Volume 10 - Issue 5

IJERD : Volume 10 - Issue 5

Version - 1 (May 2014)


A.Senthilkumar, Dr.S.Senthil Selvan, M.Balasubramaian, K.S.Anandh

Evaluation of Construction Risks Impact on Construction Project Manager's
  • Abstract
  • Keywords
  • Reference
  • Full Article
Risks have a significant impact on a construction project‟s performance in terms of cost, time and quality. As the size and complexity of the projects have increased, an ability to manage risks throughout the construction process has become a central element preventing unwanted consequences. Construction projects are always unique and risks raise from a number of the different sources. Construction projects are inherently complex and dynamic, and involving multiple feedback processes. A lot of participants – individuals and organisations a reactively involved in the construction project, and they interests may be positively or negatively affected as a result of the project execution or project completion. This naturally creates problem and confusion for even the most experienced project managers and contractors. This research work brings out certain common elements of risks and issues involved for any project life cycle. Here the project life cycle is arranged in six phases and the risk factor in each phase is assessed. For a construction project it is very important to look out for the threshold and risks involved for it to be handled easily and comfortably.
Construction industry, Importance Index, Infrastructure projects, Project Life cycle, Reliability Research, Risk management and Risk assessment
[1]. Laya Parvizsedghy, Dr. Mohammad Hossein Sobhiyah, "International Projects Risk Management In the Construction Industry," International conference on Business Management and Electronic information ,volume 3, PP 300-303, 2011.
[2]. Siddesh K Pai and J.Raj Bharath, "Analysis of Critical Causes of Delays in Indian Infrastructure Projects," International Journal of Innovative Research and development, Vol 2, Issue 3, March, 2013.
[3]. Wei Jia, "Risk management for international construction projects, "International conference on Education and Management Technology, PP, 339-343, 2010.
[4]. PMI, Project Management Body of Knowledge, 2004.
[5]. Patrick.X.W.Zou, Guomin Zhang and Jia-Yuan Wang, "Identifying Key Risks in construction Projects: Life cycle and stakeholder perspectives,"
http://prres.net/papers/zou_risks_in_construction_Projects.pdf
Citation
A.Senthilkumar, Dr.S.Senthil Selvan, M.Balasubramaian, K.S.Anandh "Evaluation of Construction Risks Impact on Construction Project Manager's" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0001. India
Page 01-05
Download    
ANED 06.067X/A1050105 aned 
aned 067X-0105-0105

 

Bendalam Vijay, Jallu Swathi

Implementation of digital Steganography using image files-a Computational approach

  • Abstract
  • Keywords
  • Reference
  • Full Article
The main aim of this paper is to hide the message along with the existence of communication so that the attacker can‟t even get the encrypted message. The procedure follows as hiding the encrypted message in image files by embedding the message bits into least significant bit positions of each byte of image file. In image file each pixel is represented with 24 bits which is a combination of RED, BLUE, GREEN color proportions for that pixel.LSB has least importance in image files so it‟s modification can‟t results in a human detectable change. Here Data Encryption Standard (DES) algorithm is used to encrypt the message and MD5 algorithm is used to compute the message digest which is used to check the integrity of message. After performing Cryptographic functions message is compressed with GZip compression technique and then it is embedded into image file. This process results in a stego file (output image file) which is exactly similar to cover file (input image file).
Encryption, Decryption, DES, MD5, LSB
[1] Cryptography and Network Security, Atul Kahate, TMH second edition.
[2] Chinta Someswararao, "Implementation of Object Oriented Approach for Copyright Protection Using Hadamard Transforms", IEEE conference on Computer & Communication Technology, pp.473-480,2010
[3] Chinta Someswararao, "Implementation Of Interactive Data Knowledge Management And Semantic Web For Step-Data From Express Entities", Third IEEE conference on Emerging Trends in Engineering and Technology, pp.537-542,2010
[4] Chinta Someswararao, "Object oriented fuzzy filter for noise reduction of PGM images", 8th International Conference on Information Science and Digital Content Technology (ICIDT), pp. 776- 782, 2011.
[5] Chinta Someswararao, "Implementation of object oriented approach to query processing for video subsequence identification", IEEE on NCCCS, pp.1-5, 2012.
Citation
Bendalam Vijay, Jallu Swathi "Implementation of digital Steganography using image files-a Computational approach" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0002. India
Page 06-10
Download
ANED 06.067X/B1050610 aned
aned 067X-0105-0110

 

ChukwumaG.J.Nmegbu, LotannaV.Ohazuruike

Wellbore Instability in Oil Well Drilling: A Review
  • Abstract
  • Keywords
  • Reference
  • Full Article
Wellbore instability is one of the key problems that engineers encounter during drilling. Often, field instances of instability are a result of a combination of both chemical and mechanical factors, the former resulting from the failure of the rock around the hole due to high stresses, low rock strength, or inappropriate drilling practice and the latter arising from damaging interactions between the rock, generally shale, and the drilling fluid. The increasing demand for wellbore stability analyses during the planning stage of a field arise from economic considerations and the increasing use of deviated, extended reach and horizontal wells, all of which are highly susceptible to the problem. This paper presents a review of the causes, symptoms, prevention, associated consequences, types and respective problems and the principle behind the problem of wellbore instability in oil well drilling.
Borehole Instability, Drilling Problems, Hole cave-in, Instability Symptoms, Wellbore Instability

[1]. N. A. Ogolo , M. A. Onyekonwu and J. AAjienka, Application of Nanotechnology in the oil and gas industry (Port Harcourt: Institute of Petroleum Studies, 2011,pp.15 – 16.
[2]. E. N. Wami , Drilling Fluid Technology. Lecture notes, Port Harcourt, Rivers State University of Science and Technology, 2012.
[3]. O. Osisanya, Practical Approach to Solving wellbore instability problems, SPE Distinguished Lecture series, Port Harcourt, 2012.
[4]. H. Rabia, Well Engineering and Construction, pp.457 – 458. [online].Available atxa.yimg.com/kq/groups/20150265/1353094454/name/rabe3a.pdf

[5]. W. Bradley, Bore Hole Failure Near Salt Domes, paper SPE 7503 presented at the 53th Annual Technical conference and Exhibition of the SPE of AIME, Houston, Texas, 1-3 October, 1978.

Citation
ChukwumaG.J.Nmegbu, LotannaV.Ohazuruike "Wellbore Instability in Oil Well Drilling: A Review" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0003. Nigeria
Page 11-20
Download
ANED 06.067X/C1051120 aned
aned 067X-0105-0120

 

D. Patel, M.K. Abeyratna, M.H.M.R. Shyamali Dilhani

Wavelet– Galerkin Solution for Boundary Value Problems
  • Abstract
  • Keywords
  • Reference
  • Full Article
Wavelet-Galerkin technique has very important advantages over classical finite difference and finite element method. In this paper, we have made an attempt to develop a technique for Wavelet-Galerkin solution of Neumann and mixed boundary value problem in one dimension in parallel to the work of J. Besora [5]. The Taylor's approach has been used to include Neumann condition in Wavelet-Galerkin setup. The test examples are given to validate techniques with exact solutions.
Boundary Value Problems, Wavelets, Scaling Function, Connection Coefficients, Wavelet Coefficient ,Wavelet- Galerkin Method.
[1]. K. Amaratunga, J.R. William, S. Qian and J. Weiss, wavelet Galerkin solution for one dimensional partial differential equations, Int. J. numerical methods eng. 37,2703-2716 (1994).
[2]. K. Amaratunga, J.R. Williams, Qian S. and J. Weiss, Wavelet-Galerkin solutions for one Dimensional Partial Differential Equations, IESL Technical Report No. 92-05, Intelligent Engineering Systems Laboratory, M. I. T ., 1992.
[3]. K. Amaratunga and J.R. William, Wavelet-Galerkin Solutions for One dimensional Partial Differential Equations, Inter. J. Num. Meth. Eng. 37(1994), 2703-2716.
[4]. J. Besora, Galerkin Wavelet Method for Global Waves in 1D, Master Thesis,Royal Inst. of Tech. Sweden, 2004.
[5]. G. Beylkin, R. Coifman, and V. Rokhlin, 1991,Fast Wavelet Transfermation and Numerical Algorithm, Comm. Pure Applied Math.,44,141-183.
Citation
D. Patel, M.K. Abeyratna, M.H.M.R. Shyamali Dilhani "Wavelet– Galerkin Solution for Boundary Value Problems" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0004. Sri Lanka
Page 21-30
Download
ANED 06.067X/D1052130 aned
aned 067X-0105-0130

 

Sibi Jacob, Kochumol Abraham, Dr K Sridharan

Romanized Language Identification and Transliteration System for Security with an Authentication System Using Persuasive Cued Click Points - RLITS
  • Abstract
  • Keywords
  • Reference
  • Full Article
Romanized script is popular today for communication in every country, as the script is almost universally enabled in text processors. In countries like India which is a linguistic cauldron, it is very common to see English text in email messages and chat transcripts, with generous sprinkling of words from local languages in roman script. Dubbed as Manglish (Malayalam and English) etc., this roman transliteration of non-English languages contributes to a major noise in analyzing English text in these countries. Our system, RLITS introduces an automated language identification scheme from the Romanized message with SVM regression. It also provides a facility to transmit our message securely using symmetric key cryptography. The overall system is protected by an authentication scheme persuasive cued click point.
Romanization, Transliteration, character n-gram, Persuasive Cued Click Point.
[1]. Font Llitj´os and A. W. Black. 2001. Knowledge of language origin improves pronunciation accuracy of proper names. In Proc. of Euro speech, pages 1919–1922.
[2]. Li, K. C. Sim, J.-S. Kuo, and M. Dong. 2007. Semantic transliteration of personal names. In Proc. of ACL , pages 120–127.
[3]. F. Huang. 2005. Cluster-specific named entity transliteration. In Proc. of HLT-EMNLP, pages 435– 442.
[4]. S. Konstantopoulos. 2007. What's in a name? In Proc. of RANLP Computational Phonology Workshop.
[5]. McNamee, B.P.: Language identification: a solved problem suitable for undergraduate in-structionl Journal of Computing Sciences in Colleges, 20(3), P. 94–101 (2005)
Citation
Sibi Jacob, Kochumol Abraham, Dr K Sridharan "Romanized Language Identification and Transliteration System for Security with an Authentication System Using Persuasive Cued Click Points - RLITS" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0005. India
Page 31-34
Download
ANED 06.067X/E1053134 aned
aned 067X-0105-0134

