S.No. |
Title |
Page |
Downloads |
1. |
Implementation of Control Strategies for Power Quality Improvement Using Distribution Static Compensator (D-Statcom)
Implementation of Control Strategies for Power Quality Improvement Using Distribution Static Compensator (D-Statcom)
Abstract: This present paper deals the enhancement of voltage sags, Harmonic distortion and low power factor using Distribution Static Compensator (D-STATCOM) in Distribution system. The present model is based on the Voltage Source Converter (VSC) principle. The D-STATCOM injects a current into the system to mitigate the voltage sags. The operation of the proposed control method is presented for D-STATCOM. Simulations and analysis are carried out in MATLAB/SIMULINK with this control method for the proposed systems. The reliability of the control scheme in the system response to the voltage instabilities due to system faults or load variations is proved obviously in the simulation results.
Key words: D-STATCOM, VSC, MATLAB/ SIMULINK.
Reference
[1] K.A Corzine and Y.L Familiant."A New Cascaded Multi –Level H-Bridge Drive" IEEE Trans Power Electron, Vol 17 no 1 pp 1.25-1.31. Jan 2002 [2] J.S. Lan and F.Z. Peng "Multi level Converters- A New bread of converters", IEEE Trans. Ind .Appli Vol 32 no 3 pp S09-S17 May/June .1996 [3] T.A Maynard M.Fadel and N.Aouda, "Modeling of Multilevel Converters". IEEE Trans. Ind .Electron .vol44 pp 3S6-364.June 1997 [4] P.Bhagwat and V.R.Stefanovic, "Generalized Structure of a Multilevel PWM inverter". IEEE, Trans, Ind, April, Vol, 1A-19 no.6.pp. 1OS7-1069.Nov/ Dec -1983 [5] G. Satyanarayana, K.N.V. Prasad, G. Ramjet Kumar, K.Lakshmi Ganesh "Improvement of power quality by using hybrid fuzzy controlled based IPQC at various" ICEETS Vol no pp, 1243, 1250, 10-12 April/2013
P. Upendra Kuma, Shameem Khan, D. Rohit, T. Sai Kumar, N. Deepa |
01-08 |
 |
2. |
Stability Enhancement of Power System by Controlling Hvdc Power Flow through the Same Ac Transmission Line
Stability Enhancement of Power System by Controlling Hvdc Power Flow through the Same Ac Transmission Line
Abstract: Long extra high voltage (EHV) ac lines cannot be loaded to their thermal limits in order to keep sufficient margin against transient instability. With the scheme proposed in this paper, it is possible to load these lines very close to their thermal limits. The conductors are allowed to carry usual ac along with dc superimposed on it. The added dc power flow does not cause any transient instability. This paper presents the feasibility of converting a double circuit ac line into composite ac–dc power transmission line to get the advantages of parallel ac–dc transmission to improve stability and damping out oscillations. Simulation and experimental studies are carried out for the coordinated control as well as independent control of ac and dc power transmissions. No alterations of conductors, insulator strings, and towers of the original line are needed. Substantial gain in the loadability of the line is obtained. Master current controller senses ac current and regulates the dc current orders for converters online such that conductor current never exceeds its thermal limit. The present paper is implemented by using MATLAB/SIMULINK.
Key words: Extra high voltage (EHV) transmission, flexible ac transmission system (FACTS), simultaneous ac–dc power transmission
Reference
[1] H. Rahman, B.H. Khan, Power upgrading of double circuit ac transmission line by simultaneous ac–dc power transmission, in: Proceedings The IEEE, PES, Power India, 2006, doi:10.1109/POWERI.2006.1632623.
[2] H. Rahman and B H Khan ―Stability Improvement of Power Systemby Simultaneous AC-DC Power Transmission‖ Electric Power System Research Journal, Elsevier, Paper Editorial ID No. EPSRD- 06-00732, Press Article No. EPSR-2560— Digital Object. [3] L. K. Gyugyi, ―Unified power flow concept for flexible A.C. transmission system,‖ Proc. Inst. Elect. Eng., p. 323, Jul. 1992. [4] L. K. Gyugyi et al., ―The unified power flow controller; a new approach to power transmission control,‖ IEEE Trans. Power Del., vol. 10, no. 2, pp. 1085–1097, Apr. 1995. [5] N. G. Hingorani, ―FACTS—flexible A.C. transmission system,‖ in Proc. Inst. Elect. Eng. 5th. Int. Conf. A.C. D.C. Power Transmission, London, U.K., 1991.
P. Upendra Kumar, T. Satish Babu, P. Divakar, T. Ravi Teja Kumar, G. Rama Raju |
09-16 |
 |
3. |
A Review on Mass Spectrometry: Technique and Tools
A Review on Mass Spectrometry: Technique and Tools
Abstract: Protein structure prediction has gain important in area of life sciences, because of its complex structure. The protein-protein interaction is necessary to study the behavior of protein in a specific environment, and study molecular relationship in living systems. Therefore, large scale proteomics technologies are required to measure physical connection of proteins in living organisms. Mass Spectrometry uses the technique to measure mass-to-charge ratio of ion. It's an evolving technique for characterization of proteins. A Mass Spectrometer can be more sensitive and specific, also complement with other LC detectors. Liquid Chromatography, unlike gas chromatography is a separation technique which helps to separate wide range of organic compounds from small molecular metabolites to peptides and proteins. This paper addresses the study of data analysis using mass Spectrometry. It also includes the study of various methods of Mass Spectrometry data analysis, the tools and various applications of Mass Spectrometry.This review briefs on Mass Spectrometry technique, its application, usage, and tools used by Mass Spectrometry
Key words: complex, LC (Liquid chromatography) detectors, Mass Spectrometry, mass-to-charge ratio, Protein-protein interaction.
Reference
[1] Cheng Lu, Introduction to mass Spectrometry. [2] Jimmy K. Eng, Ashley L. McCormack, and John R. Yates, III (1994). "An Approach to Correlate Tandem Mass Spectral Data of Peptides with Amino Acid Sequences in a Protein Database". J Am Soc Mass Spectrom 5 (11): 976–989 [3] Perkins, David N.; Pappin, Darryl J. C.; Creasy, David M.; Cottrell, John S. (1999). "Probability-based protein identification by searching sequence databases using mass spectrometry data".Electrophoresis 20 (18): 3551–67 [4] Liang, C; Smith, JC; Hendrie, Christopher (2003). A Comparative Study of Peptide Sequencing Software Tools for MS/MS. American Society for Mass Spectrometry. [5] Bartels, Christian (31 May 1990). "Fast algorithm for peptide sequencing by mass spectroscopy". Biological Mass Spectrometry 19 (6): 363–368.
Ms. Ashwini Yerlekar, Dr. M.M. Kshirsagar |
17-23 |
 |
4. |
Recursive Algorithms and Systolic Architectures for Realization of Type-II Discrete Cosine Transform and Inverse Discrete Cosine Transform
Recursive Algorithms and Systolic Architectures for Realization of Type-II Discrete Cosine Transform and Inverse Discrete Cosine Transform
Abstract: The paper presents novel recursive algorithms for realization of one-dimensional type-II discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) of any length. By using some mathematical techniques, recursive expressions for DCT and IDCT have been developed. The number of additions and multiplications in the recursive algorithm for DCT are less in comparison with some other DCT algorithms. Basing on these two recursive algorithms, two systolic architectures are presented for realization of DCT and IDCT. The recursive algorithms are appropriate for VLSI implementation.
