Volume 10 - Issue 4

IJERD : Volume 10 - Issue 4

Version - 1 (April 2014)


D.Nageshwar Rao, M.S Sameera, M D.Nizamuddin Salman, Zubeda Begum

Design of Low Power High Speed Fully Dynamic CMOS Latched Comparator
  • Abstract
  • Keywords
  • Reference
  • Full Article
A novel of low power high speed comparator is proposed in this paper which consists of less sensitive in delay using dynamic CMOS latched comparator method. It aimed for less sensitive in delay and high speed design compared with other design techniques. The simulation results carried out using LT spice tool shows up to 62% less sensitivity of the delay, which is about 0.098ns than the conventional double-tail latched comparators at approximately the same area and power consumption.
[1]. Jun He, Sanyi Zhan, Degang Chen, and R.L. Geiger, "Analyses of Static and Dynamic Random Offset Voltages in Dynamic Comparators," IEEE Trans.Circuits Syst. I: Reg Papers, vol. 56, pp. 911-919,May 2009.
[2]. Nikoozadeh and B. Murmann, "An Analysis of Latch Comparator Offset Due to Load Capacitor Mismatch," IEEE Trans. Circuits Syst. II: Exp. Briefs, vol. 53,no. 12, pp.1398-1402, Dec. 2006.
[3]. Pedro M.Figueiredo, Joao C.Vital, "Kickback Noise Reduction Techniques for CMOS Latched Comparator", IEEE Transactions on Circuits and Systems, vol.53, no.7, pp.541-545, July 2006.
[4]. B. Murmann et al., "Impact of scaling on analog performance and associated modeling needs," IEEE
Trans. Electron Devices, vol. 53, no. 9, pp. 2160-2167, Sep. 2006.
[5]. T. Kobayashi, K. Nogami, T. Shirotori and Y. Fujimoto, "A current-controlled latch sense amplifier and a static power-saving input buffer for low-power architecture," IEEE J. Solid-State Circuits, vol. 28, pp.523-52, April 1993
Citation
D.Nageshwar Rao, M.S Sameera, M D.Nizamuddin Salman, Zubeda Begum "Design of Low Power High Speed Fully Dynamic CMOS Latched Comparator" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0001. India
Page 01-06
Download    
ANED 06.067X/A1040106 aned
aned 067X-0104-0106

 

Ahmed LAABIDI, Lahsen GOURARI, Abdellah EL HMAIDI, Mohamed AARAB, Mostafa GRETAA

Caractérisation géomorphologique, litho stratigraphique et sédimenntologique des dépôts quaternaires de l'Oued Bou Salloum (Haute Moulouya, Maroc)

  • Abstract
  • Keywords
  • Reference
  • Full Article
The region of Sidi Abdalwahd is located in the High Moulouya, about 3 km NE of Mibladane. It occupies the SE of the Mibladane-Ahouli Paleozoic-buttonhole. The geological map, drawn, shows a geological substratum with varied backgrounds ranging from Paleozoic to Jurassic. These lands are capped by current and quaternary deposits. Current deposits, composed of detritus, are deposits of slope, spreading alluvial fans and / or bottom of the valley. These deposits were created by landslides and intermittent flow, diffuse type of concentrated torrential. Quaternary deposits are in the form of three terraces (T3, T1 and T2) to staggered nested. These deposits, sedimentological characteristics similar to the current deposits, were established by flow intermittent torrential type in bioclimatic conditions comparable to current conditions. Deposits recorded neotectonic events that have been expressed by joints and faults, having a role in the drainage pattern and the current route of the valley of the Oued Bou Salloum and by tilting of layers.
Quaternary deposits, geomorphology, lithostratigraphy, sedimentology, Oued Bou Salloum, Mibladane, High Moulouya, Morocco
[1]. Combe, M., & Simonot, M., "La Haute Moulouya, le sillon d'Itzer et le massif de Boumia-Aouli. Ressources en eaux du Maroc", Notes et Mémoires du Service de Géologie du Maroc, 1975, 213, pp. 193-201.
[2]. Raynal, R., "Plaines et piémonts du bassin de la Moulouya (Maroc oriental) : Etude géomorphologique", Thèse de Doctorat d'Etat, Université Mohammed V, Rabat, 1961, 671 p.
[3]. Lefèvre, D., "Les formations plio-pléistocènes du bassin de Ksabi (Moyenne Moulouya, Maroc)", Thèse de Doctorat, Université Bordeaux I, Talence, 1985, 243 p.
[4]. Bouabdelli, A., Saidi, N., M'Rabet, S., Escarre, J. & Leblanc, M., "Oued Moulouya : vecteur des métaux lourds (Maroc) ", Revue des Sciences de l'eau, 2005, 18 (2), pp. 199-213.
Citation
Ahmed LAABIDI, Lahsen GOURARI, Abdellah EL HMAIDI, Mohamed AARAB, Mostafa GRETAA "Caractérisation géomorphologique, litho stratigraphique et sédimenntologique des dépôts quaternaires de l'Oued Bou Salloum (Haute Moulouya, Maroc)" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0002. Marocco
Page 07-19
Download
ANED 06.067X/B1040719 aned
aned 067X-0104-0119

 

Rosinei B. Ribeiro, José W. J. Silva, Bianca S. M. Domingos, Jorge L. Rosa and, Nilo A. S. Sampaio

Microstructural Characterization and Pits Morphology Analysis on Austenitic Stainless Steel Aisi 304
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper aims to study the evolution establishing distribution and classification of pits in austenitic stainless steels AISI 304 obtained in state as received and heat-treated under different exposure times via Salt Spray. The work methodology started from the following steps: metallography preparation, corrosion tests via salt spray in different conditions, microstructural analysis, analysis of pits profiles, digital processing and images analysis for purposes of characterizing distribution, morphology and size of pits. In results obtained in digital processing and images analysis of profiles, the data were statistically analyzed using the median as evaluation parameter in the alloy as received and treated. The alloy, as received, exhibited the following morphology: hemispherical pits > transition region A > transition region B > irregular > conical. The pits amount in alloy treated in each exposure time is of the same order: transition region B > Hemispheric > transition region A > conical > irregular.
Pitting Corrosion, Austenitic Stainless Steel 304, Salt Spray, Metallography, Microstructure.

[1] Uhlig HH. Corrosion and Corrosion Control. New York: John Willey & Sons; 1967.

[2] Breslin CB, Macdonald DD, Sikora E, Sikola J. Photo-inhibition of pitting on types 304 and 316 stainless steels in chloride containing solution. Electrochimica Acta, 1997; 42: 137-144.

[3] Jayalakshmi M, Muralidharam VS. Empirical and deterministc models of pitting corrosion – an overview, Corrosion reviews, 2011; 14: 375-402.

[4] Ernest P, Laycock NJ, Moayed MH, Newman RC. The mechanism of lacy cover formation in pitting. Corrosion Science, 1997; 39; 1133-1136.

[5] Newman RC, Franz EM. Growth and Repassivation of Single Corrosion Pits in Stainless Steel. 1984; NACE, 40.

Citation
Rosinei B. Ribeiro, José W. J. Silva, Bianca S. M. Domingos, Jorge L. Rosa and, Nilo A. S. Sampaio "Microstructural Characterization and Pits Morphology Analysis on Austenitic Stainless Steel Aisi 304" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0003. Brazil
Page 20-28
Download
ANED 06.067X/C1042028 aned
aned 067X-0104-0128

 

Ch.Sajan, T. Praveen Kumar, T.Shiva, B.Rajashekar

A New Hybrid 27-Level Cascaded Multilevel Inverter Fed Induction Motor Drive With Low Common Mode Voltage
  • Abstract
  • Keywords
  • Reference
  • Full Article
Hybrid cascade multilevel inverters combine semiconductor devices of different voltage ratings and technologies, which theoretically allow high efficiency to be achieved. This paper deals with new hybrid multilevel inverter fed induction motor drive. It focuses on asymmetrical topologies, and introduces 27-level inverter fed Induction motor drive. The total harmonic distortion (THD) is reduced with more number of steps in output voltage without using pulse width modulation techniques. A new method is proposed to reduce the common mode voltage and bearing currents. This paper also focuses on the voltage balancing. Simulation results obtained from Matlab/simulink to simulate 27-levels of voltage and the parameters of the drive.
Cascaded multilevel inverter, Induction motor drive, Common mode voltage, Bearing currents, Total harmonic distortion.

[1] H. Kuhn, N. E. Ruger, and A. Mertens, "Control Strategy for Multilevel Inverter with Non-ideal DC Sources," in Proceeding of IEEE PESC'07, 2007, pp. 632-638.

[2] J. I. Leon, R. Portillo, S. Vazquez, J. J. Padilla, L. G. Franquelo, and J. M. Carrasco, "Simple unified approach to develop a time-domain modulation strategy for single-phase multilevel converters," IEEE Transactions on Ind. Electron., vol. 55, No. 9, pp. 3239-3248, September 2008.

[3] S. Chen, T. A. Lipo, and D. Fitzgerald, "Source of induction motor bearing currents caused by PWM inverters," IEEE Trans. Energy Converters., vol. 11, no. 1, pp. 25–32, Mar. 1996.

[4] D. Macdonald and W. Gray, "PWM drive related bearing failures," IEEE Ind. Appl. Mag., vol. 5, no. 4, pp. 41–47, Jul. Aug. 1999.

[5] D. Busse, J. Erdman, R. J. Kerkman, D. Schlegel, and G. Skibinski, "Bearing currents and their relationship to PWM drives," IEEE Trans. Power Electron., vol. 12, no. 2, pp. 243–252, Mar. 1997.

Citation
Ch.Sajan, T. Praveen Kumar, T.Shiva, B.Rajashekar "A New Hybrid 27-Level Cascaded Multilevel Inverter Fed Induction Motor Drive With Low Common Mode Voltage" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0004. India
Page 29-35
Download
ANED 06.067X/D1042935 aned
aned 067X-0104-0135

 

Jenifer Priyanka R.M, Saravana Bhaarathi.S, Varun .J

Study on lateral deflection of buildings with fixed support under various soil conditions
  • Abstract
  • Keywords
  • Reference
  • Full Article
Generally the structures are not only supported by their respective foundations but also by the Soil. But in most of the cases the designers fail to consider the interaction of the soil as well as its influence over superstructure during Earthquake. This paper studies the lateral deflection on the regular and vertically irregular framed RC Buildings with fixed support, under various soil conditions like hard, medium and soft. The regular and irregular RC framed buildings were modelled for 4m and 5m spacing. These buildings were analysed using STAAD Pro V8i under various soil conditions. The lateral deflection of these buildings were tabulated and compared with respect to types of buildings. The lateral deflection was analysed for both X-direction and Z-direction. It was concluded that the lateral deflection for regular building in Z direction was higher for 5m spacing of column with respect to soft soil.
Fixed Base; Deflection; Various Soil Condition; Irregular Structures.
[1]. B.C.Punmia and Ashok Kumar Jain, "Soil Mechanics and Foundation Engineering" referred.
[2]. Wolf, J.P, Prentice Hall, Englewood Cliffs, N.J., 1985. Soil-Structure Interaction.
[3]. Uma S.R., and Jain, S.K Seismic Design of Beam Column Joints In RC Moment Resisting Frames-Review of Codes, Structural Engineering and Mechanics Vol . 23, No. 5, 2006, PP.579-597.
[4]. A.D. Pandey, Prabhat Kumar and Sharad Sharma "Seismic soilstructure interaction of buildings on hill slopes", Journal of Civil and Structural Engineering, 2011.
[5]. STAAD Pro, Version 8i, Research Engineers International, by Bentley Systems, 2007.
Citation
Jenifer Priyanka R.M, Saravana Bhaarathi.S, Varun .J "Study on lateral deflection of buildings with fixed support under various soil conditions" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0005. India
Page 36-40
Download
ANED 06.067X/E1043640 aned
aned 067X-0104-0140

