Professional Documents
Culture Documents
com
SJ Impact Factor-3.995
Dept. of ECE
RGUKT-Basar
3
Intell Engg. College-Anatapur
1,2
Abstract A protocol is required to transmit data successfully over any network and also to manage the flow at which
data is transmitted. HDLC protocol is the high-level data link control protocol established by International Organization
for Standardization (ISO), which is widely used in digital communications. High-level Data Link Control (HDLC) is the
most commonly used Layer2 protocol and is suitable for bit oriented packet transmission mode. This paper discusses the
Verilog modeling of single-channel HDLC Layer 2 protocol and its implementation using Xilinx.
Keywords- High Level Data link Control (HDLC), Frame Check Sequence (FCS), and Cyclic Redundancy Check
(CRC)
module for the bit-oriented packet transmission mode. It is
I. INTRODUCTION
suitable for Frame Relay, X.25, ISDN B-Channel (64 Kbits/s)
and D-Channel (16 Kbits/s) The Data Interface is 8-bit wide,
HDLC protocol is the high-level data link control protocol synchronous and suitable for interfacing to transmit and
established by International Organization for standardization receive FIFOs. Information is packaged into an envelope,
(ISO), which is widely used in digital communication and called a FRAME [4]. An HDLC frame is structured as
are the bases of many other data link control protocols [2]. follows:
HDLC protocols are commonly performed by ASIC
(Application Specific Integrated Circuit) devices, software FLAG ADDRESS CONTROL INFORMATION FCS FLAG
programming and etc.
8 bits
8 bits
8 /16 bits
variable
8
8 bits
The objective of this paper is to design and implement a
single channel controller for the HDLC protocol which is the
most basic and prevalent Data Link layer synchronous, bitTable 1. HDLC Frame
oriented protocol. The HDLC protocol (High Level Data
A. Flag
link Control) is also important in that it forms the basis for
Each Frame begins and ends with the Flag Sequence which
many other Data Link Control protocols, which use the same
is a binary sequence 01111110. If a piece of data within the
or similar formats, and the same mechanisms as employed in frame to be transmitted contains a series of 5 or more 1s, the
HDLC.
transmitting station must insert a 0 to distinguish this set of
HDLC has been so widely implemented because it 1s in the data from the flags at the beginning and end of the
supports both half duplex and full duplex communication frame. This technique of inserting bits is called bit-stuffing
lines, point to point(peer to peer) and multi-point [3].
networks[1]. The protocols outlined in HDLC are designed
to permit synchronous, code-transparent data transmission. B. Address
Other benefits of HDLC are that the control information is Address field is of programmable size, a single octet or a
always in the same position, and specific bit patterns used for pair of octets. The field can contain the value programmed
control differ dramatically from those in representing data, into the transmit address register at the time the Frame is
started.
which reduces the chance of errors.
C. Control
HDLC uses the control field to determine how to control the
Page 1
www. ijraset.com
October 2014
SJ Impact Factor-3.995
Special Issue-1,
ISSN: 2321-9653
Page 2
www. ijraset.com
October 2014
SJ Impact Factor-3.995
Special Issue-1,
ISSN: 2321-9653
[2]
IV. RESULTS
[3]
[4]
[5]
V. CONCLUSION
We designed HDLC protocol sending and receiving RTL
level modules in Verilog and had them tested successfully,
which has the following advantages like easy to program and
modify, suitable for different standards of HDLC procedures,
match with other chips with different interfaces. So this
proposed method can be more useful for many applications
like a Communication protocol link for RADAR data
processing.
REFERENCES
[1] Implementation of HDLC protocol Using FPGA,
[IJESAT] International Journal of Engineering Science
Page 3
www. ijraset.com
SJ Impact Factor-3.995
Abstract- Wireless communication systems are required to provide high data rates, which is essential for many services such
as video, high quality audio and mobile integrated services. When data transmission is affected by fading and interference
effects the information will be altered. Multiple Input Multiple Output (MIMO) technique is used to reduce the multipath
fading. Orthogonal Frequency Division Multiplexing (OFDM) is one of the promising technologies to mitigate the ISI. The
combination of MIMO-OFDM systems offers high spectrum efficiency and diversity gain against multipath fading channels.
Different types of detectors such as ZF, MMSE and PIC, Iterative PIC. These detectors improved the quality of received
signal in high interference environment. Implementations of these detectors verified the improvement of the BER v/s SNR
performance. Iterative PIC technique give best performance in noise environment compared to ZF, MMSE and PIC.
Keywords: Orthogonal Frequency Division Multiplexing (OFDM), Multiple Input Multiple Output (MIMO), Zero Forcing
(ZF), Minimum Mean Square Error (MMSE), Parallel Interference Cancellation (PIC), Bit Error Rate (BER), Signal to
Noise Ratio (SNR), Inter Symbol Interference (ISI), Binary Phase Shift Keying (BPSK).
I. INTRODUCTION
Page 4
www. ijraset.com
SJ Impact Factor-3.995
MIMO Techniques:
X1
Modulation
IFFT
MIMO
Channel
X2
XL
Y1 Y2
YL
P-element
U
s
e
r
Demodulation
ZF/MMSE/
PIC/
Iterative
PIC
F
F
T
Receiver
antenna
array
Page 5
www. ijraset.com
SJ Impact Factor-3.995
Where,
y1 and y2 are the received symbol on the first and second
antenna, h1,1 is the channel from 1st transmit antenna to 1st
receive antenna, h1,2 is the channel from 1st transmit antenna to
2nd receive antenna, h2,1 is the channel from 2nd transmit
antenna to 1st receive antenna, h2,2 is the channel from 2nd
transmit antenna to 2nd receive antenna, x1, and x2 are the
transmitted symbols and n1 and n2 are the noise on 1st and 2nd
receive antennas respectively.
The sampled baseband representation of signal is given by:
y=
Hx+n
(3)
Where,
y = Received symbol matrix,
H = Channel matrix,
x = Transmitted symbol matrix,
n = Noise matrix.
For a system with NT transmit antennas and NR receiver
antennas, the MIMO channel at a given time instant may be
represented as NT x NR matrix:
H 1,1
H 2 ,1
H
H N R ,1
H 2 ,2
H N R ,2
H 1, N T
H 2,NT
H N R , N T
(4)
x
h1,2 1 n1
x2
H 1, 2
(1)
h*
H 1*,1
h
1, 2
h 2* ,1
h 2* , 2
h1,1
h 2 ,1
h1, 2
h2 ,2
(6)
x
h2,2 1 n2
x2
x1
x =
2
(7)
Page 6
(HHH)-1
HH
y1
y
2
www. ijraset.com
SJ Impact Factor-3.995
x
y1 h1,1 x1 h1,2 x2 n1 h1,1 h1,2 1 n1
x2
(8)
Equivalently,
Where,
y1, y2 are the received symbol on the 1st and 2nd antenna
respectively, h1,1 is the channel from 1st transmit antenna to 1st
receive antenna, h1,2 is the channel from 1st transmit antenna to
2nd receive antenna, h2,1 is the channel from 2nd transmit
antenna to 1st receive antenna, h2,2 is the channel from 2nd
transmit antenna to 2nd receive antenna, x1, x2 are the
transmitted symbols and n1, n2 is the noise on 1st , 2nd receiver
antennas.
The above equation can be represented in matrix notation as
follows:
y1 h1,1 h1,2 x1 n1
y h h x n
2 2,1 2,2 2 2
(12)
W=[HHH+NoI]-1HH
(13)
x
y2 h2,1 x1 h2,2 x2 n2 h2,1 h2,2 1 n2
x2
y1
y
2
(14)
(15)
(10)
R=y-H.S
(16)
y = Hx+n
Z= Dec(W.R)
Where,
R is the output of PIC Equalizer
W is the parameter of MMSE Equalization matrix
Z is the estimated symbols of PIC Equalizer
4. Iterative PIC detection:
Page 7
(17)
www. ijraset.com
SJ Impact Factor-3.995
nT - 1
c = y- H (: , J). Z
j=1
E
Dec
(W.
c)
(18)
Where,
E is the estimation of transmitted symbols of iterative PIC
detector,
W is the MMSE equalization matrix,
c is the output of iterative PIC detector,
nT is the number of transmitting antennas.
Page 8
www. ijraset.com
SJ Impact Factor-3.995
[2]
[3]
[4]
[5]
Fig .5. Performance comparison of ZF, MMSE, PIC and
Iterative PIC equalizers in 2x2 MIMO-OFDM system .
From the plot it is clear that 2x2 MIMO-OFDM system with
Iterative PIC equalizers for case of pure equalization
compared ZF, MMSE, and PIC equalizer. The code BER of
proposed scheme Iterative PIC is produced after iteration.
when iteration increases the BER is significantly improved.
From simulation results the proposed scheme is quite effective
in all simulation configurations. However, Iterative PIC
detection scheme is better in the diversity gain and when the
intefrence comes from the other layers is completely
cancelled. Modulation scheme employed here is BPSK.
V. CONCLUSION
[6]
[7]
[8]
[9]
Page 9
www. ijraset.com
SJ Impact Factor-3.995
INTRODUCTION
Page 10
www. ijraset.com
SJ Impact Factor-3.995
2 +1 =
= 0,1,2, . . ,
(1)
(2)
(3)
= 0,1,2, . . ,
+ /2 )
Page 11
(4)
www. ijraset.com
SJ Impact Factor-3.995
= 0,1,2, . . ,
1
(5) From Equation
(4) and (5), we can find out the same components, x[n] and
x[n+N/2], so we can combine the two equations as one basic
butterfly unit shown in Figure 2. The solid line means that x[n]
adds
x[n + N / 2] , and the meaning
of the dotted line is that x[n] subtracts x[n + N / 2] .