Key words: Discrete cosine transform, Inverse discrete cosine transform, Recursive algorithm, Systolic architecture.
Reference
[1] N.Ahmed, T.Natarajan, and
K.R.Rao,Discrete cosine transform, IEEE
Trans. Comput., vol. C-23, 1974,90-93.
[2] R.K.Rao and P.Yip, Discrete cosine
transform: algorithm, advantages, and
applications,(New York: Academic, 1990).
[3] M.J.Narasimha and A.M.Peterson, On
the computation of the discrete cosine
transform, IEEE Trans. Communications,
vol.COM-26, no.6, June 1978,934-936.
[4]. H.S.Hou, A fast recursive algorithms for
computing the discrete cosine transform,
IEEE Trans. Acoust., Speech, Signal
Processing, vol. ASSP-35,no.10,
Oct.1987,1455-1461.
[5] P.Lee and F.Y.Huang, Reconstructed
recursive DCT and DST algorithms, IEEE
Trans.SignalProcessing,vol.42,no.7,Jul.199
4, 1600- 1609.
M.N.Murty |
24-32 |
 |
5. |
Voltage Sag Mitigation Using Pulse Width Modulation Switched Autotransformer through Matlab Simulation
Voltage Sag Mitigation Using Pulse Width Modulation Switched Autotransformer through Matlab Simulation
Abstract: In this paper, a new voltage sag compensator for critical loads in electrical distribution system discussed. The proposed scheme employs a Pulse width modulation ac-ac converter along with a auto transformer. During a disturbance such as voltage sag, the proposed scheme supplies the missing voltage and helps in maintaining the rated voltage at the terminals of the critical load. Under normal condition the approach work in bypass mode and delivering utility power directly to load. The proposed system has less number of switching devices and has good compensating capability in comparison to commonly used compensators. Simulation analysis of three-phase compensator is performed in MATLAB/SIMULINK and performance analysis of the system is presented for various levels of sag and swell.
Key words: Power Quality, Voltage Sag, PWM Switched Autotransformer, IGBTs, Sag Mitigation.
Reference
[1] IEEE Recommended Practice for Emergency and Standby Power Systems for Industrial and Commercial Applications", vol. 445. The IEEE Standards Association, 1995.
[2] R. Arnold. Solutions to the power quality problem. Power Engineering Journal, 2001, 65–73. IEEE/PES Transmission and Distribution Conference and Exposition, 2001, 1(28): 543–547.
[3] D. Lee, T. Habetler, et al. A voltage sag supporter utilizing a pwm-switched autotransformer. IEEE Transactions on Power Electronics, 2007, 22(2): 626–635. [4] M. McGranaghan, D. Mueller, M. Samotyj. Voltage sags in industrial systems. IEEE Transactions on Industry Applications, 1993, 29(2): 397–403. [5] G. Reed, M. Takeda, I. Iyoda. Improved power quality solutions using advanced solid-slate switching and static compensation technologies. in: IEEE Power Engineering Society 1999 Winter Meeting, vol. 2, New York, USA, 1999, 1132–1137.
P. Shyam Kiran, B. Nookesh, M. Naga Bhavani, B. Anil Kumar, G. Mani Kumar |
33-36 |
 |
6. |
Speed Control of Bldc Motor Drive By Using Pid Controllers
Speed Control of Bldc Motor Drive By Using Pid Controllers
Abstract: This paper mainly deals with the Brushless DC (BLDC) motor speed driving systems have sprouted in various small scale and large scale applications like automobile industries, domestic appliances etc. This leads to the development in Brushless DC motor (BLDCM). The usage of BLDC Motor enhances various performance factors ranging from higher efficiency, higher torque in low-speed range, high power density ,low maintenance and less noise than other motors. The BLDC Motor can act as an alternative for traditional motors like induction and switched reluctance motors. In this paper PID controller is implemented with speed feedback loop and it is observe that torque ripples are minimized. Simulation is carried out using MATLAB / SIMULINK. The results show that the performance of BLDC Motor is quite satisfactory for various loading conditions. Brushless DC motor drives are typically employed in speed controlled applications.
Key words: PID, PI, BLDC, MATLAB/SIMULINK
Reference
[1] R. Civilian, and D. Stupak, "Disk drive employing multi mode spindle drive system," US patent 5471353, Oct 3, 1995. [2] G.H. Jang and M.G. Kim, "A Bipolar-Starting and Unipolar-Running Method to Drive an HDD Spindle Motor at High Speed with Large Starting Torque," IEEE Transactions on Magnetics, Vol. 41, no.2, pp. 750-755, Feb. 2005. [3] E.Grochowski and R.F. Hyot,"Future trends in hard disk drives",IEEE Tran. On Magnetics, vol.32, no.3, pp1850-1854, May 1996. [4] J.D.Ede, ,Z.Q.Zhu and D.Howe,"Optimal split ratio control for high speed permanent magnet brushless DC motors", in Proc.5th Int,Conf..Electrical Machines and Sytems', vol.2,Aug 2001,pp 909-912 [5] S.X.Chen, M.A.Jabbar, O.D. Zhang and Z.J.Lie,"New Challenge: Electromagnetic design of BLDC motors for high speed fluid film bearing spindles used in hard disk drives",IEEE Trans. Magnetics ,vol32,no.5, pp3854-3856,Sep. 1996.
Y.Narendra Kumar, P.Eswara Rao, P. Vijay Varma, V. V. Ram Vikas, P. Kasi Naidu |
37-41 |
 |
7. |
Mineral Detection using K-Means Clustering Technique
Mineral Detection using K-Means Clustering Technique
Abstract: This paper is all about a novel algorithm formulated with k-means clustering performed on remote sensing images. The fields of Remote Sensing are very wide and its techniques and applications are used both in the data acquisition method and data processing procedures. It is also a fast developing field with respect to all the above terms. Remote Sensing plays a very important role in understanding the natural and human processes affecting the earth's minerals. The k-means clustering technique is used for segmentation or feature selection of passive and active imaging and non-imaging Remote Sensing, on airborne or on satellite platforms, from monochromatic to hyperspectral. So here we concentrate on the images taken on or above the surface of the earth which are applied based on the proposed algorithm to detect the minerals like Giacomo that exist on the surface of the earth. Our experimental results demonstrate that our technique can improve the computational speed of the direct k-means algorithm by an order to two orders of magnitude in the total number of distance calculations and the overall time.
Key words: K-means clustering, sobel edge detection, remote sensing, hyperspectral image, feature extraction.
Reference
[1] The history of k-means type of algorithms (LBG Algorithm, 1980) R.M. Gray and D.L. Neuhoff, "Quantization," IEEE Transactions onInformation Theory, Vol. 44, pp. 2325-2384, October 1998. (Commemorative Issue, 1948-1998)
[2] An Introduction to Data Mining, Tan, Steinbach, Kumar, Addision-Wesley, 2005. http://www-users.cs.umn.edu/~kumar/dmbook/index.php
[3] SOBEL, I., An Isotropic 3×3 Gradient Operator, Machine Vision for Three – Dimensional
[4] SOBEL, I., Camera Models and Perception, Ph.D. thesis, Stanford University, Stanford,CA, 1970..