 

A.Nandhini, V.Kannan, E.Logashanmugam, B.Sheela rani, Raju daniel

A Modified analog integrator for continuous pulse operation Of a nuclear fusion device with reduced drift
  • Abstract
  • Keywords
  • Reference
  • Full Article
Analog integrators using operational amplifiers are often subjected to the internal difficulties like offset and drift error. It is mainly due to the offset voltage and bias current of an op-amp. It causes drift in the output which increases with respect to time. In the proposed method an analog integrator has been designed for 2s duration with low drift and offset error. It has been designed for the nuclear fusion device which requires integration of signal for long duration of time. In this method the hardware design of the integrator with low offset induced drift has been implemented for real time operation in nuclear fusion device.
drift, flux, Integrator, offset, op-amp.
[1] E. J. Strait, J. D. Broesch, R. T. Snider, and M. L. Walker, "A hybrid digital-analog long pulse integrator" Proceedings of the 11th Topical Conference on High Temperature Plasma Diagnostics, 1996.
[2] S. Ali-Arshad and L. de Kock, "Long pulse analogue integration" Rev. Sci. Instrum., vol. 64, pp. 2679, 1993.
[3] Pascal Spuig, P. Defrasne, G. Martin, M. Moreau, Ph. Moreau,F. Saint-Laurent , "An analog integrator for thousand second long pulses in Tore Supra" Fusion Engineering and Design, vol. 66-68, pp. 953-957, 2003.
[4] ITER "Plant description document "chapter 2.6, page.1, IAEA publications.
[5] A.Nandhini, V.Kannan, E.Logashanmugam, B.Sheela rani, Raju Daniel "Simulation Results of a Low-Drift Integrator for Aditya Tokamak".
Citation
A.Nandhini, V.Kannan, E.Logashanmugam, B.Sheela rani, Raju daniel "A Modified analog integrator for continuous pulse operation Of a nuclear fusion device with reduced drift" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0006. India
Page 35-39
Download
ANED 06.067X/F1053539 aned
aned 067X-0105-0139

 

M.Rajadurai, R.Mohanasundaram, M.Revathi, A.Karthikeyan

3D Computational Studies of Low Speed Axial Flow Compressor Rotor Incorporating Tandem Blades
  • Abstract
  • Keywords
  • Reference
  • Full Article
The tandem blade compressor rotor configuration is where two separate blades are mounted on a common rotating wheel. The premise of this study is that a tandem blade rotor can do more work at the same loss level as a single blade, which would reduce the number of required stages in a compressor. While tandem blades are commonly used in centrifugal impellers, they have yet to be applied to a commercial axial-flow rotor. This project presents some results of a 3-D computational study of the axial tandem configuration in a fully subsonic flow field. It was found that the tandem blade begins to offer benefits over a conventional blade when highly loaded (i.e. Lieblein D-Factor greater than 0.55). This project also includes the numerical investigation of the steady, three-dimensional flow field in a tandem compressor rotor. The interaction mechanism has been investigated between these blades. The comparison has been made based on the conventional and tandem blades by the static and total pressure distribution along the blades.
axial flow compressor; high loading; tandem blade rotor; conventional blade rotor; 3D computational; cp
[1]. Benetschik, H. & Gallus, H., 1990, "Inviscid and Viscous Flow in Transonic and Supersonic Cascades Using an Implicit Upwind Relaxation Algorithm," AIAA Paper No. 90-2128, presented at the AIAA/SAE/ASME/ASEE 26th Joint Propulsion Conference
[2]. Canon-Falla, G.A., 2004, "Numerical Investigation of the Flow in Tandem Compressor Cascades," Diploma thesis, Departmento de Ingenieria Macanica, Universidad Nacional de Colombia, written at Institute of Thermal Powerplants, Vienna University of Technology
[3]. Dettmering, W. & Becker, B., 1968, "Steps in the Development of a Supersonic Compressor Stage," AGARD CP 34, Paper No. 13
[4]. FLUENT, FLUENT 6 User´s Manual, 1998, Fluent Inc.
[5]. GAMBIT User´s Manual.
Citation
M.Rajadurai, R.Mohanasundaram, M.Revathi, A.Karthikeyan "3D Computational Studies of Low Speed Axial Flow Compressor Rotor Incorporating Tandem Blades" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0007. India
Page 40-48
Download
ANED 06.067X/G1054048 aned
aned 067X-0105-0148

 

A. Kannan, Akhil Muralidharan, Sanyam Saxena

Design of Multi-Axis Traversable depth Gauge to measure Dents on Car Body Panel
  • Abstract
  • Keywords
  • Reference
  • Full Article
Dent gauges are instruments used to measure the dents created in vehicles during a car crash. These measurements are very important in assessing the crash impact, crash investigation and further helping the material selection improvement of the vehicle. The existing depth gauges can measure the dent depth along only a single direction. The model we developed has the ability to traverse along all the three axes (X, Y & Z axes) so that mapping of the depths at different points can be extensively made, which makes this model unique.
Multi-axis gauge; depth measurement; portable; dent profiler; gauge; crash; car

[1] DhaferMarzougui, RandaRadwanSamaha, FadiTahan, Chongzhen Cui, Cing-Dao (Steve) Kan: "Extended Validation of the Finite Element Model for the 2002 Ford Explorer Sport Utility Vehicle", NCAC 2012-W-002, July 2012.

[2] Insurance Institute for Highway Safety, "Crash Test Report: 2002 Ford Explorer," IIHS Test CEF0125, November 2001.

[3] VV.AA. 2005. "Cost / benefit analyses of proposed systems [for Advanced vulnerable road user protection systems]." APROSYS report of WP2.1, Deliverable D2.1.2C.

[4] Holmberg S, Nejabat B. Numerical assessment of stiffness and dent properties of automotive exterior panels[J]. Mater Des, 2004, 25: 361−368.

[5] ASNAFI N. On strength, stiffness and dent resistance of car body panels[J]. J Mater ProcTechnol, 1995, 49: 13−31.

Citation
A. Kannan, Akhil Muralidharan, Sanyam Saxena "Design of Multi-Axis Traversable depth Gauge to measure Dents on Car Body Panel" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0008. India
Page 49-52
Download
ANED 06.067X/H1054952 aned
aned 067X-0105-0152

 

D. S. T. Ramesh, I. Gnanaselvi, S. Alice Pappa, P. Alayamani

Skolem Mean Labeling Of Nine Star Graphs

  • Abstract
  • Keywords
  • Reference
  • Full Article
A graph G = (V, E) with p vertices and q edges is said to be a skolem mean graph if there exists a
function f from the vertex set of G to 1, 2, ...p such that the induced map
* f from the edge set of G to
2,3, 4, ...p defined by * f (u) f (v)
2
f (e uv)

  if f(u) + f(v) is even and
f (u) f (v) 1
2
 
if f(u) + f(v) is
odd then the resulting edges get distinct labels from
the set 2,3,...,p. In this paper, we prove that nine star graph
1, 1, 1, 1, 1, 1, 1, 1,m 1,n K K K K K K K K K        is a skolem mean graph if m n  4  7
for  = 2, 3, . . .
Skolem mean graph, skolem mean labeling, star graphs

[1] V. Balaji, D. S. T. Ramesh and A. Subramanian, Skolem Mean Labeling, Bulletin of Pure and Applied Sciences, Vol. 26E No. 2 (2007), 245 –248.

[2] V. Balaji, D. S. T. Ramesh and A. Subramanian, Some Results On Skolem Mean Graphs, Bulletin of Pure and Applied Sciences, Vol. 27E No.1(2008), 67–74.

[3] J. A. Gallian, A Dynamic Survey of Graph Labeling, The Electronic Journal of Combinatorics, 14(2007), #DS6.

[4] F. Harary, Graph Theory, Addison – Wesley, Reading Mars, (1972).

Citation
D. S. T. Ramesh, I. Gnanaselvi, S. Alice Pappa, P. Alayamani "Skolem Mean Labeling Of Nine Star Graphs" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0009. India
Page 53-56
Download
ANED 06.067X/I1055356 aned
aned 067X-0105-0156

 

B.O.Omijeh, R.Uhunmwangho, M.Ehikhamenle

Design Analysis of a Remote Controlled "Pick and Place" Robotic Vehicle

  • Abstract
  • Keywords
  • Reference
  • Full Article
The design analysis of a Remote Controlled "Pick and Place" Robotic vehicle has been presented in this paper. This work unravels the fact that man would always want to adhered to safety precautions at workplace and even in its environment, to be able to handle some specific tasks, like sending the robotic vehicle to hazardous environment to obtain samples for chemical analysis. A typical Robotic Vehicle is capable of traveling over various terrains and traversing obstacles. In one embodiment, the design in this work, includes a Robotic arm of five Degree of Freedom with its base resting directly on top of the vehicle, a body having four drive wheels coupled to the ends thereof. The wheels are selectively powered to propel the vehicle. The design methodology involves the hardware, software part and implementation of both designs. A prototype of the Remote Controlled "Pick and Place" Robotic vehicle was built to validate design specifications. The results obtained were very satisfactory. The use of Robots is highly recommended for Industries especially for safety and productivity reasons.
Robotic Vehicle, Microcontroller, Joint Actuator, Remote, Control, "Pick and Place"
[1]. https://en.wikipedia.org/wiki/History_of_robots
[2]. Deborah Levine Gera (2003). Ancient Greek Ideas on Speech, Language, and Civilization. ISBN 978-0-19-925616-7. Retrieved 31 December 2007.
[3]. Currie, Adam (1999). "The History of Robotics". Retrieved 10 September 2007.
[4]. How do RC Servos Work? http://www.rcmodelreviews.com/howservoswork02.shtml
[5]. Electronics Data Book (1998), http//www.circuitidears.com
Citation
B.O.Omijeh, R.Uhunmwangho, M.Ehikhamenle "Design Analysis of a Remote Controlled "Pick and Place" Robotic Vehicle" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0010. Nigeria
Page 57-68
Download
ANED 06.067X/J1055768 aned
aned 067X-0105-0168