( )=
( ) + ( ) ( +
4) + (1)
( +
)
(
)
2 +
( + 3 4)
(8)
So, Equation (8) can then be expressed as four N/ 4 point DFTs.
The simplified butterfly signal flow graph of radix-4 DIF FFT is
shown in Figure 3.
( )
( )
(6)
( )
+
+
( )
( )
(7)
Page 12
www. ijraset.com
SJ Impact Factor-3.995
+
+
+
+3
+5
+7
+2
+4
+6
8
= 0,1,2, . . ,
(4 + 1) =
( ) + ( ) ( +
4)
+(1) ( +
2) + ( ) ( + 3
(4 + 3) =
Page 13
(10)
4)
(11)
www. ijraset.com
SJ Impact Factor-3.995
(12)
Thus the N-point DFT is decomposed into one N/2 -point DFT
without additional twiddle factors and two N/4 -point DFTs with
twiddle factors. The N-point DFT is obtained by successive use
of these decompositions up to the last stage. Thus we obtain a
DIF split-radix-2/4 algorithm. The signal flow graph of basic
butterfly cell of split-radix-2/4 DIF FFT algorithm is shown in
Figure 6
we have
(1) =
(3) =
(2) =
3
4
( ) + ( ) ( +
4)
(
)
+(1) ( +
2) +
( +3
( )+( ) ( +
4)
( +
2) + ( ) ( + 3
(13)
4)
4)
Page 14
www. ijraset.com
SJ Impact Factor-3.995
Any two inputs are zeros: Output will be only the copied
version of that remaining two inputs available, butterfly
calculations are reduced compared to radix-4 pruning with
one zero at input.
Any three inputs are zeros: Output will be only the copied
version of that remaining single input available, butterfly
calculations are reduced compared to radix-4 pruning with
two zero at input.
All zeros input: Output is zero and is obtained from
mathematical calculations is zero.
OFDM
Block
Size
Radix -2
Radix-4
Radix-8
Mixed
Radix-4/2
Mixed
Radix-8/2
Split
Radix-2/4
Radix -2
cm
0
0
12
31
76
179
cadd
2
8
24
64
160
384
Radix-4
cm
3
24
141
cadd
8
64
384
Radix-8
cm
-
cadd
-
7
112
24
384
Mixed
Radix-4/2
Mixed
Radix-8/2
Split
Radix-2/4
cm
8
26
64
157
cm
22
60
152
cm
0
4
12
36
90
cadd
24
64
160
384
cadd
64
160
384
cadd
8
24
64
160
384
Table 2: Comparison of complex additions(cadd) and complex multiplications(cm) of different radix algorithms with pruning
Page 15
www. ijraset.com
SJ Impact Factor-3.995
Radix
- 2
Radix
-4
Radix
-8
Mixed
Radix
-4/2
Mixe
d
radix8/2
Split
radix
-2/4
8
1
1
1.25
1
16
1.03
1
1.07
1
1
32
1.05
1
1
1
64
1.07
1.02
1
1.01
1
1
Table 3: Speed Improvement Factor without to with pruning
in terms of Multiplications
Output shows the significant reduction of computational
complexity by reducing the total no. of complex operation
i.e. both the multiplications and additions compare to the
ordinary radix FFT operations. The complex multiplications
and additions are compared for different radix and pruned
algorithms.
The
comparison of complex multiplications for different radix
DIF FFT algorithms is shown in Figure 7 and for different
input zero traced radix DIF FFT pruned algorithms are shown
in Figure 8.
Page 16
www. ijraset.com
SJ Impact Factor-3.995
INTRODUCTION
II.
CHAOTIC SYSTEM
CHAOTIC SIGNALS
Page 17
www. ijraset.com
SJ Impact Factor-3.995
SYSTEM OVERVIEW
Sk
L
d +1, 1
Figure 1: Transmitter of CDSK system
(1)
=b x c F x
(2)
Page 18
www. ijraset.com
SJ Impact Factor-3.995
at initial values the BER is same for both maps but as SNR
increases the BER for Boss map is less than Tent map.
0.45 0.503
0.3
(3)
PERFORMANCE EVALUATION
CONCLUSION
Page 19
www. ijraset.com
SJ Impact Factor-3.995
FUTURE SCOPE
REFERENCES
[1] M. Sushchik, L.S. Tsimring and A.R. Volkovskii,
"Performance analysis of correlation- based communication
schemes utilizing chaos," Circuits and Systems I:
Fundamental Theory and Applications, IEEE Transactions
on, vol. 47, no. 12, pp. 1684-1691, Dec. 2000.
[2] Q. Ding and J. N. Wang, "Design of frequency-modulated
correlation delay shift keying chaotic communication
system," Communications, IET, vol. 5, no. 7, pp. 901-905,
May 2011.
[3] Chen Yi Ping, Shi Ying and Zhang Dianlun, "Performance
of differential chaos-shift-keying digital communication
systems over several common channels," Future Computer
and Communication (ICFCC), 2010 2nd International
Conference on, vol. 2, pp. 755- 759, May 2010.
[4] Suwa Kim, Junyeong Bok and Heung-Gyoon Ryu,
"Performance evaluation of DCSK system with chaotic
maps,"
Information
Networking
(ICOIN),
2013
International Conference on, pp. 556-559, Jan. 2013.
[5] S. Arai and Y. Nishio, Noncoherent correlation-based
communication systems choosing different chaotic maps,
Proc. IEEE Int. Symp. On Circuits and Systems, New
Orleans, USA, pp. 1433-1436, June 2007.
[6] Jun-Hyun Lee and Heung-Gyoon Ryu, "New Chaos Map
for CDSK Based Chaotic Communication System," The
28th International Technical Conference on Circuit/System,
Page 20
www. ijraset.com
SJ Impact Factor-3.995
hydraulic transient
[1]
[3]
But mechanisms acting all along the entire pipe section such
hammer method.
[2]
Page 21
www. ijraset.com
SJ Impact Factor-3.995
plants
[4]
performed. Generally water hammer can occur in any thermalhydraulic systems and it is extremely dangerous for the
thermal-hydraulic system since, if the pressure induced
exceeds the pressure range of a pipe given by the
manufacturer, it can lead to the failure of the pipeline
integrity. Water hammers occurring at power plants are due to
rapid valve operation
[5]
[6]
. In existing Nuclear
pressure measurement
filled cavity within the spinal cord [10]. In the voice production
system, the human vocal folds act as a valve [11 which induces
[12]
Page 22
www. ijraset.com
SJ Impact Factor-3.995
on lengths less than the mesh size. This gives the CFL number
condition
(1)
using free hand and the model can be analysed form multiple
with it.
[14]
ordinarily
determined
under
steady
ow
(2)
the pipe E, on the inner radius of the pipe D, and on its wall
Page 23
www. ijraset.com
SJ Impact Factor-3.995
m from the reservoir was arranged and flow has been sent into
equations.
[17]
For
this
Arbitary
Lagrangian
liquid and structural steel are selected from the built in section
steel pipe model sections. Now pipe properties are defined one
by one by first selecting the round shape from the shape list of
pipe shape. Initially the reservoir acts as a constant source for
pressure producing p0 which is equal to 1 atm. As the fluid is
allowed to flow from the reservoir tank into the pipe model,
the fluid enters the left boundary of the pipe first and leaves
the right boundary of the pipe with the valve in open
Page 24
www. ijraset.com
SJ Impact Factor-3.995
edited in the study setting section from range (0, 0.005, and
0.75) to range(0, 1e-3, 0.24). Now from study 1 right click and
1/ c
=1/c2s +A
step check box is marked and in the associated edit field type
(3)
P = cuo
VI. MESHING
(4)
of the pipe system and valve point [19]. Study was extended for
model
[20]
depicted in figure 4.
VII. SIMULATION
Using
this
Multiphysics
modelling
and
simulation
Page 25
www. ijraset.com
SJ Impact Factor-3.995
Parameters
Min.
Pressure
at
Single pipe
Three pipes
-9.579*105 Pa
-1.577*105 Pa
VIII. ACKNOWLEDGEMENTS
The authors would like to thank NPMASS for the
T=0.07s
Max.
Pressure
at
4.047*105 Pa
1.1617*106 Pa
T=0.07s
Velocity
Variation
4.257*10-4
to
0.2672
to
Range at T=0.23s
1.1632 m/s
1.2742 m/s
Excess
1.35*106 Pa
-0.85*106 Pa
Pressure
405.
the same but the chances for the water transient is more which
RBMK-1500
Reactor
Main
Circulation
Circuit,
Page 26
www. ijraset.com
SJ Impact Factor-3.995
Research
in
Reactor
Safety,
Luxembourg,
2001,
non-acoustic
(2002) A1.
wasserleitungsrohren,
Nuclear
Regulatory Commission
NUREG/CR-6519,
1997.
Memoires
de
lAcademie
(1900).
589598.
systems
disturbances, ASME
subjected
to
periodic
1968,(90) , pp.532540.
107117.
2003.