[5] Data Mining: Concepts and Techniques, 2nd Edition, Jiawei Han and Micheline Kamber, Morgan Kauffman, 2006 http://www-sal.cs.uiuc.edu/~hanj/bk2
P. Bangarraju, R. V. S. Manohar, Y. L. Anusha, Y. Suresh, B. Ram Mohan |
42-49 |
 |
8. |
Strengthening of reinforced concrete circular columns using glass fibre reinforced polymers
Strengthening of reinforced concrete circular columns using glass fibre reinforced polymers
Abstract: Seismic retrofitting of reinforced concrete members vulnerable to strong earthquakes is a great problem. It has long been recognized that confinement to concrete compression members not only increase the strength but improve ductility significantly. The present study focuses on the behavior of reinforced concrete specimens strengthened using glass fiber reinforced polymer (GFRP) subjected to axial compressive loading. In this study specimen of circular cross section having length to diameter ratio of 2.0 and 0.96% longitudinal reinforcement were prepared and tested for 28 days compressive strength. The specimens were wrapped with 0,2,4,6 and 8 layers of GFRP outside the surface of the specimens as confinement. The test results showed that there is a significant increase in the strength of specimen with the increase of confinement layers on the specimen. The 28 days compressive strength of specimen wrapped with 8 layers of GRRP was increased by 47% as compared to the strength of specimen without any confinement.
Key words: confinement, glass fibre ,compressive strength.
Reference
[1.] Lau K T and Zhou L M. (2001), "The Mechanical Behaviour of Composite-
wrapped Concrete Cylinders Subjected to Uniaxial Compression Load‟, vol 52, p 189.
[2.] Sliva M A G and Rodrigues CC. (2006), "Size and Relative Stiffness Effects on Compressive Failure of Concrete Columns Wrapped With Glass FRP‟. Journal of Material in Civil Engineering ASCE, p 334.
[3.] Benzaid R, Chikh Nasr-Eddine and Mesbah H. (2008), "Behaviour of Square Concrete Column Confined With GFRP Composite Wrap‟. Journal of Civil Engineering and Management, p 115 Vol 14, no 2.
[4.] Sheikh A Shamim and G Yau. (2002). "Seismic Behaviour of Concrete Columns with Steel and Fibre Reinforced Polymers‟. ACI Structural Journal. vol 99, p 72.
[5.] Mander, J. B., Priestley, M. J. N., and Park, R. (1988) J. Struct. Eng., 114(8), 1804-1826 "Theoretical stress-strain model for confined concrete."
Manish kumar Tiwari, Rajiv Chandak, R.K. Yadav |
50-54 |
 |
9. |
Studies on Improvement of Clayey Soil Using Egg Shell Powder and Quarry Dust
Studies on Improvement of Clayey Soil Using Egg Shell Powder and Quarry Dust
Abstract: Nowadays, considerable attention has been paid to the utilization of alternative materials, which bear higher engineering quality than traditional materials and are financially affordable. Soil is one of the most important materials used in a variety of construction projects including earth canals and earth dams. The fact that soil may provide all the resistance characteristics necessary for a project illustrates the importance of various methods used to improve soil quality. Clay soil is widely used in most of the construction projects. Clay soils, particularly soft clay soils, have good plastic properties so that increased moisture results in their decreased shear strength, compressive strength and volume changes. These damages typically take an irreparable toll on structures, which further clarifies the importance of soil improvement. Considering millions of tons of waste produced annually across the country, which not only poses the problem of disposal but also adds to environmental contamination and health risks, utilization of such refuse and industrial wastes and their subsidiary products as alternatives to construction materials may effectively contribute to environmental preservation and minimization of their adverse effects on the environment. In the present study, eggshell powder and quarry dust was used as the wastes, to combine with soil so that the properties of clay soil were investigated in different mixture proportions. Then the properties of soils including liquid and plasticity limits as well as plasticity index, dry density, optimum moisture content, permeability, consolidation coefficients, and shear strength, which were already measured, were compared with those of the experimental specimens mixed with eggshell powder and quarry dust in different proportions. Since the introduction of egg shell powder and quarry dust improves the engineering behavior of soils, this review work exposes those qualities and applications that make quarry dust and egg shell powder a good replacement or admixture during soil improvement and for a more economic approach. The conclusion drawn from this investigation is that the combination of quarry dust and egg shell powder is more effective than the addition of quarry dust/ egg shell powder alone for the improvement of properties of clay.
Key words: Clay, Waste, Eggshell Powder, Quarry Dust.
Reference
[1] IS 2720 Part- III/ Section2, 1997, "Methods of Tests for soils" (Specific Gravity), BIS, New Delhi.
[2] IS 2720 Part- IV, 1995, "Methods of Tests for soils" (Grain Size Analysis), BIS, New Delhi.
[3] IS 2720 Part- V, 1995, "Methods of Tests for soils" (Atterberg Limits), BIS, New Delhi.
[4] IS 2720 Part- VIII, 1997, "Methods of Tests for soils" (Proctor's Compaction Test), BIS, New Delhi.
[5] IS 2720 Part- X, 1991, "Methods of Tests for soils" (Direct Shear), BIS, New Delhi.
Anu Paul*,Anumol V S, Fathima Moideen, Jiksymol K Jose, Alka Abraham |
55-63 |
 |
10. |
Modified Smith Predictor Based Control Of Cascaded Chemical
Reactor
Smith Predictor Based Control Of Cascaded Chemical
Reactor
Abstract: A cascade control with modified smith predictor is used for controlling an open loop unstable time delay
process. It has three controllers, one is for servo response other two are for regulatory response. For two
disturbance rejection controllers an analytical design method is used by proposing closed loop complementary
sensitivity function. These two controllers are PID controller cascaded with second order lead/lag filter. Setpoint
tracking controller is designed by using direct synthesis method. The main advantage of this control scheme is
that the servo response can be decoupled from the regulatory response.
Key words: Cascade control, Disturbance rejection, Servo response, Smith predictor, Regulatory response
Reference
[1] Jeo Gao, Multiple degrees of freedom control for cascade process with time delay, ISA Transactions 15 (2012) 3-7. [2] Mohammad Ahamadi, Temperature control of a continuous stirred tank reactor by two different intelligent strategies, Internat J on smart sensing and intelligent system 4 2011 2 [3] Yin Cheng-qiang, Cascade control based on minimum sensitivity in outer loop for process with time delay, J Central South University 19 2011 2689-2696. [4] Tao Liu. "Enhanced IMC based load disturbance rejection for integrating process with slow dynamics". ISA Transactions (2010) 345-357. [5] A. Seshagiri Rao, Enhancing the performance of parallel cascade control using smith predictor, ISA Transactions 40 2009 220-227.
Binu P. Mathew, L. D. Vijay Anand |
64-67 |
 |
11. |
Vibrations Of Poroelastic Solid Cylinder In The Presence Of Static Stresses In The Pervious Surfaces
Vibrations Of Poroelastic Solid Cylinder In The Presence Of Static Stresses In The Pervious Surfaces
Abstract: This paper deals with the flexural vibrations of poroelastic solid cylinders. The frequency equations for pervious
surface are obtained in the frame work of Biot's theory of wave propagation in poroelastic solids. The gauge
invariance property is used to eliminate one arbitrary constant in solution of the problem. This would lower the
number of boundary conditions actually required. For illustration purpose, three materials are considered and
then discussed. In either case, phase velocity is computed against wave number
Reference
[1]. Biot M.A., 1956, The theory of propagation
of elastic waves in fluid-saturated porous
solid, J.Acous.Soc.Am, 28, 168-178.
