Macdonald DD, Sikora E, Sikola J. Photo-inhibition of pitting on types 304 and 316 stainless steels in chloride containing solution. Electrochimica Acta, 1997; 42: 137-144. [3] Jayalakshmi M, Muralidharam VS. Empirical and deterministc models of pitting corrosion – an overview, Corrosion reviews, 2011; 14: 375-402. [4] Ernest P, Laycock NJ, Moayed MH, Newman RC. The mechanism of lacy cover formation in pitting. Corrosion Science, 1997; 39; 1133-1136. [5] Newman RC, Franz EM. Growth and Repassivation of Single Corrosion Pits in Stainless Steel. 1984; NACE, 40.
|
||||||||||||
Ch.Sajan, T. Praveen Kumar, T.Shiva, B.Rajashekar |
||||||||||||
A New Hybrid 27-Level Cascaded Multilevel Inverter Fed Induction Motor Drive With Low Common Mode Voltage | ||||||||||||
Hybrid cascade multilevel inverters combine semiconductor devices of different voltage ratings and technologies, which theoretically allow high efficiency to be achieved. This paper deals with new hybrid multilevel inverter fed induction motor drive. It focuses on asymmetrical topologies, and introduces 27-level inverter fed Induction motor drive. The total harmonic distortion (THD) is reduced with more number of steps in output voltage without using pulse width modulation techniques. A new method is proposed to reduce the common mode voltage and bearing currents. This paper also focuses on the voltage balancing. Simulation results obtained from Matlab/simulink to simulate 27-levels of voltage and the parameters of the drive.
Cascaded multilevel inverter, Induction motor drive, Common mode voltage, Bearing currents, Total harmonic distortion.
[1] H. Kuhn, N. E. Ruger, and A. Mertens, "Control Strategy for Multilevel Inverter with Non-ideal DC Sources," in Proceeding of IEEE PESC'07, 2007, pp. 632-638. [2] J. I. Leon, R. Portillo, S. Vazquez, J. J. Padilla, L. G. Franquelo, and J. M. Carrasco, "Simple unified approach to develop a time-domain modulation strategy for single-phase multilevel converters," IEEE Transactions on Ind. Electron., vol. 55, No. 9, pp. 3239-3248, September 2008. [3] S. Chen, T. A. Lipo, and D. Fitzgerald, "Source of induction motor bearing currents caused by PWM inverters," IEEE Trans. Energy Converters., vol. 11, no. 1, pp. 25–32, Mar. 1996. [4] D. Macdonald and W. Gray, "PWM drive related bearing failures," IEEE Ind. Appl. Mag., vol. 5, no. 4, pp. 41–47, Jul. Aug. 1999. [5] D. Busse, J. Erdman, R. J. Kerkman, D. Schlegel, and G. Skibinski, "Bearing currents and their relationship to PWM drives," IEEE Trans. Power Electron., vol. 12, no. 2, pp. 243–252, Mar. 1997.
|
||||||||||||
Jenifer Priyanka R.M, Saravana Bhaarathi.S, Varun .J |
||||||||||||
Study on lateral deflection of buildings with fixed support under various soil conditions | ||||||||||||
Generally the structures are not only supported by their respective foundations but also by the Soil. But in most of the cases the designers fail to consider the interaction of the soil as well as its influence over superstructure during Earthquake. This paper studies the lateral deflection on the regular and vertically irregular framed RC Buildings with fixed support, under various soil conditions like hard, medium and soft. The regular and irregular RC framed buildings were modelled for 4m and 5m spacing. These buildings were analysed using STAAD Pro V8i under various soil conditions. The lateral deflection of these buildings were tabulated and compared with respect to types of buildings. The lateral deflection was analysed for both X-direction and Z-direction. It was concluded that the lateral deflection for regular building in Z direction was higher for 5m spacing of column with respect to soft soil.
Fixed Base; Deflection; Various Soil Condition; Irregular Structures.
[1]. B.C.Punmia and Ashok Kumar Jain, "Soil Mechanics and Foundation Engineering" referred.
[2]. Wolf, J.P, Prentice Hall, Englewood Cliffs, N.J., 1985. Soil-Structure Interaction. [3]. Uma S.R., and Jain, S.K Seismic Design of Beam Column Joints In RC Moment Resisting Frames-Review of Codes, Structural Engineering and Mechanics Vol . 23, No. 5, 2006, PP.579-597. [4]. A.D. Pandey, Prabhat Kumar and Sharad Sharma "Seismic soilstructure interaction of buildings on hill slopes", Journal of Civil and Structural Engineering, 2011. [5]. STAAD Pro, Version 8i, Research Engineers International, by Bentley Systems, 2007.
|
||||||||||||
Sundaresha M P, Harish K V, Prabhas R K, Dinesha Shetty |
||||||||||||
An Hierarchical Approach of processing Wavelet Co-efficient in Breadth First Way by the Arithmetic coder | ||||||||||||
A high-throughput memory-efficient arithmetic coder architecture for the set partitioning in hierarchical trees (SPIHT) image compression is proposed based on a simple context model in this paper. The architecture benefits from various optimizations performed at different levels of arithmetic coding from higher algorithm abstraction to lower circuits implementations. First, the complex context model used by software is mitigated by designing a simple context model, which just uses the brother nodes' states in the coding zero tree of SPIHT to form context symbols for the arithmetic coding. The simple context model results in a regular access pattern during reading the wavelet transform coefficients, which is convenient to the hardware implementation, but at a cost of slight performance loss. Second, in order to avoid rescanning the wavelet transform co efficient, a breadth first search SPIHT without lists algorithm is used instead of SPIHT with lists algorithm. Especially, the coding bit-planes of each zero tree are processed in parallel. Third, an out-of-order execution mechanism for different types of context is proposed that can allocate the context symbol to the idle arithmetic coding core with a different order that of the input. For the balance of the input rate of the wavelet co efficient, eight arithmetic coders are replicated in the compression system. And in one arithmetic coder, there exists four cores to process different contexts. Fourth, several dedicated circuits are designed to further improve the throughput of the architecture. The common bit detection (CBD) circuit is used for unrolling the renormalization stage of the arithmetic coding. The carry look- ahead adder (CLA) and fast multiplier-divider are also employed to shorten the critical path in the architecture. Moreover, an adaptive clock switch mechanism can stop some invalid bit-planes' clock for the power saving purpose according to the input images. Experimental results demonstrate that the proposed architecture attains a throughput of 902.464 Mb/s at its maximum and achieves savings of 20.08% in power consumption over full bit-planes coding scheme based on field- programmable gate arrays (FPGAs).
Arithmetic coding, common bit detection (CBD) circuit, context model, out-of-order execution, set partitioning in hierarchical trees (SPIHT), VLSI arithmetic coder architecture.
[1] J. Rissanen, "Generalized kraft inequality and arithmetic coding," IBM J. Res. Developm., vol. 20, no. 3, pp. 198– 203, May 1976.
[2] J. Rissanen and G. G. Langdon, "Arithmetic coding," IBM J. Res. Developm., vol. 23, no. 2, pp. 149–162, Mar. 1979. [3] ISO/IEC JTC1 Information Technology-Digital Compression and Coding of Continuous-Tone Still Images-Part 1: Requirements and Guidelines, ISO/IEC International Standard 10918-1, ITU-T Rec.T.81, 1993. [4] JPEG2000 Part I Final Draft International Standard, ISO/IEC JTC1/ SC29/WG1 N1890, Sep. 2000. [5] D. Taubman, "High performance scalable image compression with EBCOT," IEEE Trans. Image Process., vol. 9, no. 7, pp. 1158–1170,Jul. 2000.
|
||||||||||||
Remadevi M., Anjali G. Pillai, Elizabeth Baby George, Priya Narayanan, Sophiya Sunny |
||||||||||||
Study of Fibre Reinforced Bituminous Concrete | ||||||||||||
The proposed work presents the studies on stability, flow and volumetric properties of fibre reinforced bituminous concrete in comparison with the properties of conventional bituminous concrete. Marshall's stability tests were conducted to determine the optimum binder content. By varying the amount of 10 mm polypropylene fibres (4%, 6%, 8% and 10% by weight of bitumen), optimum fibre content was obtained. The results indicate that the addition of PP fibres increases the stability but decreases the flow value.
Fibre reinforced, PP fibres, FRBC, Marshall's test, OBC.