_modelswater_hammer_verification{.http://www.comsol.
co.in/showroom/gallery/12683/}
Page 27
www. ijraset.com
SJ Impact Factor-3.995
Page 28
www. ijraset.com
SJ Impact Factor-3.995
Page 29
www. ijraset.com
SJ Impact Factor-3.995
Page 30
www. ijraset.com
SJ Impact Factor-3.995
Figure 13. Excess pressure distribution along the pipe for t= 30 s for single pipeline geometry.
Figure 14. Excess pressure distribution along the pipe for t= 30 s for three pipe line intersection geometry.
Page 31
www. ijraset.com
SJ Impact Factor-3.995
Abstract: This paper presents, taking the photos under dim lighting conditions using a hand-held camera becomes blurry or
noisy. If the camera is set to a long exposure time, the image is blurred due to camera shake. While, the image will be dark and
noisy if it is taken with a short exposure time with a high camera gain. By combining the both information extracted from both
blurred and noisy images, this paper shows how to produce a high quality image that cannot be obtained by simply denoising the
noisy image or deblurring the blurred image alone. The aim of is image deblurring with the help of the noisy image. First, both
images are used to estimate an accurate blur kernel from a single blurred image. Second, by using both images, a residual
deconvolution is proposed to reduce ringing artifacts inherent to image convolution. Third, the remaining ringing artifacts in
smooth image regions are further suppressed by a gain-controlled deconvolution process. We demonstrate the effectiveness of
our approach using a number of indoor and outdoor images taken by hand-held cameras in low lighting environments with
some applications.
Keywords: Matlab, deconvolution, kernel estimation algorithm, deblurring and denoising process, iterative method.
I. INTRODUCTION
Capturing satisfactory images under low light conditions
using a hand-held camera can be a frustrating experience. Often
the taken images are blurry or noisy. The brightness of the image
can be increased in three ways are shutter, aperture and ISO
settings. First, reducing the shutter speed (the reciprocal of the
focal length of the lens, in the unit of seconds) as well as safe
shutter speed. But with a safe shutter speed and camera shake
will result a blurred image. Second, the aperture should be large.
A large aperture will reduce the depth of field. Moreover, the
range of apertures in a consumer-level camera is very limited.
Third, the ISO range should be high. However, the high ISO
image is very noisy due to the amplification of noise as the
cameras gain increases. For taking a sharp image in a dim
lighting environment, the best settings are: safe shutter speed, the
largest aperture, and the highest ISO. Even with this combination,
the captured image may still be dark and very noisy. To avoid
that, flash is using in the camera. But unfortunately the flash
introduces artifacts such as shadows and secularities. On the
other hand, the flash is not effective for distant objects.
In this paper, a novel approach to produce a high quality
image by combining two degraded images. One is a blurred
image which is taken with a slow shutter speed and low ISO
Page 32
www. ijraset.com
SJ Impact Factor-3.995
Page 33
www. ijraset.com
SJ Impact Factor-3.995
I = ND +I,
(2)
Our first important observation is that the denoised image ND is
very good initial approximation to I for the purpose of kernel
estimation from Equation (1). The residual image I is
relatively small with respect to ND. The power spectrum of the
image I mainly lies in the denoised image ND. Moreover, the
large scale, sharp image structures in ND make important
contributions for the kernel estimation. As will be shown in our
experiments on synthetic and real
images, accurate kernels can be obtained using B and ND in
non-blind convolution. Once K is estimated, we can again use
Equation (1) to non-blindly deconvolute I, which unfortunately
will have significant artifacts, e.g, ringing effects. Instead of
recovering I directly, we propose to first recover the residual
image I from the blurred image B. By combining Equations
(1) and (2), the residual image can be reconstructed from a
residual deconvolution:
B = IK,
(3)
where B = BND K is a residual blurred image.
Our second observation is that the ringing artifacts from residual
deconvolution of I (Equation (3)) are smaller than those from
deconvolution of I (Equation (1)) because B has a much
smaller magnitude than B after being offset by
ND K,
(4)
The denoised image ND also provides a crucial gain
signal to control the deconvolution process so that we can
suppress ringing artifacts, especially in smooth image regions.
We propose a deconvolution algorithm to further reduce ringing
artifacts. The above three steps - kernel estimation, residual deringing approach using a gain-controlled deconvolution, and deringing - are iterated to refine the estimated blur kernel K and
the deconvolute image I.
IV. KERNEL ESTIMATION ALGORITHM
In this section, we show that a simple constrained leastsquares optimization is able to produce a very good initial
kernel.
4.1 Iterative kernel estimation:
The goal of kernel estimation is to find the blur kernel
K from with the initialization
B =IK
and
I =ND
Page 34
www. ijraset.com
SJ Impact Factor-3.995
Measurement z(k)
Calculate X
Calculate Z (K)
Calculate *l+1
|m(l*)| < ?
Y
N
V. IMPLEMENTATION DETAILS
(k)=*conv
Page 35
www. ijraset.com
SJ Impact Factor-3.995
Page 36
www. ijraset.com
SJ Impact Factor-3.995
Page 37
www. ijraset.com
SJ Impact Factor-3.995
Page 38
www. ijraset.com
SJ Impact Factor-3.995
Page 39
www. ijraset.com
SJ Impact Factor-3.995
manufacturing
simply
capabilities.
At
first,
scientists
anticoagulation
strategies
during
OPCAB
through
bleeding and risk for early graft occlusion with OPCAB. Fifty
Page 39
www. ijraset.com
SJ Impact Factor-3.995
and
discussed.
Calculation
results
are
confirmed
by
the growth in the new jobs will require science and technology
down transients.
number
of
underrepresented
minorities
receiving
II. METHODOLOGY
3. FAILURE SURVEYING
4. MATERIAL SELECTION
5. MODEL GENERATE
6. THERMAL DISTRIBUTION
Page 40
www. ijraset.com
SJ Impact Factor-3.995
frontal solution.
(ii)Design changes
(iii)Material changes
This type of centrifugal pump is supporting to the impeller the
flow rate efficiency is higher performed to actuating the force
of the equipment is called as Wear plate. The sudden life time
temperature analysis.
properties:
Corrosive resistance
and inconel alloy 783 has very good heat flux to Steel plate,
Elastic Modulus
Sheet, Coil, Flat bar, Round bar, Strip steel, wire, All kinds of
Tensile Strength
Steel plate, Sheet, Coil, Flat bar, Round bar, Strip steel, wire,
V. MODEL GENERATE
2.
Associatively
3.
4.
Design indent
SOLID WORKS
2.
PRO ENGINEER
3.
CATIA
4.
UNIGRAPHICS
5.
INVENTOR
Page 41
www. ijraset.com
SJ Impact Factor-3.995
Type of analysis
= Transient
Time taken
= 60 seconds
-9
Type of analysis
= Transient
Time taken
= 60 seconds
= 1.0236x10-9 w/mm2
= 1.1343 w/mm2
= Transient
Time taken
= 60 seconds
= 3.1436x10-9 w/mm2
= 6.6625 w/mm
Page 42
www. ijraset.com
SJ Impact Factor-3.995
Page 43
www. ijraset.com
SJ Impact Factor-3.995
Abstract: Thermal Barrier Coating(TBC) are used to stimulate the reduced heat rejection in engine cylinders. It reduces the
heat transfer to the water cooling jacket and exhaust system. Thus improves the mechanical efficiency. In this operation
Zirconia Ceramic is coated on the I.C engine piston using Plasma arc technique. Their performance characteristics and
results are studied and tabulated.
I. INTRODUCTION
According to the First law of thermo dynamics, thermal
energy is conserved by reducing the heat flow to the cooling
and exhaust systems. it's known that only one third of energy
is converted into useful work, theoretically if rejection of heat
is reduced then the thermal efficiency likely to be increased.
to a considerable extend. The Application of TBC decreases
the heat transfer to the cooling and exhaust system which
ultimately results in the high temperature gas and high
temperature combustion chamber wall which reduces the level
of smoke and hydrocarbon(HC) emission.
In particular, for the latter, durability concerns for the
materials and components in the engine cylinders, which
include piston, rings, liner, and cylinder head, limit the
allowable in-cylinder temperatures. The application of thin
TBCs to the surfaces of these components enhances hightemperature durability by reducing the heat transfer and
lowering temperatures of the underlying metal. In this article,
the main emphasis is placed on investigating the effect of a
TBC on the engine fuel consumption with the support of
detailed sampling of in-cylinder pressure. The optimization of
the engine cycle and the exhaust waste heat recovery due to a
possible increase in exhaust gas availability were not
investigated in this study.
II. LITERATURE REVIEW
The selection of TBC materials is restricted by some basic
requirements:
(1) High melting point,
Page 44
www. ijraset.com
SJ Impact Factor-3.995
Combustion chamber
Direct injection
`Bore
95 mm
Stroke
95 mm
Displacement
673.4 cc
Compression ratio
18:1
Max. torque
Max. HP
13 HP@2400 rpm
S.F.C
192 g/ Hp / hr
Cooling system
Lighting system
Table1
Zirconia Ceramic is a ceramic material consisting of
at least 90% of Zirconium Dioxide (ZrO2). Zirconium Oxide
is produced from natural minerals such as Baddeleyite
(zirconium oxide) or zirconium silicate sand. Pure zirconia
changes its crystal structure depending on the temperature: At
temperatures below 2138 F (1170C) zirconia exists in
monoclinic form. At temperature of 2138F (1170C)
monoclinic structure transforms to tetragonal form which is
stable up to 4300F (2370C). Tetragonal crystal structure
transforms to cubic structure at 4300F (2370 C). Structure
transformations are accompanied by volume changes which
may cause cracking if cooling/heating is rapid and nonuniform and structural failure of any ceramic coating. Additions
of some oxides (MgO, CaO,Y2O3) to pure zirconia depress
allotropic transformations (crystal structure changes) and
allow to stabilize either cubic or tetragonal structure of the
material at any temperature. The most popular stabilizing
addition to zirconia is yttria (Y2O3), which is added and
uniformly distributed in proportion of 5.15%.