Version - 2 (May 2014)

 

Mr C.Radhakrishnan, Ms. C.P.Darani

Privacy Preserving Of Intermediate Data Sets In Cloud
  • Abstract
  • Keywords
  • Reference
  • Full Article
Cloud Computing is a long-term dream of computing as a service has the portable to convert a huge
part of the Information Technology Industry and organization without any investment of infrastructure. In cloud
uses the more number of intermediate data sets generated, but still now preserving the privacy of intermediate
datasets becomes a difficult achievement problem because adversaries may improve privacy secret information
by analyzing multiple intermediary datasets. Encrypting all datasets in cloud is usually adopted in existing
approaches pointed to this challenge. Encrypting all intermediate datasets are either well organized or gainful
because it will take more time and costly for data demanding applications to encrypt and decrypt datasets
regularly while performing any operation on the data set. In my project, propose a novel upper-bound privacy
leakage constraint based approach to identify which intermediate datasets need to be encrypted or not, then the
privacy-preserving cost to be saved while the privacy requirements of data holders to be Satisfied. That data can
be transferred to the cloud only in an encrypted form, available only to users with the correct keys, that
protecting its confidentiality against un-intentional errors and attacks.
Encryption and Decryption, Privacy Preserving, Intermediate Dataset, Privacy Upper Bound,
Economics of scale.
[1]. C.M. Fung, K. Wang, and P.S. Yu, "Anonymizing Classification Data forPrivacy Preservation," IEEE Trans. Knowledge and Data Eng., vol. 19, no. 5, pp. 711-725, May 2007.
[2]. C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices," Proc. 41st Ann. ACM Symp. Theory of Computing (STOC '09), pp. 169-178, 2009.
[3]. H. Lin and W. Tzeng, "A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 6, pp. 995-1003, 2012. N. Cao, C. Wang, M. Li,
[4]. B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu, "Privacy-Preserving Data Publishing: A Survey of Recent Developments," ACM Computing Survey, vol. 42, no. 4, pp. 1-53, 2010.
[5]. H. Takabi, J.B.D. Joshi, and G. Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security & Privacy, vol. 8, no. 6, pp. 24-31, Nov./Dec. 2010.
Citation
Mr C.Radhakrishnan, Ms. C.P.Darani "Privacy Preserving Of Intermediate Data Sets In Cloud" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0001. India
Page 01-06
Download    
ANED 06.067X/A1050106 aned
aned 067X-0105-0206

 

Ramesh.K Deosur Umesh

Efficient Geographic Multicast Protocol for Mobile Adhoc Networks
  • Abstract
  • Keywords
  • Reference
  • Full Article
Multicasting is the transmission of packets to a group of zero or more hosts identified by a single destination address. Multicasting is intended for group-oriented computing. Many techniques' are used for transmission of data. Different techniques use different multicasting protocols. Conventional multicast protocols generally do not have good scalability due to the overhead incurred, for route searching, group membership management, and creation and maintenance of the tree/mesh structure over the dynamic MANET. For MANET unicast routing, geographic routing protocols have been proposed in recent years for more scalable. In this paper, proposed scheme is based on identity-based and threshold three level key management scheme which adopts Elliptic Curve Cryptography (ECC). It is well known that ECC is appropriate for such nodes due to its smaller keys and its higher security levels. The pairing technology provides authentication and confidentiality with reduced communication overhead and computational cost. This scheme which combined the identity-based and threshold cryptography can satisfy the secure requirements and provides efficiency in geographic multicasting of MANET.
Efficiency, Muticast Routing, Security

[1] HU Rong-lei, LIU Jian-wei, ZHANG Qishan."Cluster-based key management scheme for adhocnetworks".Journal on Communications, china.Vol.29 No.10. October 2008. pp.223-228.

[2] H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang,"URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Transactions on Networking ,Decembe2004, pp. 1049-1063

[3] W. Du, J. Deng, Y. S. Han, P. Varshney, J.Katz, and A. Khalili, "A Patrwise Ke Redistributions Scheme for Wireless Sensor Networks," ACM Transactions on Information and System Security (TISSEC), 2005 , pp. 228-258.

[4] D. Wallner, E. Harder, and R. Agee, "KeyManagement for Multicast: Issues and Architectures", RFC 2627, 1999.

[5] A. Ballardie, "Scalable Multicast KeyDistribution", RFC1949, 1996.

Citation
Ramesh.K Deosur Umesh "Efficient Geographic Multicast Protocol for Mobile Adhoc Networks" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0002. India
Page 07-11
Download    
ANED 06.067X/B1050711 aned
aned 067X-0105-0211

 

K S L N Bharadwaj, Posham Lenin Reddy, Ch Sandeep Kumar

SMART IRRIGATION DRIVE
  • Abstract
  • Keywords
  • Reference
  • Full Article
Smart Irrigation Drive involves running a single electric motor on both the phases (1phase & 3phase) which reduce the investment of farmers and increases the working hours (as 3phase or 1phase is available for most of the time). There is also a relay and cooling system designed for the motor in order to keep the windings safe from overheating , which will reduce the maintenance costs of the motor as it is operated well within it' s rated values. In order to conserve both water and electricity we are going to plant moisture sensor in the farm so that the motor turns off automatically when the farm is properly watered
Iinduction motor, Capacitor bank, Moisture sensor, Heat sensor, 1phase & 3phase supply, agricultural application
[1]. http://www.waterfront-woods.com/Articles/phaseconverter.htm
[2]. https://www.youtube.com/watch?v=6UcDM3hm0XM
[3]. http://en.wikipedia.org/wiki/Phase_converter
[4]. http://en.wikipedia.org/wiki/Rotary_phase_converter
[5]. Electric motors workshop practise series 16 by jimcox
Citation
K S L N Bharadwaj, Posham Lenin Reddy, Ch Sandeep Kumar "SMART IRRIGATION DRIVE" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0003. India
Page 12-15
Download    
ANED 06.067X/C1051215 aned
aned 067X-0105-0215

 

Dr.V. Mani Sarma, Ato Yoseph Abate

A New Decision Tree Approach to Image Data Mining and Segmentation
  • Abstract
  • Keywords
  • Reference
  • Full Article
In this paper, a general mining approach based on decision trees for segmenting image data is proposed. Pixel-wise image features are extracted and transformed into a database-like table that allows existing data mining algorithms to dig out useful information. Each tuple in the table has a feature descriptor consisting of a set of feature values for a given pixel along with its label. With the feature label, we can employ the decision tree to (1) discover relationship between the attributes of pixels and their target labels, (2) build a model for image processing by using the training data set. Both experiments and theoretical analysis are performed in our research. The results show that the proposed model is very efficient and effective for image mining and image segmentation. It can also be used to develop new image processing algorithms, refine existing algorithms, or act as an effective filter.
Data mining, decision tree, association rule,, Image Indexing ,classification, clustering, image segmentation, pixel. MIST
[1]. H. Liu, H. Motoda: Feature Selection for Knowledge Discovery and Data Mining. Kluwer Academic Publisher, 1998.
[2]. Haralick, R.M., and Shapiro, L.G. "SURVEY: image segmentation techniques", Computer Vision Graphics Image Processing, 1985, 29, pp. 100-132.
[3]. Revol, C., and Jourlin, M., "A new minimum variance region growing algorithm for image segmentation", Pattern Recognition Letters, 1997, 18, pp. 249-258.
[4]. Pal, N., and Pal, S., "A Review on Image Segmentation Techniques", Pattern Recognition, 1993, 26, pp. 1277-1294.
[5]. Jiawei Han, Micheline Kamber.: Data Mining: Concepts and Techniques. Simon Fraser University, 2001.
[6]. Rafael C. Gonzalez, Richard E. Woods.: Digital Image Processing, 1992.
Citation
Dr.V. Mani Sarma, Ato Yoseph Abate "A New Decision Tree Approach to Image Data Mining and Segmentation" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0004. Ethiopia
Page 16-25
Download    
ANED 06.067X/D1051625 aned
aned 067X-0105-0225

 

Piyush Saxena

Can Modern Interconnects Improve the Performance of Hadoop Cluster? Performance evaluation of Hadoop on SSD and HDD with IPoIB
  • Abstract
  • Keywords
  • Reference
  • Full Article
In today‟s world where Internet is most required and where pentabytes of data is produced per hour, there is a drastic need to speed up the performance and throughput of the cloud system. Traditional cloud systems were not able to give the performance that the storage devices like SSD and HDD were meant to deliver. In the last paper we showed that the hadoop on SSD and HDD did not showed much difference in performance as these were traditionally connected to the processing system that acts as a hindrance to the system. Another reason that could be spotted with the pattern of data access was that there was less of Random Access Memory with low caching resources available. To these issues, another set of experiments were conducted using a highly improved connecting method than the conventional 10 GigE and by implementing Distributed shared memory that can make the access patterns much faster. The improved methods that were considered for the test purposes were IPoIB and RDMA-IB. In this paper we will also present that Modern Interconnects used in Hadoop (MapReduce) with SSD can outperform the traditional Interconnecting technique like 10 GigE networks. In addition, we also demonstrate that the use of sockets or conventional TCP/IP applications can be still used with new technology and with improved throughput and less latency when IBoIP is used.
Hadoop, HDFS, SSD, HDD, HiBench, Benchmarking, 10 GigE, IPoIB, RDMA-IB.
[1] Hadoop Home: http://hadoop.apache.org/
[2] Jacky Wu, "Hadoop HDFS & MapReduce", Help Guidelines LSA Lab, NTHU, Taiwan 2013.8.7.
[3] Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung, "The Google File System", SOSP‟03, October 19–22, 2003, Bolton Landing, New York, USA. Copyright 2003 ACM.
[4] Piyush Saxena, Satyajit Padhy, Praveen Kumar, "Optimizing Parallel Data Processing With Dynamic Resource Allocation", International Conference on Reliability, Infocom Technologies and Optimization.,pp. 735-739, Jan. 29-31, 2013.
[5] Jeffrey Dean and Sanjay Ghemawat, "MapReduce: Simplified Data Processing on Large Clusters", OSDI‟04, 2004, Bolton Landing, New York, USA. Copyright 2004 ACM.
Citation
Piyush Saxena "Can Modern Interconnects Improve the Performance of Hadoop Cluster? Performance evaluation of Hadoop on SSD and HDD with IPoIB" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0005. India
Page 26-35
Download    
ANED 06.067X/E1052635 aned
aned 067X-0105-0235

