IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of ComputationalEngineeringResearch

(IJCER)

Volume 4, Issue 1,January, 2014

    
 
Version I
S.No. Article Title Page No. Paper Index PDF
1.

Power System Planning and Operation Using Artificial Neural Networks

Ankita Shrivastava, Arti Bhandakkar

Abstract

Load forecasting is essential part for the power system planning and operation. In this paper the modeling and design of artificial neural network for load forecasting is carried out in a particular region of India. Three ANN- techniques – Radial Basis Function Neural Network, Feed forward Neural Network and Cascade- Forward Neural Network are discussed in this paper. Their performances are evaluated through a simulation study. This gives load forecasts one hour in advance. Historical Load Data from the Load Dispatch Centre Jabalpur are used for training, testing and showing the good performance of the proposed method. The proposed model can forecast the load profile with a lead time of one to seven days.

Keywords:Artificial Intelligence, Artificial Neural Network, Back-Propagation, Energy Consumption, Load Forecasting.
01-06  
03.3005/040101001006
PDF
2.

A Survey on Software Suites for Data Mining, Analytics and
Knowledge Discovery

R.Kiruba Kumari, V.Vidya, M.Pushpalatha

Abstract

Data mining automates the detection of relevant patterns in a database, using defined approaches and algorithms to look into current and historical data that can then be analyzed to predict future trends. Data mining software tools predict future trends and behaviors by reading through databases for hidden patterns, they allow organizations to make proactive, knowledge-driven decisions and answer questions that were previously too time-consuming to resolve. This paper presents some of the most common commercially available data mining tools, with their most important features, side by side, and some considerations regarding the evaluation of data mining tools by companies that want to acquire such a system

Keywords:data mining, data mining tools, features, software
07-12  
03.3005/040101007012
PDF
3.

Hydraulic Characteristics of a Rectangular Weir Combined with Equal and Unequal Size Three Rectangular Bottom Openings

Rafa H.Al-Suhaili, Jabbar H.Al-Baidhani, and NassrinJ.Al-Mansori

Abstract

This research was based on laboratory experiments for investigating the hydraulic characteristics of a rectangular weir with three rectangular bottom openings. Two cases were investigated ,case A of equal size of openings, and case B of different size of the mid opening than an equal size of the two side openings(. Fifty-six physical models were made for this structure with different geometrical dimensions. Experimental data were analyzed in order to find the discharge coefficient for three flow cases. Case 1 when the water level is under the openings height (partial flow through the openings only), case 2 when the water level is between the openings height and under the weir crest level (full flow through the openings only), and case 3 when the water level is higher than the weir crest level (flow through both openings and over the weir). The analysis of the experimental results was done by using an equation prepared for each flow case, to find the discharge coefficients. Dimensional analysis was made to relate the discharge coefficient with different geometrical and flow non dimensional variables for each flow case, using Artificial neural networks. The highest value of the discharge coefficient, was obtained for flow case number 3, (0.6188, while its lowest value was occurred for flow case number 1,( 0.0288).The correlation coefficients found between each of the flow cases discharge coefficient, and the ratio of individual opening width to the total head (bo/H) are the highest among the other relevant variables and have negative values (-0.942,-0.937,-0.871) for the three flow cases respectively for equal size and (-0.953,-0.941,-0.503. For all the cases tested the coefficients of variation for the discharge coefficient were in the range of (0.211 - 0.563) which indicate the necessity of obtaining a model to describe this variation. Six ANN models were developed herein using the (SPSS software, version 19) to express the discharge coefficient as a function of the different geometrical and flow non dimensional variables. Three of these models are for the three flow cases with equal size of openings, while the other three are for the three flow case for unequal size of openings. The models range of correlation coefficients is (r=0.999 - 0.997).


13-29  
03.3005/040101013029
PDF
4.

An Investigation of the Effect of Shot Peening On the Properties of Lm25 Aluminium Alloy and Statistical Modelling

Sirajuddin Elyas Khany, Obaid Ullah Shafi, Mohd Abdul Wahed

Abstract

In this work the effect of shot peening on the tensile strength, hardness and impact strength of mild steel is studied using a compressed air shot-peening machine. This investigation examines the respective effects of influencing parameters such as pressure, angle of impingement, nozzle distance and the exposure time in enhancing micro hardness, tensile strength and average surface roughness. Further, statistical analysis software such as MINITAB is used to predict the optimal process parameters for the responses such as tensile strength, hardness and impact strength on the basis of taguchi analysis. These test results will be useful to the industries in deciding the optimal levels for the shot peening parameters

Keywords:shot peening, Minitab, tensile strength impact strength, hardness, taguchi analysis
30-40  
03.3005/040101030040
PDF
5.