IV. EXPERIMENTAL SETUP AND OPERATION
A fully instrumented CI engine was mounted on a
computer-controlled engine dynamometer. Table 1 tabulates
the specifications of the engine, while figure shows the
Page 45
www. ijraset.com
SJ Impact Factor-3.995
A .T H E R M A L E F F I C I E N C Y O N F U E L C O N S U M P T I O N :
T h e r e je c tio n o f h e a t flo w to th e w
ja c k e ts a n d th e e x h a u s t s y s te m w h ic h e n s u re s
c o m b u s tio n in a e n g in e th a n th e b a s e lin e e n g in e .T h e
in th e fu e l c o n s u m p tio n le v e l w h ic h a ls o in d ic a te s
th e r m a l e f fic ie n c y in th e c o a te d I .C . e n g in e
a te r c o o l
a b e tte r
d e c re a se
a b e tte r
B ra k e M e a n E ffe c t iv e
P re ssu re v s B ra k e T h e rm a l
E ffic ie n c y
B T E ( B a s e lin e )
%
50
0
B T E (C o a te d )
%
B M E P (b a r)
In th e e m is s io n m e a s u re m e n ts , th e
ta ilp ip e u H C a n d C O c o n c e n tra tio n s w e re c o n d u c te d . It w a s
d is c o v e re d th a t th e C O d id n o t v a r y m u c h in e ith e r th e
b a s e lin e o r T B C te s t. T h e v a r ia tio n s w e re m o re o r le s s w ith in
th e r e s o lu tio n o f th e N D I R a n a ly z e r , w h ic h w a s 0 .1 v o l.%
c o n c e n tr a tio n ,( 2 1 ) w h e r e a s th e r e s o lu tio n o f th e F I D u s e d w a s
1 p p m . F ig u re 6 c o m p a re s th e b ra k e s p e c ific fu e l
c o n s u m p tio n b e tw e e n th e b a s e lin e a n d T B C p is to n te s ts .
R e s u lts s h o w th a t, in g e n e ra l, th e fu e l c o n s u m p tio n w a s lo w e r
in th e T B C p is to n te s ts fo r th e s a m e o p e ra tin g c o n d itio n , w ith
a n im p ro v e m e n t o f u p to 6 % a t lo w e r e n g in e p o w e r. T h e s e lfo p tim iz e d c y c le e ffic ie n c y d u e to th e a lte re d ig n itio n
c h a ra c te ris tic s in th e T B C p is to n e n g in e o u tn u m b e re d th e
s lig h tly re d u c e d c o m b u s tio n e ffic ie n c y w ith a n o v e r a ll
im p ro v e m e n t in th e r m a l e ffic ie n c y a s a w h o le . T h e le v e l o f
im p ro v e m e n t th a t h a s b e e n p re d ic te d ra n g e d fro m 2 to 1 2 % .
T h e y a ttrib u te th is to in s u la tio n o f in -c y lin d e r c o m p o n e n ts
.
B A S E L IN E E N G IN E V S C O A T E D E N G IN E
Swept volume
Speed Voltage Current Power FC
FC
FC
SFC BMEP CV
Fuel EnergyEfficiency
cu.m rpm V
A
kW s/5cc g/hr kg/s g/(kW.hr) bar kJ/kg kW %
0.000673 1500 230
0
0 24.86 608.206 0.000169 #DIV/0!
0 42500 7.180209
0
0.000673 1500 230
2 0.541176 22.85 661.7068 0.000184 1222.719 0.642937 42500 7.811816 6.927665
0.000673 1500 230
4 1.082353 20.12 751.4911 0.000209 694.3124 1.285873 42500 8.871769 12.19997
0.000673 1500 230
6 1.623529 18.38 822.6333 0.000229 506.6944 1.92881 42500 9.711643 16.71735
0.000673 1500 230
8 2.164706 15.37 983.7345 0.000273 454.4426 2.571747 42500 11.61353 18.63951
0.000673 1500 230
10 2.705882 13.27 1139.412 0.000317 421.0871 3.214683 42500 13.45139 20.116
0.000673 1500 230
12 3.247059 13.13 1151.561 0.00032 354.6475 3.85762 42500 13.59482 23.88453
Page 46
B ra k e P o w e r v s F u e l
C o n s u m p t io n
0 .0 0 0 4
0 .0 0 0 2
FC
( B a s e lin e )
kg/s
0
0
B P (k W )
www. ijraset.com
SJ Impact Factor-3.995
Load vs HC
Load vs NOx
15
10
5
HC
(Baseline)
ppm
HC (Coated)
ppm
0
10
800
600
400
200
0
Nox in
ppm(baselin
e)
0
15
10
20
Nox in
ppm(Final)
LOAD (Amps)
LOAD (Amps)
Load vs CO
0.08
CO- by
volume
%(base line)
0.06
0.04
0.02
0
0
10
20
LOAD (Amps)
CO-by
volume
%(Coated)
C. Nitrogen oxides:
NOx is formed by chain reactions involving Nitrogen
and Oxygen in the air. These reactions are highly temperature
dependent. Since diesel engines always operate with excess
air, NOx emissions are mainly a function of gas temperature
and residence time. Most of the earlier investigations show
that NOx emission from LHR engines is generally higher than
Page 47
www. ijraset.com
SJ Impact Factor-3.995
Page 48
www. ijraset.com
SJ Impact Factor-3.995
Properties of cement
Description
of
test
Test results
obtained
with papercrete.
setting
time
II. OBJECTIVES
The major Objective of the project is replacing the costly
Requirements of
65 minutes
Min. 30minutes
270 minutes
Max. 600minutes
following characteristics,
Required
Cost effective
Environmental friendly
Less weight
Inflammable
Easily available
m /kg
Fig . Cement
412.92
investigation
Page 49
www. ijraset.com
SJ Impact Factor-3.995
3.995
Special Issue-1,
Issue October 2014
ISSN: 2321-9653
2321
Fig GGBS
QUARRY DUST: Getting good Quarry dust free from
organic impurities and salts is very difficult in now a day.
While adding the Quarry dust to the mix. And the Quarry
dust should be in uniform size i.e., all the Quarry dust
table
Property
Quarry dust
Natural sand
Specific gravity
2.54-2.60
2.60
than cellulose.
1720-1810
1460
1.20-1.50
Nil
Nil
1.50
12-15
06
Zone II
Zone II
Bulk
relative
3
texture. Clay,
lay, rice husk ash is added to make the cellulose
density (kg/m )
Absorption (%)
Moisture
content
(%)
Fine particles less
than 0.075mm (%)
Sieve analysis
very smooth.
Page 50
www. ijraset.com
SJ Impact Factor-3.995
segregation.
should be between 6 to 7.
AND PLASTER
rebound
Page 51
www. ijraset.com
SJ Impact Factor-3.995
random and they are stacked length wise, along the width
ABSORPTION
CRUSHING STRENGTH
SOUNDNESS
struck each other. The bricks should not break and a clear
STRUCTURE
A brick is broken and its structure is examined. It
should be homogeneous, compact and free from defects
Page 52
www. ijraset.com
SJ Impact Factor-3.995
FIBROUS CONCRETE
polymer like
environmental.
PADOBE
Cement
brick. This earth should have clay content more than 30%.
GGBS
Quarry dust
may crack while drying, but adding paper fiber to the earth
Paper
Fibrous concrete
Padobe
fibrous materials
Fidobe
ECO FRIENDLY
Page 53
www. ijraset.com
SJ Impact Factor-3.995
MANUFACTURING OF BRICKS
were removed.
There was no clear past details about the project. And there
is no hard procedure for casting the bricks. So the
MOULD PREPARATION
After collecting all the materials, a mould was
prepared. A typical mould is shown in the below figure.
Fig.
Immersed
Fig. Mould
This mould was non-water absorbing in the size
of 230mm length, 110mm wide and 80mm deep. The
shorter sides of the mould are slightly projecting to serve
as handle. And joints were made without any hole or gap
Fig. Paper Pulp
to avoid leakage.
Page 54
Paper
www. ijraset.com
SJ Impact Factor-3.995
Fig. Mixing
Ingredients (%)
ificat
S.No.
first and kept separately .This was done just before the
Dr
Dr
ion
Ce
arr
GGBS
Mar
me
ap
% of weight
nt
er
du
of cement
101
Fixi
st
mixing starts.
Fixit
302
Super
Latex
1.
2.
P1
P2
20%
30%
20%
20%
50ml
50ml
3.
P3
50%
20%
50ml
Page 55
www. ijraset.com
SJ Impact Factor-3.995
WEIGHT
Table : Weight of Papercrete Bricks
S.No.
Identification
% 0f
Mark
GGBS
1.
P1
20
2.
P2
30
3.
P3
50
Dry
Weight
(kg.)
1.773
1.842
1.862
the brick.
Page 56
www. ijraset.com
SJ Impact Factor-3.995
3.995
Special Issue-1,
Issue October 2014
ISSN: 2321-9653
2321
rd
COMPRESSION TEST
of conventional brick
weight only. So this bricks are light weight and it will also
reduce total cost of construction due to the reduction in
dead load.