 

Dr. Geetha Susan Philip, Younus A, Dhan Mon Francis

ModellingThe Performance Of Wind Energy Conversion System At Potential Wind Farm Sites In Kerala
  • Abstract
  • Keywords
  • Reference
  • Full Article
Due to the energy crisis and growing environmental consciousness, the global perspective in energy consumption is shifting towards sustainable resources and technologies. Hence wind energy is going to be a major source of the global energy demand from renewable and sustainable resources. India ranks fifth in the world in terms of global wind power capacity. Though Kerala has an estimated wind power potential of 1000 MW at 50 m level, the installed capacity in the state is only 32 MW. Hence, the power base of the state can be strengthened by exploiting the available renewable energy resources. Seven sites from different districts are selected for analysis. The Wind Energy Resource Analysis (WERA) program is used for analyzing the wind energy potential and estimating the performance of a Wind Energy Conversion System (WECS) at the site. For wind energy economics analysis the Eco-REN software is used .Different input parameters like rated power, capital investment, life span, capacity factor, operation and maintenance cost, discounting rate and electricity cost are used to produce the outcome. Among the selected sites, Kanjikode is most suitable to install wind turbines with minimum capital investment and with a payback period of 2-5 years.
Wind velocity,WERAmodel,ecoRENandcapacity factor.

[1] AnnaMani.1994.WindEnergyResourceSurveyinIndia.Vol.I.Allied Publishers Limited,New Delhi: 419-472.

[2] AnnaMani.1994.WindEnergyResourceSurveyinIndia.Vol.II.Allied Publishers Limited,New Delhi: 419-472.

[3] AnnaMani.1994.WindEnergyResourceSurveyinIndia.Vol.III.Allied PublishersLimited,NewDelhi: 419-472

[4] Mathew, S., AnilKumar, V.R. and Rao, M.D. 2004. Performance analysis of WECS usinWERAmodel.Proceedings of 8th World Renewable Energy Congress, Colorado, USA.

[5] Mathew, S.2006.Wind Energy-Fundamentals, ResourceAnalysisand Economics.Springer Publication, Germany: 1-233
[6] MNRE (2012). Retrieved fromhttp://www.mnre.gov.in/mission and-vision-2/achievements

Citation
Dr. Geetha Susan Philip, Younus A, Dhan Mon Francis "ModellingThe Performance Of Wind Energy Conversion System At Potential Wind Farm Sites In Kerala" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0006. India
Page 36-42
Download    
ANED 06.067X/F1053642 aned
aned 067X-0105-0242

 

V.V.S.Sarma, P.V.Rambabu, G.Venkata Ramarao

Durability Study on Compressive Strength of concrete using Rice Husk Ash as a Partial replacement using Magnesium Sulphate Solution
  • Abstract
  • Keywords
  • Reference
  • Full Article
The advancement of concrete technology can reduce the consumption of natural resources and energy sources and lessen the burden of pollutants on environment. Presently large amounts of RHA are generated in Rural and Small Scale Industries with an important impact on environment and humans. In recent years, many researchers have established that the use of supplementary cementitious materials (SCMs) like fly ash (FA), blast furnace slag, silica fume, metakaolin (MK), and rice husk ash (RHA), hypo sludge etc. can, not only improve the various properties of concrete - both in its fresh and hardened states, but also can contribute to economy in construction costs.
[1]. Mick Ryan, Sulphate Attack and Chloride Ion Penetration: Their Role in Concrete Durability, QCL Group Technical Note, Australia, March 1999.
[2]. Jan Skalny, Jacques Marchand and Ivan Odler, Consequences of sulfate attack on concrete, 2002.
[3]. E. B. Oyetola and M. Abdullahi, The use of rice husk ash in low - cost sandcrete block production, Federal University of Miami, June 2006.
[4]. J. Prasad, D.K. Jain and A.K. Ahuja, factors influencing the Sulphate resistance of cement concrete and mortar, IITR-Roorke, 2006.
[5]. M.R. Gidde and A.P. Jivani Waste to Wealth - Potential of Rice Husk in Indian Literature Review, Bharati Vidyapeeth Deemed University Callege of Engineering,pune,2007.
[6]. Ghassan Abood Habeeb, Hilmi Bin Mahmud Study on Properties of Rice Husk Ash and Its Use as Cement Replacement Material, March 2010.
Citation
V.V.S.Sarma, P.V.Rambabu, G.Venkata Ramarao "Durability Study on Compressive Strength of concrete using Rice Husk Ash as a Partial replacement using Magnesium Sulphate Solution" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0007. India
Page 43-47
Download    
ANED 06.067X/G1054347 aned
aned 067X-0105-0247

 

J.O. Kiran, D. Shivalingappa, D. Ramesh Rao

Experimental Validation of Numerical Simulation of Vibrating Systems having Three Degrees of Freedom using Power Input Method
  • Abstract
  • Keywords
  • Reference
  • Full Article
In this work, the energies dissipated by the spring mass damper system with three degrees of freedom are modelled and simulated for persistent load by using MATLAB. The experimentation is carried out for the numerical model developed. The experimental validation of the numerical solution developed for the persistence excitation system for coupling loss factor of 0.075 is compared.The overall trend of the profile of the experimental values seems to be in good agreement with the theoretical prediction. The difference in the values between the theoretical prediction and the experimental values can be attributed to the approximations made in simplification of the vibrating system for numerical solution. Also, there may be some cross vibrations coming from the floor on which the vibrating system is mounted.
Three degrees of freedom, Damping, Coupling loss factor, Persistent load,

[1] R.H Lyon and R.G DeJong,"Theory and Application of Statistical Energy Analysis" Elsevier science & technology,Books, 1995.

[2] S.S.Rao,"Mechanical vibrations" Prentice Hall Inc, Book, 2004.

[3] Nashif A.D,"Vibration Damping" Wiley John & Sons, Book,1985.

[4] C.W. DeSilva, "Vibration Fundamentals and Practice" CRC Press,Book, 1999.

[5] W.Liu,"Experimental and Analytical Estimation of damping in beams and plates with damping treatments"PhD Thesis, Lawrence, Aerospace Engineering,Univercity of Kansas, 2008.

Citation
J.O. Kiran, D. Shivalingappa, D. Ramesh Rao "Experimental Validation of Numerical Simulation of Vibrating Systems having Three Degrees of Freedom using Power Input Method" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0008. India
Page 48-55
Download    
ANED 06.067X/H1054855 aned
aned 067X-0105-0255

 

Praveen Budhwar, Bhisham Sharma, Dr. Trilok C. Aseri

Congestion Detection and Avoidance based Transport Layer Protocols for Wireless Sensor Networks
  • Abstract
  • Keywords
  • Reference
  • Full Article
Congestion can occur in wireless sensor networks when multiple sensor nodes try to transmit data. The sensor nodes closer to sink are more liable to congestion as they generally carry large upstream traffic. Congestion leads to higher packet loss, increased packet delay, less energy efficiency and poor throughput. Thus, congestion control is an important aspect that should be considered while designing transport layer protocols. In this paper, we first describe the basics of wireless sensor networks and their architecture. Then we elaborate the aspects of congestion control. Then we present various transport layer protocols which provide congestion control and then a comparison of these protocols is given on the basis of various parameters viz. congestion detection, congestion notification, congestion mitigation, hbh/e2e, fairness, energy efficiency, simulation/testbed, network topology, number of sensor nodes, buffer size, packet size, radio transmission range, coverage area, channel bit rate, initial transmission rate, simulation time, energy, fairness, latency, queue size, throughput, source rate, packet drop and fidelity . At the end, we present open research issues in congestion control protocols for wireless sensor networks.
Congestion Detection, Congestion Notification, Congestion Mitigation, Transport Layer, Wireless Sensor Networks.

[1]. D. Culler, D. Estrin and M. Srivastava, Overview of sensor networks, IEEE Computer, 38(8), 2004, 41-49.
[2]. K. Romer and F. Mattern, The design space of wireless sensor networks, IEEE Wireless Communications, 11(6), 2004, 54–61.
[3]. A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton and J. Zhao, Habitat monitoring: application drive for wireless communications technology, ACM SIGCOMM Workshop on Data Communication in Latin American and Caribbean, 31(2), 2001, 20-41.

[4]. K. Mechitov, W. Y. Kim, G. Agha and T. Nagayama, High-frequency distributed sensing for structure monitoring, Proc. 1st International Workshop on Networked Sensing Systems (INSS), 2004, 101-104.
[5]. R. Holman, J. Stanley and T. Ozkan-Haller, Applying video sensor networks to nearshore environment monitoring, IEEE Pervasive Computing, 2(4), 2003, 14-21.