[2]. Biswas R.N., 1976, Nangia A.K. and Ram
Kumar, Flexural vibrations of a finite circular
cylinder, Acustica, 35, 26-31.
[3]. Mott G., Elastic waveguide propagation in an
infinite isotropic solid cylinder that is
subjected to a static axial stress and strain,
Journal of Acoustical Society of America,
1972, pp. 1129-1133.
[4]. Malla Reddy P. and Tajuddin M, 2000, Exact
analysis of the plane strain vibrations of thick
walled hollow poroelastic cylinders,
International Journal of Solids & Structures,
37, 3439-3456.
[5]. Ram Kumar, 1964, Axially symmetric
vibrations of a finite isotropic cylinder,
J.Acoust. Soc. Am., 38, 851-854.
Srisailam Alety |
68-72 |
 |
12. |
The Finite Element Method Solution of an Unsteady MHD Free Convection Flow Past an Infinite Vertical Plate with Constant Suction and Heat Absorption
The Finite Element Method Solution of an Unsteady MHD Free Convection Flow Past an Infinite Vertical Plate with Constant Suction and Heat Absorption
Abstract: The study of unsteady hydro magnetic free convective flow of viscous incompressible and electrically conducting fluids past an infinite vertical porous plate in the presence of constant suction and heat absorbing sinks has been made. Appropriate solutions have been derived for the velocity and temperature fields, skin friction and rate of heat transfer using Galerkin finite element method. It is observed that increase in magnetic field strength decreases the velocity of the fluid. Also the skin friction and rate of heat transfer of the conducting fluid decrease with increase in magnetic field strength.
Key words: MHD, unsteady, free convection flow, infinite vertical plate, heat sink, constant suction, Galerkin finite element method.
Reference
[1] Ahmed, S. and Liu, I. C. Mixed convective three – dimensional heat and mass transfer flow with transversely periodic suction velocity, International Journal of Applied Mathematics and Mechanics,6(1), 2010, pp. 58 - 73.
[2] Ahmed, S. Effects of viscous dissipation and chemical reaction on transient free
convective MHD flow over a vertical porous plate. Journal of Energy Heat and Mass Transfer 32, 311 - 332 (2010).
[3] Ahmed, S. Free and forced convective MHD oscillatory flows over an infinite porous surface in an oscillating free stream. Latin American Applied Research 40, 167 - 173 (2010).
[4] Ahmed, S. Transient three-dimensional flows through a porous medium with transverse permeability oscillating with time. Emirates Journal for Engineering Research 13(3), 11 - 17 (2008).
[5] Aldoss, T. K. and Al-Nimir, M. A. Effect of the local acceleration term on the MHD transient free convection flow over a vertical plate. International Journal for Numerical Methods for Heat Fluid Flow 15(3), 296 - 305 (2005).
A Sri Sailam |
73-79 |
 |
13. |
Shear Strength Prediction of Multi-Spot Welded Lap Shear Specimen through Experimentation and Validation by FEM
Shear Strength Prediction of Multi-Spot Welded Lap Shear Specimen through Experimentation and Validation by FEM
Abstract: The effect of design parameters and process parameters on the tensile shear strength of two similar galvanized steel sheets are investigated through experiments using Taguchi method .Design parameters are number of spots, specimen thickness and spot spacing. Process parameters are squeezing force, welding current. Similar sheets of galvanized steel sheets are made by resistance spot welding at different processing conditions and these joint populations have been tested under defined loading conditions. Specially fabricated and designed fixture is used to load the lap shear specimen in the universal testing machine Regression analysis is done to obtain relationship between tensile shear strength and selected parameters. Confirmation tests have been conducted to check accuracy of regression model. More over Monte Carlo simulation i.e probabilistic analysis under dynamic loading condition has been carried to know uncertainty in shear strength also probability for safety of structure is determined. The experimental results indicate that the failure loads of spot welds in lap shear specimens increase when number of spot, squeezing force, welding current and sheet thickness increase for the given ranges while Shear strength increases by 1.318% as loading velocity increases from 1.32m/min to 2m/min.
Key words: Number of spots, Spot spacing, Tensile shear strength, Spot spacing, Monte Carlo simulation
Reference
[1]. V.X. Trana, J. Pana,, T. Panb, "Effects of Processing Time on Strengths and Failure Modes of Dissimilar Spot Friction Welds Between Aluminum 5754-O and 7075-T6 Sheets" J materials processing technology 209(2009)3724–3739.
[2]. Luo Yi a,b,, Liu Jinhe , Xu Huibin , Xiong Chengzhi , Liu Lin , "Regression Modeling And Process Analysis Of Resistance Spot Welding On Galvanized Steel Sheet". Materials and Design 30 (2009) 2547–2555
[3]. A.M. Pereira, J.M. Ferreira . A. Loureiro, J.D.M. Costa , P.J. Bártolo, "Effect of Process Parameters on The Strength of Resistance Spot Welds In 6082-T6 Aluminium Alloy". Materials and Design31(2010)2454–2463
[4]. A.G Thakur and V.M Nandedakar, "Application of Taguchi Method to Determine Resistance Spot Welding Conditions. of Austenitic Stainless Steel AISI304",Journal of scientific research Vol No.69 ,Septmber 2010 pp.680-683.
[5]. G. Mukhopadhyay .S. Bhattacharya b, K.K. Ray a, "Effect of Pre-Strain on The Strength of Spot-Welds". Materials and Design 30 (2009) 2345–2354.
Prasad P Kulkarni |
80-87 |
 |
14. |
Study on Braille Input Output Devices
Study on Braille Input Output Devices
Abstract: This document is about the Braille devices .there nearly 45 to 50 million are many people in the world who are blind and more than 269 who visually impaired. before the inversion of Braille device blind people cannot able to read or gain knowledge through reading Louis Braille is the person who invented the device called Braille which became popular by the usage ,nowadays there are many devices arrived in this world to solve the visually impaired peoples problem not only we can use such devices but also we can reduce the cost by combining various techniques. This paper is about the various Braille devices and their methods or their combination to make them cost effective.
Key words: Braille,copier,embrossor,Tactile,SPARSHA.
Reference
[1] S.Srinath, C.N.Ravi Kumar, An Insight into optical Braille Character Recognition since its conceptualization, International Journal
of Computer Applications,, 33(6), 2011 ,(0975-8897).
[2] David G. Johnson, Fact Sheet on Braille Writers, Printers and Software,http://www.abledata.com/abledata_docs/braille_writers_printers_software.htm
[3] Ruman Sarker, Smita Das, Analysis of Different Braille Devices for Implementing a Cost –effective and Portable Braille System for the Visually Impaired People, International Journal of Computer Applications,60(9),2012,(0975-8897).