Climate Change Analysis and Adaptation: The Role of Remote Sensing (Rs) And Geographical Information System (Gis)

Nathaniel Bayode ENIOLORUNDA

Abstract

This review is presented in three parts. The first part explains such terms as climate, climate change, climate change adaptation, remote sensing (RS) and geographical information systems (GIS). The second part highlights some areas where RS and GIS are applicable in climate change analysis and adaptation. Issues considered are snow/glacier monitoring, land cover monitoring, carbon trace/accounting, atmospheric dynamics, terrestrial temperature monitoring, biodiversity conservation, ocean and coast monitoring, erosion monitoring and control, agriculture, flood monitoring, health and disease, drought and desertification. The third part concludes from all illustrated instances that climate change problems will be less understood and managed without the application of RS and GIS. While humanity is still being plagued by climate change effects, RS and GIS play a crucial role in its management for continued human survival.

Keywords:Climate, Climate Change, Climate Change Adaptation, Geographical Information System and Remote Sensing.
41-51  
03.3005/040101041051
PDF

6.

Influence Of Supply Chain Management On Its Operational Performance

Jagdish Ahirwar, Mahima Singh, B. K. Shrivastava, Alkesh Kumar Dhakde

Abstract

This paper empirically confirmed a positive relationship between Supply Chain Management (SCM) and operational performance. A measurement model of the SCM construct was developed. Operational performance was conceptualized using competitive priorities literature with four dimensions: cost, quality, flexibility and delivery. Results showed positive effects of SCM on all performance dimensions, offering further support for the cumulative capabilities perspective. We also found evidence of an operational competence construct mediating the effect of SCM on performance, supported conceptually by the resource-based and relational views of strategy. The need for a suitable management and communication framework is thus becoming evident. We already have some examples showing that information sharing is a key-point at certain levels of a supply chain network. As there are several analogies between a company in a business network and an agent, the Multi-Agent System paradigm can be a valid approach for modeling supply chain networks

Keywords:supply chain management, performance, competitive priorities, resource-based view
52-55  
03.3005/040101052055
PDF
7.

Processing Of Mammographic Images Using Speckle Technique

A.M. Hamed, Tarek A. Al-Saeed

Abstract

We study the malignant and benign mammographic x – ray images using speckle techniques. Discrimination between the mammographic images is outlined using circular aperture segmentation. The algorithm is based on the selection of the interested segment from the mammographic image. We multiply the segment by a uniform circular aperture of diameter nearly equal the dimensions of the segment. Then, we multiply the modulated segment by a diffuse function. Finally, we operate the Fourier transform upon the three matrices to get a modulated speckle images. These modulated images are dependent upon the information on the selected image segment. The modulated speckle images and profiles of the mammographic images are investigated using mat-lab code.

Keywords:Mammographic x- ray images; modulated speckle images; correlation and contours of benign and malignant images.
56-62  
03.3005/0401056062
PDF
8.

An Ontology System for Ability Optimization & Enhancement in Cloud Broker

Pradeep Kumar

Abstract

This Paper Presents The Service Providing Ability Optimization Of Cloud Brokers. The Concept Of Service Ability Optimization Provides A Nearest Result Regarding User's Queries And Broker's Optimi-zation System To Optimize The Result. This Concept Is Focusing 0n To Reduce Broker's Decision Mak-ing Time And Helps In Improving His Services, Trust, And Feasibility In Users. It Is Specially Designed For Cloud Brokers Who Want To Long Relationship With Users And Being In Existence In Marketplace Successfully.In This Regard Cloud Broker System Works On Improved Ontology Based Cloud Services Discover System (CSDS) And ROSP. The ROSP System Works For Enhancement Of Cloud Brokers With Improved CSDS. The Concept Behind Optimization Is Adding New Type Of Similarity Reasoning In Cloud Services Discover System, Is Called Protocol Similarity Reasoning. The Protocol Similarity Reasoning Divides In Four Parts: - 1) SSL Similarity, 2) Authorization Similarity, 3) Popularity Simi-larity And 4) Security & Ownership Similarity.