 

Sundaresha M P, Harish K V, Prabhas R K, Dinesha Shetty

An Hierarchical Approach of processing Wavelet Co-efficient in Breadth First Way by the Arithmetic coder
  • Abstract
  • Keywords
  • Reference
  • Full Article
A high-throughput memory-efficient arithmetic coder architecture for the set partitioning in hierarchical trees (SPIHT) image compression is proposed based on a simple context model in this paper. The architecture benefits from various optimizations performed at different levels of arithmetic coding from higher algorithm abstraction to lower circuits implementations. First, the complex context model used by software is mitigated by designing a simple context model, which just uses the brother nodes' states in the coding zero tree of SPIHT to form context symbols for the arithmetic coding. The simple context model results in a regular access pattern during reading the wavelet transform coefficients, which is convenient to the hardware implementation, but at a cost of slight performance loss. Second, in order to avoid rescanning the wavelet transform co efficient, a breadth first search SPIHT without lists algorithm is used instead of SPIHT with lists algorithm. Especially, the coding bit-planes of each zero tree are processed in parallel. Third, an out-of-order execution mechanism for different types of context is proposed that can allocate the context symbol to the idle arithmetic coding core with a different order that of the input. For the balance of the input rate of the wavelet co efficient, eight arithmetic coders are replicated in the compression system. And in one arithmetic coder, there exists four cores to process different contexts. Fourth, several dedicated circuits are designed to further improve the throughput of the architecture. The common bit detection (CBD) circuit is used for unrolling the renormalization stage of the arithmetic coding. The carry look- ahead adder (CLA) and fast multiplier-divider are also employed to shorten the critical path in the architecture. Moreover, an adaptive clock switch mechanism can stop some invalid bit-planes' clock for the power saving purpose according to the input images. Experimental results demonstrate that the proposed architecture attains a throughput of 902.464 Mb/s at its maximum and achieves savings of 20.08% in power consumption over full bit-planes coding scheme based on field- programmable gate arrays (FPGAs).
Arithmetic coding, common bit detection (CBD) circuit, context model, out-of-order execution, set partitioning in hierarchical trees (SPIHT), VLSI arithmetic coder architecture.
[1] J. Rissanen, "Generalized kraft inequality and arithmetic coding," IBM J. Res. Developm., vol. 20, no. 3, pp. 198– 203, May 1976.
[2] J. Rissanen and G. G. Langdon, "Arithmetic coding," IBM J. Res. Developm., vol. 23, no. 2, pp. 149–162, Mar. 1979.
[3] ISO/IEC JTC1 Information Technology-Digital Compression and Coding of Continuous-Tone Still Images-Part 1: Requirements and Guidelines, ISO/IEC International Standard 10918-1, ITU-T Rec.T.81, 1993.
[4] JPEG2000 Part I Final Draft International Standard, ISO/IEC JTC1/ SC29/WG1 N1890, Sep. 2000.
[5] D. Taubman, "High performance scalable image compression with EBCOT," IEEE Trans. Image Process., vol. 9, no. 7, pp. 1158–1170,Jul. 2000.
Citation
Sundaresha M P, Harish K V, Prabhas R K, Dinesha Shetty "An Hierarchical Approach of processing Wavelet Co-efficient in Breadth First Way by the Arithmetic coder" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0006. India
Page 41-48
Download
ANED 06.067X/F1044148 aned
aned 067X-0104-0148

 

Remadevi M., Anjali G. Pillai, Elizabeth Baby George, Priya Narayanan, Sophiya Sunny

Study of Fibre Reinforced Bituminous Concrete
  • Abstract
  • Keywords
  • Reference
  • Full Article
The proposed work presents the studies on stability, flow and volumetric properties of fibre reinforced bituminous concrete in comparison with the properties of conventional bituminous concrete. Marshall's stability tests were conducted to determine the optimum binder content. By varying the amount of 10 mm polypropylene fibres (4%, 6%, 8% and 10% by weight of bitumen), optimum fibre content was obtained. The results indicate that the addition of PP fibres increases the stability but decreases the flow value.
Fibre reinforced, PP fibres, FRBC, Marshall's test, OBC.
[1]. K.Thulasiraja, V.L. Narasimha, "Studies on Coir Fibre Reinforced bituminous concrete", International
Journal of Earth Sciences and Engineering, ISSN 0974-5904.
[2]. Sayyed Mahdi Abthai, Saman Esfandiarpour, Mehmet Kunt, Sayyed Mahdi Hejazi, Milad Ghorban
Ebrahimi, "Hybrid Reinforcement of Asphalt Concrete mixtures using Glass and Polypropylene fibres",
Journal of Engineered Fibres and Fabrics.
[3]. T. Subramani, "Experimental Investigations on Coir fibre reinforced bituminous mixes", International
Journal of Engineering Research and Applications.
[4]. Kamil E Kaloush, Waleed A Zeiade, "Evaluation of Fibre Reinforced Asphalt mixtures using advanced
material characterization tests".
[5]. J. Murali Krishnan "Asphalt Mix Design", HINCOL Training Program – 2013.
Citation
Remadevi M., Anjali G. Pillai, Elizabeth Baby George, Priya Narayanan, Sophiya Sunny "Study of Fibre Reinforced Bituminous Concrete" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0007. India
Page 49-56
Download
ANED 06.067X/G1044956 aned
aned 067X-0104-0156

 

Sunita Kumari Jain, Fanibhushan Sharma, Mukesh Kumar Baliwal

Modeling and Simulation of an Induction Motor
  • Abstract
  • Keywords
  • Reference
  • Full Article
Induction motors are most widely used motors due to their reliability, robustness and low cost. The
qd0 transformation theory is applied for the modeling and simulation of an induction motor on the stationary
reference frame. The differential equations of system represents the dynamic behavior of the machine. The
simulation are done in MATLAB/SIMULINK. The effective motor output variables namely phase current,
motor speed and electromagnetic torque are examined. The results obtained by simulation clearly shows the
elegance of qd0 transformation theory in machine modeling.
Dynamic modeling, induction machine, stationary reference frame, MATLAB/SIMULINK.
[1]. Shakuntla Boora, S. K Agarwal, K. S Sandhu, "Dynamic d-q axis modeling of three-phase
asynchronous machine using matlab", International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, Vol. 2, pp. 3942-3951, 2013.
[2]. R. Krishan, "Electric motor drives: Modeling, analysis and control", Prentice Hall Company, New
Jersey, 2001.
[3]. K.L. Shi, T.F. Chan, Y. K. Wong and S. L. Ho, "Modeling and simulation of the three-phase induction
motor using simulink," International Journal of Electrical Engineering Education, vol. 36, pp. 163-
172, 1999.
[4]. Lee, R.J., Pillay, P., and Harley, R.G., "D, Q Reference frame for the simulation of induction
motors", Electric Power Systems Research Journal, vol. 8, pp. 15-16, October 1984.
[5]. B.K Bose, "Modern power electronics and ac drives", Prentice Hall, 2002.
Citation
Sunita Kumari Jain, Fanibhushan Sharma, Mukesh Kumar Baliwal "Modeling and Simulation of an Induction Motor" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0008. India
Page 57-61
Download
ANED 06.067X/H1045761 aned
aned 067X-0104-0161

 

Achyut P. Banginwar, Anup K. Nagdeve, Gaurav S. Naigaonkar, Prof. J. G.Ingale

Achyut P. Banginwar, Anup K. Nagdeve, Gaurav S. Naigaonkar, Prof. J. G.Ingale

  • Abstract
  • Keywords
  • Reference
  • Full Article
Milling is a process of producing flat and complex shapes with the use of multi-tooth cutting tool, which is called a milling cutter and the cutting edges are called teeth. The axis of rotation of the cutting tool is perpendicular to the direction of feed, either parallel or perpendicular to the machined surface. The machine tool that traditionally performs this operation is a milling machine. Milling is an interrupted cutting operation: the teeth of the milling cutter enter and exit the work during each revolution. This interrupted cutting action subjects the teeth to a cycle of impact force and thermal shock on every rotation. The tool material and cutter geometry must be designed to withstand these conditions. Cutting fluids are essential for most milling operations .In this Paper the design aspects of milling cutter is analyzed. The objective considered is the design and modeling of milling cutter and to analyze various stress components acting on it. By taking two different material i.e. HSS and Cemented Carbide to check stress and deformation. The design and analysis is carried out using the software like Pro-E and ANSYS.
ANSYS, Pro-E, cutting fluids, cutting edges, High Speed Steel, Milling Speed, Cemented Carbide.
[1]. Chittibomma. Tirumalaneelam, Tippa Bhimasankara Rao, April 2013, "Structural Analysis of Milling Cutter Using FEA", International Journal Of Computational Engineering Research, Vol. 3, Issue .4,pp101-105.
[2]. K. Chaitanya, M. Kaladhar,Nov-Dec 2013 "Design and Analysis Of Special Shape Milling Cutter Using Finite Element Analysis", International Journal Of Modern Engineering Research, Vol. 3, Issue. 6, pp 3716-3722.
[3]. V. Gowtham Reddy, M. Kumara Swamy, Nov 2012,"Modeling and Analysis of a Surface Milling Cutter Using Finite Element Analysis", International Journal of Engineering Research and Development, Vol.4, Issue. 10, pp49-54.
[4]. Shigley, J. E. and Mischke, C. R., 1989, Mechanical Engineering Design, Fifth Edition. McGraw Hill Book Company.
[5]. E.B. Kivanc, E. Budak, 2004, "Structural modeling of end mills for form error and stability analysis", International Journal of Machine Tools & Manufacture ,pp 1151–1161.
Citation
Achyut P. Banginwar, Anup K. Nagdeve, Gaurav S. Naigaonkar, Prof. J. G.Ingale "Analysis of Gear Milling Cutter Using Finite Element Analysis" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0009. India
Page 62-68
Download
ANED 06.067X/I1046268 aned
aned 067X-0104-0168

 