[4] Daniel Blood, Brian Koch Press Project: Improving the Literacy of the world's Visually Impaired, International Journal for Service Learning in Engineering, 5(2),2010,(1555-9033)., Marjorie Ballun, Mark M.Budnik, G.Scott Duncan, A Braille
[5] Paul Blenkhorn , Gareth Evans, Automated Braille Production from word-processed Documents, IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABITATION ENGINEERING,9(1),2001
S. Padmavathi, S. Saradha |
88-93 |
 |
15. |
Literature Survey on Voltage Profile Management Methods of Distributed Generation
Literature Survey on Voltage Profile Management Methods of Distributed Generation
Abstract: Distributed Generation (DG) has been utilized in some electrical networks in order to manage the low level demand. Environmental and economical issues have driven significant increase in the development of distributed generation. DG connected to the distribution systems, however, may impose negative influences with respect to power quality and efficiency. This negative influence is based on the location of the DG in the distributed system. In order to optimally positioning the DG in the system to improve the power quality and efficiency many algorithms are used. In this paper we made a literature survey on different algorithms used for positioning and sizing of DG in order to reduce losses, maintaining voltage profile. Also we have explained the methodology of each algorithms used.
Key words: Artificial Bee Colony, Ant Colony Optimization, Distributed Generation, Genetic Algorithm, Optimization Algorithms.
Reference
[1] I. A. Farhat, "Ant Colony Optimization for Optimal Distributed Generation in Distribution Systems", International Journal of Computer, Information Science and Engineering Vol: 7 No: 8, 2013. [2] M.Gandomkar, M.Vakilian, M.Ebsan, "A combination of genetic algorithm and simulated and annealing for optimal DG allocation in distribution networks", CCECE/CCGEI, Saskatoon, May 2005. [3] Fahad S. Abu-Mouti, EL-Hawary, "Optimal Distributed Generation Allocation and Sizing in Distribution Systems via Artificial Bee Colony Algorithm", IEEE Transactions On Power Delivery, Vol. 26, No. 4, October 2011. [4] R. Srinivasa Rao, K. Ravindra, K. Satish, and S. V. L. Narasimham, "Power Loss Minimization in Distribution System Using Network Reconfiguration in the Presence of Distributed Generation", IEEE Transactions On Power Systems, Vol. 28, No. 1, February 2013. [5] Sara Molazei, Mahmoud Oukati Sadegh, "Vector Swarm Optimization algorithm for Distributed Generator Allocation", International Journal of Renewable Energy Research Sara Molazei Et Al., Vol.3, No.1, 2013.
Chandragupta Mauryan. K. S, Manikanda Prabhu. J, Senapathi. N. K, Madhumitha. D |
94-98 |
 |
16. |
Synthesis of Cordic Algorithm for Different Function
Synthesis of Cordic Algorithm for Different Function
Abstract: COordinate Rotation DIgital Computer (CORDIC) algorithm is very simple and iterative process for performing various mathematical computations. The development of CORDIC algorithm and architecture has taken place for achieving high throughput rate and reduction of hardware-complexity as well as the latency of implementation Most of the literature lacks in calculation of resources utilized by a particular CORDIC architecture. In this paper resource calculation and the design operation of various mathematical functions like divider, Rectangular to Polar conversion sin cos functions along with their accuracy is discussed.
Index Terms: CORDIC, Vector Rotation, Throughput
Reference
[1] Buruc KIR Mehmet Ali ALTUCN, Suhap SAHIN, ― FPGA Based Implementation of CORDIC using different number format ‖ IEEE, 2013. [2] J. E. Volder, ―The CORDIC trigonometric computing technique,‖ IRE Transactions on Electronic Computers, vol. EC- 8, pp. 330–334, Sept. 1959. [3] J. S. Walther, ―A unified algorithm for elementary functions,‖ in Proceedings of the 38th Spring Joint Computer Conference, Atlantic City, NJ, 1971, pp.379–385. [4] D. S. Cochran, ―Algorithms and accuracy in the HP-35,‖ Hewlett-Packard Journal, pp. 1–11, June 1972. [5] S. Wang, V. Piuri, and J. E. E. Swartzlander, ―Hybrid CORDIC algorithms,‖IEEE Transactions on Computers, volume 46, no. 11, pp. 1202–1207, November1997.
Ramanpreet Kaur, Parminder Singh Jassal |
99-104 |
 |
17. |
Induction Motor Mathematical Model Fed By Cascaded MLI
Induction Motor Mathematical Model Fed By Cascaded MLI
Abstract: Multilevel inverters have drawn tremendous interest in the power industry as it is easy to produce a high-power, high voltage inverter with the multilevel structure because of the way in which device voltages stresses are controlled. The unique structure of multilevel inverters allow them to reach high voltages with low harmonics. Cascaded multilevel inverters has gained more interest because of its advantages over other MLI configurations like diode-clamped, flying capacitor inverter. In this paper seven level cascaded MLI is simulated and is fed to mathematical model of induction motor and the results are evaluated.
Key words: cascaded mli, diode clamped, flying capacitor, high power, low harmonics, induction motor
Reference
[1] Electric Motor Drives –Modeling, Analysis and Control by R.Krishnan [2] Permanent Magnet Synchronous and Brushless DC Motor Drives by R. Krishnan. [3] Krause, P. C., ‗Simulation of symmetrical induction machinery', IEEE T rans. Power Apparatus Systems, Vol. PAS-84, No. 11, pp. 1038–1053 (1965) [4] Ghani, S. N., ‗Digital computer simulation of three-phase induction machine dynamics — a generalized approach', IEEE Trans Industry Appl., Vol. 24, No. 1, pp. 106–114 (1988). [5] M.Rashid ―Power electronics Handbook‖, AcademicPress.
ManiKrishna.P, SivaKotayya.V, CalvinKamal.V,M.S.RaghavendraReddy, Sri Harsha.G |
105-111 |
 |
18. |
Edge Detection Using Directional Filtering
Edge Detection Using Directional Filtering
Abstract: Edge detection can be performed by applying an edge filter in n directions. Conceptually, in order to estimate gradient, that is, to determine the edge map, eight filtering directions, e.g. (0, π/8, π/4, 3π/8, π/2, 5π/8, 3π/4, 7π/8), constitute the sufficient basis for the gradient calculation. Computationally, such a two-dimensional (2-D) eight-directional filter can be represented by a pair of real masks, that is, by one complex-number matrix. Final edges are determined after applying the non-maximum suppression followed by thresholding with hysteresis algorithms to obtain smooth and connected edge map.
Key words: Conjugate images, directional filtering, edge detection.
Reference
[1] Rishi R. Rakesh, Probal Chaudhuri, and C. A.
Murthy "Thresholding in Edge Detection: A
Statistical Approach‟ IEEE Transactions on
image processing, vol. 13, no. 7, July 2004.
[2] E. Davies, "Machine Vision: Theory,
Algorithms and Practicalities", Academic
Press, pp 101 – 110, 1990.
[3] R. M. Haralick and L. S. Shapiro, Computer
Vision, vol. 1. Reading, MA: Addison-Wesley,
1992.
[4] A. K. Jain, Fundamentals of Digital Image
Processing. Englewood Cliffs, NJ: Prentice-
Hall, 1989.
[5] D. Marr and E. Hildreth, "Theory of edge
detection," in Proc. R. Soc. Lond. B, vol. 207,
pp. 187–217, 1980.