[1]. K.Thulasiraja, V.L. Narasimha, "Studies on Coir Fibre Reinforced bituminous concrete", International
Journal of Earth Sciences and Engineering, ISSN 0974-5904. [2]. Sayyed Mahdi Abthai, Saman Esfandiarpour, Mehmet Kunt, Sayyed Mahdi Hejazi, Milad Ghorban Ebrahimi, "Hybrid Reinforcement of Asphalt Concrete mixtures using Glass and Polypropylene fibres", Journal of Engineered Fibres and Fabrics. [3]. T. Subramani, "Experimental Investigations on Coir fibre reinforced bituminous mixes", International Journal of Engineering Research and Applications. [4]. Kamil E Kaloush, Waleed A Zeiade, "Evaluation of Fibre Reinforced Asphalt mixtures using advanced material characterization tests". [5]. J. Murali Krishnan "Asphalt Mix Design", HINCOL Training Program – 2013.
|
||||||||||||
Sunita Kumari Jain, Fanibhushan Sharma, Mukesh Kumar Baliwal |
||||||||||||
Modeling and Simulation of an Induction Motor | ||||||||||||
Induction motors are most widely used motors due to their reliability, robustness and low cost. The
qd0 transformation theory is applied for the modeling and simulation of an induction motor on the stationary reference frame. The differential equations of system represents the dynamic behavior of the machine. The simulation are done in MATLAB/SIMULINK. The effective motor output variables namely phase current, motor speed and electromagnetic torque are examined. The results obtained by simulation clearly shows the elegance of qd0 transformation theory in machine modeling. Dynamic modeling, induction machine, stationary reference frame, MATLAB/SIMULINK.
[1]. Shakuntla Boora, S. K Agarwal, K. S Sandhu, "Dynamic d-q axis modeling of three-phase
asynchronous machine using matlab", International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, pp. 3942-3951, 2013. [2]. R. Krishan, "Electric motor drives: Modeling, analysis and control", Prentice Hall Company, New Jersey, 2001. [3]. K.L. Shi, T.F. Chan, Y. K. Wong and S. L. Ho, "Modeling and simulation of the three-phase induction motor using simulink," International Journal of Electrical Engineering Education, vol. 36, pp. 163- 172, 1999. [4]. Lee, R.J., Pillay, P., and Harley, R.G., "D, Q Reference frame for the simulation of induction motors", Electric Power Systems Research Journal, vol. 8, pp. 15-16, October 1984. [5]. B.K Bose, "Modern power electronics and ac drives", Prentice Hall, 2002.
|
||||||||||||
Achyut P. Banginwar, Anup K. Nagdeve, Gaurav S. Naigaonkar, Prof. J. G.Ingale |
||||||||||||
Achyut P. Banginwar, Anup K. Nagdeve, Gaurav S. Naigaonkar, Prof. J. G.Ingale |
||||||||||||
Milling is a process of producing flat and complex shapes with the use of multi-tooth cutting tool, which is called a milling cutter and the cutting edges are called teeth. The axis of rotation of the cutting tool is perpendicular to the direction of feed, either parallel or perpendicular to the machined surface. The machine tool that traditionally performs this operation is a milling machine. Milling is an interrupted cutting operation: the teeth of the milling cutter enter and exit the work during each revolution. This interrupted cutting action subjects the teeth to a cycle of impact force and thermal shock on every rotation. The tool material and cutter geometry must be designed to withstand these conditions. Cutting fluids are essential for most milling operations .In this Paper the design aspects of milling cutter is analyzed. The objective considered is the design and modeling of milling cutter and to analyze various stress components acting on it. By taking two different material i.e. HSS and Cemented Carbide to check stress and deformation. The design and analysis is carried out using the software like Pro-E and ANSYS.
ANSYS, Pro-E, cutting fluids, cutting edges, High Speed Steel, Milling Speed, Cemented Carbide.
[1]. Chittibomma. Tirumalaneelam, Tippa Bhimasankara Rao, April 2013, "Structural Analysis of Milling Cutter Using FEA", International Journal Of Computational Engineering Research, Vol. 3, Issue .4,pp101-105.
[2]. K. Chaitanya, M. Kaladhar,Nov-Dec 2013 "Design and Analysis Of Special Shape Milling Cutter Using Finite Element Analysis", International Journal Of Modern Engineering Research, Vol. 3, Issue. 6, pp 3716-3722. [3]. V. Gowtham Reddy, M. Kumara Swamy, Nov 2012,"Modeling and Analysis of a Surface Milling Cutter Using Finite Element Analysis", International Journal of Engineering Research and Development, Vol.4, Issue. 10, pp49-54. [4]. Shigley, J. E. and Mischke, C. R., 1989, Mechanical Engineering Design, Fifth Edition. McGraw Hill Book Company. [5]. E.B. Kivanc, E. Budak, 2004, "Structural modeling of end mills for form error and stability analysis", International Journal of Machine Tools & Manufacture ,pp 1151–1161.
|
||||||||||||
Dhomse Kanchan, Prof. R.L.Paikrao |
Survey paper on Generalized Inverted Index for Keyword Search |
Inverted lists are normally used to index selected documents to acess the documents according to a set of keywords efficiently. Since inverted lists are normally large in size, many compression techniques have been proposed to minimize the storage space and disk I/O time.This paper presents we propose improved technologies for document identifier assignment a more convenience index structure, the Generalized Inverted Index which merges consecutive IDs in inverted lists into intervals to avoid large storage space. With this index structure, more efficient algorithms can be devised to implement basic keyword search operations. The performance of generalized inverted index is also improved by reordering the documents in datasets using two scalable new algorithms. Experiments on the performance and scalability of generalized inverted index on real datasets prove that Generalized Inverted Index requires minimum storage space as well as increases the keyword search performance, as compared to the old inverted indexes.
keyword search; DocID Assignment, index compression; document reordering, Union Algorithm, Intersection Algorithm.
[1]. F. Scholer, H. E. Williams, J. Yiannis, and J. Zobel, Compression of inverted indexes for fast query evaluation, in Proc. of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Tammpere, Finland, 2002, pp. 222-229.
[2]. M. Zukowski, S. Hman, N. Nes, and P. A. Boncz, Super-scalar RAM-CPU cache compression, in Proc. of the 22nd International Conference on Data Engineering, Atlanta, Georgia, USA, 2006, pp. 59. [3]. R. Blanco and A. Barreiro. Characterization of a simple case of the reassignment of document identifiers as a pattern sequencing problem. In Proc. of the 28th annual int. ACM SIGIR conference on Research and development in inf. retrieval, 2005. [4]. R. Blanco and A. Barreiro. Document identifier reassignment through dimensionality reduction. In Proc. of the 27th European Conf. on Information Retrieval, pages 375–387, 2005. [5]. R. Blanco and A. Barreiro. Tsp and cluster-based solutions to the reassignment of document identifiers. Inf. Retr., 9(4):499–517, 2006 |
Version - 2 (April 2014) |
M.Arulmani, V.R.Hema Latha |
GANJA IS ILLEGAL PLANT?... (A new theory on "Mars Drug") |
Today across global countries "Ganja" is considered as a illegal substance because of its certain Negative effects which promotes ill-health to Human. This scientific based research article focus that "Ganja" popularly knows as "MARIJUANA" or "CANNABIS" shall be considered as species to "Natural Holistic Plant" called family name "ACEA-e". The "Acea-e" also shall mean "EZHEM DRUG", "MOTHER OF DRUGS" originated in prehistoric Land origin "EZHEM" (also called as MARS). In prehistoric Tamil e-DRUG shall be called as "KASAYAM".
a) Philosophy of "MARS DRUGS"
b) Philosophy of "DRUGS" c) Philosophy of "MEDICINES" d) Philosophy of "ORGANIC" e) Philosophy of "INORGANIC" f) Philosophy of "MARIJUANA" [1]. Intensive Internet "e-book" study through, Google search and wikipedia [2]. M.Arulmani, "3G Akkanna Man", Annai Publications, Cholapuram, 2011 [3]. M. Arulmani; V.R. Hemalatha, "Tamil the Law of Universe", Annai Publications, Cholapuram, 2012 [4]. Harold Koontz, Heinz Weihriah, "Essentials of management", Tata McGraw-Hill publications, 2005 [5]. M. Arulmani; V.R. Hemalatha, "First Music and First Music Alphabet", Annai Publications, Cholapuram, 2012 |
Adel Zakarazadeh, Somayye Moslemi |
||||||||||||
Multiple WH – Questions and Their Acceptance by Native & Non-Native Speakers of English. A Case Study of Iranian B.A. General English Students. | ||||||||||||
This study investigates the knowledge of multiple WH – questions and their acceptance rate by non-native speakers of English whose first language is Persian. Persian grammar is known to license a wider range of such questions who ate why? For example. But this is not the case for English grammar. It means such questions are not all acceptable in English. Acceptability judgements were obtained on 6 different types of such questions. Acceptability of English examples was rated by both native and non-native speakers of English, but Persian examples were only judged by Persian speakers of English. The results for native speakers judging their own language were generally in accord with expectations. The non-native speakers of English were divided into two groups through proficiency test of grammar (OPT). Both groups significantly were different from native speakers in their ratings of these sentences. But the advanced level students were better than the intermediate level ones in judging these questions.
Multiple WH-questions, - acceptability – Judgements – non-active speaker – proficiency test.