Dhomse Kanchan, Prof. R.L.Paikrao

Survey paper on Generalized Inverted Index for Keyword Search

  • Abstract
  • Keywords
  • Reference
  • Full Article
Inverted lists are normally used to index selected documents to acess the documents according to a set of keywords efficiently. Since inverted lists are normally large in size, many compression techniques have been proposed to minimize the storage space and disk I/O time.This paper presents we propose improved technologies for document identifier assignment a more convenience index structure, the Generalized Inverted Index which merges consecutive IDs in inverted lists into intervals to avoid large storage space. With this index structure, more efficient algorithms can be devised to implement basic keyword search operations. The performance of generalized inverted index is also improved by reordering the documents in datasets using two scalable new algorithms. Experiments on the performance and scalability of generalized inverted index on real datasets prove that Generalized Inverted Index requires minimum storage space as well as increases the keyword search performance, as compared to the old inverted indexes.
keyword search; DocID Assignment, index compression; document reordering, Union Algorithm, Intersection Algorithm.
[1]. F. Scholer, H. E. Williams, J. Yiannis, and J. Zobel, Compression of inverted indexes for fast query evaluation, in Proc. of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Tammpere, Finland, 2002, pp. 222-229.
[2]. M. Zukowski, S. Hman, N. Nes, and P. A. Boncz, Super-scalar RAM-CPU cache compression, in Proc. of the 22nd International Conference on Data Engineering, Atlanta, Georgia, USA, 2006, pp. 59.
[3]. R. Blanco and A. Barreiro. Characterization of a simple case of the reassignment of document identifiers as a pattern sequencing problem. In Proc. of the 28th annual int. ACM SIGIR conference on Research and development in inf. retrieval, 2005.
[4]. R. Blanco and A. Barreiro. Document identifier reassignment through dimensionality reduction. In Proc. of the 27th European Conf. on Information Retrieval, pages 375–387, 2005.
[5]. R. Blanco and A. Barreiro. Tsp and cluster-based solutions to the reassignment of document identifiers. Inf. Retr., 9(4):499–517, 2006
Citation
Dhomse Kanchan, Prof. R.L.Paikrao "Survey paper on Generalized Inverted Index for Keyword Search" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0010. India
Page 69-73
Download
ANED 06.067X/J1046973 aned
aned 067X-0104-0173


Version - 2 (April 2014)

 

M.Arulmani, V.R.Hema Latha

GANJA IS ILLEGAL PLANT?... (A new theory on "Mars Drug")
  • Abstract
  • Keywords
  • Reference
  • Full Article
Today across global countries "Ganja" is considered as a illegal substance because of its certain Negative effects which promotes ill-health to Human. This scientific based research article focus that "Ganja" popularly knows as "MARIJUANA" or "CANNABIS" shall be considered as species to "Natural Holistic Plant" called family name "ACEA-e". The "Acea-e" also shall mean "EZHEM DRUG", "MOTHER OF DRUGS" originated in prehistoric Land origin "EZHEM" (also called as MARS). In prehistoric Tamil e-DRUG shall be called as "KASAYAM".
a) Philosophy of "MARS DRUGS"
b) Philosophy of "DRUGS"
c) Philosophy of "MEDICINES"
d) Philosophy of "ORGANIC"
e) Philosophy of "INORGANIC"
f) Philosophy of "MARIJUANA"
[1]. Intensive Internet "e-book" study through, Google search and wikipedia
[2]. M.Arulmani, "3G Akkanna Man", Annai Publications, Cholapuram, 2011
[3]. M. Arulmani; V.R. Hemalatha, "Tamil the Law of Universe", Annai Publications, Cholapuram, 2012
[4]. Harold Koontz, Heinz Weihriah, "Essentials of management", Tata McGraw-Hill publications, 2005
[5]. M. Arulmani; V.R. Hemalatha, "First Music and First Music Alphabet", Annai Publications, Cholapuram, 2012
Citation
M.Arulmani, V.R.Hema Latha "GANJA IS ILLEGAL PLANT?... (A new theory on "Mars Drug")" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0001. India
Page 01-12
Download    
ANED 06.067X/A1040112 aned
aned 067X-0104-0212

 

Adel Zakarazadeh, Somayye Moslemi

Multiple WH – Questions and Their Acceptance by Native & Non-Native Speakers of English. A Case Study of Iranian B.A. General English Students.
  • Abstract
  • Keywords
  • Reference
  • Full Article
This study investigates the knowledge of multiple WH – questions and their acceptance rate by non-native speakers of English whose first language is Persian. Persian grammar is known to license a wider range of such questions who ate why? For example. But this is not the case for English grammar. It means such questions are not all acceptable in English. Acceptability judgements were obtained on 6 different types of such questions. Acceptability of English examples was rated by both native and non-native speakers of English, but Persian examples were only judged by Persian speakers of English. The results for native speakers judging their own language were generally in accord with expectations. The non-native speakers of English were divided into two groups through proficiency test of grammar (OPT). Both groups significantly were different from native speakers in their ratings of these sentences. But the advanced level students were better than the intermediate level ones in judging these questions.
Multiple WH-questions, - acceptability – Judgements – non-active speaker – proficiency test.
[1]. Beley – Vroman,R., Felix,S. & Ioup,G.1988. The acceptability of universal grammar in adult language learning second language Research 4, 1-32.
[2]. Beley – Vroman,R. & Yashinga, N.2000. The acquisition of multiple Wh- questions by high proficiency non-native speakers of English second language Research 16, 3-26
[3]. Brown, B. 1994. principles of language learning and teaching. New Jersey: Prentice Hall, Inc.
[4]. Chomsky,N.1980 Rules and Representation – Newyork: Columbia University Press.
[5]. Chomsky,N.1988 Language and problems of knowledge Cambridge, MA: MIT Press.
Citation
Adel Zakarazadeh, Somayye Moslemi "Multiple WH – Questions and Their Acceptance by Native & Non-Native Speakers of English. A Case Study of Iranian B.A. General English Students." published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0002. Iran
Page 13-19
Download    
ANED 06.067X/B1041319 aned
aned 067X-0104-0219

 

Ajay Gore, Nirvedh Meshram, Sumit Gadi, Rahul Raghatate

Design of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail
  • Abstract
  • Keywords
  • Reference
  • Full Article
Traditional ticketing system for railways involves serpentine queues for passengers and requires constant human processing. Attempts to fix this problem include coupon books for passengers and more recently smart cards for standard railways. In standard railway, the purpose of the smartcard is to automatically print a ticket for the passenger. However, if a smart card system is to be implemented for Metrorail the purpose of this smartcard will be to give the passenger access to the station by commanding the turnstile to rotate(or a flap gate to open) and then again enable the passenger to exit at the destination station. Building on this idea, we propose a more advanced automatic ticketing system using Near Field Communication keeping in mind the specific needs and requirements of Metrorail systems in India and also the convenience of the passengers. The prototype of this system is implemented and described in this paper.
Ticketing system, human processing, smartcard, Metrorail, automatic ticketing, Near Field Communication, RFID, automatic fare collection
[1]. NFC Forum
[2]. Near Field Communication - Interface and Protocol (NFCIP-1) ECMA-340 3rd Edition / June 2013
[3]. NFC Data Exchange Format, NFC Forum Technical
Specification, NDEF 1.0, July 2006.
[4]. NFC Record Type Definition, NFC Forum Technical
[5]. Arduino Website (http://arduino.cc/en/Main/arduinoBoardMicro)
Citation
Ajay Gore, Nirvedh Meshram, Sumit Gadi, Rahul Raghatate "Design of an Automatic Fare Collection System Using Near Field Communication with Focus on Indian Metrorail" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0003. India
Page 20-24
Download    
ANED 06.067X/C1042024 aned
aned 067X-0104-0224

 

Ch.Sajan, T. Praveen Kumar, T.Shiva, K.Srilatha

A New Hybrid Cascaded Multilevel Inverter Fed Induction Motor Drive with Mitigation of Bearing Currents and Low Common Mode Voltage
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper deals with new hybrid multilevel inverter fed induction motor drive. It focuses on the different topologies to mitigate the common mode voltages, bearing currents and their effects on the drive. In proposed topology, the total harmonic distortion (THD) is reduced with more number of steps in output voltage without using pulse width modulation techniques. The main advantage of this proposed topology is the insulation required in the motor is reduced due to low common mode voltage and mitigation of bearing currents. A new method is proposed to reduce the common mode voltage and bearing currents. This paper also focuses on the adverse effects of bearing currents in the motor drive. Simulation results obtained from Matlab/Simulink to simulate the output voltage and the parameters of the drive.
Cascaded multilevel inverter, Induction motor drive, Common mode voltage, Bearing currents mitigation techniques, Total harmonic distortion.

[1] Annette von Jouanne and Alan Wallace, "A Short Course on Adjustable Speed Drives and Utility Application Issues", July, 2000.

[2] A. Nabea, I. Takahashi and H. Akagi, " A New Neutral-Point-Clamped PWM Inverter", IEEE Transactions on Industry Applications, Vol. IA-17, No. 5, September/October 1981, pp.518-523.

[3] S. Chen, T. A. Lipo, and D. Fitzgerald, "Source of induction motor bearing currents caused by PWM inverters," IEEE Trans. Energy Converters., vol. 11, no. 1, pp. 25–32, Mar. 1996.

[4] D. Macdonald and W. Gray, "PWM drive related bearing failures," IEEE Ind. Appl. Mag., vol. 5, no. 4, pp. 41–47, Jul.–Aug. 1999.

[5] D. Busse, J. Erdman, R. J. Kerkman, D. Schlegel, and G. Skibinski, "Bearing currents and their relationship to PWM drives," IEEE Trans. Power Electron., vol. 12, no. 2, pp. 243–252, Mar. 1997.

Citation
Ch.Sajan, T. Praveen Kumar, T.Shiva, K.Srilatha "A New Hybrid Cascaded Multilevel Inverter Fed Induction Motor Drive with Mitigation of Bearing Currents and Low Common Mode Voltage" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0004. India
Page 25-29
Download    
ANED 06.067X/D1042529 aned
aned 067X-0104-0229

 

Sabyasachi Patra, Karishma Velisetty, Prathamesh Patel, Mr. Abhay Kolhe

A study on the OpenGL ES and the OpenSL ES in the Android NDK paradigm
  • Abstract
  • Keywords
  • Reference
  • Full Article
When it comes to beautiful visual rendering on the Android handsets that we use today, much of that credit has to be given to the various graphic libraries which come along with programming paradigms. Just like anything in programming and technology, there are good and bad ways to implement and get certain things done both at the front end and the backend. What the Android Native Development Kit (NDK) does is that it works alongside the Software Development Kit (SDK) and injects the native powers of any C/C++ application into your Android application which can be packaged as any normal application and run on an emulator/device of choice. The SDK, the NDK, the ADT and Eclipse are primarily what one requires to directly hit on towards Android Native Development. The Android NDK basically is a companion toolset for the Android SDK, designed to augment the SDK to allow developers to implement and embed performance-critical portions of their applications using "machine code‟ generating programming languages like C, C++, and Assembly. So now how does one enjoy the seamless graphics and sound in multimedia applications on an Android phone? It is the Native Graphics/ Sound API‟s which come as a result of relying on performance critical native code which makes this possible. There are various levels of detail to which this can be carried out. In this paper we delve into the introductory portions of what the Open Graphics Library and the Open Sound Library for Android actually are and the important steps which broadly need to be followed, in order to get such applications up and running. We also talk about the basic Hardware and Software implementations of each of these along with the Configurations, simplified diagrams as well as the role of sensors.
NDK, Companion toolset, Native Programming, Open GL, Open SL, C++ Android, Graphics

[1] The Android Google group (http://groups.google.com/group/androiddevelopers)

[2] Android NDK group (http://groups.google.com/group/android-ndk)

[3] The Android Developer BlogSpot (http://android-developers.blogspot.com/)

[4] Google Code (http://code.google.com/hosting/) for lots of NDK exampleapplications.
[5] Stack Overflow (http://stackoverflow.com/)

Citation
Sabyasachi Patra, Karishma Velisetty, Prathamesh Patel, Mr. Abhay Kolhe "A study on the OpenGL ES and the OpenSL ES in the Android NDK paradigm" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0005. India
Page 30-35
Download    
ANED 06.067X/E1043035 aned
aned 067X-0104-0235

 

S.Ramya, S.Karthikeyan

Test Pattern Generation By Using Accumulator
  • Abstract
  • Keywords
  • Reference
  • Full Article
Weighted pseudorandom built-in self test (BIST) schemes have been utilized in order to drive down the number of vectors to achieve complete fault coverage in BIST applications. Weighted sets comprising three weights, namely 0, 1, and 0.5 have been successfully utilized so far for test pattern generation, since they result in both low testing time and low consumed power. In this paper an accumulator-based 3-weight test pattern generation scheme is presented; the proposed scheme generates set of patterns with weights 0, 0.5, and 1. Since accumulators are commonly found in current VLSI chips, this scheme can be efficiently utilized to drive down the hardware of BIST pattern generation, as well. Comparisons with previously presented schemes indicate that the proposed scheme compares favorably with respect to the required hardware.
Built-in-self-test(BIST),test per clock, VLSI testing, Weighted test pattern generation.