H. Aboelsoud M. |
112-115 |
 |
19. |
Secure Data Aggregation in Wireless Sensor Networks
Secure Data Aggregation in Wireless Sensor Networks
Abstract: The Security in sensor networks has become most important aspect along with low power as the sensors are unattended so there is more possibility of attack in WSN than usual networks, data aggregation security is an important task as if some false node injects a highly odd value it will affect the whole aggregation process, The paper reviews the need of security for data aggregation and propose an architecture which can eliminate the false values injection as well as provides end to end reliability and data freshness, the architecture is also energy optimized.
Key words: data aggregation, sensor networks, energy efficiency, Hash
Reference
[1] Shehzad Ashraf Ch, ZahidMehmood, Rashid Amin, Dr. Mohammad Alghobiri, Tahir Afzal Malik "Ensuring Reliability & Freshness in Wireless Sensor Networks" 2010 International Conference on Intelligent Network and Computing (ICINC 2010) [2] Tanveer Zia and Albert Zomaya "Security Issues in Wireless Sensor Netwoks" [3] Kay Romer and FriedemannMattern "The Design Space of Wireless Sensor Networks" NCCR-MICS, grant no. 5005-67322. IEEE Wireless Communicationss, Dec. 2004 [4] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson,"Wireless Sensor Networks for Habitat Monitoring," WSNA‟02, Atlanta, Georgia, September 2002.
[5] N. Xu, S. Rangwala, K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, and D. Estrin, "A Wireless Sensor Network for Structural Monitoring," in Proceedings of the ACM Conference on Embedded Networked Sensor Systems, Baltimore, MD, and November 2004.
Dr. Debmalya Bhattacharya |
116-120 |
 |
20. |
Microcontroller Based Power Consumption Monitoring and Warning System
Microcontroller Based Power Consumption Monitoring and Warning System
Abstract: This paper attempts a solution to the problem of energy crisis in an indirect way. This project aim to design a circuit which helps consumer taking care regarding his electrical energy consumption and protect him/her from the extra charges incurred due to minor changes in slab categories, even though these changes are small but they affect the consumer's bill severely. To make him aware and to control the excess power consumption, this paper introduces, a "MICROCONTROLLER BASED POWER CONSUMPTION MONITORING AND WARNING SYSTEM". This system will intimate the consumer about his usage rate. It will display the units he consumed and how many units he had been left with, in order to be in a minimum slab rate being fixed for a period of time by him/her. In this way we can make the consumer aware of the billing and make him to consume the power according to his use. It not only benefits the consumer, it also benefits the government as it is capable of reducing the power consumption and subsequently we can reduce the unusual power usage
Key words: power consumption, slab rate, electrical energy crisis, consumer, warning system, micro controller.
Reference
[1] V.K.Mehta and Rohit Mehta, "Principles of Power System", 4th ed, S. Chand publication, 2008. [2] C. J. Bandim, E. R. Alves ., A. V. Pinto, F. C. Souza, M. R. B. Loureiro, C. A. Magalhges and F. Galvez-Durand, "Identification of Energy Theft and Tampered Meters Using a Central Observer Meter: A Mathematical Approach", Transmission and distribution conference and exposition, 2003 [3] M.A.O liveira and C.C. Barioni, "Technical loss calculation by distribution system segment with corrections from measurements", Proc.20th international Conference and Exhibition on Electricity Distribution, Prague, Czech Republic, June 2009, pp. 1–4 [4] Sunil S. Rao, "Switchgear Protection and Power Systems", 9th ed, Khanna Publishers, 2012 [5] "RWS-434N Datasheet", Wenshing electronics co., Ltd., Taipei, Taiwan.
Y. Narendra Kumar, Prasad Beer Bahdur, S. Prashanth Varma, V. Srikanth, T. Lakshmu Naidu |
121-128 |
 |
21. |
Virtual Keyboard Using Image Processing
Virtual Keyboard Using Image Processing
Abstract: As the technology advances, more and more systems are introduced which will look after the users comfort. Few years before hard switches were used as keys. Traditional QWERTY keyboards are bulky and offer very little in terms of enhancements. Now-a-days soft touch keypads are much popular in the market. These keypads give an elegant look and a better feel. Currently keyboards are static and their interactivity and usability would increase if they were made dynamic and adaptable. Various on-screen virtual keyboards are available but it is difficult to accommodate full sized keyboard on the screen as it creates hindrance to see the documents being typed. Virtual Keyboard has no physical appearance. Although other forms of Virtual Keyboards exist; they provide solutions using specialized devices such as 3D cameras. Due to this, a practical implementation of such keyboards is not feasible. The Virtual Keyboard that we propose uses only a standard web camera, with no additional hardware. Thus we see that the new technology always has more Benefits and is more user-friendly.
General Terms: Virtual Keyboard, Pattern matching, Pattern Recognition, Segmentation, Thresholding.
Keywords RGB, HSV, API,VK
Reference
[1] Y. Adajania, J. Gosalia, A. Kanade, H.
Mehta, Prof. N. Shekokar, "Virtual
Keyboard Using Shadow Analysis",Third
International Conference on Emerging Trends
in Engineering and Technology, 2010
[2] Kölsch, M. and Turk, M. "Keyboards without
Keyboards: Survey of Virtual Keyboards",
Workshop on Sensing and for Media-centric
Systems, Santa Barbara, CA, June 20-21,
2002.
[3] H. Du, T. Oggier, F. Lustenberger and E.
Charbon, "A virtual keyboard based on true-
3D optical ranging," Proc. British Machine
Vision Conference (BMVC), Oxford, pp.
220-229, Sept. 2005.
[4] Matsui, N. & Yamamoto, Y. A New Input
Method of Computers with One CCD
Camera: Virtual Keyboard. Keio University,
2000.
[5] Wijewantha N. S.," Vista Key: A Keyboard
Without A Keyboard – A Type Of Virtual
Keyboard," Final year project hesis,
Informatics Institute of Technology,
Wellawatta, Sri Lanka, April 2004.
|
129-130 |
 |
22. |
A Fast Merge Sort
A Fast Merge Sort
Abstract: Merge sort is one of the most efficient ways to solve sorting problem. Our research suggests that it is still responsive to clever optimizations. A considerably fast variation of Merge sort has been proposed in this paper. Proposed algorithm uses some novel optimizations to improve the speed of the proposed algorithm. Proposed algorithm not only applies some novel optimizations but also retains most of the old optimizations which were effective in reducing space and time. In addition to time and space efficiency, proposed algorithm offers the benefit of elegant design. Profiling has been carried out to verify the effectiveness of proposed algorithm. Profiling results reinforce the fact that proposed algorithm is significantly faster than existing best algorithm.
Reference
[1] Donald E. Knuth, The Art of Computer Programming, Vol. 3, Pearson Education, 1998.
[2] http://www.inf.fh-flensburg.de/lang/algorithmen/sortieren/merge/mergef.htm. [3] S. Baase and A. Gelder, Computer Algorithms:Introduction to Design and Analysis, Addison-Wesley, 2000. [4] J. L. Bentley, "Programming Pearls: how to sort," Communications of the ACM, Vol. Issue 4, 1986, pp. 287-ff. [5] T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, Second Edition. MIT Press and McGraw-Hill, 2001.