[1]. Beley – Vroman,R., Felix,S. & Ioup,G.1988. The acceptability of universal grammar in adult language learning second language Research 4, 1-32. [2]. Beley – Vroman,R. & Yashinga, N.2000. The acquisition of multiple Wh- questions by high proficiency non-native speakers of English second language Research 16, 3-26 [3]. Brown, B. 1994. principles of language learning and teaching. New Jersey: Prentice Hall, Inc. [4]. Chomsky,N.1980 Rules and Representation – Newyork: Columbia University Press. [5]. Chomsky,N.1988 Language and problems of knowledge Cambridge, MA: MIT Press.
|
Ajay Gore, Nirvedh Meshram, Sumit Gadi, Rahul Raghatate |
||||||||||||
Design of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail | ||||||||||||
Traditional ticketing system for railways involves serpentine queues for passengers and requires constant human processing. Attempts to fix this problem include coupon books for passengers and more recently smart cards for standard railways. In standard railway, the purpose of the smartcard is to automatically print a ticket for the passenger. However, if a smart card system is to be implemented for Metrorail the purpose of this smartcard will be to give the passenger access to the station by commanding the turnstile to rotate(or a flap gate to open) and then again enable the passenger to exit at the destination station. Building on this idea, we propose a more advanced automatic ticketing system using Near Field Communication keeping in mind the specific needs and requirements of Metrorail systems in India and also the convenience of the passengers. The prototype of this system is implemented and described in this paper.
Ticketing system, human processing, smartcard, Metrorail, automatic ticketing, Near Field Communication, RFID, automatic fare collection
[1]. NFC Forum [2]. Near Field Communication - Interface and Protocol (NFCIP-1) ECMA-340 3rd Edition / June 2013 [3]. NFC Data Exchange Format, NFC Forum Technical Specification, NDEF 1.0, July 2006. [4]. NFC Record Type Definition, NFC Forum Technical [5]. Arduino Website (http://arduino.cc/en/Main/arduinoBoardMicro)
|
Ch.Sajan, T. Praveen Kumar, T.Shiva, K.Srilatha |
||||||||||||
A New Hybrid Cascaded Multilevel Inverter Fed Induction Motor Drive with Mitigation of Bearing Currents and Low Common Mode Voltage | ||||||||||||
This paper deals with new hybrid multilevel inverter fed induction motor drive. It focuses on the different topologies to mitigate the common mode voltages, bearing currents and their effects on the drive. In proposed topology, the total harmonic distortion (THD) is reduced with more number of steps in output voltage without using pulse width modulation techniques. The main advantage of this proposed topology is the insulation required in the motor is reduced due to low common mode voltage and mitigation of bearing currents. A new method is proposed to reduce the common mode voltage and bearing currents. This paper also focuses on the adverse effects of bearing currents in the motor drive. Simulation results obtained from Matlab/Simulink to simulate the output voltage and the parameters of the drive.
Cascaded multilevel inverter, Induction motor drive, Common mode voltage, Bearing currents mitigation techniques, Total harmonic distortion.
[1] Annette von Jouanne and Alan Wallace, "A Short Course on Adjustable Speed Drives and Utility Application Issues", July, 2000. [2] A. Nabea, I. Takahashi and H. Akagi, " A New Neutral-Point-Clamped PWM Inverter", IEEE Transactions on Industry Applications, Vol. IA-17, No. 5, September/October 1981, pp.518-523. [3] S. Chen, T. A. Lipo, and D. Fitzgerald, "Source of induction motor bearing currents caused by PWM inverters," IEEE Trans. Energy Converters., vol. 11, no. 1, pp. 25–32, Mar. 1996. [4] D. Macdonald and W. Gray, "PWM drive related bearing failures," IEEE Ind. Appl. Mag., vol. 5, no. 4, pp. 41–47, Jul.–Aug. 1999. [5] D. Busse, J. Erdman, R. J. Kerkman, D. Schlegel, and G. Skibinski, "Bearing currents and their relationship to PWM drives," IEEE Trans. Power Electron., vol. 12, no. 2, pp. 243–252, Mar. 1997.
|
Sabyasachi Patra, Karishma Velisetty, Prathamesh Patel, Mr. Abhay Kolhe |
||||||||||||
A study on the OpenGL ES and the OpenSL ES in the Android NDK paradigm | ||||||||||||
When it comes to beautiful visual rendering on the Android handsets that we use today, much of that credit has to be given to the various graphic libraries which come along with programming paradigms. Just like anything in programming and technology, there are good and bad ways to implement and get certain things done both at the front end and the backend. What the Android Native Development Kit (NDK) does is that it works alongside the Software Development Kit (SDK) and injects the native powers of any C/C++ application into your Android application which can be packaged as any normal application and run on an emulator/device of choice. The SDK, the NDK, the ADT and Eclipse are primarily what one requires to directly hit on towards Android Native Development. The Android NDK basically is a companion toolset for the Android SDK, designed to augment the SDK to allow developers to implement and embed performance-critical portions of their applications using "machine code‟ generating programming languages like C, C++, and Assembly. So now how does one enjoy the seamless graphics and sound in multimedia applications on an Android phone? It is the Native Graphics/ Sound API‟s which come as a result of relying on performance critical native code which makes this possible. There are various levels of detail to which this can be carried out. In this paper we delve into the introductory portions of what the Open Graphics Library and the Open Sound Library for Android actually are and the important steps which broadly need to be followed, in order to get such applications up and running. We also talk about the basic Hardware and Software implementations of each of these along with the Configurations, simplified diagrams as well as the role of sensors.
NDK, Companion toolset, Native Programming, Open GL, Open SL, C++ Android, Graphics
[1] The Android Google group (http://groups.google.com/group/androiddevelopers) [2] Android NDK group (http://groups.google.com/group/android-ndk) [3] The Android Developer BlogSpot (http://android-developers.blogspot.com/) [4] Google Code (http://code.google.com/hosting/) for lots of NDK exampleapplications.
|
S.Ramya, S.Karthikeyan |
Test Pattern Generation By Using Accumulator |
Weighted pseudorandom built-in self test (BIST) schemes have been utilized in order to drive down the number of vectors to achieve complete fault coverage in BIST applications. Weighted sets comprising three weights, namely 0, 1, and 0.5 have been successfully utilized so far for test pattern generation, since they result in both low testing time and low consumed power. In this paper an accumulator-based 3-weight test pattern generation scheme is presented; the proposed scheme generates set of patterns with weights 0, 0.5, and 1. Since accumulators are commonly found in current VLSI chips, this scheme can be efficiently utilized to drive down the hardware of BIST pattern generation, as well. Comparisons with previously presented schemes indicate that the proposed scheme compares favorably with respect to the required hardware.
Built-in-self-test(BIST),test per clock, VLSI testing, Weighted test pattern generation.
[1]. P. Bardell, W. McAnney, and J. Savir, Built-In Test For VLSI: Pseudorandom Techniques. New York: Wiley, 1987 [2]. P. Hortensius, R. McLeod, W. Pries, M. Miller, and H. Card, "Cellular automata-based pseudorandom generators for built-in self test," IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., vol. 8, no. 8, pp. 842–859, Aug. 1989. [5]. I. Pomeranz and S. M. Reddy, "3 weight pseudo-random test generation based on a deterministic test set for combinational and sequential circuits," IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., vol.12, no. 7, pp. 1050–1058, Jul. 1993. |
Swarnalata Bollavarapau, Neil K. Samuel, Maneesh Shankar, Nihaar Shah |
||||||||||||
An Analytical Study of Various Methods Used to Build an Autonomous Fire-Extinguishing Robot | ||||||||||||
Expanding human population and growing industrialization, has led to a manifold increase in the number fire accidents. The physical limitations of humans to deal with these kinds of destructive fires combined with the adverse conditions, makes fire extinguishing an arduous task. The use of autonomous robots can reduce the errors and the limitations that are faced by human fire fighters. This paper is an effort to understand the various approaches that are possible to build such a robot. We compare and contrast the various design and construction steps that are involved in the process of building a fire fighting robot.
Fire Fighting, Autonomous Robot, Sensors, Micro Controller, Differential Turn
[1]. Ratnesh Malik, S. S. Kumbhalkar, "Fire Fighting Robot: An Approach‟, Indian Streams Research Journal, Vol.2, Issue.II/March; 12pp.1-4. [2]. Taiser T. T. Barros, Walter Fetter Lages, "Development of a Firefighting Robot for Educational Competitions‟, RiE 2012, Prague. [3]. V.J. Lumelsky and A.A. Stepanov, "Path Planning Strategies for a Point Mobile Automaton Moving Amidst Unknown Obstacles of Arbitary Shape", Algorithmica, Vol. 2, No. 4 pp403-430, 1987 [4]. Goto, Y. Strntz, A., "Mobile Robot Navigation: The CMU System", IEEE Expert, Vol. 2, No. 4, winter, 1987 [5]. Martin, F. Robotic Explorations, a Hands-On Introduction to Engineering, Upper Saddle River, New Jersey: Prentice Hall, 2001.
|
Hala M. Abd Elkader, Gamal Mabrouk, Adly Tag El-Dien, Reham S. Saad |
||||||||||||
Performance of LTE Channel Estimation Algorithms for Different Interpolation Methods and Modulation Schemes | ||||||||||||
In this paper, we present performance of pilot based channel estimation techniques such as Least Squares (LS) and Linear Minimum Mean Square Error (LMMSE) for different interpolation methods and modulation schemes. The performance is evaluated using the mean squared error (MSE) as the performance metric of interest for downlink LTE system. Simulation results show that for low SNR environment, applying QPSK modulation for any interpolation method produces the best MSE performance, but for high SNR environment, linear interpolation produces the worst MSE performance for QPSK and 16-QAM modulation schemes.