[1]. P. Bardell, W. McAnney, and J. Savir, Built-In Test For VLSI: Pseudorandom Techniques. New York: Wiley, 1987

[2]. P. Hortensius, R. McLeod, W. Pries, M. Miller, and H. Card, "Cellular automata-based pseudorandom generators for built-in self test," IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., vol. 8, no. 8, pp. 842–859, Aug. 1989.
[3]. A. Stroele, "A self test approach using accumulators as test pattern generators," in Proc. Int. Symp. Circuits Syst., 1995, pp. 2120–2123.
[4]. H. J. Wunderlich, "Multiple distributions for biased random test patterns," in Proc. IEEE Int. Test Conf., 1988, pp. 236–244.

[5]. I. Pomeranz and S. M. Reddy, "3 weight pseudo-random test generation based on a deterministic test set for combinational and sequential circuits," IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst., vol.12, no. 7, pp. 1050–1058, Jul. 1993.

Citation
S.Ramya, S.Karthikeyan "Test Pattern Generation By Using Accumulator" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0006. India
Page 36-42
Download    
ANED 06.067X/F1043642 aned
aned 067X-0104-0242

 

Swarnalata Bollavarapau, Neil K. Samuel, Maneesh Shankar, Nihaar Shah

An Analytical Study of Various Methods Used to Build an Autonomous Fire-Extinguishing Robot
  • Abstract
  • Keywords
  • Reference
  • Full Article
Expanding human population and growing industrialization, has led to a manifold increase in the number fire accidents. The physical limitations of humans to deal with these kinds of destructive fires combined with the adverse conditions, makes fire extinguishing an arduous task. The use of autonomous robots can reduce the errors and the limitations that are faced by human fire fighters. This paper is an effort to understand the various approaches that are possible to build such a robot. We compare and contrast the various design and construction steps that are involved in the process of building a fire fighting robot.
Fire Fighting, Autonomous Robot, Sensors, Micro Controller, Differential Turn

[1]. Ratnesh Malik, S. S. Kumbhalkar, "Fire Fighting Robot: An Approach‟, Indian Streams Research Journal, Vol.2, Issue.II/March; 12pp.1-4.

[2]. Taiser T. T. Barros, Walter Fetter Lages, "Development of a Firefighting Robot for Educational Competitions‟, RiE 2012, Prague.

[3]. V.J. Lumelsky and A.A. Stepanov, "Path Planning Strategies for a Point Mobile Automaton Moving Amidst Unknown Obstacles of Arbitary Shape", Algorithmica, Vol. 2, No. 4 pp403-430, 1987

[4]. Goto, Y. Strntz, A., "Mobile Robot Navigation: The CMU System", IEEE Expert, Vol. 2, No. 4, winter, 1987

[5]. Martin, F. Robotic Explorations, a Hands-On Introduction to Engineering, Upper Saddle River, New Jersey: Prentice Hall, 2001.

Citation
Swarnalata Bollavarapau, Neil K. Samuel, Maneesh Shankar, Nihaar Shah "An Analytical Study of Various Methods Used to Build an Autonomous Fire-Extinguishing Robot" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0007. India
Page 43-47
Download    
ANED 06.067X/G1044347 aned
aned 067X-0104-0247
 

Hala M. Abd Elkader, Gamal Mabrouk, Adly Tag El-Dien, Reham S. Saad

Performance of LTE Channel Estimation Algorithms for Different Interpolation Methods and Modulation Schemes
  • Abstract
  • Keywords
  • Reference
  • Full Article
In this paper, we present performance of pilot based channel estimation techniques such as Least Squares (LS) and Linear Minimum Mean Square Error (LMMSE) for different interpolation methods and modulation schemes. The performance is evaluated using the mean squared error (MSE) as the performance metric of interest for downlink LTE system. Simulation results show that for low SNR environment, applying QPSK modulation for any interpolation method produces the best MSE performance, but for high SNR environment, linear interpolation produces the worst MSE performance for QPSK and 16-QAM modulation schemes.
Channel Estimation, LS, LMMSE, Interpolation, LTE.

[1] Wenwen Liu &Xiaolin Li "An Improved LMMSE Channel Estimation Algorithm of LTE System,"Fourth International Conference on Computational and Information Sciences,2012,PP. 231-234.

[2] Wang Hong-jin& Liu Li-fa"A Modified Channel Estimation Based on SVD in LTE-Advanced Systems, " 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM),2011. PP. 1-5.

[3] Ahmed M. AL-Samman, TharekAbdRahman, Uche AK Chude-Okonkwo&RazaliNgah, "Hybrid Channel Estimation for LTE Downlink," IEEE 9th International Colloquium on Signal Processing and its Applications,2013, PP. 44-48.

[4] S. Adegbite, B. G. Stewart & S. G. McMeekin, "Least Squares Interpolation Methods for LTE System Channel Estimation over Extended ITU Channels," International Journal of Information and Electronics Engineering, Vol. 3,No. 4, PP. 414-418,2013.

[5] MandaRajarao, R V Raja Kumar, DivyaMadhuri&MadhaviLatha, "Efficient Channel Estimation Technique for LTE Air Interface," Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PRIMEASIA), 2012, PP. 214-219.

Citation
Hala M. Abd Elkader, Gamal Mabrouk, Adly Tag El-Dien, Reham S. Saad "Performance of LTE Channel Estimation Algorithms for Different Interpolation Methods and Modulation Schemes" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0008. Egypt
Page 48-52
Download    
ANED 06.067X/H1044852 aned
aned 067X-0104-0252

 

Noopur Srivastava, Bineet Kumar Gupta, Neeraj Kumar Tiwari

An Approach to Develop a Framework to Enhance the Performance of Digital Notes Based on Auto Arranger
  • Abstract
  • Keywords
  • Reference
  • Full Article
In the past decade provision for preparing notes were in single copy for all subjects and finally writes notes in different subjects copy. Now in the advance age of technology and viewing the future aspects of students, it is well demanded to prepare their notes digitally and distribute them automatically in their respective subjects and no need to prepare separate notes manually. For better distribution process we need a reliable and efficient distribution approach by which one note automatically distributed in their respective subjects. In our approach part "cue word‟ are those relative words of a prescribed subject that helps to distribute a single note into its respective folders on the basis of frequency of cue words. Proposed approach will announced in different sectors like letter writing, student‟s notes making, script managing, news reporting and many more criteria related to writing work and managing prepared notes.
Data mining, data warehouse, artificial intelligence, SSA, Digital Notes.
[1] J. Anemuller, "Convolutive Blind Source Separation", Ph.D. thesis, University of Oldenburg, Germany, 2001.
[2] Araki S., "Limitation of frequency domain blind source separation for convolutive mixture of speech", proc IEEE HSC-01, pp. 91-94, 2001.
[3] H. Attias, "Independent Factor Analysis Neural Computation", 11, pp. 803-851, 2009.
[4] M. Baeak, and U. Zolzer, "Performance Analysis of a Source Separation Algorithm", DAFx-02, Hamburg, Germany, pp. 207-210, 2002.
[5] J.A. Bell, and J.T. Sejnowski, "An information maximization approach to blind separation and blind deconvolution. Neural Computation 7", pp. 1129-1159, 1995.
Citation
Noopur Srivastava, Bineet Kumar Gupta, Neeraj Kumar Tiwari "An Approach to Develop a Framework to Enhance the Performance of Digital Notes Based on Auto Arranger" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0009. India
Page 53-57
Download    
ANED 06.067X/I1045357 aned
aned 067X-0104-0257

 

Anushila Dey, Aditi Dutt, Sumeet Kumar Jain, Vaishali Pandurangan

A Comparative Study of Grid Computing and Cloud Computing
  • Abstract
  • Keywords
  • Reference
  • Full Article
The present competitive world is characterized by individuals and businesses constantly trying to adapt themselves to progressive technological innovations for competitive advantage to stay ahead of the race. Cloud Computing is one such innovation which has made considerable impact in the market. It is the practice of delivering services over the Internet. These services can be broadly categorized into Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). For instance, more and more organizations and individuals are migrating data to the servers on the cloud, thus reaping the benefits of IaaS which eliminates the need of own data centres and lowers maintenance costs. Cloud Computing is the amalgamation of existing technologies like Grid Computing, Utility Computing and several other models. Grid Computing is a form of distributed and parallel computing. In simple terms, it is a set of distributed resources working together to achieve a mutual goal thereby enhancing computational power by sharing of resources. In this paper, we try to compare and contrast the models of Grid and Cloud Computing. We also discuss their essential characteristics by reviewing a handful of research papers based on the two technologies.
Cloud Computing; Grid Computing; Grids vs. Clouds
[1]. Foster. What is the Grid? A Three Point Checklist, July 2002.
[2]. Ian Foster,Yong Zhao, Ioan Raicu, Shiyong Lu "Cloud Computing and Grid Computing 360-Degree Compared"
[3]. Seyyed Mohsen Hashemi,Amid Khatibi Bardsiri "Cloud Computing Vs. Grid Computing", VOL. 2, NO.5, ARPN Journal of Systems and Software ,MAY 2012
[4]. Prof. Milan Kantilal Vachhani, Dr. Kishor H. Atkotiya "Similarities and Contrast between Grid Computing and Cloud Computing", Volume : 3 , Issue : 3, INDIAN JOURNAL OF APPLIED RESEARCH, March 2013
[5]. Bhawna Saxena, "Grid Computing: Virtualization Of Distributed Computing And Data Resources" , Vol. 4, No.1, The Journal of Computer Science and Information Technology, 2006
Citation
Anushila Dey, Aditi Dutt, Sumeet Kumar Jain, Vaishali Pandurangan "A Comparative Study of Grid Computing and Cloud Computing" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0010. India
Page 58-66
Download    
ANED 06.067X/J1045866 aned
aned 067X-0104-0266

 

Version - 3 (April 2014)

 