Citation
Praveen Budhwar, Bhisham Sharma, Dr. Trilok C. Aseri "Congestion Detection and Avoidance based Transport Layer Protocols for Wireless Sensor Networks" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0009. India
Page 56-69
Download    
ANED 06.067X/I1055669 aned
aned 067X-0105-0269

 

K. Pahari

An analysis of relative Consistancy Coefficients of twolayered blood flow through a narrow vessel
  • Abstract
  • Keywords
  • Reference
  • Full Article
An attempt has been made to analyse the behavior of relative consistency coefficients of viscosity of two-layered blood flow through a narrow vessel. In the peripheral plasma layer, blood has been taken as Newtonian fluid while in the core layer it has been taken as Bingham Plastic fluid. The determination of relative coefficient ofviscosity has been made by equating the sum ofvolumetric flow rates in two layers to the volumetric flow rate in case the two fluids are replaced by a single newtonian fluid with appropriate viscosity coefficient. The computations of relative coefficient of viscosity are discussed numerically and displayed graphically.
Newtonian fluid, Bingham Plastic fluid, Hematocrit, Effective coefficient of viscosity.
[1]. R Fahreaeus, T liendquist (1931). The viscosity of blood innarrow capillary tubes, Am, J. Physiology, 96; 562 - 568
[2]. S. Segre, A Silberg (1962). Behaviour of microscopic nigid spheres in poiseuille flow, J. Fluid
[3]. Mech, 14, 115-157.
[4]. P Chaturani, P. N. Kaloni (1976). Two layered Poiseuille flow model for blood flow through arteries of small diameter and arterids, Biorheology, 13; 243 - 250.
[5]. G. Bugliarello, C. Kapur, G. Wsiao ( 1965) The profile viscosity and other characteristics of blood flow in a non-uniform shear field, symposium on Biorheology, Interscience John wiley, 351- 370.
Citation
K. Pahari "An analysis of relative Consistancy Coefficients of twolayered blood flow through a narrow vessel" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0010. India
Page 70-76
Download    
ANED 06.067X/J1057076 aned
aned 067X-0105-0276

 

Version - 3 (May 2014)

 

K. Shivarama Krishna, B. Murali Mohan, Dr. M. Padma Lalitha

Dynamic Modeling and Control of Grid Connected Hybrid Wind/PV Generation System
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper presents a dynamic modeling and control strategy for a grid connected wind and PV hybrid system. The power extracted from hybrid wind-solar power system is transferred to the grid interface inverter by keeping common dc voltage as constant. A direct-driven permanent magnet synchronous wind generator is used with a variable speed control method whose strategy is to capture the maximum wind energy below the rated wind speed. This study considers both wind energy and solar irradiance changes in combination with load power variations. A 26-kW wind/solar hybrid power system dynamic model is explored. The examined dynamics shows that the proposed power system is a feasible option for a sustainable micro grid application.
Grid-connected hybrid system, power conditioning system (PCS), variable speed wind turbine, PMSG, Photovoltaic (PV) array, PWM voltage source inverter, PI controller
[1]. Jitendra Kasera, Ankit Chaplot and Jai Kumar Maherchandani,(2012). "Modeling and Simulation of Wind-PV Hybrid Power System using Matlab/Simulink", IEEE Students' Conference on Electrical, Electronics and Computer Science.
[2]. K. T. Tan, P. L. So, Y. C. Chu, and K. H. Kwan, (2010). "Modeling, Control and Simulation of a Photovoltaic Power System for Grid-connected and Standalone Applications", IEEE- IPEC.
[3]. Alejandro Rolan, Alvaro Luna, Gerardo Vazquez and Gustavo Azevedo, (2009). "Modeling of a Variable Speed Wind Turbine with a Permanent Magnet Synchronous Generator", IEEE International Symposium on Industrial Electronics.
[4]. D. Kastha, S. N. Bhadra, S. Banerjee, "Wind Electrical Systems," Oxford University Press, New Delhi, 2009.
[5]. B. M Hasaneen and Adel A. Elbaset Mohammed, (2008). "Design and Simulation of DC/DC Boost Converter", IEEE.
Citation
K. Shivarama Krishna, B. Murali Mohan, Dr. M. Padma Lalitha "Dynamic Modeling and Control of Grid Connected Hybrid Wind/PV Generation System" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0001. India
Page 01-12
Download    
ANED 06.067X/A1050112 aned
aned 067X-0105-0312

 

Tanmay Kumar Varshney*, Amit Suhane

Breakdown Maintenance and Modification of Design for the Drying Machine
  • Abstract
  • Keywords
  • Reference
  • Full Article
Condition-based maintenance (CBM) is a maintenance program that recommends maintenance decisions based on the information collected through condition monitoring. It consists of three main steps: data acquisition, data processing and maintenance decision-making.The basic purpose of the paper work is the satisfaction of Tractor manufacturer's demand regarding issues of malfunctioning of PRV (Pressure relieving valve) coming from the field in warranty period. This was causing huge losses to the company as it had to replace parts which was the result of inefficient drying process. To resolve this issue a drying machine was used which later broke down. In this analysis, Breakdown maintenance of the drying machine is done and modification of design for the drying machine is proposed so that it could be used in all the seasons of the year in an efficient way.
Breakdown , Maintenance, Modification of design, Drying machine, Condition monitoring
[1]. J.Jaturonnatee, D.N.P. Murthy (March 2005): Optimal preventive maintenance of leased equipment with corrective minimal repairs, 174 (2006) 201–215.
[2]. Adjustable air aimplifier maintenance manual : Nex flow- Leading technology into the future USA, 2008.
[3]. Installation and maintenance of air cylinders Series 55-(E)CQ2 : SMC Corporation Europe, 2011.
[4]. Mahmood Shafiee, Stefanka Chukova(February 2013): Maintenance models in warranty, 229 (2013) 561–572.
[5]. Ming-TzongLin, Shih-KaiWu (June 2013): Modeling and improvement of dynamic contour errors for five-axis machine tools under synchronous measuring paths, 72(2013)58–72.
Citation
Tanmay Kumar Varshney*, Amit Suhane "Breakdown Maintenance and Modification of Design for the Drying Machine" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0002. India
Page 13-19
Download    
ANED 06.067X/B1051319 aned
aned 067X-0105-0319

 

Ziad M. Abood Rafal Naser Salah aeder Raad Hamed

Iris Eye Segmentation and bymultiple FCM
  • Abstract
  • Keywords
  • Reference
  • Full Article
In this research, the fuzzy c-means (FCM) technique applied toeye's iris segmentation and with multiple and evaluation the accuracy of results.
FCM, Iris eye, Digital Image Processing, segmentation, Matlab.

[1] Zetter, Kim (2012-07-25). "Reverse-Engineered Irises Look So Real, They Fool Eye-Scanners". Wired Magazine.Retrieved 25 July 2012.

[2] Jain, A., Hong, L., Pankanti, S. (2000). "Biometric Identification".Communications of the ACM, 43(2), p. 91-98. [3] Jain, Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK;

[4] Weaver, A. C. (2006). "Biometric Authentication". Computer, 39 (2), p. 96-97.

[5] Sahoo, SoyujKumar; MahadevaPrasanna, SR, Choubisa, Tarun (2012). "Multimodal Biometric Person Authentication : A Review". IETE Technical Review 29 (1): 54.

Citation
Ziad M. Abood Rafal Naser Salah aeder Raad Hamed "Iris Eye Segmentation and bymultiple FCM" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0003. Iraq
Page 20-25
Download    
ANED 06.067X/C1052025 aned
aned 067X-0105-0325

 

Osamah Rabab'ah, Abrar Omar Alkhamisi, Amin Saif Ahmad

Measure Quality Augmented Reality Tourist Using in Mobile Technology
  • Abstract
  • Keywords
  • Reference
  • Full Article
Lately, the advances in communication networking for mobile phones are considered the main cause of the emergence of some services that can easily present sightseeing information through the mobile at the tourist places. Nevertheless, the contents of the current tourist guide like the web and guide books present data and information that are related to non-activated sightseeing. In this paper, an endeavor is made to measure quality of the mobile application systems that present advices concerning sightseeing in order to solve these problems. This application system enables users to easily post and share any sightseeing data and information via utilizing their mobiles. Thus, they will be able to improve the sightseeing data. Moreover, the suggested system makes use of the augmented reality technology that improves a real environment via the virtual items. Consequently, the application system can be utilized as a sightseeing steerage system that overlays annotations on the real world. The suggested application system provides fundamental tour guides and routs that help their tours. Validation of the quality proposed solution in this paper through collecting a sample of people who answer an electronic survey that composed of 12 questions. The result of the validation of the quality proposed solution proved using this application will be suitable for solution tourist problem.
Measure Quality; Augmented Reality (AR); Tourist.

[1] Lashkari, A.H.; Parhizkar, B.; Mohamedali, M.A., "Augmented Reality Tourist Catalogue Using Mobile Technology," Computer Research and Development, 2010 Second International Conference on., pp.121,125, 7-10 May 2010

[2] Díaz ,F. ; González ,M.; Vidau , A.; "An Accesible and Collaborative Tourist Guide Based on Augmented Reality and Mobile Devices ",The Human Communication and Interaction Research Group,pp.354-361.

[3] El Choubassi, M.; Nestares ,O.; Yi Wu, Kozintsev, I.; Haussecker H., "An Augmented Reality Tourist Guide on Your Mobile Devices " , Springer-Verlag Berlin Heidelberg 2010,pp. 588–602.

[4] Alzua , A. ; Teresa ,M.; Abad, M., "An Experimental Usability Study for Augmented Reality Technologies in the Tourist Sector",Faculty of Humanities, San Sebastian Campus Deusto University, Spain,pp.232-242.