Channel Estimation, LS, LMMSE, Interpolation, LTE.
[1] Wenwen Liu &Xiaolin Li "An Improved LMMSE Channel Estimation Algorithm of LTE System,"Fourth International Conference on Computational and Information Sciences,2012,PP. 231-234. [2] Wang Hong-jin& Liu Li-fa"A Modified Channel Estimation Based on SVD in LTE-Advanced Systems, " 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM),2011. PP. 1-5. [3] Ahmed M. AL-Samman, TharekAbdRahman, Uche AK Chude-Okonkwo&RazaliNgah, "Hybrid Channel Estimation for LTE Downlink," IEEE 9th International Colloquium on Signal Processing and its Applications,2013, PP. 44-48. [4] S. Adegbite, B. G. Stewart & S. G. McMeekin, "Least Squares Interpolation Methods for LTE System Channel Estimation over Extended ITU Channels," International Journal of Information and Electronics Engineering, Vol. 3,No. 4, PP. 414-418,2013. [5] MandaRajarao, R V Raja Kumar, DivyaMadhuri&MadhaviLatha, "Efficient Channel Estimation Technique for LTE Air Interface," Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PRIMEASIA), 2012, PP. 214-219.
|
Noopur Srivastava, Bineet Kumar Gupta, Neeraj Kumar Tiwari |
||||||||||||
An Approach to Develop a Framework to Enhance the Performance of Digital Notes Based on Auto Arranger | ||||||||||||
In the past decade provision for preparing notes were in single copy for all subjects and finally writes notes in different subjects copy. Now in the advance age of technology and viewing the future aspects of students, it is well demanded to prepare their notes digitally and distribute them automatically in their respective subjects and no need to prepare separate notes manually. For better distribution process we need a reliable and efficient distribution approach by which one note automatically distributed in their respective subjects. In our approach part "cue word‟ are those relative words of a prescribed subject that helps to distribute a single note into its respective folders on the basis of frequency of cue words. Proposed approach will announced in different sectors like letter writing, student‟s notes making, script managing, news reporting and many more criteria related to writing work and managing prepared notes.
Data mining, data warehouse, artificial intelligence, SSA, Digital Notes.
[1] J. Anemuller, "Convolutive Blind Source Separation", Ph.D. thesis, University of Oldenburg, Germany, 2001. [2] Araki S., "Limitation of frequency domain blind source separation for convolutive mixture of speech", proc IEEE HSC-01, pp. 91-94, 2001. [3] H. Attias, "Independent Factor Analysis Neural Computation", 11, pp. 803-851, 2009. [4] M. Baeak, and U. Zolzer, "Performance Analysis of a Source Separation Algorithm", DAFx-02, Hamburg, Germany, pp. 207-210, 2002. [5] J.A. Bell, and J.T. Sejnowski, "An information maximization approach to blind separation and blind deconvolution. Neural Computation 7", pp. 1129-1159, 1995.
|
Anushila Dey, Aditi Dutt, Sumeet Kumar Jain, Vaishali Pandurangan |
||||||||||||
A Comparative Study of Grid Computing and Cloud Computing | ||||||||||||
The present competitive world is characterized by individuals and businesses constantly trying to adapt themselves to progressive technological innovations for competitive advantage to stay ahead of the race. Cloud Computing is one such innovation which has made considerable impact in the market. It is the practice of delivering services over the Internet. These services can be broadly categorized into Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). For instance, more and more organizations and individuals are migrating data to the servers on the cloud, thus reaping the benefits of IaaS which eliminates the need of own data centres and lowers maintenance costs. Cloud Computing is the amalgamation of existing technologies like Grid Computing, Utility Computing and several other models. Grid Computing is a form of distributed and parallel computing. In simple terms, it is a set of distributed resources working together to achieve a mutual goal thereby enhancing computational power by sharing of resources. In this paper, we try to compare and contrast the models of Grid and Cloud Computing. We also discuss their essential characteristics by reviewing a handful of research papers based on the two technologies.
Cloud Computing; Grid Computing; Grids vs. Clouds
[1]. Foster. What is the Grid? A Three Point Checklist, July 2002. [2]. Ian Foster,Yong Zhao, Ioan Raicu, Shiyong Lu "Cloud Computing and Grid Computing 360-Degree Compared" [3]. Seyyed Mohsen Hashemi,Amid Khatibi Bardsiri "Cloud Computing Vs. Grid Computing", VOL. 2, NO.5, ARPN Journal of Systems and Software ,MAY 2012 [4]. Prof. Milan Kantilal Vachhani, Dr. Kishor H. Atkotiya "Similarities and Contrast between Grid Computing and Cloud Computing", Volume : 3 , Issue : 3, INDIAN JOURNAL OF APPLIED RESEARCH, March 2013 [5]. Bhawna Saxena, "Grid Computing: Virtualization Of Distributed Computing And Data Resources" , Vol. 4, No.1, The Journal of Computer Science and Information Technology, 2006
|
Version - 3 (April 2014) |
Nitin Saxena, Naveenprakash |
Data Dissemination to Mobile Users |
we present the dynamic channel model, the information push model for data dissemination to mobile users. This is a set of extensions for the conceptual models developed for information channels that capture mobility-specific requirements. Dynamic channels are used for filtering and setting update order priorities for the information that user's decide to monitor, which depends on their location and changes as they roam. The dynamic channel model was implemented in Ubidata; it is a software framework for the construction of systems for information dissemination to mobile users. Here we also present the architecture of Update, an adaptable framework for information dissemination to mobile systems. We introduce our development process for the class of mobile computing applications operating under the information dissemination metaphor. In the mobile information dissemination network mobile users, equipped with wireless devices, exchange information in a spontaneous manner whenever they come into the communication range. Users have to specify what kind of information they are looking for and what type of information they can offer. The adaptive data dissemination model and the associated on-line scheduling algorithms improve the functionality and performance of bidirectional broadcast models, maximizing the total number of satisfied users in asymmetric communication environments with dynamic client profiles and time requirements (e.g., mobile systems).on-line scheduling algorithm can be executed in O(n) time, where n is the number of data items in the database. Performance evaluation shows on-line scheduling algorithm produces optimal channel allocation which significantly improves the system performance under various parameter settings.
mobile computing applications, information dissemination, geosensor networks, peer-to-peer communications, location-aware systems, scheduling, time-critical data, asymmetric communication, push-based technique
[1] "A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms," in Advances in Cryptology - CRYPTO'84, Proceedings, ser. Lecture Notes in Computer Science, G. R. Blakley and D. Chaum, Eds. [2] vol. 196. Springer, 1985, pp. 10–18.] B. R. Waters, E. W. Felten, and A. Sahai, "Receiver Anonymity via Incomparable Public Keys," in Proceedings of the 10th ACM conference on Computer and communication security. [3] ACM Press, 2003, pp. 112–121. D. Chaum and E. van Heyst, "Group Signatures," in EUROCRYPT'91, Proceedings, ser. Lecture Notes in Computer Science, vol. 547. Springer, 1991, pp. 257–265. J. Camenisch, Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem. [4] Hartung-Gorre Verlag, 1998. A. Heinemann, "The iClouds Project. Tu-darmstadt.de A. Heinemann, J. Kangasharju, F. Lyardet, and M. M¨uhlh¨auser, "I Clouds – Peer-to-Peer Information Sharing in Mobile Environments," in Euro-Par 2003. Parallel Processing, 9th International Euro-Par [5] Conference, ser. Lecture Notes in Computer Science,H. Kosch, L. B¨osz¨orm´enyi, and H. Hellwagner, Eds.,vol. 2790. Klagenfurt, Austria: Springer, 2003, pp. 1038–1045. A. Heinemann, J. Kangasharju, F. Lyardet, and M. M¨uhlh¨auser, "Ad Hoc Collaboration and Information Services Using Information Clouds," in Proceedings of the 3rd Workshop on Applications and Services in Wireless Networks, (ASWN 2003), T. Braun,N. Golmie, and J. Schiller, Eds. Bern, Switzerland: |
Akwukwaegbu I.O, Okwe Gerald Ibe |
||||||||||||
Load Flow Control and Analytical Assessment of Voltage Stability Index Using Thyristor Controlled Series Capacitor (Tcsc) | ||||||||||||
Voltage stability problem has become one of the major concerns in the operation of power system in recent years. The reason is that power systems all over the globe are being operated with reduced margins because of the exponentially growing demands and the associated stress on the power transmission resources aggravated by a general reluctance to invest in improvement of the electric grid infrastructure. Moreover, voltage instability has been responsible for severe network collapses world-wide and subsequently, the possible threat of voltage instability is becoming more pronounced in power utilities. In order to avoid the voltage collapse, this paper presents maximum loadability identification of a load bus in a power transmission network which is achieved by performing voltage stability study by utilizing Fast Voltage Stability Index (FVSI) as an indicator of the maximum loadability termed as Qmax. In this technique, reactive power loading will be increased gradually at particular load bus until the FVSI reaches close to unity. Therefore, a critical value of FVSI was set as the maximum loadability point. This value ensures the system from entering voltage-collapse region. The main purpose in the maximum loadability assessment is to plan for the maximum allowable load value to avoid voltage collapse; which is important in power system planning risk assessment index. In order to improve the system stability, Thyristor Controlled Series Capacitor (TCSC) is installed in the most severe line, which is identified from the line stability index values of all lines in a system. TCSC is a series compensated device used for voltage stability enhancement, which is to be connected in series with transmission line. It can control the transmission line impedance to improve the line transfer capability and to regulate the receiving end bus voltage. This proposed technique was applied to solve real problems in a 14 bus power grid using Power flow analysis. Power flow is very necessary for planning, operation, economic scheduling and exchange of power between utilities. Newton Raphson iterative algorithm is used for solving the power flow problems due to its ability to converge very fast with small number of iteration. Simulation of power flow solutions with and without TCSC was done using MATLAB 7.5 program. The result shows that the application of TCSC improved the voltage profile of the system and furtherly enhanced the power flow.