Nitin Saxena, Naveenprakash

Data Dissemination to Mobile Users
  • Abstract
  • Keywords
  • Reference
  • Full Article
we present the dynamic channel model, the information push model for data dissemination to mobile users. This is a set of extensions for the conceptual models developed for information channels that capture mobility-specific requirements. Dynamic channels are used for filtering and setting update order priorities for the information that user's decide to monitor, which depends on their location and changes as they roam. The dynamic channel model was implemented in Ubidata; it is a software framework for the construction of systems for information dissemination to mobile users. Here we also present the architecture of Update, an adaptable framework for information dissemination to mobile systems. We introduce our development process for the class of mobile computing applications operating under the information dissemination metaphor. In the mobile information dissemination network mobile users, equipped with wireless devices, exchange information in a spontaneous manner whenever they come into the communication range. Users have to specify what kind of information they are looking for and what type of information they can offer. The adaptive data dissemination model and the associated on-line scheduling algorithms improve the functionality and performance of bidirectional broadcast models, maximizing the total number of satisfied users in asymmetric communication environments with dynamic client profiles and time requirements (e.g., mobile systems).on-line scheduling algorithm can be executed in O(n) time, where n is the number of data items in the database. Performance evaluation shows on-line scheduling algorithm produces optimal channel allocation which significantly improves the system performance under various parameter settings.
mobile computing applications, information dissemination, geosensor networks, peer-to-peer communications, location-aware systems, scheduling, time-critical data, asymmetric communication, push-based technique
[1] "A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms," in Advances in Cryptology - CRYPTO'84, Proceedings, ser. Lecture Notes in Computer Science, G. R. Blakley and D. Chaum, Eds.
[2] vol. 196. Springer, 1985, pp. 10–18.] B. R. Waters, E. W. Felten, and A. Sahai, "Receiver Anonymity via Incomparable Public Keys," in Proceedings of the 10th ACM conference on Computer and communication security.
[3] ACM Press, 2003, pp. 112–121. D. Chaum and E. van Heyst, "Group Signatures," in EUROCRYPT'91, Proceedings, ser. Lecture Notes in Computer Science, vol. 547. Springer, 1991, pp. 257–265. J. Camenisch, Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem.
[4] Hartung-Gorre Verlag, 1998. A. Heinemann, "The iClouds Project. Tu-darmstadt.de A. Heinemann, J. Kangasharju, F. Lyardet, and M. M¨uhlh¨auser, "I Clouds – Peer-to-Peer Information Sharing in Mobile Environments," in Euro-Par 2003. Parallel Processing, 9th International Euro-Par
[5] Conference, ser. Lecture Notes in Computer Science,H. Kosch, L. B¨osz¨orm´enyi, and H. Hellwagner, Eds.,vol. 2790. Klagenfurt, Austria: Springer, 2003, pp. 1038–1045. A. Heinemann, J. Kangasharju, F. Lyardet, and M. M¨uhlh¨auser, "Ad Hoc Collaboration and Information Services Using Information Clouds," in Proceedings of the 3rd Workshop on Applications and Services in Wireless Networks, (ASWN 2003), T. Braun,N. Golmie, and J. Schiller, Eds. Bern, Switzerland:
Citation
Nitin Saxena, Naveenprakash "Data Dissemination to Mobile Users" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0001. India
Page 01-06
Download    
ANED 06.067X/3/A1040106 aned
aned 067X-0104-0306

 

Akwukwaegbu I.O, Okwe Gerald Ibe

Load Flow Control and Analytical Assessment of Voltage Stability Index Using Thyristor Controlled Series Capacitor (Tcsc)
  • Abstract
  • Keywords
  • Reference
  • Full Article
Voltage stability problem has become one of the major concerns in the operation of power system in recent years. The reason is that power systems all over the globe are being operated with reduced margins because of the exponentially growing demands and the associated stress on the power transmission resources aggravated by a general reluctance to invest in improvement of the electric grid infrastructure. Moreover, voltage instability has been responsible for severe network collapses world-wide and subsequently, the possible threat of voltage instability is becoming more pronounced in power utilities. In order to avoid the voltage collapse, this paper presents maximum loadability identification of a load bus in a power transmission network which is achieved by performing voltage stability study by utilizing Fast Voltage Stability Index (FVSI) as an indicator of the maximum loadability termed as Qmax. In this technique, reactive power loading will be increased gradually at particular load bus until the FVSI reaches close to unity. Therefore, a critical value of FVSI was set as the maximum loadability point. This value ensures the system from entering voltage-collapse region. The main purpose in the maximum loadability assessment is to plan for the maximum allowable load value to avoid voltage collapse; which is important in power system planning risk assessment index. In order to improve the system stability, Thyristor Controlled Series Capacitor (TCSC) is installed in the most severe line, which is identified from the line stability index values of all lines in a system. TCSC is a series compensated device used for voltage stability enhancement, which is to be connected in series with transmission line. It can control the transmission line impedance to improve the line transfer capability and to regulate the receiving end bus voltage. This proposed technique was applied to solve real problems in a 14 bus power grid using Power flow analysis. Power flow is very necessary for planning, operation, economic scheduling and exchange of power between utilities. Newton Raphson iterative algorithm is used for solving the power flow problems due to its ability to converge very fast with small number of iteration. Simulation of power flow solutions with and without TCSC was done using MATLAB 7.5 program. The result shows that the application of TCSC improved the voltage profile of the system and furtherly enhanced the power flow.
TCSC, FACTS, Line Flow Index, FVSI, Criticality Index, load flow, Matlab.
[1]. IJ Nagrath / DP Kothari, "Power System Engineering (concept of series and shunt compensation)", Tata McGraw-Hill,2003
[2]. Ajjarapu, V., and Christy, C., 1992, "The continuation power flow: A tool for steady state voltage stability analysis," IEEE Trans. Power Syst., 7(1), pp. 416–423.
[3]. Althowibi, F.A., and Mustafa, M.W., 2010, "Line voltage stability calculations in power systems" in Proc. IEEE conference on Power Engineering, pp.396-401.
[4]. Guo Chulin, Tong Luyuan, Wang Zhonghang, " Stability Control of TCSC between interconnected Power networks", Power System Technology, 2002 proceedings, volume-3,13-17 Oct 2002, pages 1943-1946
[5]. Geng Juncheng; Tong Luyuan; Ge Jun; Wang Zhonghong; "Mathematical model for describing characteristics of TCSC", Power System Technology, 2002. Proceedings. PowerCon 2002. Volume 3, 13-17 Oct. 2002 Page(s):1498 - 1502
Citation
Akwukwaegbu I.O, Okwe Gerald Ibe "Load Flow Control and Analytical Assessment of Voltage Stability Index Using Thyristor Controlled Series Capacitor (Tcsc)" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0002. Nigeria
Page 07-18
Download    
ANED 06.067X/B1040718 aned
aned 067X-0104-0318

 

Anil Kumar Mishra, Madhabananda Das, Tarini Charan Panda

Modified Optimization by Artificial Bee Colony (MOABC) for improvement in content-based image retrieval performance
  • Abstract
  • Keywords
  • Reference
  • Full Article
Artificial Bee Colony(ABC) algorithm based optimization techniques are quite popular and focus for research in fields of Swarm Intelligence. This paper presents an optimization algorithm based on artificial bee colony (ABC) to deal with optimization problems in Content Based Image Retrieval (CBIR) System. We have introduced a modified ABC algorithm which is based on the intelligent scavenging behaviour for content base images. It uses less control parameters, and it can be efficiently used for solving for multi object optimization problems. In the current work, MOABC for discrete variables has been developed and implemented successfully for the multi variable design optimization of composites. The proposed algorithm is applied to Image retrieval section of CBIR system for minimizing the feature vectors and to find the image similar to the queried image. Finally the performance is evaluated in comparison with other nature inspired techniques which includes Particle Swarm Optimization (PSO) and Genetic Algorithm (GA). The performance of MOABC is better as par with that of ABC, PSO and GA for all the loading configurations.
Multi variable optimization, Structural optimization, Artificial Bee Colony (ABC), Feature Extraction.
[1]. Binitha S, S Siva Sathya, "A Survey of Bio inspired Optimization Algorithms", International Journal of Soft Computing and Engineering, Vol. 2, No. 2, pp. 137-151, 2012.
[2]. Nabeel Mohammed and David McG. Squire,"Effectiveness of ICF features for collection-specific CBIR", 9th International Workshop on information Systems and Applications, Vol. 7836, pp. 83-95, 2013.
[3]. Jun Wang, Sanjiv Kumar, and Shih-Fu Chang,"Semi-Supervised Hashing for Large Scale Search", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 34, No. 12, pp. 2393- 2406, 2012.
[4]. Swati V. Sakhare and Vrushali G. Nasre,"Design of Feature Extraction in Content Based Image Retrieval(CBIR) using Color and Texture", International Journal of Computer Science & Informatics, Vol. 1, pp. 57-62, 2011.
[5]. Vibha Bhandari and Sandeep B.Patil,"Comparison of CBIR Techniques using DCT and FFT for Feature Vector Generation", International Journal of Emerging Trends & Technology in Computer Science, Vol. 1, No. 4, pp. 1-10, 2012.
Citation
Anil Kumar Mishra, Madhabananda Das, Tarini Charan Panda "Modified Optimization by Artificial Bee Colony (MOABC) for improvement in content-based image retrieval performance" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0003. India
Page 19-29
Download    
ANED 06.067X/C1041929 aned
aned 067X-0104-0329

 

M. A. Abdul Hakeem, V. Thanikachalam

Using Analytic Hierarchy Process for Prioritising the Dimensions and Determinants of Internal Quality Assurance of Second Cycle Engineering Programmes
  • Abstract
  • Keywords
  • Reference
  • Full Article
Quality assurance in engineering education has a double aspect: the internal quality assurance process implemented by the institutions and the external quality assurance or accreditation undertaken by external independent bodies. The providers of engineering education have the primary responsibility for the quality of their provision and its assurance. Although several accreditation standards and guidelines have been established and implemented worldwide through various international, regional and national agencies; relevant literature searches show that frameworks for internal quality assurance have not been properly developed. The authors have developed a conceptual framework comprising of 24 determinants grouped under 6 dimensions (Quality Enablers, Programme Design, Programme Resources, Programme Delivery, Programme Outcomes, and Quality Analysis) for the internal quality assurance of second cycle engineering programmes. In this article, the authors elaborate on an Analytic Hierarchy Process (AHP) based study for the prioritisation of these dimensions and determinants. The results evolved from the study shows that all the 6 dimensions are significant in the internal quality assurance of second cycle engineering programmes. The study demonstrates that the most significant determinants of internal quality assurance are: 360o Evaluation of Programme Dimensions; Programme Educational Objectives and Outcomes; Faculty: Adequacy, Competency and Development; Graduate Attributes and Professional Competencies; Institutional Leadership and Governance; and Support for Creativity and Innovation.
Internal Quality Assurance, Multi-criteria Decision Making, Analytic Hierarchy Process, Programme Dimensions, Quality Determinants.

[1]. J. Figuera, S. Greco, and M. Ehrgott (Eds.), "Multiple Criteria Decision Analysis, State of the Art Surveys", New York, NY: Springer, 2005.

[2]. C. L. Hwang and K. Yoon, "Multiple Attribute Decision Making: Methods and Applications", Berlin / Heidelberg / New York, NY: Springer Verlag, 1981.

[3]. S. A. Hajkowicz, G. T. McDonald, and P. N. Smith, "An evaluation of multiple objective decision support weighting techniques in natural resource management", Journal of Environmental Planning and Management, vol. 43, no. 4, pp. 505–518, 2000.

[4]. B. Roy, "The outranking approach and the foundations of ELECTRE methods", Theory and Decisions, vol. 31, no. 1, pp. 49–73, 1991.

[5]. H. M. Moshkovich, A. I. Mechitov, and D. L. Olsen, "Ordinal judgments in multi-attribute decision analysis", European Journal of Operational Research, vol. 137, pp. 625–641, 2002.