D.Abhyankar |
131-134 |
 |
23. |
Microcontroller Protocol for Secure Broadcast in Controller Area Networks
Microcontroller Protocol for Secure Broadcast in Controller Area Networks
Abstract: Controller Area Network is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks. To withstand such threats, one can implement security in the application layer of CAN. Here we design, refine and implement a broadcast authentication protocol based on the well known paradigm of using key-chains and time synchronization, a commonly used Mechanism in wireless sensor networks, which allows us to take advantage from the use of symmetric primitives without the need of secret shared keys during broadcast. But, as process control is a time critical operation we make several refinements in order to improve on the authentication delay. For this we study several trade-offs to alleviate shortcomings on computational speed, memory and bandwidth up to the point of using reduced versions of hash functions that can assure ad hoc security. To prove the efficiency of the protocol
Reference
[1] K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kan-tor, D. Anderson, H. Shacham, and S. Savage, ―Experimental security analysis of a modern au-tomobile,‖ in IEEE Symposium on Security and Privacy, pp. 447–462, 2010.
[2] M. Wolf, A. Weimerskirch, and C. Paar, ―Secu-rity in automotive bus systems,‖ in Workshop on Embedded Security in Cars, 2004.
[3] A. Perrig, R. Canetti, D. Song, and D. Ty-gar, ―Efficient authentication and signing of mul-ticast streams over lossy channels,‖ in IEEE Symposium on Security and Privacy, pp. 56–73, 2000.
[4] A. Perrig, R. Canetti, D. Song, and D. Tygar, ―Efficient and secure source authentication for multicast,‖ in Network and Distributed System Security Symposium, pp. 35–46, 2001.
[5] A. Perrig, R. Canetti, D. Song, and D. Tygar, ―The tesla broadcast authentication protocol,‖ in RSA Cryptobytes, pp. 2–13, 2002.
B.Vijayalakshmi, K. Kumar |
135-146 |
 |
24. |
The Influence of Alternate Dry-wet Effect on the Strength Characteristic of Expansive Soil
The Influence of Alternate Dry-wet Effect on the Strength Characteristic of Expansive Soil
Abstract: The direct shear test was carried out to study the effect of the wet-dry cycle on the improved expansive soil that is mixed with lime and sand. The results showed that the age has a great impact on the shear strength of improved expansive soil, and found that improved expansive soil shear strength reduced with the increase of wet and dry cycles.
Key words: Improved expansive soil; drying and watering cycle; age; shear strength
Reference
[1] Qi Yin, Jia Chen. Experimental study on the
strength characteristics of lime treated
expansive soils [J]. Urban Roads Bridges &
Flood Control , 2008 , (8):352-354, in
Chinese
[2] Qiong Qi, Youhai Yang . Experimental
Study of Improved Expansive Soil Filling
with Lime[J]. Journal of Lanzhou Jiaotong
University, 2009, 28[4]:30-34, in Chinese
[3] Xin Zhang, Shulin Sun etc. Laboratory test study of properties of expansive soil improved by waste foundry sand[J]. Soil Mechanics, 2012, 33(2):209-212, in Chinese [4] Jun Yang, Lei Tong, Guodong Zhang etc. Research on shear strength index of expansive soil modified by weathered sand[J]. Research of Soil and Water Conservation, 2013, 20(2):276-281, in Chinese
[5] Xianjie Mu, Xiaoping Zhang. Research on mechanical properties of expansive soil under wetting-drying cycle [J].Soil Mechanics, 2008, 28:580-583, in Chinese
Yongcun WANG, Yun DONG |
147-151 |
 |
25. |
Hand Gesture Based Wheelchair Movement Control for Disabled Person Using MEMS.
Hand Gesture Based Wheelchair Movement Control for Disabled Person Using MEMS.
Abstract: This paper is to develop a wheel chair control which is useful to the physically disabled person with his hand movement or his hand gesture recognition using Acceleration technology.Tremendous leaps have been made in the field of wheelchair technology. However, even these significant advances haven‟t been able to help quadriplegics navigate wheelchair unassisted.It is wheelchair which can be controlled by simple hand gestures. It employs a sensor which controls the wheelchair hand gestures made by the user and interprets the motion intended by user and moves accordingly.In Acceleration we have Acceleration sensor. When we change the direction, the sensor registers values are changed and that values are given to microcontroller. Depending on the direction of the Acceleration, microcontroller controls the wheel chair directions like LEFT, RIGHT, FRONT, and BACK. The aim of this paper is to implement wheel chair direction control with hand gesture reorganization.
Key words: Micro-electromechanical systems (MEMS), wheelchair..
Reference
[1] "A Wearable Head- Mounted Sensor-Based Apparatus for Eye Tracking Applications" IEEE International Conference on Virtual Environments, Human-Computer Interfaces, and Measurement Systems Istanbul, Turkey, dated 14-16 July 2008. [2] A. Murarka, M. Sridharan and B. Kuipers. 2008. "Detecting obstacles and drop-offs using stereo and motion cues for safe local motion".IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS-08). [3] ShilpaGulati, Benjamin Kuipers2008. "High Performance Control for Graceful Motion of an Intelligent Wheelchair".Proceedings of the IEEE International Conference on Robotics and Automation (ICRA).
[4] Marhic, B. " Robotic assistance: an automatic wheelchair tracking "Intelligent Robots and Systems, 2005. (IROS 2005). 2005 IEEE/RSJ [5] L.JosefssonandP.Persson, Conformal Array Antenna Theory and Design
Prof. Vishal V. Pande, Nikita S.Ubale, Darshana P. Masurkar, Nikita R. Ingole, Pragati P. Mane |
152-158 |
 |
26. |
Comparative Study of Frequent Itemset Mining Techniques on
Graphics Processor
Comparative Study of Frequent Itemset Mining Techniques on
Graphics Processor
Abstract: Frequent itemset mining (FIM) is a core area for many data mining applications as association rules computation, clustering and correlations, which has been comprehensively studied over the last decades. Furthermore, databases are becoming gradually larger, thus requiring a higher computing power to mine them in reasonable time. At the same time, the improvements in high performance computing platforms are transforming them into massively parallel environments equipped with multi-core processors, such as GPUs. Hence, fully operating these systems to perform itemset mining poses as a challenging and critical problems that addressed by various researcher. We present survey of multi-core and GPU accelerated parallelization of the FIM algorithms
Reference
[1.] Jiawei Han and Micheline Kamber. Data mining concepts and techniques. Second Edition, morgan Kaufmann Publications, 2006.
[2.] NVIDIA CORPORATION, CUDA Programming Guide, http://developer.nvidia.com/cuda
[3.] R. Agrawal, T. Imielinski, and A. Swami. Mining association rules between set of items in large databases. In Proceeding of the 1993 ACM SIGMOD International conference on management of data, pages 207–216, May 1993.
[4.] Mian Lu Xiangye Xiao Chi Kit Lam Philip Yang Bingsheng He Qiong Luo Pedro V. Sander Wenbin Fang, Ka Keung Lau and Ke Yang.Parallel data mining on graphics processors. Technical Report HKUST-CS08-07, October 2008.
[5.] Fan Zhang, Yan Zhang, and J. Bakos. Gpapriori: Gpu-accelerated frequent itemset mining. In 2011 IEEE International Conference on Cluster Computing (CLUSTER), pages 590–594, 2011. doi: 10.1109 /CLUSTER. 2011.61.