WATER ABSORBTION TEST : Dry the specimen in
ventilated oven at a temperature of 105C to 115C till it
attains substantially constant mass. Cool the specimen to
room temperature and obtain its weight (M1) specimen too
warm to touch shall not be used for this purpose. Immerse
completely
mpletely dried specimen in clean water at a temperature
out any traces of water with damp cloth and weigh the
WATER
ABSORPTION
TEST
PAPECRETE BRICKS
OF
to half compression.
hours)
Trail
Mix
20%
30%
50%
40.11%
33.85%
23.74%
45
40
35
30
25
20
15
10
5
0
G-20%
G-30%
G-50%
P1
P2
P3
24 HOURS
time.
Page 57
www. ijraset.com
SJ Impact Factor-3.995
3.995
Special Issue-1,
Issue October 2014
ISSN: 2321-9653
2321
brick. While the scratch was made with the help of finger
formula,
BRICKS
14 Days)
Trial
Mix
were taken and they were struck with each other. The
30%
50%
STRUCTURE TEST
In this test, the bricks were broken and the
5.9
7.5
8.7
7.5N/
10
8.7N/
2
8
6
G2
4
2
0
P1
P2 14 DAYS P3
HARDNESS TEST
In this test, a scratch was made on brick surfaces.
This test was carried out for all the three proportions of
Page 58
www. ijraset.com
SJ Impact Factor-3.995
NAILING
out to find out whether bricks hold the nail or not. A nail
was hammered in the brick and a screw is also screwed in
not hold nails any better than dry wall, but screws worked
well and hold a considerable weight. So, the screws are the
Page 59
www. ijraset.com
SJ Impact Factor-3.995
First, the brick was wiped with cloths and all the
foreign matters were removed.
VII. CONCLUSIONS
papercrete.
From the above experimental studies we can conclude that,
FIRE
for the bricks. This test was carried out only for fibrous
Page 60
www. ijraset.com
SJ Impact Factor-3.995
Sludge,
Construction
and
Building
and
Thermal
Envelope
Council
Pulp
and
Paper
Mill
Residuals,
Page 61
www. ijraset.com
SJ Impact Factor-3.995
I. INTRODUCTION
There is an increasing demand for fuel nowadays and it is soon
expected that there will be an acute shortage in the fuel that we
are using at present. Hence there is a need to optimize the fuel
usage.
Almost 10% of fuel in a vehicle is used for maintaining the
temperature within it for the comfort level of the passengers and
the main factor that influences this is the air conditioner in the
vehicle have made a carbon nano tube which is blasted with
Graphite vapors forming a chicken wired structure. It is then
condensed with a polymer, which brings up the required
behavior of the material i.e. it can act both as a sun proof sheet
or as a normal transparent sheet (allows sunlight to pass
through) according to the requirement. This can be stuck to the
window pane. Now a voltage of 5V is given to change its
behavior from sun proof sheet to normal sheet and vice versa.
This eliminates the peak thermal temperature attained in the
vehicle when parked and hence the work load of the AC is
abruptly reduced.
II. FABRICATION OF CNT
Carbon nano tubes are tubular fibrous structures composed
entirely of graphitic carbon planes. The carbon carbon double
bonds form a hexagon shape within the lamellar graphite planes
that resemble common chicken wire. The orientation of the
graphite planes is parallel to the fiber axis along with the
seamless nature of tube structure that enables their extreme
mechanical properties. This can be done by ball milling or by
normal chemical vapor Deposition method. It is then condensed
with a polymer such as SMP (Shape memory polymer) to get
the required property .Large quantities of SWNTs can be
synthesized by catalytic decomposition of methane over welldispersed metal particles supported on MgO at 1000C. The thus
produced SWNTs can be separated easily from the support by a
simple acidic treatment to obtain a product with high yields (70
80%) of SWNTs. Because the typical synthesis time is 10 min, 1
g of SWNTs can be synthesized per day by this method. The
SWNTs are characterized by high-resolution transmission
electron microscopy and by Raman spectroscopy, showing the
quality and the quantity of products. The catalytic
Page 62
www. ijraset.com
SJ Impact Factor-3.995
Fig 2 SWNT
(i)Materials required:
llactide, 1,4Butanediol(BDO) , stannous octate
(Sn(Oct)2),Hexamthylene diisocyanate (HDI) , toluene which is
dried over Na wire and distilled before use ,Ethyl Acetate which
is dried over CaH2 before use.
(ii)Preparation of poly(l-lactide) diol (HO-PLA-OH)
l-lactide was recrystallized in ethyl acetate for three times. It
was then added to a glass container which had been flame-dried
and equipped with a magnetic stirring bar. A toluene solution of
1,4-Butanediol(BDO)
and
Page 63
www. ijraset.com
SJ Impact Factor-3.995
Sn
Fig. 5 CARBON NANO TUBE CHICKEN WIRED
STRUCTURE
III. ADVANTAGES
According to the statistics published, there is a consumption of
about 40 billion liters of gasoline/ year for the usage of air
conditioners alone, assuming 80% of vehicles use AC. Even an
increase of 0.4 km/liter will save around $6 billion annually.
The results of a study shows that the fuel consumption of the
test vehicles with air conditioning systems in operation increases
with rising ambient air temperature and humidity, reaching a
value of about 18 percent on a typical Swiss summer day with
an air temperature of27 degrees and relative humidity of about
60%.
IV. CONCLUSION
Page 64
www. ijraset.com
SJ Impact Factor-3.995
Page 65
www. ijraset.com
SJ Impact Factor-3.995
Page 66
www. ijraset.com
SJ Impact Factor-3.995
Page 67
www. ijraset.com
SJ Impact Factor-3.995
Page 68
www. ijraset.com
SJ Impact Factor-3.995
Page 69
www. ijraset.com
SJ Impact Factor-3.995
packet
end
to
end
delay
(sec).
Packet Delay Variation is the variance among end-to-end delays
for voice packets received by this node.
Packet End-to-End Delay for a voice packet is
measured from the time it is created to the time it is received.
And Fig 6 and 7 are the voice packet end to end delay of RSVP
and
voice
packet
delay
variation.
Figure: 5 Queuing model of RSVP i.e voice packet delay, voice
packet end to end delay.
Page 70
www. ijraset.com
SJ Impact Factor-3.995
REFERENCES
[1] M. A. Khan, G. A. Mallah* And A. Karim Analysis Of
Resource Reservation Protocol (Rsvp) For P2p Networks.
[2] Vikas Gupta1, Baldev Raj2 Optimization Of Real-Time
Application Network Using RSVP ISSN: 22316612 Oct.
2013
[3] Braden R., Et Al. Resource Reservation Protocol (RSVP) -Version 1: Functional Specification. RFC 2205, IETF,
September, 1997.
[4] Mara E. Villapol , Jonathan Billington A Coloured Petri
Net Approach To Formalising And Analysing The
Resource Reservation Protocol
[5] Lixxia Zhang, Stephen Derring, Deborah Estrin, Scott
Shenkar, And Daniel Zappala RSVP: A New Resource
Reservation Protocol IEEE Sep 1993.
[6] Jan Lucenius , Research Scientist VTT Information
Technology The Application Of RSVP.
Page 71
www. ijraset.com
SJ Impact Factor-3.995
Abstract- In this paper, we propose a different approach for the database intrusion detection (IDS). Database Management
(DBMS) has become a key criteria in the information system (IS) storing valuable information of the system. We are urged to
protect it to the fullest without losing any bit of information. Intrusion detection, which gathers and analyses the information
system was one of the methods which protects the database the fullest with all sorts of rules. In this paper, we move into the Role
based Access Control (RBAC) system which controls the administered databases for finding out sensitive attributes of the system
dynamically. Role based Access Control is a method to restrict system access by authorized and unauthorized people directly. The
access is based on the roles of the individual users within the organization. Important roles like administrator, access sensitive
attributes and if their audit logs are mined, then some useful information regarding the attributes can be used. This will help to
decide the sensitivity of the attributes. Since the models of the database intrusion detection has proposed a lot of rules , it is time
to change the system to protect it more evidently with less rules and regulations which would be useful for detecting all sorts of
transactions.
Keywords: Database intrusion detection, Role based access control system, Administered database, Audit logs, Sensitive and
attributes.
I. INTRODUCTION
In past years, Database Management System (DBMS) have
become an indispensible part of the life of the organizers and the
users using it. Hence it was the primary priority to safeguard the
DBMS, no matter how easy or difficult it was. The motive of the
researches was first based on these ideas of protecting the
DBMS and to prevent the leakage of data. The past years,
Authentication user privileges , Auditing, Encryption and lots
of methods have been used to protect the data and the system.
Amending all the above methods, newer methods have come up
to protect the same for daily operations and decision making in
organizations. Database is a group or collection of data's which
may contain valuable and sensitive information about the
institution and organization, which is accessed by the people of
the organization internally and externally every day.
Any leak of information in these systems will devastate the
whole database system and the data's, leading to a great loss.