Citation
M. A. Abdul Hakeem, V. Thanikachalam "Using Analytic Hierarchy Process for Prioritising the Dimensions and Determinants of Internal Quality Assurance of Second Cycle Engineering Programmes" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0004. India
Page 30-41
Download    
ANED 06.067X/D1043041 aned
aned 067X-0104-0341

 

Abirami Priyadarshini.B

Effect of carbon on the hardness of ASTM A182.Gr F6NM alloy for oil and gas industries.
  • Abstract
  • Keywords
  • Reference
  • Full Article
This article presents a relationship between the hardness and the carbon content of the ASTM A182 Gr. F6NM alloy mainly used for oil and gas industries. This study was initiated because of the frequent rejections of the F6NM alloy components due to their increased hardness leading to embrittlement problems while serving applications at high temperature and pressure. The repetitive method was adopted to analyse the relationship between the hardness and carbon content, by utilizing various samples of F6NM alloys with varying compositions of carbon ranging between 0.009-0.05percent following the standard [1] and by measuring their hardness using a Rockwell hardness tester. The focus is on investigating the role of carbon in altering the hardness of the F6NM alloys as it was found that the hardness remained unchanged even after the double tempering operation. To study the exact effect of carbon on hardness, the percentage of manganese was maintained as a constant between 0.54-0.58percent. Hence, it was concluded that even though the ASTM specifications of carbon are between 0.009-0.05, the percentage of carbon has to be controlled between 0.009-0.02percent from the production of F6NM alloys in order to control the hardness as the tempering operations seemed to be ineffective for this high alloyed steel.
Hardness, Double tempering, Normalising, Quenching, Carbon content, F6NM
[1]. ASTM Designation: A 182/A 182M – 02., Standard specification for forged or rolled alloy – steel pipe flanges, forged fittings, and valves and parts for High – Temperature service.
[2]. J. Svoboda, Literature Review of Martensitic Stainless steels, Steel Founders' Society of America, 1982
[3]. Raymond A., Higgins B., 1985, Properties of Engineering Materials. Hoodder and Stonghton.
[4]. T.V.Rajan, C.P. Sharma and Ashok Sharma, "Heat treatment – Principles and Techniques" second edition, pp 87-95
[5]. F6NM (UNS S42400), OILFIELD MODIFIED DATA SHEET , Special quality alloys.
Citation
Abirami Priyadarshini.B "Effect of carbon on the hardness of ASTM A182.Gr F6NM alloy for oil and gas industries." published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0005. India
Page 42-46
Download    
ANED 06.067X/E1044246 aned
aned 067X-0104-0346

 

J RAJANIKANTH, Dr. T.V. RAJINIKANTH

Soft Spatial Query Processing in Spatial Databases-A Case Study
  • Abstract
  • Keywords
  • Reference
  • Full Article
Knowledge discovery in databases (KDD) is an important task in spatial databases since both, the
number and the size of such databases are rapidly growing. This paper introduces a set of basic operations which
should be supported by a spatial database system (SDBS). Here, it will go on to describe the research that is
currently going on in this area, pointing out the different areas, tasks etc., Finally this will helps the researchers
to develop better techniques in spatial databases.
KDD, Database Model, SDBS.
[1]. Talhofer, V., Hošková, Š., Kratochvíl, V., & Hofmann, A. (2009). Geospatial Data Quality. ICMT'09 -
International conference on military technologies, pp. 570-578,2009.
[2]. Frawley W.J., Piatetsky-Shapiro G., Matheus J.: "Knowledge Discovery in Databases: An Overview",
in: Knowledge Discovery in Databases, AAAI Press, Menlo Park, pp. 1-27, 1991.
[3]. Koperski K., Han J.: "Discovery of Spatial Association Rules in Geographic Information Databases",
Proc. 4th Int. Symp. on Large Spatial Databases, Portland, ME, pp.47-66, 1995.
[4]. Shekhar, S.; Lu, C.; and Zhang, P.. A Unified Approach to Detecting Spatial Outliers. GeoInformatica
7(2), 2003.
[5]. Shekhar, S.; Schrater, P. R.; Vatsavai, R. R.; Wu, W.; and Chawla, S. Spatial Contextual Classification
and Prediction Models for Mining Geospatial Data. IEEE Transaction on Multimedia 4(2), 2002.
Citation
J RAJANIKANTH, Dr. T.V. RAJINIKANTH "Soft Spatial Query Processing in Spatial Databases-A Case Study" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0006. India
Page 47-52
Download    
ANED 06.067X/F1044752 aned
aned 067X-0104-0352

 

Sanjit Kumar Paul

Opposite Dust on Linear Dust-acoustic Waves
  • Abstract
  • Keywords
  • Reference
  • Full Article
The linear propagation of the dust-acoustic waves (L-DAWs) in a dusty plasma consisting of
Boltzmann-distributed electrons and ions, mobile charge fluctuating positive and negative dust charge
fluctuating stationary positive dust and charge fluctuating stationary negative dust has been theoretically
investigated
Charge fluctuation, linear dust-acoustic waves, dusty plasmas, shock waves
[1]. D. A. Mendis and M. Rosenberg, "Cosmic dusty plasma", Annu. Rev. Astron. Astrophys., vol.32, pp.
418-463, Sep.1994.
[2]. M. Horanyi and D. A. Mendis, "The dynamics of charged dust in the tail of comet Giacobini-Zinner,"
J. Geophys. Res., vol.91, pp. 355-361, Jan. 1986.
[3]. M. Horanyi, "Charged dust dynamics in the solar system", Annu.Rev. Astrophys, vol.34, pp. 383-418,
Sep.1996.
[4]. F. Verheest, "Waves in Dusty Plasmas", Kluwer Academic Publishers, Dordrecht, The Netherlands.
2000.
[5]. P. K. Shukla, "A survey of dusty plasma physics", Phys. Plasmas., vol. 8, no.5, pp. 1791-1803, May
2001.
Citation
Sanjit Kumar Paul "Opposite Dust on Linear Dust-acoustic Waves" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0007. India
Page 53-60
Download    
ANED 06.067X/G1045360 aned
aned 067X-0104-0360

 

Wael Bekheet

Development of a Management System for Paved Assets
  • Abstract
  • Keywords
  • Reference
  • Full Article
Large enterprises have a significant percentage of their maintenance budgets directed towards maintenance of paved assets. They need to maintain these assets at an acceptable level of service in terms of both functional condition and level of safety. Typical pavement management systems are tailored towards continuous roads or defined road networks. However, depending on the conditions of each enterprise, some of their paved assets can be difficult to include in a typical pavement management system, since these assets represented individual pavement sections that are significantly different from a traditional road from functional and geometric perspectives. This paper presents an approach to customize typical pavement management tools to manage an enterprise paved assets, using the paved assets managed by a school board as a case study. The paved assets were divided into sections, and field condition survey was carried out to assess their current condition. Analysis models were then developed based on experience and finalized through a cycle of preliminary pavement management analysis and ground truth visits, by a panel of experts, for models validation. The approach presented in this paper showed the potential use of existing analysis tools to manage paved assets within the framework of an asset management system.
Pavement Management, Asset Management, Paved Assets, Condition Assessment, Pavement Performance
[1]. W. Bekheet, K Helali, P VanDerHurst, M Voth, and J. Amenta, "Development of The National Park Service Parkways & Park Roads Pavement Management System," In Proc. 86th Annual Meeting of the Transportation Research Board, Washington DC, January 2007.
[2]. M. Khattak, G. Baladi, Z. Zhang, and S. Ismail, "A Review of The Pavement Management System of the State of Louisiana-Phase I," In Proc. 87th Annual Meeting of the Transportation Research Board, Washington DC, January 2008.
[3]. M. Shahin and S. Kohn, "Development of a Pavement Condition Rating Procedure for Roads, Streets and Parking Lots", Construction Engineering Research Laboratory, U.S. Army Corps of Engineers, Technical Report M-268, July, 1979
[4]. Standard Practice for Roads and Parking Lots Pavement Condition Index Surveys, ASTM Std. D6433-11, 2011
[5]. W. Bekheet, K Helali, P VanDerHurst, M Voth, and J. Amenta, "Development of Roughness Deterioration Models for The National Parks Services Network," In Proc. 85th Annual Meeting of the Transportation Research Board, Washington DC, January 2006.
Citation
Wael Bekheet "Development of a Management System for Paved Assets" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0008. Egypt
Page 61-67
Download    
ANED 06.067X/H1046167 aned
aned 067X-0104-0367

 

Geetha C.R., Dr.Puttamadappa C.

A Robust Image Steganography using Multiple Edge Detection and Advanced Error Replacement Method
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper proposes a Steganography method using the digital images. The art of embedding the data which is to be secured into the digital image is called as Image Steganography. Human Visual System proved that the changes in the image edges are insensitive to human eyes. Therefore we are using edge detection method in Steganography to increase data hiding capacity by embedding more data in these edge pixels. So, if we can increase number of edge pixels, we can increase the amount of data that can be hidden in the image. To increase the number of edge pixels, Multiple Edge Detection is employed. Edge detection is carried out using more sophisticated operator like canny operator. To compensate for the resulting decrease in the PSNR because of increase in the amount of data hidden, Advanced Error Replacement [AER] method is proposed here. Because we are changing bits other than the one in which the data is hidden, by employing AER Technique, the proposed encryption algorithm is immune to many of the standard Stego Analysis Procedure. Therefore, the proposed image Steganography method improves the PSNR and ensures high security without comprising the Data hiding capacity and visual qualities of the Cover image. To extract the data we need the original image and the embedding ratio. Extraction is done by taking multiple edges detecting the original image and the data is extracted corresponding to the embedding ratio, this ratio again forms a secret which will be known only to the receiver.
Security, Cryptography, Multiple edge detection, Minimum error replacement, Variable embedding ratio.
[1] Chan K. and Cheng M. "Hiding Data in Images using Simple LSB Substitution" Computer Journal of Pattern Recognition Letters, volume 37,No.3, PP . 469-474,2004.
[2] Wang R. Z , Lin C. F and Lin J. C "Hiding Data in Images Optimal Moderately Significant –bit replacement", IEE Electron Letter, vol. 36, no. 25, PP. 2069-2070, 2000.
[3] Marghny Mohamed, Fadwa Al-Afari, and Mohammed Bamatrf "Data Hiding by LSB substitution using Genetic Optimal Key Permutation", International Arab Journal of e- Technology, vol 2, No.1 January 2011.
[4] Moazzam Hossain, Sadia Al Haque, Farhana Sharmin. "Variable Rate Steganography in Gray Scale Digital images Using Neighborhood pixel information", The International Arab Journal of information technology, vol. 7, No. 1, January 2010.
5] Li Li, Bin Luo, and Qiang Li Xiaojun Fang., "A color Images steganography method by multiple embedding strategy based on Sobel operator," International conference on multimedia information networking and security, IEEE 2009, 978-0-7695-3843-3/09.
Citation
Geetha C.R., Dr.Puttamadappa C. "A Robust Image Steganography using Multiple Edge Detection and Advanced Error Replacement Method" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0009. India
Page 68-73
Download    
ANED 06.067X/I1046873 aned
aned 067X-0104-0373

 