TCSC, FACTS, Line Flow Index, FVSI, Criticality Index, load flow, Matlab.
[1]. IJ Nagrath / DP Kothari, "Power System Engineering (concept of series and shunt compensation)", Tata McGraw-Hill,2003 [2]. Ajjarapu, V., and Christy, C., 1992, "The continuation power flow: A tool for steady state voltage stability analysis," IEEE Trans. Power Syst., 7(1), pp. 416–423. [3]. Althowibi, F.A., and Mustafa, M.W., 2010, "Line voltage stability calculations in power systems" in Proc. IEEE conference on Power Engineering, pp.396-401. [4]. Guo Chulin, Tong Luyuan, Wang Zhonghang, " Stability Control of TCSC between interconnected Power networks", Power System Technology, 2002 proceedings, volume-3,13-17 Oct 2002, pages 1943-1946 [5]. Geng Juncheng; Tong Luyuan; Ge Jun; Wang Zhonghong; "Mathematical model for describing characteristics of TCSC", Power System Technology, 2002. Proceedings. PowerCon 2002. Volume 3, 13-17 Oct. 2002 Page(s):1498 - 1502
|
Anil Kumar Mishra, Madhabananda Das, Tarini Charan Panda |
||||||||||||
Modified Optimization by Artificial Bee Colony (MOABC) for improvement in content-based image retrieval performance | ||||||||||||
Artificial Bee Colony(ABC) algorithm based optimization techniques are quite popular and focus for research in fields of Swarm Intelligence. This paper presents an optimization algorithm based on artificial bee colony (ABC) to deal with optimization problems in Content Based Image Retrieval (CBIR) System. We have introduced a modified ABC algorithm which is based on the intelligent scavenging behaviour for content base images. It uses less control parameters, and it can be efficiently used for solving for multi object optimization problems. In the current work, MOABC for discrete variables has been developed and implemented successfully for the multi variable design optimization of composites. The proposed algorithm is applied to Image retrieval section of CBIR system for minimizing the feature vectors and to find the image similar to the queried image. Finally the performance is evaluated in comparison with other nature inspired techniques which includes Particle Swarm Optimization (PSO) and Genetic Algorithm (GA). The performance of MOABC is better as par with that of ABC, PSO and GA for all the loading configurations.
Multi variable optimization, Structural optimization, Artificial Bee Colony (ABC), Feature Extraction.
[1]. Binitha S, S Siva Sathya, "A Survey of Bio inspired Optimization Algorithms", International Journal of Soft Computing and Engineering, Vol. 2, No. 2, pp. 137-151, 2012. [2]. Nabeel Mohammed and David McG. Squire,"Effectiveness of ICF features for collection-specific CBIR", 9th International Workshop on information Systems and Applications, Vol. 7836, pp. 83-95, 2013. [3]. Jun Wang, Sanjiv Kumar, and Shih-Fu Chang,"Semi-Supervised Hashing for Large Scale Search", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 34, No. 12, pp. 2393- 2406, 2012. [4]. Swati V. Sakhare and Vrushali G. Nasre,"Design of Feature Extraction in Content Based Image Retrieval(CBIR) using Color and Texture", International Journal of Computer Science & Informatics, Vol. 1, pp. 57-62, 2011. [5]. Vibha Bhandari and Sandeep B.Patil,"Comparison of CBIR Techniques using DCT and FFT for Feature Vector Generation", International Journal of Emerging Trends & Technology in Computer Science, Vol. 1, No. 4, pp. 1-10, 2012.
|
M. A. Abdul Hakeem, V. Thanikachalam |
||||||||||||
Using Analytic Hierarchy Process for Prioritising the Dimensions and Determinants of Internal Quality Assurance of Second Cycle Engineering Programmes | ||||||||||||
Quality assurance in engineering education has a double aspect: the internal quality assurance process implemented by the institutions and the external quality assurance or accreditation undertaken by external independent bodies. The providers of engineering education have the primary responsibility for the quality of their provision and its assurance. Although several accreditation standards and guidelines have been established and implemented worldwide through various international, regional and national agencies; relevant literature searches show that frameworks for internal quality assurance have not been properly developed. The authors have developed a conceptual framework comprising of 24 determinants grouped under 6 dimensions (Quality Enablers, Programme Design, Programme Resources, Programme Delivery, Programme Outcomes, and Quality Analysis) for the internal quality assurance of second cycle engineering programmes. In this article, the authors elaborate on an Analytic Hierarchy Process (AHP) based study for the prioritisation of these dimensions and determinants. The results evolved from the study shows that all the 6 dimensions are significant in the internal quality assurance of second cycle engineering programmes. The study demonstrates that the most significant determinants of internal quality assurance are: 360o Evaluation of Programme Dimensions; Programme Educational Objectives and Outcomes; Faculty: Adequacy, Competency and Development; Graduate Attributes and Professional Competencies; Institutional Leadership and Governance; and Support for Creativity and Innovation.
Internal Quality Assurance, Multi-criteria Decision Making, Analytic Hierarchy Process, Programme Dimensions, Quality Determinants.
[1]. J. Figuera, S. Greco, and M. Ehrgott (Eds.), "Multiple Criteria Decision Analysis, State of the Art Surveys", New York, NY: Springer, 2005. [2]. C. L. Hwang and K. Yoon, "Multiple Attribute Decision Making: Methods and Applications", Berlin / Heidelberg / New York, NY: Springer Verlag, 1981. [3]. S. A. Hajkowicz, G. T. McDonald, and P. N. Smith, "An evaluation of multiple objective decision support weighting techniques in natural resource management", Journal of Environmental Planning and Management, vol. 43, no. 4, pp. 505–518, 2000. [4]. B. Roy, "The outranking approach and the foundations of ELECTRE methods", Theory and Decisions, vol. 31, no. 1, pp. 49–73, 1991. [5]. H. M. Moshkovich, A. I. Mechitov, and D. L. Olsen, "Ordinal judgments in multi-attribute decision analysis", European Journal of Operational Research, vol. 137, pp. 625–641, 2002.
|
Abirami Priyadarshini.B |
||||||||||||
Effect of carbon on the hardness of ASTM A182.Gr F6NM alloy for oil and gas industries. | ||||||||||||
This article presents a relationship between the hardness and the carbon content of the ASTM A182 Gr. F6NM alloy mainly used for oil and gas industries. This study was initiated because of the frequent rejections of the F6NM alloy components due to their increased hardness leading to embrittlement problems while serving applications at high temperature and pressure. The repetitive method was adopted to analyse the relationship between the hardness and carbon content, by utilizing various samples of F6NM alloys with varying compositions of carbon ranging between 0.009-0.05percent following the standard [1] and by measuring their hardness using a Rockwell hardness tester. The focus is on investigating the role of carbon in altering the hardness of the F6NM alloys as it was found that the hardness remained unchanged even after the double tempering operation. To study the exact effect of carbon on hardness, the percentage of manganese was maintained as a constant between 0.54-0.58percent. Hence, it was concluded that even though the ASTM specifications of carbon are between 0.009-0.05, the percentage of carbon has to be controlled between 0.009-0.02percent from the production of F6NM alloys in order to control the hardness as the tempering operations seemed to be ineffective for this high alloyed steel.
Hardness, Double tempering, Normalising, Quenching, Carbon content, F6NM
[1]. ASTM Designation: A 182/A 182M – 02., Standard specification for forged or rolled alloy – steel pipe flanges, forged fittings, and valves and parts for High – Temperature service. [2]. J. Svoboda, Literature Review of Martensitic Stainless steels, Steel Founders' Society of America, 1982 [3]. Raymond A., Higgins B., 1985, Properties of Engineering Materials. Hoodder and Stonghton. [4]. T.V.Rajan, C.P. Sharma and Ashok Sharma, "Heat treatment – Principles and Techniques" second edition, pp 87-95 [5]. F6NM (UNS S42400), OILFIELD MODIFIED DATA SHEET , Special quality alloys.
|
J RAJANIKANTH, Dr. T.V. RAJINIKANTH |
||||||||||||
Soft Spatial Query Processing in Spatial Databases-A Case Study | ||||||||||||
Knowledge discovery in databases (KDD) is an important task in spatial databases since both, the
number and the size of such databases are rapidly growing. This paper introduces a set of basic operations which should be supported by a spatial database system (SDBS). Here, it will go on to describe the research that is currently going on in this area, pointing out the different areas, tasks etc., Finally this will helps the researchers to develop better techniques in spatial databases. KDD, Database Model, SDBS.