Keywords:Cloud Computing, Cloud Service, Cloud Service Providers, Ontology, CSDS, Reason-ing, Users, ROSP Algorithms, Optimization, Brokers, Cloud Broker System, Enhancement
63-69  
03.3005/040101063069
PDF
9.

Evaluation and Modeling of High Surface Area Activated Carbon from Date Frond and Application on Some Pollutants

M.M.S. Ali, ,N. EL-SAID ,B. S. GIRGIS

Abstract

Activated carbons were prepared through chemical activation of date frond DF, using sodium hydroxide and phosphoric acid as the chemical activating agents. The effect of different parameters, such as particle size, method of mixing, chemical/corn ratio, to choose the suitable conditions for the studying materials was chosen. The activation time and activation temperature, on SBET surface area of the produced activated carbons were discussed. The porosity of the activated carbons was evaluated through nitrogen adsorption. The storage capacity of the activated carbon was evaluated using natural gas. Under the experimental conditions investigated, the optimal conditions for production of high surface area carbons by chemical activation were identified. Products with highly developed porosity were obtained from H3PO4-activation, whereas, micro porous carbons with moderate porosity resulted from NaOH or steam activation schemes. The results were applied on and discussed adsorption of cations and pollutants from aqueous solution.

Keywords:Activated carbons, agricultural waste, chemical activation, adsorption
70-78  
03.3005/040101070078
PDF
Version II
S.No. Article Title Page No. Paper Index PDF
1.

A Survey of Protection Against DoS & DDoS Attacks

Mrs.S.Thilagavathi , Dr.A.Saradha

Abstract

Denial-of-Services (DoS) attacks cause serious threats to the today internet world. The problem of DoS attacks has become well known, but it has been hard to find out the Denial of Service in the Internet. So the users have to take own effort of a large number of protected system such as Firewall or up-to-date antivirus software. If the system or links are affected from an attack then the legitimate clients may not be able to connect it. There have been a number of solutions and tools to detect the DoS attacks. However there are no end solutions which can protect against the DoS attacks. This paper focuses on techniques used in different DoS attacks and describes the characteristics of tools used in DoS attack network and also presents the proposed solutions

Keywords:Denial-Of-Service, Distributed Dos, DDoS Attack Tools, Traceback Mechanisms, Intrusion Detection and Prevention Method, IP Address Spoofing, IP Address Monitoring, Blocked IP Address, Client-Side Script.
01-10  
03.3005/041201010
PDF
2.

The Effect of Chemical Reaction on Mhd Free Convection Flow Of Dissipative Fluid Past An Exponentially Accelerated Vertical Plate

 P.M. Kishore, S. Vijayakumar Varma, S. Masthan Rao, K.S. Bala Murugan

Abstract

Aim of the paper is to investigate the the chemical reaction effect on the unsteady mhd free convection flow, heat and mass transfer characteristics in a viscous, incompressible and electrically conducting fluid past an exponentially accelerated vertical plate by taking into account the heat due to viscous dissipation. The problem is governed by coupled non-linear partial differential equations. The dimensionless equations of the problem have been solved numerically by the unconditionally stable finite difference method of Dufort – Frankel's type. The effects of governing parameters on the flow variables are discussed quantitatively with the aid of graphs for the flow field, temperature field, concentration field, skin-friction, Nusselt number and Sherwood number

Keywords:MHD, free convection, viscous dissipation, finite difference method, exponentially accelerated plate, chemical reaction
11-26  
03.3005/0412011026
PDF
3.

A Review on Parametric Optimization of Tig Welding

 Naitik S Patel, Prof. Rahul B Patel

Abstract

Quality and productivity play important role in today's manufacturing market. Now a day's due to very stiff and cut throat competitive market condition in manufacturing industries . The main objective of industries reveal with producing better quality product at minimum cost and increase productivity.TIG welding is most vital and common operation use for joining of two similar or dissimilar part with heating the material or applying the pressure or using the filler material for increasing productivity with less time and cost constrain. To obtain main objective of company regards quality and productivity. In the present research project an attempt is made to understand the effect of TIG welding parameters such as welding current , gas flow rate ,welding speed ,that are influences on responsive output parameters such as hardness of welding, tensile strength of welding, by using optimization philosophy. The effort to investigate optimal machining parameters and their contribution on producing better weld quality and higher Productivity

27-31  
03.3005/0412027031
PDF
4.