Jitendra D. Barakale, Suraj D. Deshmukh, Chinmay J. Gonjari, Hemant P.Chaudhari

Temperature control of shell & tube type Heat exchanger By using Twin CAT PLC
  • Abstract
  • Keywords
  • Reference
  • Full Article
In many industrial process and operations Heat Exchanger is one of the important unit for the transfer of thermal energy. There are different types of heat exchangers used in industries, the shell and tube type heat exchanger is most common. The main purpose of heat exchanger is to maintain fluid at specific temperature conditions, which is achieved by controlling the exit temperature of one of the fluids. Here we have presented an automation system that is composed of Heat exchanger, Twin CAT PLC and sensors. To control the tube outlet temperature of the fluid of heat exchanger system Twin CAT PLC used. The designed controller regulates the shell outlet temperature of the fluid to a desired set point in the shortest possible time.SCADA system is used to give a virtual display of the proposed process. The end system is a fully automated for the transfer of energy in industrial applications.
Heat exchanger, I/P converter, PC, SCADA, Temperature sensor. Twin CAT PLC
[1]. Yuvraj Khare, Yaduvir Singh, PID Control of Heat Exchanger System, International Journal of Computer Application,8(6),October 2010,0975-8887.
[2]. Chhaya Sharma, Sanjeev Gupta and Vipin Kumar, Modeling and simulation of Heat Exchanger Used in Soda Recovery, Proceedings of the world Congress on Engineering,Vol-2,WCE 2011,July 2011.
[3]. P. Sivakumar, D.Prabhakaran and T. Kannadasan, Temperature Control of Shell and Tube Heat Exchanger By Using Intelligent Controllers-Case Study, International Journal of Computational Engineering Research,2(8),December 2012,2250-3005.
[4]. Dale E.Seborg,Process Dynamics and Control,(Singapore,2004).
[5]. George Stephanopoulas,Chemical Process Control,(India,Prentice-Hall,2003).
Citation
Jitendra D. Barakale, Suraj D. Deshmukh, Chinmay J. Gonjari, Hemant P.Chaudhari "Temperature control of shell & tube type Heat exchanger By using Twin CAT PLC" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0010. India
Page 74-76
Download    
ANED 06.067X/J1047476 aned
aned 067X-0104-0376

 

Version - 4 (April 2014)

 

M.Arulmani, V.R.Hema Latha

THE ENDOS?... A new theory on "Math-Thurai"
  • Abstract
  • Keywords
  • Reference
  • Full Article
This scientific research article attempts to focus the philosophical distinction between "ENDOS" and "INDOS" in the pre-history and history of origin of universe, Life, Geological evolution of various "human races" based on anthropological science. This research strongly focus that the whole cosmo universe, matters including human shall be considered as "Created" initially and subsequently all those created matters further evolved into three species during expanding universe due to genetic variation in growth of environmental radiation conditions. The philosophy of "ENDOS" shall be considered as the existence of Human race and other plants and Animals in the "MARS PLANET" (also called as EZHEM LAND) in the early universe before origin of life in "EARTH PLANET".
a) Philosophy of "ENDOS/ INDOS"
b) Philosophy of "REAL and IMAGE"
c) Philosophy of "GOD and HUMAN"
d) Philosophy of "ACEAE and AMOEBA"
e) Philosophy of "TRIBE"
f) Philosophy of word "RELIGION".
g) Etymology of word "MADURAI
[1]. Intensive Internet "e-book" study through, Google search and wikipedia
[2]. M.Arulmani, "3G Akkanna Man", Annai Publications, Cholapuram, 2011
[3]. M. Arulmani; V.R. Hemalatha, "Tamil the Law of Universe", Annai Publications, Cholapuram, 2012
[4]. Harold Koontz, Heinz Weihriah, "Essentials of management", Tata McGraw-Hill publications, 2005
[5]. M. Arulmani; V.R. Hemalatha, "First Music and First Music Alphabet", Annai Publications, Cholapuram, 2012
Citation
M.Arulmani, V.R.Hema Latha "THE ENDOS?... A new theory on "Math-Thurai"" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0001. India
Page 01-24
Download    
ANED 06.067X/A1040124 aned
aned 067X-0104-0424

 

Aboli Ravindra Wakure, Apurva Rajendra Patkar, Manisha Vitthal Dagale, Priyanka Pradeepkumar Solanki

Vehicle Accident Detection and Reporting System Using GPS and GSM
  • Abstract
  • Keywords
  • Reference
  • Full Article
In highly populated Countries like India, everyday people lose their lives because of accidents and poor emergency facilities. These lives could have been saved if medical facilities are provided at the right time. This paper implies system which is a solution to this drawback. Acceleratometer sensor can be used in car security system to sense vibrations in vehicle and GPS to give location of vehicle, so dangerous driving can be detected. When accident occurs, Acceleratometer will detect signal and will send signal to AVR controller, microcontroller will enable airbag to blow and message with accident location is sent to preprogrammed numbers such as ambulance, police station, etc via GSM.
Accident; Acceleratometer; Microcontroller; Global positioning system; GSM.

[1] World Health Organization Road Traffic Injuries Fact Sheet No 358, March 2013. Available from: http://www.who.int/mediacentre/factsheets/fs358/en/[Last accessed on 2013 Jul 15].
[2] GPS http://www8.garmin.com/aboutGPS/

[3] GPS http://gpsd.berlios.de/vendor-docs/sirf/SiRF2-Leadtek.pdf

[4] GSM modem Wireless Communication by THEODORE RAPPAPORT

[5] GSM modem http://www.developershome.com/sms/atCommandsIntro.asp

[6] Acceleratometer http://www.engineersgarage.com/articles/accelerometer

Citation
Aboli Ravindra Wakure, Apurva Rajendra Patkar, Manisha Vitthal Dagale, Priyanka Pradeepkumar Solanki "Vehicle Accident Detection and Reporting System Using GPS and GSM" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0002. India
Page 25-28
Download    
ANED 06.067X/B1042528 aned
aned 067X-0104-0428

 

Sheetal J. Nagar, Divan G. Raimagia, Pinaki A. Ghosh

Identification and Elimination of Selfish Nodes in Adhoc Network
  • Abstract
  • Keywords
  • Reference
  • Full Article
An Ad Hoc network is the network of self-configuring nodes without having fixed infrastructure. Each node acts as a system and router. Many of the routing protocols of Ad Hoc network are designed based on the assumption that every node forwards every packet but practically many of them act as selfish nodes, they use network and its service but don't cooperate with other nodes so as to save resources for themselves. This report discusses the types of availability attack, malicious activity of selfish node, a Survey of techniques used to detect selfishness attack and some approach to detect selfishness attack. Here i have implemented the selfishness attack and analyze its effect on the Packet delivery ratio, End to End Delay and throughput. I have also implemented credit based algorithm to detect and overcome the activity of selfish nodes.
MANET, Selfish nodes, AODV, IDS, Watchdog
[1] RubanaTarannum, YogadharPandey, "Detection and Deletion of Selfish MANET Nodes-A Distributed Approach" IEEE 2012
[2] D.S.NishantChaurasia, Sanjay Sharma, "Review study of routing proto-cols and versatile challenges of manet",vol.1
[3] SandhyaKhurana, Neelima Gupta, NagenderAneja, "Reliable Ad-hoc On-demand Distance Vector Routing Protocol", IEEE, Jan 2003
[4] Niyati Shah, SharadaValiveti, "Intrusion Detection System for the Avail-ability Attacks in Ad-Hoc Networks", IJECSE,2011.
[5] Enrique Hern´andez-Orallo, Manuel D. Serrat, Juan-Carlos Cano, Carlos T. Calafate, and Pietro Manzoni "Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog", IEEE, MAY 2012
Citation
Sheetal J. Nagar, Divan G. Raimagia, Pinaki A. Ghosh "Identification and Elimination of Selfish Nodes in Adhoc Network" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0003. India
Page 29-34
Download    
ANED 06.067X/C1042934 aned
aned 067X-0104-0434

 

Kishori V. Sangani, Vinod P. Patel, Sunil B. Bhatt

Design of DSP Base Controlled Power Supply on Synchronous Rectifier
  • Abstract
  • Keywords
  • Reference
  • Full Article
Synchronous rectification is a commonly used technique to improve the efficiency of DC/DC converters with low (30V) output voltages and high output currents. Use of a synchronous rectifier in place of diode bridge rectifier because in low voltage application the conduction losses of diode bridge contributes significantly to the overall power loss in a power supply compared to synchronous rectifier. Control of the synchronous rectifiers in forward converters has been accomplished in many different ways, from self-driven to complexly controlled techniques. Most existing control techniques allow the synchronous rectifier's body diode to conduct for some small time interval, thus degrading efficiency. In this synchronous rectifier the PWM techniques are used so the power switches are switched at high frequency which is reduce the size of transformer and overall size, weight and cost. The AC/DC converters called also PWM rectifiers provide synchronous rectification or active filtering improving electrical power quality. The design process of the PWM (pulse width modulation) rectifier has been described. The practical realization of the voltage and current sensors as well as control electronics and the protection systems has been presented. Voltage Oriented Control has been implemented into the DSP to control the synchronous rectifier. The simulation of whole system will do in PSIM (power simulation) software and after examine the simulation results the whole scheme will implement in hardware. PWM waveform generated using CCS (code composer studio) software for DSP (digital signal processing) programming.
Synchronous rectification, low voltage high current, DSP based controlling, voltage control method, PI controller, phase shifted full bridge IGBT inverter.
[1]. Ying-Yu Tzou, Shih-Liang Jung:"Full Control of a PWM DC-AC converter for ac voltage Regulation," IEEE Transaction on Aerospace and Electronics System vol. 34,No.4 Oct. 1998.
[2]. Ali Emadi, Alireza Khaligh, Zhong Nie, Young Joo Lee : "Integrated Power Electronic Converters and Digital Control" (chapter 11)
[3]. Michal and Krysztof : "Hardware Application of AC/DC Converter based on Intelligent Power Module and DSP Controller "prace naukowe instytutu maszyn, napędów i pomiarów elektrycznych politechniki wrocławskiej ,Nr 26 ,2006.
[4]. Somnida Ratanapanachote, Han Ju Cha, and Prasad N. Enjeti :"A Digitally controlled switch ModePower Supply Based on Matrix Converter" IEEE Transaction On Power Electronics, Vol. 21, No.1, Jan 2006.
[5]. C.L. Neft and C.D. Schauder,"theory and design of 30hp matrix converter," IEEE transaction Ind. Appl.,Vol. 28, No.3,PP. 546-551, May/Jun.1992.
[6]. Wangfeng Zhang, Guang Feng, Yan-Fei Liu and Bin wu :" Adigital Power factor correction (PFC) Control strategy optimized for DSP," IEEE transaction on power electronics, Vol. 19, No. 6, Nov 2004
Citation
Kishori V. Sangani, Vinod P. Patel, Sunil B. Bhatt "Design of DSP Base Controlled Power Supply on Synchronous Rectifier" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0004. India
Page 35-42
Download    
ANED 06.067X/D1043542 aned
aned 067X-0104-0442

 