[1]. Talhofer, V., Hošková, Š., Kratochvíl, V., & Hofmann, A. (2009). Geospatial Data Quality. ICMT'09 - International conference on military technologies, pp. 570-578,2009. [2]. Frawley W.J., Piatetsky-Shapiro G., Matheus J.: "Knowledge Discovery in Databases: An Overview", in: Knowledge Discovery in Databases, AAAI Press, Menlo Park, pp. 1-27, 1991. [3]. Koperski K., Han J.: "Discovery of Spatial Association Rules in Geographic Information Databases", Proc. 4th Int. Symp. on Large Spatial Databases, Portland, ME, pp.47-66, 1995. [4]. Shekhar, S.; Lu, C.; and Zhang, P.. A Unified Approach to Detecting Spatial Outliers. GeoInformatica 7(2), 2003. [5]. Shekhar, S.; Schrater, P. R.; Vatsavai, R. R.; Wu, W.; and Chawla, S. Spatial Contextual Classification and Prediction Models for Mining Geospatial Data. IEEE Transaction on Multimedia 4(2), 2002.
|
Sanjit Kumar Paul |
Opposite Dust on Linear Dust-acoustic Waves |
The linear propagation of the dust-acoustic waves (L-DAWs) in a dusty plasma consisting of
Boltzmann-distributed electrons and ions, mobile charge fluctuating positive and negative dust charge fluctuating stationary positive dust and charge fluctuating stationary negative dust has been theoretically investigated Charge fluctuation, linear dust-acoustic waves, dusty plasmas, shock waves
[1]. D. A. Mendis and M. Rosenberg, "Cosmic dusty plasma", Annu. Rev. Astron. Astrophys., vol.32, pp. 418-463, Sep.1994. [2]. M. Horanyi and D. A. Mendis, "The dynamics of charged dust in the tail of comet Giacobini-Zinner," J. Geophys. Res., vol.91, pp. 355-361, Jan. 1986. [3]. M. Horanyi, "Charged dust dynamics in the solar system", Annu.Rev. Astrophys, vol.34, pp. 383-418, Sep.1996. [4]. F. Verheest, "Waves in Dusty Plasmas", Kluwer Academic Publishers, Dordrecht, The Netherlands. 2000. [5]. P. K. Shukla, "A survey of dusty plasma physics", Phys. Plasmas., vol. 8, no.5, pp. 1791-1803, May 2001. |
Wael Bekheet |
Development of a Management System for Paved Assets |
Large enterprises have a significant percentage of their maintenance budgets directed towards maintenance of paved assets. They need to maintain these assets at an acceptable level of service in terms of both functional condition and level of safety. Typical pavement management systems are tailored towards continuous roads or defined road networks. However, depending on the conditions of each enterprise, some of their paved assets can be difficult to include in a typical pavement management system, since these assets represented individual pavement sections that are significantly different from a traditional road from functional and geometric perspectives. This paper presents an approach to customize typical pavement management tools to manage an enterprise paved assets, using the paved assets managed by a school board as a case study. The paved assets were divided into sections, and field condition survey was carried out to assess their current condition. Analysis models were then developed based on experience and finalized through a cycle of preliminary pavement management analysis and ground truth visits, by a panel of experts, for models validation. The approach presented in this paper showed the potential use of existing analysis tools to manage paved assets within the framework of an asset management system.
Pavement Management, Asset Management, Paved Assets, Condition Assessment, Pavement Performance
[1]. W. Bekheet, K Helali, P VanDerHurst, M Voth, and J. Amenta, "Development of The National Park Service Parkways & Park Roads Pavement Management System," In Proc. 86th Annual Meeting of the Transportation Research Board, Washington DC, January 2007. [2]. M. Khattak, G. Baladi, Z. Zhang, and S. Ismail, "A Review of The Pavement Management System of the State of Louisiana-Phase I," In Proc. 87th Annual Meeting of the Transportation Research Board, Washington DC, January 2008. [3]. M. Shahin and S. Kohn, "Development of a Pavement Condition Rating Procedure for Roads, Streets and Parking Lots", Construction Engineering Research Laboratory, U.S. Army Corps of Engineers, Technical Report M-268, July, 1979 [4]. Standard Practice for Roads and Parking Lots Pavement Condition Index Surveys, ASTM Std. D6433-11, 2011 [5]. W. Bekheet, K Helali, P VanDerHurst, M Voth, and J. Amenta, "Development of Roughness Deterioration Models for The National Parks Services Network," In Proc. 85th Annual Meeting of the Transportation Research Board, Washington DC, January 2006. |
Geetha C.R., Dr.Puttamadappa C. |
||||||||||||
A Robust Image Steganography using Multiple Edge Detection and Advanced Error Replacement Method | ||||||||||||
This paper proposes a Steganography method using the digital images. The art of embedding the data which is to be secured into the digital image is called as Image Steganography. Human Visual System proved that the changes in the image edges are insensitive to human eyes. Therefore we are using edge detection method in Steganography to increase data hiding capacity by embedding more data in these edge pixels. So, if we can increase number of edge pixels, we can increase the amount of data that can be hidden in the image. To increase the number of edge pixels, Multiple Edge Detection is employed. Edge detection is carried out using more sophisticated operator like canny operator. To compensate for the resulting decrease in the PSNR because of increase in the amount of data hidden, Advanced Error Replacement [AER] method is proposed here. Because we are changing bits other than the one in which the data is hidden, by employing AER Technique, the proposed encryption algorithm is immune to many of the standard Stego Analysis Procedure. Therefore, the proposed image Steganography method improves the PSNR and ensures high security without comprising the Data hiding capacity and visual qualities of the Cover image. To extract the data we need the original image and the embedding ratio. Extraction is done by taking multiple edges detecting the original image and the data is extracted corresponding to the embedding ratio, this ratio again forms a secret which will be known only to the receiver.
Security, Cryptography, Multiple edge detection, Minimum error replacement, Variable embedding ratio.
[1] Chan K. and Cheng M. "Hiding Data in Images using Simple LSB Substitution" Computer Journal of Pattern Recognition Letters, volume 37,No.3, PP . 469-474,2004. [2] Wang R. Z , Lin C. F and Lin J. C "Hiding Data in Images Optimal Moderately Significant –bit replacement", IEE Electron Letter, vol. 36, no. 25, PP. 2069-2070, 2000. [3] Marghny Mohamed, Fadwa Al-Afari, and Mohammed Bamatrf "Data Hiding by LSB substitution using Genetic Optimal Key Permutation", International Arab Journal of e- Technology, vol 2, No.1 January 2011. [4] Moazzam Hossain, Sadia Al Haque, Farhana Sharmin. "Variable Rate Steganography in Gray Scale Digital images Using Neighborhood pixel information", The International Arab Journal of information technology, vol. 7, No. 1, January 2010. 5] Li Li, Bin Luo, and Qiang Li Xiaojun Fang., "A color Images steganography method by multiple embedding strategy based on Sobel operator," International conference on multimedia information networking and security, IEEE 2009, 978-0-7695-3843-3/09.
|
Jitendra D. Barakale, Suraj D. Deshmukh, Chinmay J. Gonjari, Hemant P.Chaudhari |
||||||||||||
Temperature control of shell & tube type Heat exchanger By using Twin CAT PLC | ||||||||||||
In many industrial process and operations Heat Exchanger is one of the important unit for the transfer of thermal energy. There are different types of heat exchangers used in industries, the shell and tube type heat exchanger is most common. The main purpose of heat exchanger is to maintain fluid at specific temperature conditions, which is achieved by controlling the exit temperature of one of the fluids. Here we have presented an automation system that is composed of Heat exchanger, Twin CAT PLC and sensors. To control the tube outlet temperature of the fluid of heat exchanger system Twin CAT PLC used. The designed controller regulates the shell outlet temperature of the fluid to a desired set point in the shortest possible time.SCADA system is used to give a virtual display of the proposed process. The end system is a fully automated for the transfer of energy in industrial applications.