MV Compensation Attack on fast Selective Video Encryptions

Jay M. Joshi, Upena D. Dalal

Abstract

Many researchers had published their papers related with privacy and security of multimedia data which combine the property of compression and encryption. In compression many sensitive parameters are available, without these decoding have no meaning. Encrypting only sensitive parameters make encryption faster and reduce complexity overhead of encryption. Such sensitive parameters in video codec are non–zeros in CAVLC and motion vectors, which are used commonly in many papers. Proposed encryption method is shown with the use of standard 128-bit AES algorithm in counter mode and compare with other selective encryption methods. This paper deals with sensitive application which demands strict security levels. This paper shows cryptanalysis of proposed algorithm using MV compensation technique and compare with non-zeros in CAVLC and motion vector encryption

Keywords:CAVLC, Motion Vector, Motion Compensation, Selective Encryption, Video Security.
32-38  
03.3005/0412032038
PDF
5.

Studies on the Variation in Coal Properties Of Low Volatile Coking Coal After Beneficiation

Vivek Kumar, V.K. Saxena

Abstract

Coal is the main ingredient for the various industries like; Iron & steel industries, Power generation industries, Cement industries etc. and its calorific value is the back bone for the processing. The calorific value of coal depends on various factors on which ash content is the major one.Coking coal is an essential prerequisite for production of Iron & Steel through blast furnace route. Systematic R&D studies on the availability of desired quality coking coal from indigenous resources have become imperative to minimize the dependence on imported coals. The Low Volatile Coking Coal (LVCC) constitutes about 50% of the total coking coal reserves in India. These coals are characterized by high ash content and difficult in cleaning potential. This high ash content will be reduced by washability process. Washability analysis is the basis for nearly all coal preparation plant and it is carried out for the analysis of ash reduction in different specific gravity portion of coal and it's characterization defines how and which process can be applied for the certain quality of coal for specific separation

39-57  
03.3005/0412039057
PDF
6.

Pre-Loading Impact on Mechanical Properties of Sand-Polystyrene-Cement Mix

 Aneke I.F., Agbenyeku E.E.

Abstract

A laboratory study on the formation of lightweight material by blending sand with polystyrene (EPS) and cement is presented. The effects of pre-loading compositions of EPS-sand, cement-sand and water-sand ratios on strength and densities of lightweight geomaterial were investigated. Mixes of 40%EPS-60%sand (as fine aggregate) and 50%EPS-50%sand with 15%cement to both mixes made up the specimens composition. The density of the control specimen was 1681.3kg/m3 which was reduced to 1185.8kg/m3 and 1070.23kg/m3 when 40% and 50%EPS were added respectively. Hence it was observed that the mixture of 40%EPS and 60%sand with 15% cement content under a pre-loading stress of 600kPa had the highest unconfined compressive strength (UCS) and density. The volumetric mix design used in this study can be applied when robust or lightweight carrying geomaterial is required in construction.

Keywords:Unconfined compressive strength, Lightweight, Polystyrene, Pre-loading
58-64  
03.3005/0412058064
PDF
7.

The Effect of Activating Flux in Tig Welding

Akash.B.Patel , Prof.Satyam.P.Patel

Abstract

Quality and productivity play important role in today's manufacturing market. Now a day's due to very stiff and cut throat competitive market condition in manufacturing industries . The main objective of industries reveal with producing better quality product at minimum cost and increase productivity.TIG welding is most vital and common operation use for joining of two similar or dissimilar part with heating the material or applying the pressure or using the filler material for increasing productivity with less time and cost constrain. To obtain main objective of company regards quality and productivity. In the present research project an attempt is made to understand the effect of TIG welding parameters such as welding current , gas flow rate ,electrode angle ,that are influences on responsive output parameters such as weld penetration, depth to width ratio, strength of weld joint by using optimization philosophy. The effort to investigate optimal machining parameters and their contribution on producing better weld quality and higher Productivity

65-70  
03.3005/0412065070
PDF
8.