Ch.Sivanarayana, K Pratyusha, P V Rambabu, G V Ramarao

A Study on Sulphuric Acid Attack on Concrete with Rice Husk Ash as a Partial Replacement of Cement
  • Abstract
  • Keywords
  • Reference
  • Full Article
Cement is widely noted to be most expensive constituents of concrete. Concrete is one of the most widely used construction materials, because of its good durability to cost ratio. Rice husk ash (RHA) is a highly reactive pozzolanic material suitable for use in mix for Portland cement as replacement. The possibility of using RHA as a construction material need to be investigates. The study suggests that up to 10% replacement of OPC with RHA has the potential to be used as partial cement replacement, having good compressive strength. Effect of sulphuric acid (H2SO4) present in mixing water on properties of setting times and compressive strength of cement concrete. The rate of development of compressive strength decreased with the increase in concentration of H2SO4 at 7days, 28days and 60 days
Rice husk ash ,Sulphuric acid, cement concrete, compressive strength, curing.
[1]. A.M. Pande and S.G.Makarande,(2013), "Effect of Rice Husk Ash on Concrete" , International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 , Vol. 3, Issue 1, January -February 2013, pp.1718-1723 .
[2]. E. Arunakanthi and H. Sudarsana Rao ,(2013)"Effects of Sulphuric Acid in Mixing And Curing Water on Strength of High- Performance Metakaolin Concrete", IJSR – International Journal of Scientific Research, ISSN No 2277 – 8179,Volume : 2 , Issue : 12 , December 2013 ,pp. 146-150.
[3]. Marthong C. (2012) , "Effect of Rice Husk Ash (RHA) as Partial Replacement of Cement on Concrete Properties", International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 6, August - 2012 ISSN: 2278-0181.
[4]. S. D. Nagrale, Dr. Hemant Hajare, Pankaj R. Modak(2012), "Utilization of Rice Husk Ash", International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.001-005 1.
[5]. Akinkurolere O. O. (2013) "Effects of Rice-Husk Ash as Partial Replacement for Cement on Compressive Strength of Recycled Aggregate Concrete", International Journal of Engineering and Technology, ISSN: 2049-3444 © 2013, Volume 3 No. 8, August, 2013.
Citation
Ch.Sivanarayana, K Pratyusha, P V Rambabu, G V Ramarao "A Study on Sulphuric Acid Attack on Concrete with Rice Husk Ash as a Partial Replacement of Cement" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0005. India
Page 43-49
Download    
ANED 06.067X/E1044349 aned
aned 0647-0104-0449

 

Utkarsh, K. Senthil Kumar

Enhanced Anonymization and Clustering of OSN
  • Abstract
  • Keywords
  • Reference
  • Full Article
In current scenario online social networks such as Facebook, LinkedIn are increasingly utilized by many people. These platforms have successfully created a virtual world by allowing the user to connect with each other just by sharing information about themselves. The information disclosed in here are public as well as private which has created a lot of trouble in recent times. The More data is shared by people the more privacy issues are being violated. In shared data publishing process, we need not only protect the privacy of data but also insure the data‟s integration. To address this issue we proposed the solution of reliable and secure data set by using various Anonymization and clustering concepts and then this paper explores data randomization, i.e. our method maintains statistical relations among data to preserve knowledge, whereas in most anonymization methods, knowledge is lost then we shift on how to launch inference attacks using released social networking data to predict private information and then our work shows the effectiveness of these techniques and finally we worked on how we can decrease the privacy leakage from social networks.
K-Anonymity, Quasi-Identifiers, I-Diversity, Generalization, Attacks and Privacy Model, NBDH.
[1]. http://en.wikipedia.org/wiki/Facebook.
[2]. http://en.wikipedia.org/wiki/Twitter.
[3]. http://en.wikipedia.org/wiki/Linked_in.
[4]. http://en.wikipedia.org/wiki/Vkontakte.
[5]. Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networking Sites (The Facebook Case).[online]. p. 2. Available at
:http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf
Citation
Utkarsh, K. Senthil Kumar "Enhanced Anonymization and Clustering of OSN" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0006. India
Page 50-60
Download    
ANED 06.067X/F1045060 aned
aned 067X-0104-0460

 

V. Khanaa, Dr. R. Udayakumar

Efficient Pc Controlled By Hand Movement Using Mems Sensor Mouse
  • Abstract
  • Keywords
  • Reference
  • Full Article
Ahybrid two-dimensional position sensing system is designed for mouse applications. The system measures the acceleration of hand- movements which are converted into two-dimensional location coordinates. The system consists of four major components: 1) MEMS accelerometers, 2) CMOS analog read-out circuitry, 3) an acceleration magnitude extraction module, and 4) a 16-bit RISC microprocessor. Mechanical and analog circuit simulation shows that the designed padless mouse system can detect accelerations as small as 5.3 mg and operate up to 18MHz.
..
[1]. http://bioen.okstate.edu/Home/fharry/4212/HUMAN.PP.HTM
[2]. L. M. Roylance and J. B. Angell, "A batch-fabricated silicon accelerometer," IEEE Trans. Electron Devices, vol. ED-26, pp.1911-1917, Dec. 1979.
[3]. C. Yeh and K. Najafi, "A low-voltage bulk-silicon tunneling based microaccelerometer," Tech. Dig. IEEE IEDM, Washing- ton, DC. Dec. 1995. Pp.593-596.
[4]. J. S. Chae, H. Kulah, K. Najafi, "A High Sensitivity Silicon- On-Glass Lateral μG Microaccelerometer.", Nanospace '2000, Houston, TX.
[5]. N. Yazdi, K. Najafi, "An All-Silicon Single-Wafer Fabrication Technology for Precision Micro Accelerometers", Proc. Trans- ducers 97, pp. 1181-1184.
Citation
V. Khanaa, Dr. R. Udayakumar "Efficient Pc Controlled By Hand Movement Using Mems Sensor Mouse" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0007. India
Page 61-71
Download    
ANED 06.067X/G1046171 aned
aned 067X-0104-0471

 

Snuti Kumari, Garima Rathi, Priyanka Attri, Manee Kumar

Types of Sensors and Their Applications
  • Abstract
  • Keywords
  • Reference
  • Full Article
As we all know that the sensors are the most important part of the embedded system and the robotics world. By using different types of sensors we can minimize the logic circuits and also make the system more efficient to get output by taking less input. Therefore, here is detailed view of different types of sensors and their applications in the different fields.
sensors, temperature sensors, IR sensors, UV sensors, Touch sensors, Proximity sensors, advanced sensor technology.
[1]. I.F. Akyildiz, W. Su, A power aware enhanced routing (PAER) protocol for sensor networks, Georgia Tech Technical Report, January 2002, submitted for publication
[2]. A. Bakre, B.R. Badrinath, I-TCP: indirect TCP for mobile hosts, Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, BC, May 1995, pp. 136–143
[3]. P. Bauer, M. Sichitiu, R. Istepanian, K. Premaratne, The mobile patient: wireless distributed sensor networks for patient monitoring and care, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine, 2000, pp. 17–21
[4]. Bhardwaj, T. Garnett, A.P. Chandrakasan, Upper bounds on the lifetime of sensor networks, IEEE International Conference on Communications ICC'01, Helsinki, Finland, June 2001
[5]. P. Bonnet, J. Gehrke, P. Seshadri Querying the physical world IEEE Personal Communications (October 2000), pp. 10–15
Citation
Snuti Kumari, Garima Rathi, Priyanka Attri, Manee Kumar "Types of Sensors and Their Applications" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0008. India
Page 72-85
Download    
ANED 06.067X/H1047285 aned
aned 067X-0104-0485

 

Preksha R. Kolankar, Swati V. Sakhare

FPGA Implementation of QPSK modulator by using Hardware Co-simulation
  • Abstract
  • Keywords
  • Reference
  • Full Article
The modulators are the basic requirement of communication systems they are designed to reduce the channel distortion & to use in RF communication hence many type of carrier modulation techniques has been already proposed according to channel properties & data rate of the system. QPSK (Quadrature Phase Shift Keying) is one of the modulation schemes used in wireless communication system due to its ability to transmit twice the data rate for a given bandwidth. The QPSK is the most often used scheme since it does not suffer from BER (Bit Error rate) degradation while the bandwidth efficiency is increased. It is very popular in Satellite communication. As the design of complex mathematical models such as QPSK modulator in "pure HDL‟ is very difficult and costly; it requires from designer many additional skills and is time-consuming. To overcome these types of difficulties, the proposed QPSK modulator can be implemented on FPGA by using the concept of hardware co-simulation at Low power. In this process, QPSK modulator is simulated with Xilinx System Generator Simulink software and later on it is converted in Very high speed integrated circuit Hardware Descriptive Language to implement it on FPGA. Along with the co-simulation, power of the proposed QPSK modulator can be minimized than conventional QPSK modulator. As a conclusion, the proposed architecture will not only able to operate on co-simulation platform but at the same time it will significantly consume less operational power.
QPSK, VHDL, FPGA, Xilinx

[1] Asaraf Mohamed Moubark,"FPGA implementation of low power digital QPSK modulator using verilog HDL",Journal of Applied Sciences 13(3),2013,385-392,ISSN 1812-5654

[2] Gaurav Purohit, Divya Vyas, Kota Solomon Raju, V.K Chaubey,Arvind Nehra "Hardware Co-simulation of BPSK and QPSK For SoftwareDefineRadio";IJECET,2013,pp 301-308.

[3] Swapan K Samaddar, Atri Sanyal, Somali Sanyal," FPGA based generalized architecture for Modulation and Demodulation Techniques"Journal of Computing Technologies ISSN 2278– 3814,2012,27-32

[4] S.O. Popescu, A.S.Gontean and D.Ianchis; "QPSK Modulator on FPGA", IEEE 9th International Symposium on Intelligent Systems and Informatics,September 8-10, 2011, Subotica, Serbia,359-364, SISY 2011

[5] S.O. Popescu, A.S.Gontean and D.Ianchis; "Implementation of a QPSK System on FPGA"; IEEE, 2011, pp 365-370

Citation
Preksha R. Kolankar, Swati V. Sakhare "FPGA Implementation of QPSK modulator by using Hardware Co-simulation" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0009. India
Page 86-93
Download    
ANED 06.067X/I1048693 aned
aned 067X-0104-0493

 

Krupa Gandhi, K.L.Mokariya, Deepa Karvat

Simulation of PWM inverter for VFD application Using MATLAB
  • Abstract
  • Keywords
  • Reference
  • Full Article
In this paper, at first, operating principle of variable frequency drive is explained. Different
components of VFD are explained. Suitability of VFD for different types of load is also explained. Concept of
PWM inverter for VFD is explained and analysis of PWM inverter for VFD is done.
Operating principle of VFD; PWM; Modulation Index; Carrier Frequency; variable torue load.
[1]. "ANALYSIS OF VARIABLE FREQUENCY THREE PHASE INDUCTION MOTOR DRIVE" Thida Win, Nang Sabai, and Hnin Nandar Maung. World Academy of Science, Engineering and Technology 18 2008.
[2]. "ENERGY EFFICIENT INDUSTRIAL MOTORS" Gajendra Singh, N K Sharma, P Tiwari, International Journal of Engineering Science and Technology Vol. 2(12), 2010.
[3]. "Energy use, energy savings and emission analysis in the Malaysian rubber producing industries" , R. Saidur a,, S. Mekhilef ,–applied energy Elsevier journal, 2010.
[4]. "ENERGY AUDIT IN INDUSTRY-A CASE STUDY OF CENTRIFUGAL PUMPS" R.M. Holmukhe & K.D.Deshpande, i-COST Electronics & communication proceedings 13-15 jan-2011.
[5]. " VARIABLE FREQUENCY DRIVE" Jigar N. Mistry , Hetal D. Solanki, Tejas M. Vala Research Expo International Multidisciplinary Research Journal Volume – II , Issue – III September – 2012.
Citation
Krupa Gandhi, K.L.Mokariya, Deepa Karvat "Simulation of PWM inverter for VFD application Using MATLAB" published at International Journal of Engineering Research and Development, Volume 10, Issue 4 (April 2014)
MID 1004.067X.0010. India
Page 94-103
Download    
ANED 06.067X/J10494103 aned
aned 067X-0104-0403