Dharmesh Bhalodiya, Prof. Chhaya Patel |
159-163 |
 |
27. |
Comparibility And Implementing Analysis Of Neighbourhood Discovery In Wireless Network
Comparibility And Implementing Analysis Of Neighbourhood Discovery In Wireless Network
Abstract: Neighbor discovery is an important first step in the initialization of a wireless ad hoc network. In this paper, we design and analyze several algorithms for neighbor discovery in wireless networks. Starting with a single-hop wireless network of nodes, we propose a ALOHA-like neighbor discovery algorithm when nodes cannot detect collisions, and an order-optimal receiver feedback-based algorithm when nodes can detect collisions. Our algorithms neither require nodes to have a prior estimate of the number of neighbors nor synchronization between nodes. Our algorithms allow nodes to begin execution at different time instants and to terminate neighbor discovery upon discovering all their neighbors. We finally show that receiver feedback can be used to achieve a running time, even when nodes cannot detect collisions. We then analyze neighbor discovery in a general multi hop setting. We establish an upper bound of on the running time of the ALOHA-like algorithm, where denotes the maximum node degree in the network and the total number of nodes. We also establish a lower bound of on the running time of any randomized neighbor discovery algorithm. Our result thus implies that the ALOHA-like algorithm is at most a factor worse than optimal.
Key words: Neighbour discovery, multihop, feedback, collision detection, wireless network, beacon based neighbourhood discovery.
Reference
[1] IEEE 802.15.4 Standard Specification. http://standards.ieee.org/getieee802/802.15.html. [2] D. Angelosante, E. Biglieri, and M. Lops. Neighbor discovery in wireless networks:a multiuser-detection approach. In Information Theory and Applications Workshop, pages 46–53, 2007. [3] An Introduction to the Ecology of Written Language 2nd ed (review) 2011 [4] Bluetooth Specification Version 3.0 + HS.2008
[5] S. A. Borbash, A. Ephremides, and M. J. McGlynn. An asynchronous neighbor discovery algorithm for wireless sensor networks. Ad Hoc Networks, 5(7):998–1016, 2007.
P.Poornima, K.Kumar |
164-169 |
 |
28. |
Power Quality Issues and It's Mitigation Techniques
Power Quality Issues and It's Mitigation Techniques
Abstract: In this paper the main power quality (PQ) problems are presented with there associated causes and consequences. The economic impact associated with PQ are characterized. Also this paper tries to give the solution for reducing the losses produced because of harmonics and increasing the quality of power at consumers' side.
Key words: Flywheel, Harmonics, Power Quality, Power Quality Cost, Supercapacitors.
Reference
[1] J. Delgado, "Gestão da Qualidade Total
Aplicada ao Sector do Fornecimento da Energia Eléctrica", Thesis submitted to fulfilment of the requirements for the degree of PhD. in Electrotechnical Engineering, Coimbra, September 2002. [2] M. Bollen, "Understanding Power Quality Problems– Voltage Sags and Interruptions", IEEE Press Series on Power Engineering – John Wiley and Sons, Piscataway, USA (2000). [3] M. McGranaghan, "Costs of Interruptions", in proceedings of the Power Quality 2002 Conference, Rosemont, Illinois, pp 1-8, October 2002. [4] D. Chapman, "Costs of Poor Power Quality", Power Quality Application Guide – Copper Development Association, March 2001. [5] EPRI, "Creating the Electricity Infrastructure for a Digital Society", UIE-2000 Conference, Lisbon, 1-3, November 2000.
Tejashree G. More, Pooja R. Asabe, Prof. Sandeep Chawda |
170-177 |
 |
29. |
3D Simulation of a Medium scale Pool Fire
3D Simulation of a Medium scale Pool Fire
Abstract: Pool fires represent the most frequently encountered accidents of the different types of fires that are known to occur in the Chemical Process Industry (CPI). Exhaustive analysis of the history of past accidents in CPI's that have occurred across the world since early 1900's reveal that pool fires are major threats to industrial safety, and result in huge losses of life and property. Studies have been going on to study the interaction mechanisms of the fire and models have been developed which were mostly empirical, zone models and field models developed according to and based on the conditions available for the experiment. The experiment considered consisted of a 2-m-diameter methanol pool in an unconfined area with a cross-wind velocity of 13 m/s. Steady state simulations with uniform time step were done using computational fluid dynamics and the simulations showed sensitivity to the grid refinement, size of the pool and wind profiles.Comparison between calculated and experimental results are also made.Turbulence models were also investigated, and was observed that RNG model gave more predictable results for the test cases to the accuracy of almost 80%.
Key words: Fire, Modeling, Unconfined, Turbulence
Reference
[1]
E. A. Suchman, A conceptual analysis of the accident problem, Social Problems, 8(3),1961,241.
[2]
S. Mannan, Lee's Loss Prevention in the Process Industries Hazard Identification, Assessment and Control (Elsevier, Butterworth-Heinemann, Oxford, 2005)
[3]
J. Fay, Model of large pool fires, Journal of Hazardous Materials , B136, 2006, 219–232
[4]
A. Hamins and T. Kashiwagi,Characteristics of pool fire burning, in Proc. ASTM STP 1284, Philadelphia, PA., 1996.
[5]
Major Hazard Incident Data Service (MHIDAS), Health and Safety Executive and the Safety and Reliability Directorate of the United Kingdom Atomic Energy Authority, Cheshire, UK..
Naveen S, Sivasubramanian V |
178-187 |
 |
30. |
Classification of The Climate Based on the Combination Between Potential Evapotranspiration and Rainfall
Classification of The Climate Based on the Combination Between Potential Evapotranspiration and Rainfall
Abstract: The sum of all climatic parameters known until now, in a strict understanding, cannot be the same as climate itself. The climate is the parameters we know plus potential evapotranspiration. The objective of this paper is first, to quantify the evapotranspiration and then, combining it with the rainfall values, to classify the climate of Albania. For that, fifty six meteorological stations throughout Albania were taken into consideration. The potential evapotranspiration was quantified by applying Penman-Monteith formulae. To quantify the functions of potential evaporation and rainfall over time the regression analysis was applied. The data were collected over last six years, on daily basis. The period of time between the curves respective intersections was considered as the duration of pluviometric deficit, whereas the area between curves is defined as the magnitude of pluviometric deficit. The north western part of Albania seems to have a humid climate. The rest part of the country will be characterized between subhumid and dry climate scale.
Key words: evapotranspiration, rainfall, pluviometric deficit.
Reference
[1] Hillel, D. "Soil and water", from
Physiological Ecology, edited by T. T.
Kozlowski, Wisconsin. 1971, 201-239.
[2] Richard G. Allen, et al., "Crop
evapotranspiration"; Irrigation and
drainage, 56, FAO, Rome, 1998, 1-16.
[3] Penman, H.L.. "Natural evaporation from
open water, bare soil, and grass". Proc. Roy.
Soc. (London, U.K.) A193 (1032), 1948,
120–145. [4] Gjongecaj B., et al., "Determination of the Relationships between the Evaporation from a Free Water Table and the Potential Evapotranspiration, Calculated and Measured, in the Field of Kosovo", BALWOIS Conference, Ohri, Macedonia, 2012.
[5] Monteith J. L., Evapotranspiration and environment. The state and environment of water in living organisms. Cambridge, UK., 1965
Azem Bardhi, Besnik Gjongecaj |
188-192 |
 |