Independent and Total Strong (Weak) Domination in Fuzzy Graphs

P.J.Jayalakshmi, S.Revathi , C.V.R. Harinarayanan

Abstract

Let G be a fuzzy graph. Then D V is said to be a strong (weak) fuzzy dominating set of G if every vertex v ε V- D is strongly(weakly) dominated by some vertex u in D. We denote a strong(weak) fuzzy dominating set by sfd-set(wfd-set). The minimum scalar cardinality of a sfd-set(wfd-set) is called the strong(weak) fuzzy domination number of G and is denoted by TGD- number γ sf (G)( γwf (G)). In this paper we introduce the concept of total strong(weak) domination in fuzzy graphs and obtain some interesting results for this new parameter in fuzzy graphs.

Keywords:Fuzzy Graphs, Fuzzy Domination, Total domination,Fuzzy independent set, strong(weak)fuzzy domination number, Total strong(weak)fuzzy domination number
71-74  
03.3005/0412071074
PDF
9.

Effect of discrete heating on natural convection heat transfer on square plate

Dr. V Katti, S G Cholake, Anil Rathod

Abstract

Experimental and numerical analysis is presented for steady state natural convection from discrete heating inside a two dimensional square copper plate. The study has been made for different heater length and location. The left side wall is heated discretely at an interval of 12.5 mm keeping remaining portion unheated portion adiabatic. The experimental study is performed on an experimental setup designed in order to assuming, with a good approximation, those adopted natural convection hypotheses on a heated horizontal flat plate. The finite volume method is used to solve the dimensionless governing equations. The temperature distribution are presented at different heater length and location which reveals, Nusselt number increases when heater is located at mid height from base distributing heat uniformly setting up proper convection currents as compared to other positions and with increase in heater length temperature increases at hot wall. The results obtained from experiment are found to be in good agreement with numerical results and previous researchers.

Keywords:Natural convection, discrete heating, heat transfer enhancement.
75-80  
03.3005/I0412075080
PDF
Version III
S.No. Article Title Page No. Paper Index PDF
1.

Slicing Algorithm for Controlling Backtracking In Prolog

Divanshi PriyadarshniWangoo 

Abstract

This paper focuses on building an efficient slicing algorithm for controlling backtracking in prolog. Prolog has a built-in backtracking mechanism which alleviates the programmer of explicit backtracking. The automatic backtracking mechanism is often veiled from the user of the system. Uncontrolled backtracking causes inefficiency in a program and may lead to interrupted execution. Slicing technique renders the structural relationship through the ordering of clauses and goals. It facilitates the backtracking prevention mechanisms through relative structuring of parent goal and the relative cut in the program. The algorithm is preferential for the events where the cut and negation mechanisms break down under certain conditions. The slicing algorithm is called BTrack_Slicer and it takes as input the Backtrack Dependency Graph (BDG) which comprises of all dependencies arising out of backtracking. Employing the algorithm for use in various application programming structures would lessen the vast execution time expended as a consequence of indefinite backtracking

Keywords:Backtracking, Backtrack Dependency Graph (BDG),BTrack_Slicer, Dynamic System Dependence Graph (DSDG) System Dependence Graph (SDG),Prolog.
01-05  
03.3005/04130105
PDF
2.

The Use Of The Computational Method Of Hamming Code Techniques For The Detection And Correction Of Computational Errors In A Binary Coded Data: Analysis On An Integer Sequence A119626

Afolabi Godfrey, Ibrahim A.A, Ibrahim Zaid

Abstract

This paper presents a review of the Computational method of Hamming codes techniques for detection and correction of computational errors in a binary coded data, analysis in an integer sequence A119626. This integer sequence is obtained from computing the difference in the number of inverted pairs of the first and the last cycles which in turn is obtained from a special (123)-avoiding permutation pattern. The computation in this paper was restricted to values of n = 1, 2, 3, 4, and 5 respectively. This paper simply considered the execution time (T) and rate (R) for any given time t of the Computational method of analysis based on the number of iterations (steps) involved in the general procedure of encoding, detection and correction of errors for all the values of n.

Keywords:Computational method, binary coded data, execution time (T) and rate (R), Hamming codes and integer sequence A119626.
06-15  
03.3005/041306015
PDF
3.