Hence the data need to be protected and secured. The recent
models of protection of DBMS were the dynamic threshold
method and the data mining method of Intrusion detection
system. Intrusion detection method is a process which analyses
the unauthorized access and malicious behaviors and finds
intrusion behaviors and attempts by detecting the state and
activity of an operating system to provide an effective means for
intrusion defend. In this paper, we will see how RBAC will help
Page 72
www. ijraset.com
SJ Impact Factor-3.995
USERS
TASK /JOB
ACCESS
CONSTRAINTS
SESSIONS
User
Data secured
Data abstraction
Data
FIG 2. DATA FLOW DIAGRAM
Page 73
www. ijraset.com
SJ Impact Factor-3.995
NAME*
ACCOUNT
SALARY TYPE
ADDRESS*
ATTRIBUTE NAME
STAFF
GETS
STAFF
STAFF ID*
ACCOUNTS
Administrator
ACCOUNT
ATTRIBUTE
Light
sensitivity
a, b, c, d, i, ,j ,k
Medium
sensitivity
e, f
II
High sensitivity
g, h, l
III
ACC ID*
WEIGHTS
AMT DEPOSIT***
STATUS**
The sensitivity of the attributes can also be given by the entityrelationship model [E-R]. But with relation to the RBAC model
, an administrator is required to control the database for its
sensitivity. It is a perception of the real world. It is the
diagrammatic representation of how the attributes are
considered. The * represents if the attributes are sensitive or
not. The model represents a collection of entities or data's and
Page 74
www. ijraset.com
SJ Impact Factor-3.995
COMPILE
DEFINE ROLES
FIG 4.PROCESS
a)Develop Plans- To make best use of RBAC we can develop
and plan for the RBAC system into best work in an organization
or for a project's security of data. Example to extract the
maximum security from RBAC a development plan including a
project, etc. should be developed along with the deadline ,
budget etc.
b)Compile- This step involves the collection and putting
together of all data , files , projects, etc. so as to identify the
level of security needed to implement it. Sensitivity of the
attributes should be determined so as to segregate and compile
the system to one to provide the highest security possible.
c)Define Roles- As we have discussed that operation of database
system is first best used only by the key user or the important
user of that organizer or a system. Hence assigning a particular
role to that person for the easy access of the software to access
the data with ease and implement any kind of proper change
within the system.
d)Analyze- this is a main step for any kind of system to know
and to formulate RBAC. This would bring about the betterment
of the system so that the next stage of implementation would be
easier to execute. Any changes needed in the system should be
done in this stage so that no further disputes arise at the later
stage.
e)Integrate- Before any problem occurs in the system like
system failure, we need to transfer each application's security
system to a centralized security system so as to provide a
secured companywide information access. this would be the last
step of the process and would be the final stage without making
any changes.
e)Implement- To put forth whatever we have executed these
many steps without any errors or any types of problems. These
are the best ways to protect a data from the external user.
Thus refining the system and protecting it according to
the steps followed would give a better result. Always the
principle of divide and rule method is followed in RBAC which
is the key principle of the system.
V. PROCESS USING A FORMULAE
ANALYSE
INTERGRATE
IMPLEMENT
Page 75
www. ijraset.com
SJ Impact Factor-3.995
Thus this formula would be easy for the generation of large sets
of data and to secure the data and hence even if there is a small
change in the capitalization or the attributes or the brackets or
any syntax mistake there would be an error generated in the
system which would spoil the whole set of data. This is done for
just a small set of data. We can proceed this for a huge one. An
outsider seeing this would not understand the type of data or the
importance of the data and hence would hesitate to meddle with
it.
VI. CONCLUSION
Intrusion detection mechanism helps to secure the data in an
organization. In this paper we have discussed in detail how the
database could be secured by using Role Based Access Control
System. The key benefits of RBAC are high efficiency and low
maintenance cost for any type of organization be it big or small.
Also RBAC system could be designed and used to improve the
operational performance and strategic business value. This
system could streamline and automate any business procedures,
thus providing high/ better/ faster benefits to the user. It also
helps to maintain privacy and confidentially of the employees in
any organization. Thus we can conclude that mission to protect
any key business process is a main vision of RBAC system in
database intrusion detection.
Page 76
www. ijraset.com
SJ Impact Factor-3.995
Page 77
www. ijraset.com
SJ Impact Factor-3.995
Abstract: Glass Fiber Reinforced Plastics composites have an increased application in recent days, due to its enhanced
structural properties, Mechanical and thermal properties. Drilling of holes in GFRP becomes almost unavoidable in
fabrication. The heterogeneous nature of this kind of materials makes complications during machining operation. However,
drilling is a common machining practice for assembly of components. The quality of holes produced in the GFRP material is
severely affected by surface roughness, Circularity and Delamination . The objective of the study is to apply the full factorial
design, ANOVA and Fuzzy logic model to achieve an improved hole quality considering the minimum surface roughness
through proper selection of drilling parameters. The regression method is employed in the Experimental investigation and
Mathematical modelling of drilling of GFRP material using HSS drill bits and the fuzzy logic model for the validation of the
mathematical model.
Index terms: GFRP, ANOVA, Fuzzy logic, aircraft fuselage, Full factorial Method, Drilling, Surface Roughness.
I. INTRODUCTION
Glass fiber Reinforced Plastics (GFRP) are widely being used
in the automotive, machine tool industry, aerospace
components, sporting equipments [1] because of their
particular mechanical and physical properties such as specific
strength and high specific stiffness. An aircraft fuselage
structure around 100,000 holes is required for joining purpose
[2, 3]. About 60% of the rejections are happening in aircraft
industry due to the defects in the holes [4]. Many of these
problems are due to the use of non-optimal cutting tool
designs, rapid tool wear and cutting parameters [5, 6]. Among
the defects caused by drilling with tool wear, Delamination
appears to be the most critical [7].The surface finish of the
work piece is an important attribute of hole quality in any
drilling operation. During machining many factors affect the
surface finish. Many theoretical models have concluded that
the effect of spindle speed on surface roughness is minimal
[8]. In practice, however spindle speed has been found to be
an important factor [9]. The quality of drilling surfaces
depends on the cutting parameters and tool wear, while
changing the cutting parameters causes to tool wear
[10].Researchers have attempted to model the surface
roughness prediction using multiple regression, mathematical
modeling based on physics of process, fuzzy logic
[11].Machining operation being highly nonlinear in nature,
soft computing techniques have been found to be very
effective for modeling [12].The influence of process
parameters such as spindle speed, lubrication and feed rate on
surface finish were investigated during the experimentation of
Metal matrix composites. The experiments were conducted
according to the full factorial design .The percentage of
contribution of highest influential factors can be determined
Page 78
www. ijraset.com
SJ Impact Factor-3.995
3.995
Special Issue-1,
Issue October 2014
ISSN: 2321-9653
2321
A. ANOVA
The Analysis of variance is extensively used to analyze the
experimental results. ANOVA tests the significance of group
difference between two or more groups. The normal
probability plot represents that all the points on the
th normal
plot lie close to the straight line (main line) or not. Versus fits
plots represents that how far deviation occur from the normal
distribution. An interaction plot is occurs when the change in
response from the one level of a factor to another level
lev differs
from change in response at the same two level second factor.
A main effect plot is present when different levels of an input
affect the responses directly.
B. ANOVA FOR SURFACE ROUGHNESS
Fig.4 Represent that all the points lie closer to the regression
line, this implies that the data are fairly normal and there is a
no deviation from the normal. Histogram graph shows the
skewness. The Equation No. 1 represents that feed has much
effect on Ra. The main effect plot for Surface Roughness has
been shown in the Fig 5. The plot shows that Ra decrease with
low cutting speed and low feed rate for 15 mm plate, as well
as the initial (without wear in drill bit ) point angle has less
effect on Ra. Table 2 Shows that the analysis of variance of
second order model with 95% confidence interval for the
Surface roughness experiments. Parameter A gives 44.2%
contribution to the Ra.
Page 79
www. ijraset.com
SJ Impact Factor-3.995
3.995
Special Issue-1,
Issue October 2014
ISSN: 2321-9653
2321
DF
SS
MS
Regression
77.44
25.81
2.05
0.135
Residual
Error
23
289.54
12.59
Total
26
366.99
Fig.6 Represent that high feed rate and low speed have less
effect on Ra while drilling on 5mm thickness plate. When
drilling on 10mm thickness of plate with cutting parameters of
low speed and feed rate shows surface roughness is
minimized. For 15mm plate high speed and high feed rate has
less effect on Ra. From Fig.5 shows that when decreasing the
point angle , the effect
ect of surface roughness is increased .
Decreasing the point angle causes tool wear . Fig 7 shows the
predicted and measured hole characteristics at different
drilling process parameter conditions. The result significantly
shows that the values relatively follow the similar trend
pattern of the measured value and predicted values from the
developed regression model.
Constant
4.873
2.352
2.07
0.05
8.56e-4
1.09e-3
-0.78
0.442
2.494
1.367
1.49
0.151
0.2487
0.1673
2.07
0.017
Page 80
www. ijraset.com
SJ Impact Factor-3.995
E .Defuzzification
The aggregate output of all the rules which is in the form of
fuzzy set is converted into a numerical value (crisp number)
that represents the response variable for the given data sets. In
the present work, the centroid defuzzification method is used
for this purpose. It is the most popular method used in most of
the fuzzy logic applications. It is based on the centroid
calculation and returns center of area under the curve.The
predicted values of surface roughness are compared with the
experimental output, prediction model output and fuzzy
output. The comparison of prediction performance in fuzzy
logic output, prediction model output with the experimental
results is given in the Table 3.
20
15
Experimental
Value
10
Predicted
Value
Fuzzified
Value
1 5 9 13 17 21 25
D .Aggregation of Rules
Hole number
Page 81
www. ijraset.com
SJ Impact Factor-3.995
S.