[5] Seo Byung K.; Kim, K.; Par , J., "Augmented Reality-Based On-Site Tour Guide: A Study in Gyeongbokgung",Springer-Verlag Berlin Heidelberg 2011, pp. 276–285,

Citation
Osamah Rabab'ah, Abrar Omar Alkhamisi, Amin Saif Ahmad "Measure Quality Augmented Reality Tourist Using in Mobile Technology" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0004. Jeddah
Page 26-40
Download    
ANED 06.067X/D1052640 aned
aned 067X-0105-0340

 

Mithun Ekanathan, Sujithkumar N., Dileeplal J., Y. S. Shankar Narayan

Modelling and Surface Analysis of Deployable Mesh Reflector
  • Abstract
  • Keywords
  • Reference
  • Full Article
Focal length of an antenna is a critical parameter when it comes to setting the feed or the receiver. In this paper, a technique for least-squares fitting of the elliptic paraboloid in 3D data set is presented. The objective is to estimate the invariants and the focal length of the deployable mesh reflector using the linear least-squares based fitting mechanism. The 3D data set will be acquired from the flight model hardware using close range photogrammetry (CRP) and the points will be used as input to the least square based fitting mechanism. The technique also describes how to estimate the Euler angles and orientation of the antenna. Estimating the variations of the focal length in each deployment tests will help in deciding the placement of the feed or the receiver.
Parameter estimation, paraboloid, fitting mechanism, mesh reflector, focal length
[1]. N. Werghi, B. Fisher, A. Ashbrook and C. Robertson, "Faithful recovering of quadric surfaces from 3D range data by global fitting", Int. J. Shape Modeling, vol. 6 (1), pp. 65–78, 2000.
[2]. G. Greschik, A. Palisoc, C. Cassapakis, G. Veal and M. M. Milulas "Sensitivity study of precision pressurized membrane reflector deformations", AIAA Journal, vol. 39 (2), pp. 308 – 314, 2001.
[3]. A. J. Camelio, S. J. Hu and D. J. Ceglark, "Modelling variation propagation of multistage assembly system with complaint parts", Transitions of the ASME, Journal of Mechanical Design, 2003.
[4]. Jainjun Shi and Shiyu Zhou, "Quality control and improvement of multistage systems: a survey", IIE Transitions, vol. 41, pp. 744-753, 2009.
[5]. Kathleen M. Carley, Natalia Y. Kamneva and Jeff Reminga, Response Surface Methodology: CASOS Technical Report, CMU-ISRI: 136, 2004.
Citation
Mithun Ekanathan, Sujithkumar N., Dileeplal J., Y. S. Shankar Narayan "Modelling and Surface Analysis of Deployable Mesh Reflector" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0005. India
Page 41-48
Download    
ANED 06.067X/E1054148 aned
aned 067X-0105-0348

 

Ajay Pathania

Human Exposure to Electromagnetic Radiations
  • Abstract
  • Keywords
  • Reference
  • Full Article
Human beings are bioelectrical systems. Our hearts and brains are regulated by internal bioelectrical signals. Environmental exposures to artificial EMFs can interact with fundamental biological processes in the human body. In some cases, this may cause discomfort, or sleep disruption, or loss of well-being (impaired mental functioning and impaired metabolism) or sometimes, maybe it is a dread disease like cancer or Alzheimer‟s disease. We cannot see ELF Electromagnetic Radiation (EMR) or Radio Frequency (RF) radiation but they exist everywhere. It is only relatively recently that we are beginning to understand that long-term exposure to these radiations can cause noticeable long-term health problems. As an analogy, it took 50 years of studying the impact of common household chemicals to understand our health was at risk when we use them. But before that, we did not realize such exposures were dangerous. These chemicals made us sick and even caused disease. Like the chemical world, we are now finally beginning to understand that Electromagnetic Fields (EMFs) can be dangerous. The use of common wireless devices like wireless laptops and mobile phones requires urgent action simply because the exposures are everywhere in daily life; we need to define whether and when these exposures can damage health, or the children of the future who will be born to parents now immersed in wireless exposures.
Electromagnetic radiations, Human Exposure, EM Radiations, effects of Em radiations, cell phones and radiation, radiations from laptop, Health Safety
[1]. (Aitken et al, 2004; Agarwal et al, 2007; Erogul et al., 2006) Barouki et al, 2012; Preston, 2004; WHO, 2002; Gee, 2009; Sly and Carpenter, 2012)
[2]. Sarkar, Ali and Behari (1994), Phillips et al. (1998), Lai and Singh (1995, 1996, 1997), and Verschave et al. (1994)
[3]. Bawin and Adey (1976), Adey (1980) and Blackman (1990).
[4]. Human Exposure to electromagnetic Radiation http://en.wikipedia.org/wiki/Electromagnetic_radiation_and_health
[5]. Bio-initiative Report, A Rationale for a Biologically-based Public Exposure Standard for Electromagnetic Fields (ELF and RF), 2007- http://www.bioinitiative.org/report/index.htm
Citation
Ajay Pathania "Human Exposure to Electromagnetic Radiations" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0006. India
Page 49-56
Download    
ANED 06.067X/F1054956 aned
aned 067X-0105-0356

 

Viswanadha Varma D., Rama Rao G. V., Sindhu J.

Effect of Temperature on Metakaolin Blended High Strength Concrete
  • Abstract
  • Keywords
  • Reference
  • Full Article
The high strength concrete can be advantageously used for columns and shear walls of high rise buildings, elevated structures, precast and prestressed products and construction where durability is a function of compressive strength. The advent of prestressed concrete technology techniques has given impetus for making concrete of higher strength. Concrete is defined as "High-strength concrete" solely on the basis of its compressive strength measured at a given age. In the 1970's, any concrete mixture that showed 40 MPa or more compressive strength at 28-days were designed as high-strength concrete. Achievement of high strength concrete requires quality materials resulting in increase of cost which necessitates the use of chemical and mineral admixture in the concrete industry. Metakaolin is a leader among a new generation of such materials. Metakaolin is relatively a new mineral admixture for concrete. An attempt is made in the present investigation to study the properties of high strength Metakaolin concrete. The present work aims to show the behavior of M50 grade of concrete at various temperatures and changes in its compressive strength, flexural strength and split tensile strength. The strength properties studied in general are found to be improved by replacing the cement with Metakaolin in all the mixes. The study reveals that concrete has very distinct bonding properties that change with change in exposure conditions.
High Strength Concrete, Metakaolin (MK), Compressive Strength, Flexural Strength, Split Tensile Strength
[1] Aquino .W, Lange. D.A., Olek.J "The influence of Metakaolin and silica fume on the chemistry of alkali-silica reaction products", Cement & Concrete Composites. 23, pp. 485-493, 2001.
[2] Bai.J, Wild.S, Sabir B.B and Kinuthia J.M "Workability of concrete incorporating pulverized fuel ash and Metakaolin", Cement & Concrete Research 51, No.3, pp.207-216, 1999.
[3] Bhai.J, Wild.S, Sabir.B.B "Sorptivity and strength of air-cured and water-cured PC-PFA-MK concrete and the influence of binder composition on carbonation depth", Cement & Concrete Composites, 32, pp. 1813-1821, 2002.
[4] Brooks.J.J., M.A.Meghat Johari, Mazloom M "Effect of admixtures on the setting times of high strength concrete", Cement & Concrete Composites Vol.22, pp.293-301, 2000.
[5] Chi- Sun-Poon, Salman Azhar, et al. "Performance of Metakaolin concrete at elevated temperatures", Cement & Concrete Research 25, pp. 83-89, 2003.
Citation
Viswanadha Varma D., Rama Rao G. V., Sindhu J. "Effect of Temperature on Metakaolin Blended High Strength Concrete" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0007. India
Page 57-67
Download    
ANED 06.067X/G1055767 aned
aned 067X-0105-0367

 

P.John Maclins

Tensile Behavior of Aluminium Alloy 6063 - T6 In Sea Water
  • Abstract
  • Keywords
  • Reference
  • Full Article
Sea water, by virtue of its chloride content, is a most efficient electrolyte. The Omni-presence of oxygen in marine atmospheres, sea spray increases the aggressiveness of salt attack. The differential concentration of oxygen dissolved in a droplet of salt spray creates a cell in which attack is concentrated where the oxygen concentration is lowest. The sea environment is the most structurally hostile environment within which aircraft operate. The structural components are being exposed to salt spray continuously during its operation and it experiences heavy loading during landing. Corrosion also leads to crack propagation when subjected to loading. Corrosion along with damage leads to the failure of structural components prematurely and presents a serious problem in the aging aircraft. This requires a different approach to the maintenance of structural components subjected to corrosion and repetitive loads. This paper studies the effect of corrosion and low impact damage on aluminium alloy 6063- T6. The 6063 aluminium alloy that was used for the study was heat treated and soaked in seawater prepared per ASTM D1141 for different intervals of time between 0hours and 1000hours. Corroded specimens were subjected to low impact damage. The result shows a gradual degradation in mechanical properties of the alloy due to corrosion and damage.
Sea Water, Corrosion, tensile strength, impact damage, Al Alloy 6063 – T6, ASTM D1141
[1]. L. Kompotiatis, Investigation on the behavior of aluminum alloys in corrosive environments, Doctor Engineer Thesis, Chemical Engineering Department, University of Patras, 1995.
[2]. Hosni Ezuber, A.El-Houd, F.El-Shawesh, A Study on the corrosion behavior of aluminium alloys in sea water, Journal of material and design, vol33, 2000, 117-134.
[3]. Wu.X.R, Li.B, Lu.F,TaoC.H,Zhang W.F, Xi.N.S, Analysis and control of corrosion cracking in airframe structures, Journal of engineering failure analysis, Vol 13,2006,398-408.
[4]. DuQuesnay D.L, Underhill.P.R, Britt H.J, Fatigue crack growth from corrosion damage in 7075-T6511 aluminium alloy under aircraft loading, Vol 25, 2000, 371-377.
[5]. Margery E.Hoffman and Paul C.Hoffman, Corrosion and fatigue research structural issues and relevance to naval aviation, Vol23, 2001, S1-S10.
Citation
P.John Maclins "Tensile Behavior of Aluminium Alloy 6063 - T6 In Sea Water" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0008. India
Page 68-74
Download    
ANED 06.067X/H1056874 aned
aned 067X-0105-0374

 