Intrusion Awareness Based On D-SA

 Prashant Shakya , Prof. Rahul Shukla

Abstract

Intrusion awareness system is device or software applications that monitor network or system activities for malicious activities or policy violation. Mainly Two types of Intrusion detection systems are network based and host based. This paper is only discussed about network based intrusion system. Matching algorithms are used for detection intrusion. In this paper we proposed a novel method for intrusion awareness using Distributed situational awareness (D-SA). Data fusion work on the biases of features gathering of event. Support vector machine is a super classifier of data. In this paper we used SVM for the detection of closed item of ruled based technique. In Our proposed method, we used KDD1999 DARPA data set and get better empirical evaluation result in comparison of Rule based technique and Distributed Situational Awareness.

Keywords:intrusion awareness, D-SA, data fusion, SVM and KDDCUP1999.
16-18  
03.3005/0413016018
PDF
4.

A Review On Dry Sliding Wear Analysis On Brass Using Taguchi Technique

Sachin P Patel , Prof. Tausif M Shaikh, Prof. Navneet K Prajapati

Abstract

In this study, wear behavior of the brass pin (85%Cu, 5%Sn, 5%Pb, 5%Zn) is examine on Pin-on-Disc wear test, which is perform on wear and friction monitor machine. Pin of brass is produce by sand casting process. The EN31 steel disc (hardness 60 HRc and surface roughness 1.6 Ra.) is attach with motor of machine and varying the rotation speed. The Pin of brass is fit in the pin holder of wear and friction monitor machine. An attempt has been made to study the influence of wear parameters like sliding speed (rpm), contact time (second), applied load (N). output parameter of wear is reduction in pin length (μm). We also study change in temperature and friction force. A design of experiments (DOE) is base on the Taguchi techniques. An orthogonal array and the analysis of variance (ANOVA) is employee to investigate the wear behavior. The wear test is measure with linear variable displacement transducer (LVDT).

Keywords:taguchi technique, wear, DOE, ANOVA,
19-23  
03.3005/0413019023
PDF
5.

Survey on Various Techniques of Brain Tumor Detection from MRI Images

Mr.Deepak .C.Dhanwani , Prof. Mahip M.Bartere

Abstract

Brain tumor is an abnormal growth of brain cells within the brain. Detection of brain tumor is challenging problem due to complex structure of brain.MRI can provide the detail information about human soft tissue anatomy, which is helpful in diagnosis of brain tumor. Detection of brain tumor involves different stages such as image preprocessing, segmentation, feature extraction and classification. This paper summarizes the study of various techniques of brain tumor from MRI images

Keywords:Classification, Feature extraction, MRI, Neural Network, Preprocessing ,Rough set, Segmentation
24-26  
03.3005/0413024026
PDF
6.

Transforming Satellite Campuses of Tertiary-education Institutions in Nigeria through Appropriate Application of Information Technology: A Case Study

Adu Michael K

Abstract

Satellite Campus is a campus of a college or university that is physically at a distance from the original university or college (main campus) area. In Nigeria, managing Satellite campuses is seen to be a very difficult task and hence has not been accepted fully as a dependable avenue to gain tertiary education by those who are constrained either by the nature of their work and those of other reasons to attend them. Most people have only seen satellite campuses as a means of generating funds only for the institutions. However, this paper opens up areas that make management of satellite campuses very difficult which have contributed mostly to the negative impression about them. They are students' result processing, general students' affairs management, financing and inappropriate and ineffective means of addressing part-time lecturers' honorarium. Effective management of these deficiencies through appropriate application of Information Technology (IT) tools is proposed and implemented in this work. These are expected to produce positive results and further boost the image of satellite campuses in Nigeria. The Continuing Education Centre (CEC), Federal polytechnic, Ado-Ekiti, as the case study for this work is the satellite campus of the institution, about 30 minutes drive from the main campus and one of the best managed with enviable graduates.

Keywords:Financing, Honorarium, Information Technology, Management, Result processing, Satellite Campus.
27-34  
03.3005/0413027034
PDF
7.