Heat exchanger, I/P converter, PC, SCADA, Temperature sensor. Twin CAT PLC
[1]. Yuvraj Khare, Yaduvir Singh, PID Control of Heat Exchanger System, International Journal of Computer Application,8(6),October 2010,0975-8887. [2]. Chhaya Sharma, Sanjeev Gupta and Vipin Kumar, Modeling and simulation of Heat Exchanger Used in Soda Recovery, Proceedings of the world Congress on Engineering,Vol-2,WCE 2011,July 2011. [3]. P. Sivakumar, D.Prabhakaran and T. Kannadasan, Temperature Control of Shell and Tube Heat Exchanger By Using Intelligent Controllers-Case Study, International Journal of Computational Engineering Research,2(8),December 2012,2250-3005. [4]. Dale E.Seborg,Process Dynamics and Control,(Singapore,2004). [5]. George Stephanopoulas,Chemical Process Control,(India,Prentice-Hall,2003).
|
Version - 4 (April 2014) |
M.Arulmani, V.R.Hema Latha |
THE ENDOS?... A new theory on "Math-Thurai" |
This scientific research article attempts to focus the philosophical distinction between "ENDOS" and "INDOS" in the pre-history and history of origin of universe, Life, Geological evolution of various "human races" based on anthropological science. This research strongly focus that the whole cosmo universe, matters including human shall be considered as "Created" initially and subsequently all those created matters further evolved into three species during expanding universe due to genetic variation in growth of environmental radiation conditions. The philosophy of "ENDOS" shall be considered as the existence of Human race and other plants and Animals in the "MARS PLANET" (also called as EZHEM LAND) in the early universe before origin of life in "EARTH PLANET".
a) Philosophy of "ENDOS/ INDOS"
b) Philosophy of "REAL and IMAGE" c) Philosophy of "GOD and HUMAN" d) Philosophy of "ACEAE and AMOEBA" e) Philosophy of "TRIBE" f) Philosophy of word "RELIGION". g) Etymology of word "MADURAI [1]. Intensive Internet "e-book" study through, Google search and wikipedia [2]. M.Arulmani, "3G Akkanna Man", Annai Publications, Cholapuram, 2011 [3]. M. Arulmani; V.R. Hemalatha, "Tamil the Law of Universe", Annai Publications, Cholapuram, 2012 [4]. Harold Koontz, Heinz Weihriah, "Essentials of management", Tata McGraw-Hill publications, 2005 [5]. M. Arulmani; V.R. Hemalatha, "First Music and First Music Alphabet", Annai Publications, Cholapuram, 2012 |
Aboli Ravindra Wakure, Apurva Rajendra Patkar, Manisha Vitthal Dagale, Priyanka Pradeepkumar Solanki |
||||||||||||
Vehicle Accident Detection and Reporting System Using GPS and GSM | ||||||||||||
In highly populated Countries like India, everyday people lose their lives because of accidents and poor emergency facilities. These lives could have been saved if medical facilities are provided at the right time. This paper implies system which is a solution to this drawback. Acceleratometer sensor can be used in car security system to sense vibrations in vehicle and GPS to give location of vehicle, so dangerous driving can be detected. When accident occurs, Acceleratometer will detect signal and will send signal to AVR controller, microcontroller will enable airbag to blow and message with accident location is sent to preprogrammed numbers such as ambulance, police station, etc via GSM.
Accident; Acceleratometer; Microcontroller; Global positioning system; GSM.
[1] World Health Organization Road Traffic Injuries Fact Sheet No 358, March 2013. Available from: http://www.who.int/mediacentre/factsheets/fs358/en/[Last accessed on 2013 Jul 15]. [3] GPS http://gpsd.berlios.de/vendor-docs/sirf/SiRF2-Leadtek.pdf [4] GSM modem Wireless Communication by THEODORE RAPPAPORT [5] GSM modem http://www.developershome.com/sms/atCommandsIntro.asp [6] Acceleratometer http://www.engineersgarage.com/articles/accelerometer
|
Sheetal J. Nagar, Divan G. Raimagia, Pinaki A. Ghosh |
||||||||||||
Identification and Elimination of Selfish Nodes in Adhoc Network | ||||||||||||
An Ad Hoc network is the network of self-configuring nodes without having fixed infrastructure. Each node acts as a system and router. Many of the routing protocols of Ad Hoc network are designed based on the assumption that every node forwards every packet but practically many of them act as selfish nodes, they use network and its service but don't cooperate with other nodes so as to save resources for themselves. This report discusses the types of availability attack, malicious activity of selfish node, a Survey of techniques used to detect selfishness attack and some approach to detect selfishness attack. Here i have implemented the selfishness attack and analyze its effect on the Packet delivery ratio, End to End Delay and throughput. I have also implemented credit based algorithm to detect and overcome the activity of selfish nodes.
MANET, Selfish nodes, AODV, IDS, Watchdog
[1] RubanaTarannum, YogadharPandey, "Detection and Deletion of Selfish MANET Nodes-A Distributed Approach" IEEE 2012 [2] D.S.NishantChaurasia, Sanjay Sharma, "Review study of routing proto-cols and versatile challenges of manet",vol.1 [3] SandhyaKhurana, Neelima Gupta, NagenderAneja, "Reliable Ad-hoc On-demand Distance Vector Routing Protocol", IEEE, Jan 2003 [4] Niyati Shah, SharadaValiveti, "Intrusion Detection System for the Avail-ability Attacks in Ad-Hoc Networks", IJECSE,2011. [5] Enrique Hern´andez-Orallo, Manuel D. Serrat, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni "Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog", IEEE, MAY 2012
|
Kishori V. Sangani, Vinod P. Patel, Sunil B. Bhatt |
||||||||||||
Design of DSP Base Controlled Power Supply on Synchronous Rectifier | ||||||||||||
Synchronous rectification is a commonly used technique to improve the efficiency of DC/DC converters with low (30V) output voltages and high output currents. Use of a synchronous rectifier in place of diode bridge rectifier because in low voltage application the conduction losses of diode bridge contributes significantly to the overall power loss in a power supply compared to synchronous rectifier. Control of the synchronous rectifiers in forward converters has been accomplished in many different ways, from self-driven to complexly controlled techniques. Most existing control techniques allow the synchronous rectifier's body diode to conduct for some small time interval, thus degrading efficiency. In this synchronous rectifier the PWM techniques are used so the power switches are switched at high frequency which is reduce the size of transformer and overall size, weight and cost. The AC/DC converters called also PWM rectifiers provide synchronous rectification or active filtering improving electrical power quality. The design process of the PWM (pulse width modulation) rectifier has been described. The practical realization of the voltage and current sensors as well as control electronics and the protection systems has been presented. Voltage Oriented Control has been implemented into the DSP to control the synchronous rectifier. The simulation of whole system will do in PSIM (power simulation) software and after examine the simulation results the whole scheme will implement in hardware. PWM waveform generated using CCS (code composer studio) software for DSP (digital signal processing) programming.
Synchronous rectification, low voltage high current, DSP based controlling, voltage control method, PI controller, phase shifted full bridge IGBT inverter.
[1]. Ying-Yu Tzou, Shih-Liang Jung:"Full Control of a PWM DC-AC converter for ac voltage Regulation," IEEE Transaction on Aerospace and Electronics System vol. 34,No.4 Oct. 1998. [2]. Ali Emadi, Alireza Khaligh, Zhong Nie, Young Joo Lee : "Integrated Power Electronic Converters and Digital Control" (chapter 11) [3]. Michal and Krysztof : "Hardware Application of AC/DC Converter based on Intelligent Power Module and DSP Controller "prace naukowe instytutu maszyn, napędów i pomiarów elektrycznych politechniki wrocławskiej ,Nr 26 ,2006. [4]. Somnida Ratanapanachote, Han Ju Cha, and Prasad N. Enjeti :"A Digitally controlled switch ModePower Supply Based on Matrix Converter" IEEE Transaction On Power Electronics, Vol. 21, No.1, Jan 2006. [5]. C.L. Neft and C.D. Schauder,"theory and design of 30hp matrix converter," IEEE transaction Ind. Appl.,Vol. 28, No.3,PP. 546-551, May/Jun.1992. [6]. Wangfeng Zhang, Guang Feng, Yan-Fei Liu and Bin wu :" Adigital Power factor correction (PFC) Control strategy optimized for DSP," IEEE transaction on power electronics, Vol. 19, No. 6, Nov 2004
|
Ch.Sivanarayana, K Pratyusha, P V Rambabu, G V Ramarao |
||||||||||||
A Study on Sulphuric Acid Attack on Concrete with Rice Husk Ash as a Partial Replacement of Cement | ||||||||||||
Cement is widely noted to be most expensive constituents of concrete. Concrete is one of the most widely used construction materials, because of its good durability to cost ratio. Rice husk ash (RHA) is a highly reactive pozzolanic material suitable for use in mix for Portland cement as replacement. The possibility of using RHA as a construction material need to be investigates. The study suggests that up to 10% replacement of OPC with RHA has the potential to be used as partial cement replacement, having good compressive strength. Effect of sulphuric acid (H2SO4) present in mixing water on properties of setting times and compressive strength of cement concrete. The rate of development of compressive strength decreased with the increase in concentration of H2SO4 at 7days, 28days and 60 days
Rice husk ash ,Sulphuric acid, cement concrete, compressive strength, curing.