M. H. Gulzar

On Some Extensions of Enestrom-Kakeya Theorem
  • Abstract
  • Keywords
  • Reference
  • Full Article
In this paper we generalize some recent extensions of the Enestrom-Kakeya Theorem concerning the
location of zeros of polynomials.
Mathematics Subject Classification: 30 C 10, 30 C 15
Coefficient, Polynomial, Zero
[1] A.Aziz and B.A.Zargar, Some Extensions of Enestrom-Kakeya Theorem, Glasnik Math. 31(1996),
239-244.
[2] N. K. Govil and Q.I. Rahman, On the Enestrom-Kakeya Theorem, Tohoku Math.J.20(1968), 126-136.
[3] M. H. Gulzar, Some Refinements of Enestrom-Kakeya Theorem, Int. Journal of Mathematical
Archive -2(9, 2011),1512-1529.
[4] M. H. Gulzar, Bounds for the Zeros and Extremal Properties of Polynomials, Ph.D thesis,
Department of Mathematics, University of Kashmir, Srinagar, 2012.
[5] A. Joyal, G. Labelle and Q. I. Rahman, On the Location of Zeros of Polynomials, Canad. Math. Bull.,
10(1967), 53-66.
Citation
M. H. Gulzar "On Some Extensions of Enestrom-Kakeya Theorem" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0009. India
Page 75-81
Download    
ANED 06.067X/I1057581 aned
aned 067X-0105-0381

 

Sandeep Choudhary, Pragati Karan, Raghava Nallanthighal

Network Congestion Control through VTP Approach
  • Abstract
  • Keywords
  • Reference
  • Full Article
Network congestion occurs when a link or node carries large data but its quality of service deteriorates. Typical effects include queuing delay, packet loss or the blocking of new connections. It causes actual reduction in network throughput. The paper outlines VLAN Trunking Protocol (VTP) approaches to control network congestion and deliver maximum throughput. This approach helps to control network congestion and transmit packets from source to destination more effectively. Once implemented on manageable switch to make VTP server and client to control network congestion in local area network.
VLAN, Bursty Traffic, Delay Sensitive, High Speed Networks, Performance Metrics, Quality of Service, NVRAM
[1] E. Brent Kelly " Quality of Service In Internet Protocol (IP) Networks", Wainhouse Research 2002.
[2] David D. Clark, Kenneth T. Pogran and David P. Reed "An Introduction to Local Area Network" Proceedings of the IEEE, Vol. 66, No. 11, November 1978.
[3] JACOBSON, V. Congestion avoidance and control. In Proceedings of SIGCOMM '88 (Stanford, CA, Aug. 1988), ACM.
[4] Anders Berglund. (2002). "How do students understand network protocols" A phenomenographic study. Technical Report, 2002-006, Department of Information Technology, Uppsala University, Uppsala, Sweden.
[5] W. Willinger, M. Roughan, "Internet Topology Research Redux", in H. Haddadi, O. Bonaventure (Eds.),Recent Advancesin Networking, (2013)
Citation
Sandeep Choudhary, Pragati Karan, Raghava Nallanthighal "Network Congestion Control through VTP Approach" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0010. India
Page 82-86
Download    
ANED 06.067X/J1058286 aned
aned 067X-0105-0386

 

Version - 4 (May 2014)

 

M.K. Abeyratne, M.H.M.R. Shyamali Dilhani, D. Patel

Wavelet–Galerkin Technique for Neumann-Helmholtz-Poisson Boundary Value problems
  • Abstract
  • Keywords
  • Reference
  • Full Article
This paper is concerned with Wavelet-Galerkin technique to solve Neumann Helmholtz and Neumann Poisson boundary value problems. In compare, to classical finite difference and finite element, Wavelet-Galerkin technique has very important advantages. In this paper, we have made an attempt to develop a technique for Wavelet-Galerkin solution of Neumann Helmholtz boundary value problem in one dimension and Neumann Poisson problem in two dimensions in parallel to the work of J. Besora [6], Mishra etl. [15]. The Taylors approach have been used to include Neumann condition in Wavelet-Galerkin setup for 𝒚′′+𝜶𝒖=𝒇. The test examples show that some value of 𝜶 the result match with the exact solution. Neumann Poisson BVP results show that the given technique is not fit to the solution for some parameter.
Boundary Value Problems, Wavelets, Scaling Function, Connection Coefficients, Wavelet Coefficient ,Wavelet- Galerkin Method.
[1]. K. Amaratunga, J.R. William, S. Qian and J. Weiss, wavelet Galerkin solution for one dimensional partial differential equations, Int. J. numerical methods eng. 37,2703-2716 (1994).
[2]. K. Amaratunga, J.R. Williams, Qian S. and J. Weiss, Wavelet-Galerkin solutions for one Dimensional Partial Differential Equations, IESL Technical Report No. 92-05, Intelligent Engineering Systems Laboratory, M. I. T., 1992.
[3]. K. Amaratunga and J.R. William, Wavelet-Galerkin Solutions for One dimensional Partial Differential Equations, Inter. J. Num. Meth. Eng. 37(1994), 2703-2716.
[4]. G. Battle, "A block spin construction of ondelettes. Part I: Lemarie functions.‟ Comm. Math. Phys., 110, 601-615, (1987).
[5]. G. Belkin, R. Coifman and V. Rokhlin, Fast Wavelet Transforms and Numerical Algorithms, Comm. Pure Appl. Math. 44 (1997), 141-183.
Citation
M.K. Abeyratne, M.H.M.R. Shyamali Dilhani, D. Patel "Wavelet–Galerkin Technique for Neumann-Helmholtz-Poisson Boundary Value problems" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0001. India
Page 01-10
Download    
ANED 06.067X/A1050110 aned
aned 067X-0105-0410

 

D. O. Fakorede, A. I. Babatunde, F,A Ovat

Productivity Increase by Optimum Utilization of Machines and Manpower Energy
  • Abstract
  • Keywords
  • Reference
  • Full Article
Productivity has often been cited as a key factor in industrial performance, and actions to increase it are said to improve profitability and the wage earning capacity of employees. Improving productivity is seen as a key issue for survival and success in the long term. This project focuses on examining key factors of productivity enhancement, and investigating the causal relationships among those key factors to better understand and plan for productivity improvement. The results prove 5 key productivity factors, including "leadership‟, "strategic quality planning‟, "people‟, "data and information‟, and "process management‟, leading to a conceptual model.
man power, optimum utilization, production capacity, process management, strategy quality planning.
[1]. Afzal Muhammad (2004). Measurement of Productivity in the Large Scale Manufacturing Sector of Pakistan. Ph.D. Thesis, The University of Lahore, Pakistan. Ali K J (1978).
[2]. Baig Ayesha (2002). Your Productivity is National Prosperity. Productivity Journal, National Productivity Organization Pakistan, Islamabad, 8-9. Bernolak Imre (1980).
[3]. Campbell, John P. & Campbell, Richard J. (1998b). Industrial –Organizational Psychology and Productivity: The Goodness to Fit. In Campbell, John P., Campbell, Richard J. & Associates (Contributors). Productivity in Organizations.Jossey- Bass Publishers. USA.
[4]. Chen Liang-Hsuan, Liaw Shu-Yi and Chen, Yeong Shin (2001).Using financial factors to investigate productivity: an empirical study in Taiwan.Industrial Management and Data Systems. 101/7,MCB University Press [ISSN 0263-5577], 378-379.
[5]. Daniels Shirley (1997). Back to basics with productivity techniques. Work Study, Volume 46 · Number 2 © MCB University Press · ISSN 0043-8022, 52–57.
Citation
D. O. Fakorede, A. I. Babatunde, F,A Ovat "Productivity Increase by Optimum Utilization of Machines and Manpower Energy" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0002. Nigeria
Page 11-24
Download    
ANED 06.067X/B1051124 aned
aned 067X-0105-0424

 

Ms. Varsha N Kavi, Mr. Divyesh Joshi

Efficient mining of Positive and Negative Association Rules with weighted FP - Growth
  • Abstract
  • Keywords
  • Reference
  • Full Article
In recent years, data mining has become one of the most popular techniques for data owners to determine their strategies. Association rule mining is a data mining approach that is used widely in traditional databases and usually to find the positive association rules. However, there are some other challenging rule mining topics like negative association rule mining. Assumptions made by classical association rule mining model that all items have same significance without assigning their weight within a transaction or record. But importance for the items and transactions is given by calculating weight on various items have been represented by the proposed method. This proposed system uses weighted FP Growth algorithm using coefficient of correlation for mining both positive and negative association rules. Experiments are carried on synthetic as well as real data sets to provide precise and important positive and negative association rules which benefits in consumption of memory and compaction of search area for negative rule mining which in turn reduces execution time.
Data Mining, Association rule mining, Data Processing, correlation, Market basket analysis.
[1]. Samet Cokpinar, Taflan Imre Gunden, "Positive and negative rule mining on XML data streams in database as a service concept", Expert Systems with Applications, Vol.39, pp.7503-7511, 2012.
[2]. Agrawal, R., Srikant, R., "Fast algorithms for mining association rules in large Databases", In 20th International Conference on Very Large Data Bases, 1994.
[3]. Liu, Y., & Guan, Y. (2008), "FP-Growth Algorithm for Application in Research of Market Basket Analysis." IEEE International Conference on Computational Cybernetics, 269-272
[4]. Chit Nilar Win, Khin Haymar Saw Hla "Mining frequent patterns from XML data" University of Computer Studies, Yangon
[5]. Unay, O., & Gundem, T. _I. (2008). A survey on querying encrypted XML documents for databases as a service. ACM SIGMOD Record, 37(1), 12–20.
Citation
Ms. Varsha N Kavi, Mr. Divyesh Joshi "Efficient mining of Positive and Negative Association Rules with weighted FP - Growth" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0003. India
Page 25-31
Download    
ANED 06.067X/C1052531 aned
aned 067X-0105-0431

 

Nirali N. Madhak, Chintan R. Varnagar, Shahida G. Chauhan

Novel Approach for Improving the Recommendation System by Knowledge of Semantic Web in Web Usage Mining
  • Abstract
  • Keywords
  • Reference
  • Full Article
The World Wide, We has influenced a lot to both users as well as the web site owners. Massive growth of World Wide Web increases the complexity for users to browse effectively. For increasing web site uses and to achieve desired goal efficiently, web server activities are hypothetical to be changed as per users' interests. To achieve this they have to record and analyze user access pattern which are captured in the form of log files. Web usage mining refers to process of analyzing interaction of user with different web application and deriving some important knowledge out of it. Web usage mining process produces result based on maximum usage history, stored in the web server access logs. So we propose the system, which uses semantic knowledge, derived from each page, along with knowledge derived from WUM. The system generates the most efficient and applicable recommendation list, and also provides equal opportunity for the content, which is added recently, to be incorporated in the list, if this best matches with users interest.
Data mining, Web usage mining (WUM), Web log mining, Content Recommendation, Recommender System, Web server log.