Effect of boundary roughness on Kelvin-Helmholtz instability in Couple stress fluid layer bounded above by a porous layer and below by rigid surface

 Krishna B. Chavaraddi, N. N. Katagi,V. B. Awati, Priya M. Gouder

Abstract

The effect of boundary roughness on Kelvin-Helmholtz instability (RTI) of a couple-stress fluid layer bounded above by a porous layer and below by a rigid surface with roughness boundary is studied using linear stability analysis. Because of the growing importance of non-Newtonian fluids (Couple-stress fluid) in modern technology and industries as well as various practical applications investigations on such fluids are desirable. An expression for the growth rate of KHI is derived using suitable boundary and surface conditions in addition to couple-stress boundary conditions. Also in order to observe the effect of boundary layer applying the Beavers-Joseph (BJ) slips condition. From this it is clear that the effects of couple stress parameter, roughness parameter, bond number and porous parameter play a significant role in maintaining the stability on the two fluid systems. The couple stress fluid is found to be stabilizing effect and the influence of the various parameters of the problem on the interface stability is thoroughly analyzed.

Keywords:Couple-stress fluid, KHI, B-J Condition, dispersion relation, porous media, boundary roughness.
35-43  
03.3005/0413035043
PDF
8.

Combinational Study of Mineral Admixture and Super Plasticizer in Usual Concrete

Debabrata Pradhan, D. Dutta, Dr. Partha Ghosh

Abstract

Now a days the tailor made high strength and high performance concrete embodied with silica fume into the normal concrete are being widely used all over the world and it is a common practice in the present days. The presence of silica fume makes the mix proportioning difficult and increase the design parameters in conventional concrete. The principal object of this paper is to observe the several mechanical properties like compressive strength, compacting factor, and slump of silica fume concrete. In this present paper silica fume concrete are cast for 5 (five) mixes to execute experiments. Various percentages of silica fumes are used for cement replacement to carry out these experimentations at a single unchanging water-cementitious materials ratio keeping other mix design variables unvarying. The various cement replacement levels by silica fume are 0%, 5%, 10%, 15% and 20% for a single water-cementitious materials (w/cm) ratio of 0.50. Different sizes like 100 and 150 mm cubes are used to find out the compressive strengths for all mixes at age levels of 24 hours, 7 and 28 days. Except the compressive strengths, other properties like compacting factor, slump of concrete are also resoluted for five mixes of concrete. To overcome low workability problem, high range water reducer chemical admixture is used.

Keywords:Silica fume, high strength concrete, high performance concrete and strength.
44-48  
03.3005/0413044048
PDF
9.

Design of Closed Loop Electro Mechanical Actuation System

Oondla.Chiranjeevi, J.Venkatesu Naik 

Abstract

An Actuator is basically a position servo control system used in industries and vehicles. A rotary electro mechanical actuation system is an angular positioning system used in aerospace applications such as control of rudder and ailerons of aero planes and control of control surfaces, jet vanes, etc. This position loop system is to steer the vehicle to move in required direction. A servo controller is a driver to accurately control the position of the actuation system by getting the command signals from the on-board computer of the vehicle. It involves a class of DSP controller optimized for digital motor motion control and power conversion applications. In this thesis, Closed loop Rotary Electro Mechanical Actuating system is designed for the derived specifications by using the CAD software UNIGRAPHICS, and simulated the design with the help of FEA software ANSYS and MATLAB

Keywords:Actuator, ANSYS, CAD, DSP controller, UNIGRAPHICS
49-55  
03.3005/0413049055
PDF
10.   

Effect Of In-Band Crosstalk For Datapath Routing In Wdm/Dwdm Networks

Praveen Singh , Prof. R.L.Sharma 

Abstract

Physical layer impairments are the major limitation for the high speed optical WDM/DWDM networks. They significantly affect the signal quality resulting poor quality of transmission which is normally expressed in terms of bit-error rate. To cope up with the future demand, increase in the no. of channels and data speed further enhances these impairments. Hence new techniques are needed, which mitigate these impairments and ensure a better quality of transmission. Among the physical layer impairments we have studied the impact of in-band crosstalk on transmission performance of a transparent WDM/DWDM network. In this paper, the effects of component crosstalk with finite interferers on the performance of a WDM receiver are studied. Bit error rate (BER) and power penalty in the receiver are calculated using a simplified analysis which can represent the performance of the WDM receiver in case of small number of interferers. Some optimum detection thresholds are suggested for minimum bit error rate. Optimum detection thresholds for minimum bit error rates in the WDM receiver in presence of component crosstalk are investigated.

Keywords:Bit error rate, crosstalk, detection threshold, optical network, wavelength division multiplexing (WDM)
56-61  
03.3005/J0413056061
PDF