[1]. A.M. Pande and S.G.Makarande,(2013), "Effect of Rice Husk Ash on Concrete" , International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 , Vol. 3, Issue 1, January -February 2013, pp.1718-1723 . [2]. E. Arunakanthi and H. Sudarsana Rao ,(2013)"Effects of Sulphuric Acid in Mixing And Curing Water on Strength of High- Performance Metakaolin Concrete", IJSR – International Journal of Scientific Research, ISSN No 2277 – 8179,Volume : 2 , Issue : 12 , December 2013 ,pp. 146-150. [3]. Marthong C. (2012) , "Effect of Rice Husk Ash (RHA) as Partial Replacement of Cement on Concrete Properties", International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 6, August - 2012 ISSN: 2278-0181. [4]. S. D. Nagrale, Dr. Hemant Hajare, Pankaj R. Modak(2012), "Utilization of Rice Husk Ash", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.001-005 1. [5]. Akinkurolere O. O. (2013) "Effects of Rice-Husk Ash as Partial Replacement for Cement on Compressive Strength of Recycled Aggregate Concrete", International Journal of Engineering and Technology, ISSN: 2049-3444 © 2013, Volume 3 No. 8, August, 2013.
|
Utkarsh, K. Senthil Kumar |
Enhanced Anonymization and Clustering of OSN |
In current scenario online social networks such as Facebook, LinkedIn are increasingly utilized by many people. These platforms have successfully created a virtual world by allowing the user to connect with each other just by sharing information about themselves. The information disclosed in here are public as well as private which has created a lot of trouble in recent times. The More data is shared by people the more privacy issues are being violated. In shared data publishing process, we need not only protect the privacy of data but also insure the data‟s integration. To address this issue we proposed the solution of reliable and secure data set by using various Anonymization and clustering concepts and then this paper explores data randomization, i.e. our method maintains statistical relations among data to preserve knowledge, whereas in most anonymization methods, knowledge is lost then we shift on how to launch inference attacks using released social networking data to predict private information and then our work shows the effectiveness of these techniques and finally we worked on how we can decrease the privacy leakage from social networks.
K-Anonymity, Quasi-Identifiers, I-Diversity, Generalization, Attacks and Privacy Model, NBDH.
[1]. http://en.wikipedia.org/wiki/Facebook. [2]. http://en.wikipedia.org/wiki/Twitter. [3]. http://en.wikipedia.org/wiki/Linked_in. [4]. http://en.wikipedia.org/wiki/Vkontakte. [5]. Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networking Sites (The Facebook Case).[online]. p. 2. Available at :http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf |
V. Khanaa, Dr. R. Udayakumar |
Efficient Pc Controlled By Hand Movement Using Mems Sensor Mouse |
Ahybrid two-dimensional position sensing system is designed for mouse applications. The system measures the acceleration of hand- movements which are converted into two-dimensional location coordinates. The system consists of four major components: 1) MEMS accelerometers, 2) CMOS analog read-out circuitry, 3) an acceleration magnitude extraction module, and 4) a 16-bit RISC microprocessor. Mechanical and analog circuit simulation shows that the designed padless mouse system can detect accelerations as small as 5.3 mg and operate up to 18MHz.
..
[1]. http://bioen.okstate.edu/Home/fharry/4212/HUMAN.PP.HTM [2]. L. M. Roylance and J. B. Angell, "A batch-fabricated silicon accelerometer," IEEE Trans. Electron Devices, vol. ED-26, pp.1911-1917, Dec. 1979. [3]. C. Yeh and K. Najafi, "A low-voltage bulk-silicon tunneling based microaccelerometer," Tech. Dig. IEEE IEDM, Washing- ton, DC. Dec. 1995. Pp.593-596. [4]. J. S. Chae, H. Kulah, K. Najafi, "A High Sensitivity Silicon- On-Glass Lateral μG Microaccelerometer.", Nanospace '2000, Houston, TX. [5]. N. Yazdi, K. Najafi, "An All-Silicon Single-Wafer Fabrication Technology for Precision Micro Accelerometers", Proc. Trans- ducers 97, pp. 1181-1184. |
Snuti Kumari, Garima Rathi, Priyanka Attri, Manee Kumar |
Types of Sensors and Their Applications |
As we all know that the sensors are the most important part of the embedded system and the robotics world. By using different types of sensors we can minimize the logic circuits and also make the system more efficient to get output by taking less input. Therefore, here is detailed view of different types of sensors and their applications in the different fields.
sensors, temperature sensors, IR sensors, UV sensors, Touch sensors, Proximity sensors, advanced sensor technology.
[1]. I.F. Akyildiz, W. Su, A power aware enhanced routing (PAER) protocol for sensor networks, Georgia Tech Technical Report, January 2002, submitted for publication [2]. A. Bakre, B.R. Badrinath, I-TCP: indirect TCP for mobile hosts, Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, BC, May 1995, pp. 136–143 [3]. P. Bauer, M. Sichitiu, R. Istepanian, K. Premaratne, The mobile patient: wireless distributed sensor networks for patient monitoring and care, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine, 2000, pp. 17–21 [4]. Bhardwaj, T. Garnett, A.P. Chandrakasan, Upper bounds on the lifetime of sensor networks, IEEE International Conference on Communications ICC'01, Helsinki, Finland, June 2001 [5]. P. Bonnet, J. Gehrke, P. Seshadri Querying the physical world IEEE Personal Communications (October 2000), pp. 10–15 |
Preksha R. Kolankar, Swati V. Sakhare |
||||||||||||
FPGA Implementation of QPSK modulator by using Hardware Co-simulation | ||||||||||||
The modulators are the basic requirement of communication systems they are designed to reduce the channel distortion & to use in RF communication hence many type of carrier modulation techniques has been already proposed according to channel properties & data rate of the system. QPSK (Quadrature Phase Shift Keying) is one of the modulation schemes used in wireless communication system due to its ability to transmit twice the data rate for a given bandwidth. The QPSK is the most often used scheme since it does not suffer from BER (Bit Error rate) degradation while the bandwidth efficiency is increased. It is very popular in Satellite communication. As the design of complex mathematical models such as QPSK modulator in "pure HDL‟ is very difficult and costly; it requires from designer many additional skills and is time-consuming. To overcome these types of difficulties, the proposed QPSK modulator can be implemented on FPGA by using the concept of hardware co-simulation at Low power. In this process, QPSK modulator is simulated with Xilinx System Generator Simulink software and later on it is converted in Very high speed integrated circuit Hardware Descriptive Language to implement it on FPGA. Along with the co-simulation, power of the proposed QPSK modulator can be minimized than conventional QPSK modulator. As a conclusion, the proposed architecture will not only able to operate on co-simulation platform but at the same time it will significantly consume less operational power.
QPSK, VHDL, FPGA, Xilinx
[1] Asaraf Mohamed Moubark,"FPGA implementation of low power digital QPSK modulator using verilog HDL",Journal of Applied Sciences 13(3),2013,385-392,ISSN 1812-5654 [2] Gaurav Purohit, Divya Vyas, Kota Solomon Raju, V.K Chaubey,Arvind Nehra "Hardware Co-simulation of BPSK and QPSK For SoftwareDefineRadio";IJECET,2013,pp 301-308. [3] Swapan K Samaddar, Atri Sanyal, Somali Sanyal," FPGA based generalized architecture for Modulation and Demodulation Techniques"Journal of Computing Technologies ISSN 2278– 3814,2012,27-32 [4] S.O. Popescu, A.S.Gontean and D.Ianchis; "QPSK Modulator on FPGA", IEEE 9th International Symposium on Intelligent Systems and Informatics,September 8-10, 2011, Subotica, Serbia,359-364, SISY 2011 [5] S.O. Popescu, A.S.Gontean and D.Ianchis; "Implementation of a QPSK System on FPGA"; IEEE, 2011, pp 365-370
|
Krupa Gandhi, K.L.Mokariya, Deepa Karvat |
||||||||||||
Simulation of PWM inverter for VFD application Using MATLAB | ||||||||||||
In this paper, at first, operating principle of variable frequency drive is explained. Different
components of VFD are explained. Suitability of VFD for different types of load is also explained. Concept of PWM inverter for VFD is explained and analysis of PWM inverter for VFD is done. Operating principle of VFD; PWM; Modulation Index; Carrier Frequency; variable torue load.
[1]. "ANALYSIS OF VARIABLE FREQUENCY THREE PHASE INDUCTION MOTOR DRIVE" Thida Win, Nang Sabai, and Hnin Nandar Maung. World Academy of Science, Engineering and Technology 18 2008. [2]. "ENERGY EFFICIENT INDUSTRIAL MOTORS" Gajendra Singh, N K Sharma, P Tiwari, International Journal of Engineering Science and Technology Vol. 2(12), 2010. [3]. "Energy use, energy savings and emission analysis in the Malaysian rubber producing industries" , R. Saidur a,, S. Mekhilef ,–applied energy Elsevier journal, 2010. [4]. "ENERGY AUDIT IN INDUSTRY-A CASE STUDY OF CENTRIFUGAL PUMPS" R.M. Holmukhe & K.D.Deshpande, i-COST Electronics & communication proceedings 13-15 jan-2011. [5]. " VARIABLE FREQUENCY DRIVE" Jigar N. Mistry , Hetal D. Solanki, Tejas M. Vala Research Expo International Multidisciplinary Research Journal Volume – II , Issue – III September – 2012.
|