No
Plate
thickness
t (mm)
Speed
s(rpm)
Feed
f(mm/rev)
Point angle
()
Fuzzy
output
280
0.18
10732'07"
3.19
6.3224
2.15
5
5
5
5
5
5
5
5
10
10
10
10
10
10
10
10
10
15
15
15
15
15
15
15
15
15
280
280
900
900
900
1800
1800
1800
280
280
280
900
900
900
1800
1800
1800
280
280
280
900
900
900
1800
1800
1800
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
0.18
0.71
1.40
10729'47"
10725'32"
10720'44"
10717'58"
10715'20"
10719'31"
10712'25"
10708'28"
10702'57"
10647'11"
10639'47"
10630'09"
10628'42"
10624'50"
10621'20"
10619'26"
10616'32"
10632'07"
10558'10"
10552'37"
10544'12"
10536'04"
10514'39"
10522'42"
10508'35"
10458'49"
11.98
6.49
4.09
9.16
8.79
12.96
7.27
3.33
5.64
8.98
11.42
1.76
7.12
8.58
7.72
10.07
8.97
8.37
10.48
15.75
5.43
18.25
11.43
4.74
6.64
8.55
7.6421
9.3602
5.7892
7.1089
8.8270
5.0152
6.3349
8.0530
7.5674
8.8871
10.6052
7.0342
8.3539
10.0720
6.2602
7.5799
9.2980
8.8124
10.1321
11.8502
8.2792
9.5989
11.3170
7.5052
8.8249
10.5430
10.00
5.75
3.62
7.87
7.87
12.1
5.75
2.50
3.62
7.87
10.00
2.19
5.75
7.87
5.75
10.00
7.87
7.87
10.00
14.30
3.62
16.4
10.00
3.62
5.75
7.87
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Page 82
www. ijraset.com
SJ Impact Factor-3.995
Page 83
www. ijraset.com
SJ Impact Factor-3.995
Page 84
www. ijraset.com
SJ Impact Factor-3.995
INTRODUCTION
Page 85
www. ijraset.com
SJ Impact Factor-3.995
EXPERIMENTAL RESULT
Fig 2. Solar insolation vs Time on a rainy day (a) and clear day
(b)
Page 86
www. ijraset.com
SJ Impact Factor-3.995
CONCLUSION
Page 87
www. ijraset.com
SJ Impact Factor-3.995
Page 88
www. ijraset.com
SJ Impact Factor-3.995
INTRODUCTION
Page 89
www. ijraset.com
SJ Impact Factor-3.995
channel ahead of the data burst. The OBS routers will set up a
light path for the duration of the data burst according to the
information carried in the burst header. Data bursts can stay in
the optical domain and pass through OBS routers
transparently. This eliminates the need for optical buffers in
such networks. In addition, since burst headers and data bursts
are sent on separate WDM channels, there is no stringent
synchronization requirement. Figure 1 illustrates an OBS
network interconnecting heterogeneous networks. OBS
ingress edge routers are responsible for assembling packets
into data bursts according to the egress edge router addresses
and possibly quality-of-service (QoS) levels. A burst is
formed when it either reaches the pre-defined maximum burst
size, or the burst assembly time reaches the timeout value.
Adaptive burst assembly schemes can be used as well. Once a
burst is formed, the ingress edge router generates a burst
header which is sent on a separate control channel. The burst
header specifies the length of the burst, and the offset time
between the burst header and the data burst. The data burst is
then launched on one of the WDM data channels. When the
burst header reaches the OBS core router, it is converted to
electronic signal and processed electronically. Since burst
headers carry complete information about data bursts, the
OBS core router can make efficient scheduling decisions in
selecting the outgoing WDM channels for data bursts by
simply processing burst headers. If at least one outgoing
WDM channel is available for the duration of the burst, a
channel will be selected to carry the data burst. Otherwise, the
data burst will be dropped. Before the data burst reaches the
OBS core router, the optical interconnects in the OBS core
router will be configured to route the optical data burst to the
desired output channel. The data burst can traverse the OBS
core network as an optical entity transparently without
encountering O/E/O conversion. When data bursts reach the
egress edge router, data bursts will be disassembled back to
packets and forwarded to proper network interfaces.
Note
that
burst
assembly/disassembly
functionality is only provided at OBS edge routers. There is
no burst reassembly in the OBS core network. There is a oneto-one correspondence between the burst header and its
associated burst. Burst headers are responsible for setting up
optical data paths for their data bursts. Data bursts will simply
follow the light paths set up by burst headers and are
transparent to OBS core routers.
III.
PROPOSED EMBEDDED
SECURITY SERVICES AND INTEGRATED SECURE
OBS ROUTER ARCHITECTURE
3.1.Security vulnerabilities in OBS networks
Page 90
www. ijraset.com
SJ Impact Factor-3.995
FIG2(a)
Page 91
www. ijraset.com
SJ Impact Factor-3.995
Fig 3
Secure edge router architecture:
The OBS edge router aggregates traffic into bursts
based on destination edge router addresses, and possibly QoS
parameters. The basic operation of an edge router can be
found in Reference [10]. We extend the basic OBS edge
router architecture to support embedded OBS security services
as shown in Figure 4. At the point of ingress direction, the
assembled bursts and their corresponding headers are
encrypted before transmission onto the optical link. At the
point of egress direction, the received burst headers are
authenticated before their corresponding bursts are decrypted
and disassembled. The key management functions include
both classical and quantum components. The classical key
distribution protocol uses the control channel, while the QKD
is via Q-channels. The burst integrity control interacts with the
burst assembly process in the burst transmitter and retransmits
bursts as necessary.
Secure core router architecture:
OBS core routers electronically process the burst
headers sent on the control channel while allowing optical
bursts to pass transparently [10]. The integrated secure OBS
core router architecture shown in Figure 5 supports Q
channels for QKD, as well as classical key distribution
protocols. The key manager in the core router architecture is
for burst header authentication, and is transparent to the burst
encryption key exchanged on an end-to-end basis. The burst
scheduling process is only executed when the burst header is
Page 92
www. ijraset.com
SJ Impact Factor-3.995
Page 93
www. ijraset.com
SJ Impact Factor-3.995
(cos
(sin
x
(cos
( sin
cos ( + )
sin( + )
sin )
cos )
sin )
cos )
sin( + )
cos ( + )
Page 94
www. ijraset.com
SJ Impact Factor-3.995
IMPLEMENTATION
X=
1
Y
For the same qubits with different polarization for each bit has
done and measured the qubits status .The output is shown
below.The measured values is different in both the cases
-i
0
VI.
i
Z= 0
-1
-1
CONCLUSION
Page 95
www. ijraset.com
SJ Impact Factor-3.995
Page 96
www.ijraset.com
SJ Impact Factor: 3.995
Page 97
www.ijraset.com
SJ Impact Factor: 3.995
Page 98
www.ijraset.com
SJ Impact Factor: 3.995
Page 99
www. ijraset.com
SJ Impact Factor-3.995
Sinter Coolers
Ramireddy. Pavankalyan Reddy1, Telukutla. Harika Sivani2
Dept. of Electrical and ElectronicsEengineering
Lakkireddy Balireddy College of Engineering
Mylavaram, Krishna district
Andhrapradesh, India
Abstract At present, distributed generation (DG) has been a research focus all over the world. As a kind of DG system,
cogeneration system utilizing waste heat from sintering-cooling process plays an important role in modern iron and steel
enterprises
I. INTRODUCTION
a) Belt type
b) Stepping type
c) Air Draft type
d) Box type and so on.
Smelting is the term related to metallurgy and we use blast
furnaces for smelting. We can call blast furnaces differently in
different relations like bloomeries for iron, blowing houses for
tin, smelt mills for lead, sinter plants for base metals like steel,
copper, iron ultimately.
Iron ore cannot be directly charged in a blast furnace. In
the early 20th century sinter technology was developed for
converting ore fines into lumpy material chargeable in blast
furnaces, though it took time to gain acceptance in the iron ore
making domain but now places an important role in generating
steel, metallurgical waste generated in steel plants to enhance
blast furnace operation.
III. WASTE HEAT RECOVERY IN SINTER PLANT
In sinter plant sensible heat can be recovered both
from the exhaust gases of the sinter machine and off-air of the
sinter cooler. Heat recovery can be in different forms.
Hot air steams from both sinter machine and sinter cooler
can be used for the generation of steam with the
installation of recovery boilers. This steam can be used to
generate power or can be used as process steam. For
increased heat recovery efficiency, a high temperature
exhaust section should be separated from a low
temperature exhaust section and heat should be recovered
only from high temperature exhaust section.
Sinter machine exhaust section can be recirculated to the
sinter machine, either after going through a heat recovery
boiler or without it.
Heat recovered from the sinter cooler can be re-circulated
to the sinter machine or can be used for pre heating the
combustion air in the ignition hood, for pre heating of the
raw mix to sinter machine. It can be used to produce hot
water for district heating.
A. Features
Page 100
www. ijraset.com
SJ Impact Factor-3.995
temperature and water convert this into steam. The water tube
boiler which has water in its tubes heated by this hot
recovered air and this water will be converted into steam. This
steam drives the turbine and give mechanical energy which is
input to the generator and this generator will give electricity.
A. Advantages
1) Reduction in pollution: A number of toxic combustible
wastes such as carbon monoxide gas, sour gas, carbon black
off gases, oil sludge, Acrylo nitrile and other plastic chemicals
etc. releasing to atmosphere if/when burnt in the incinerators
serves dual purpose i.e. recovers heat and reduces the
environmental pollution levels.