[1] Hauqiang zhou and Hongxia Gao et al. "Research on improving Methods of processing in Web log Mining", IEEE, 2010.

[2] R. Cooley, B. Mobasher, J. Srivastava, "Web mining: information and pattern discovery on World Wide web", tools with artificial intelligence, Ninth IEEE International November 1997.

[3] J. Srivasta, R.Cooley, M.Deshpande, P.Tan, "Web usage mining: discovery and applications of usage patterns from Web data", ACM SIGKDD Vol.7, No.2, Jan-2000.

[4] S. K. Pani et al.," Web Usage Mining: A survey on pattern extraction from web logs", International Journal of Instrumentation, Control &Automation, Vol.1, Issue 1, 2011.

[5] Ting Chen et al., "Content Recommendation System based on Private Dynamic User Profile", VIth International Conference on Machine Learning and Cybernetics, IEEE, August-2007.

Citation
Nirali N. Madhak, Chintan R. Varnagar, Shahida G. Chauhan "Novel Approach for Improving the Recommendation System by Knowledge of Semantic Web in Web Usage Mining" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0004. India
Page 32-40
Download    
ANED 06.067X/D1053240 aned
aned 067X-0105-0440

 

Chukwuma G.J. Nmegbu

Modelling the Diffusion Rate of Microbes in Porous Media during Microbial Enhanced Oil Recovery
  • Abstract
  • Keywords
  • Reference
  • Full Article
Biotechnological advances have not only grown in chemical and biological industry but its application in oil and gas has completely followed an increasing trend. This work presents a study of the diffusion of microbes in one of such technologies. The models mathematically presented describe the transport of bacterial community through the pore throats of a porous system. Filtration loss control can be achieved using the formulated model mainly due to the plugging mechanism of biofilms. A computer program, written in JAVA code was used to run a simulation of the bacteria diffusion model. Three-Dimensional, areal, side and top views of the bacteria invasion environment are presented.
Diffusion, Microbe, MEOR, Biofilm, Simulation.
[1]. A. Tarek, and D. Paul, Advanced Reservoir Engineering Handbook, Arnold publishing limited, USA: Elsevier, p.33, 2006
[2]. J. Russell, Fundamentals of Enhanced Oil Recovery, Texas: SPE, p.23, 2002
[3]. C.G.J. Nmegbu and D.D. Pepple, "Modeling A Well Stimulation Process Using The MEOR Technique", Int. J. of Research. In Eng. And Tech., vol.3, no.3, April, 2014
[4]. C.G.J Nmegbu and K.K. Dagde, "Mathematical modeling of the soaking period in microbial enhanced oil recovery (MEOR) applications", J. Pet. Gas Explor. Res., vol. 4, no.1, pp.7-16, 2014
[5]. E. Donaldson, G. Chilingarian and T. Ye, Microbial Enhanced Oil Recovery, Arnold Publishing limited, USA: Elsevier, p.76, 2002
Citation
Chukwuma G.J. Nmegbu "Modelling the Diffusion Rate of Microbes in Porous Media during Microbial Enhanced Oil Recovery" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0005. Nigeria
Page 41-46
Download    
ANED 06.067X/E1054146 aned
aned 067X-0105-0446

 

K.P.UMA, P.SUDHARANII

Manpower Model for a Single Grade System with Two Sources of Depletion and Two Components for Threshold
  • Abstract
  • Keywords
  • Reference
  • Full Article
In this paper, an organization with single grade subjected to exodus of personnel due to policy decisions taken by it, is considered. In order to avoid the crisis of the organization reaching a breakdown point, a suitable univariate policy recruitment based on shock model approach and cumulative damage process, is suggested. A mathematical model is constructed and a performance measure namely the mean and variance of time to recruitment are obtained.
Single grade system, Univariate policy of recruitment, shock model.
[1]. Bartholomew, D.J., Stochastic Model for Social Process , 2nd ed., John Wiley and Sons, New
York(1973).
[2]. Bartholomew, D.J., A.F.Forbes, Statistical Techniques for Manpower Planning, John Wiley,
Chichester(1979).
[3]. R.Sathyamoorthi and R.Elangovan, A shock model approach to determine the expected time to
recruitment , Journal of Decision and Mathematical Sciences, 2(1-3)(1998),67-68.
[4]. R.Sathyamoorthi and S.Parthasarathy, On the expected time to recruitment in a two grade marketing
organization ,IAPQR Transactions, 27(1)( 2002), 77-80.
[5]. R,Elangovan, R.Sathiyamationoorthi and E.Susiganeshkumar, "Estimation of expected time to
recruitment under two sources of depletion of manpower", Proceedings of the International onference
on Stochastic Modelling and Simulation, Allied Publishres Pvt.Ltd., Chennai, pp.99-104, Dec 2011.
Citation
K.P.UMA, P.SUDHARANI "Manpower Model for a Single Grade System with Two Sources of Depletion and Two Components for Threshold" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0006. India
Page 47-55
Download    
ANED 06.067X/F1054755 aned
aned 067X-0105-0455

 

Devendra Singh, Amit Suhane

Modification of Hydraulic System of Tractor for Removal of Magnetic Particles from Hydraulic Oil
  • Abstract
  • Keywords
  • Reference
  • Full Article
In a tractor hydraulic/transmission oil contamination is a serious problem as it works in such environment, these contamination may be in different forms dust particles, water, oxidation & corrosion products ,wear metal particles. Metal wear particles plays a significant role in failure of hydraulic system such as jamming of control valve, worn out of sealing element etc. Removal of these metal wear particles is a serious problem. In present work modification in design of hydraulic system of tractor is proposed for removal of magnetic particles with the help of magnetic filter. In this work magnetic filter with centrally placed magnets (Ceramic oxide)of flux density 0.35T in the form of circular discs surrounded by a wire mesh filter cartridge mesh size (160μm) is used in suction side of hydraulic system of tractor.
Magnetic filter, viscous fluid, Hydraulic system, Tractor, Magnetic wears particles.
[1]. Noria Cooperation, Applications and Benefits of Magnetic Filtration. MachineryLubrication. 2014-03-03,<http://www.machinerylubrication.com/Read/794/magnetic> (Archived by WebCite at <http://www.webcitation.org/ 5ztv2aJTX>.
[2]. Magnom Magnetic Filter, Theory Behind the Magnom, 2014. <http://www.magnom.com>(Archived by WebCite at <http://www.webcitation.org/5ztwy83HR>).
[3]. J.H.P .Watson, Magnetic filtration, J. Appl. Phys. 44 (1973) 4209–4213.
[4]. S.J. Liberman, D. Kelland, Magnetic filtration aqueous suspensions of submicron reactor corrosion products, IEEE Trans. Magn. MAG 20 (1984) 1195–1197.
[5]. M. Franz, M. Franzreb, Determination of the capture radii of magnetite bearing hydroxide flocs in magnetic filtration, IEEE Trans. Magn. 34 (1998) 3902–3909.
Citation
Devendra Singh, Amit Suhane "Modification of Hydraulic System of Tractor for Removal of Magnetic Particles from Hydraulic Oil" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0007. India
Page 56-60
Download    
ANED 06.067X/G1055660 aned
aned 067X-0105-0460

 

Tejas R. Morankar, Anita P. Gund, Prashant R. Lonkar, Rohan B. Tambe, Prof. P. S. Purandare

Productivity Enhancement for Spray Painting Process of Wheel Hub
  • Abstract
  • Keywords
  • Reference
  • Full Article
Productivity is nothing but an economic measure of output per unit of input. Inputs include labour and capital, while output is typically measured in process time and revenues. The aim of the paper is to study productivity of the current production process by systematic analysis and implementation of the enhanced method to increase the productivity. For this the special purpose machine is developed to reduce the time required for the prescribed application of spray painting process with the improved accuracy of painting to the constrained area. The special purpose machine designed is advantageous for the improvement in productivity, increasing accuracy and proper utilization of manpower. Thus, the design and development of Special Purpose Machine is explained and analysed further in this report.
Accuracy Improvement, Fixture, Productivity, SPM, Spray Painting, Wheel Hub.

[1]. Letizia Montinari, "Trade, Productivity Improvements and Welfare Endogenous Market Structure Framework", no. 1624, Dec. 2013.

[2]. Prof. K. Gopinath & Prof. M. M. Mayuram, "Worm Gear Design", Indian Institute of Technology Madras.

[3]. S. K. Hajra Choudhary, A. K. Hajra Choudhary, Nirjhar Roy "Elements of Workshop Technology", Vol. 1 Manufacturing Processes, 11th Edition, 2002.

[4]. V. B. Bhandari, "Design of Machine Elements", 3rd Edition, 2012.

[5]. R. S. Khurmi, "Theory of Machines", 25th Edition, 2001.

Citation
Tejas R. Morankar, Anita P. Gund, Prashant R. Lonkar, Rohan B. Tambe, Prof. P. S. Purandare "Productivity Enhancement for Spray Painting Process of Wheel Hub" published at International Journal of Engineering Research and Development, Volume 10, Issue 5 (May 2014)
MID 1005.067X.0008. India
Page 61-64
Download    
ANED 06.067X/H1056164 aned
aned 067X-0105-0464