2) Reduction in equipment sizes: Waste heat recovery
reduces the fuel consumption, which leads to reduction in the
flue gas produced. This results in reduction in equipment sizes
of all flue gas handling equipment such as fans, stacks, ducts,
burners, etc.
3) Reduction in auxiliary energy consumption: Reduction
in equipment sizes gives additional benefits in the form of
reduction in auxiliary energy consumption like electricity for
fans, pumps etc.
Recovery of waste heat has a direct effect on the efficiency
of the process. This is reflected by reduction in the utility
consumption & costs, and process cost.
B. Disadvantages
1) Capital cost: The capital cost to implement a waste heat
recovery system may outweigh the benefit gained in heat
recovered. It is necessary to put a cost to the heat being offset.
2) Quality of heat: Often waste heat is of low quality
(temperature). It can be difficult to efficiently utilize the
quantity of low quality heat contained in a waste heat medium.
Heat exchangers tend to be larger to recover significant
quantities which increases capital cost.
3) Maintenance of Equipment: Additional equipment
requires additional maintenance cost.
CONCLUSION
Page 101
www. ijraset.com
SJ Impact Factor-3.995
Page 102
www. ijraset.com
SJ Impact Factor-3.995
Department of Electrical & Electronics Engineering, Jayaram College of Engineering & Technology, Tamil Nadu, India
Abstract: The fuel requirements of the world are increasing at an alarming rate and the source demand has been running ahead
of supply. Due to the population and development activities increases, the requirement of the fuel will also increase. So we need
to look for the alternative of conventional sources and the best alternative of conventional sources are the non-conventional
sources of energy which are also called renewable source of energy. In this paper, the alternate potential in tractions AET is
investigated. The innovative method of generating wind energy in a fast moving traction is one of the best methods and it
eliminate lot of problems facing in railways today.
Key Words: Fuel demand, Population growth, Conventional sources, Non-conventional sources, AET, Wind energy in traction.
I. INTRODUCTION
The wind is a free, clean, and inexhaustible energy
source. By generating wind energy in a fast moving traction in
one of the new innovation in wind power production and also
alternate energy to traction. By placing the wind turbine on the
traction it will very efficient method to produce the energy
which has been used for inter purpose also. The main aim of
this innovation is to provide a method and a system for
generating electricity by using high wind pressure generated in
moving vehicles, using free renewable input namely air. Wind
energy is cheap, non-polluting, and capable of providing enough
electricity.
II. WIND ENERGY
The wind has been used to power sailing ships for
many centuries. Many countries owed their prosperity to their
skill in sailing. The New World was explored by wind powered
ships. Indeed, wind was almost the only source of power for
ships until Watt invented the steam engine in the 18th Century.
Denmark was the first country to use the wind for generation of
electricity. The Danes were using a 23 m diameter wind turbine
in 1890 to generate electricity. By 1910, several hundred units
with capacities of 5 to 25 kW were in operation in Denmark.
Other countries also continued wind research for a longer period
of time.
Page 103
www. ijraset.com
SJ Impact Factor-3.995
been not necessary. The diameter of the rotor and the maximum
wind speed determine the amount of power that can be
produced.
In above specified figure 2, the windmills are placed
above the traction. This is another method of producing wind
energy in traction. The small size windmills are placed above
the traction. The electric train run over railroad tracks, the
alternative form of wind energy
produced by train is very
unique. If the wind is properly directed towards the wind
turbine blades, optimum electricity may be generated. The
desired direction of wind is obtained by a means for channeling
wind, in the direction of the wind turbine.
IV. AERODYNAMICS
Aerodynamics is the science and study of the physical
laws of the behavior of objects in an air flow and the forces that
are produced by air flows. The shape of the aerodynamic profile
is decisive for blade performance. Even minor alterations in the
shape of the profile can greatly alter the power curve and noise
level. Therefore a blade designer does not merely sit down and
outline the shape when designing a new blade.
The aerodynamic profile is formed with a rear side, is
much more curved than the front side facing the wind.
Page 104
www. ijraset.com
SJ Impact Factor-3.995
mass time
density area time
velocity
time
Power 12 (density) area (velocity)3
AV3
2
Figure -4: Traction facing aerodynamic problems
Example:
V = 10 m/s
A = (2 m)2 = 4 m2
= 1.2 kg/m3, P=2400 w Theoretical solution.
Page 105
www. ijraset.com
SJ Impact Factor-3.995
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
REFERENCES
Stephane Sanquer, Christian Barre, Marc Dufresne de Virel
and Louis-Marie Cleon (2004), Effect of cross winds on
high-speed trains: development of new experimental
methodology, Journal of Wind Engineering and Industrial
Aerodynamics, 92(2004), 535-545.
Wilson, R.E. and Lissaman, P.B.S. (1974), Applied
Aerodynamics of Wind Power Machines, Oregon State
University, NTIS PB 238594.
Friends of Earth, Briefing Anaerobic Digestion (2004)
Retrieved 17.08.07. Anaerobic digestion Briefing Paper,
www.foe.co.uk.
E. Muljadi and C.P. Butterfield, Pitch-Controlled
Variable-Speed Wind Turbine Generation, 1999 IEEE
Industry Applications Society Annual Meeting, Phoenix,
Arizona, October 3-7, 1999.
Grauers, A., Direct driven generators .Technology and
development trends, Proceedings of the Nordic Wind
Power Conference 2000 (NWPC 2000), Trondheim,
Norway, Mars 13-14, 2000.
Shyam Lal Verma, Ajay Bangar, Ankit Soni, Shravan
Gajendragadkar-2012 Renewable and Non-Conventional
Energy Sources and Engineering System ISSN No. 2231
6477, Volume-1, Issue-3.
BJ Furman, K Youssefi - Wind Power and Wind Turbines
WWW/K-12/airplane/short.html.
Emrah Kulunk- Aerodynamics of Wind Turbines, New
Mexico Institute of Mining and Technology USA.
Ramler, J. R. and R. M. Donovan: Wind Turbines for
Electric Utilities: Development Status and Economics,
Report DOE/NASA/1028-79/23, NASA TM-79170,
AIAA-79-0965, June 1979.
WWEA World Wind Energy Association Report 2012.
WWW.WWINDEA.ORG.
Page 106
www. ijraset.com
SJ Impact Factor-3.995
M.GOWTHAM RAJU.
N.PUSHPALATHA,
mgr434@gmail.com
pushpalatha_nainaru@rediffmail.com
Introduction
Digital images become very popular for transferring visual
information. And there are many advantages using these
images instead of traditional camera film. The digital
www. ijraset.com
SJ Impact Factor-3.995
International
Journal for Research inwhich
Applied
Science & Engineering
we refer to as anti-forensic dither, to it value
1. RELATED TO PROJECT WORK:
according
to
the
equation
Z=Y+D
The segment length is equal to the length of the
quantization interval the probability that the quantized
coefficient value is qk is given by.
(2)
(3)
Coefficient
Quantization
Fingerprint
P(Y=y)={
if y=kQi,j
(5)
www. ijraset.com
SJ Impact Factor-3.995
www. ijraset.com
SJ Impact Factor-3.995
International
Journal for Research in AppliedA measure
Science
& Engineering
methods designed to detect evidence of JPEG compression
of blocking artifacts strength is
in decoded images, determine an images origin, detect
double JPEG compression, and identify cut and paste
image forgeries.
A digital image forgery has resulted in an
environment where the authenticity of digital images
cannot be trusted. Many of these digital forensic techniques
rely on detecting artifacts left in image by JPEG
compression. Because most of the digital cameras make use
of proprietary quantization tables, an image compression
history can be used to help identify the camera used to
capture it. These techniques are quite adept at detecting
standard image manipulation, they do not account for the
possibility that anti-forensic operation designed to hide
traces of image manipulation may applied to an image.
Recent work as shown such operations can be constructed
to successfully fool existing image forensic techniques.
Back Ground:
When an image is subjected to JPEG compression, it is first
segmented into 8X8 pixel blocks. The DCT of each block
is computed and resulting set of DCT coefficients are
quantized by dividing each coefficient by its corresponding
entry in a quantization table then rounding the result to the
nearest integer. The set of quantized coefficients read into a
single bit stream and lossless encoded. so decompressed
begins by bit stream of quantized DCT coefficients and
reforming into a set of 8X8 pixel blocks.
As a result two forensically significant
artifacts are left in an image by JPEG compression. That is
DCT coefficient quantization artifact sand blocking
artifacts. Blocking artifacts are the discontinuities which
occur across 8X8 pixel block boundaries because of
JPEGs loss nature anti forensic technique capable of
removing DCT coefficient artifacts from a previously
compressed image.
www. ijraset.com
SJ Impact Factor-3.995
To the best knowledge increased in the field of antiforensics. Most of the methods of this an forensics is
to find out the process that which the image
compression is takes places, such of that methods
involves in like JPEG detection and quantization table
estimation.in this method of anti-forensic the JPEG
compression of an image history also produces the
information of camera used to produce an image.
4. CONCLUSION:
www. ijraset.com
SJ Impact Factor-3.995
International
Journal for Research in[9]Applied
Science & Engineering
H. Farid, Digital image ballistics from JPEG
This anti forensic technique capable of removing
quantization, Tech. Rep.TR2006-583, Dept. of Computer
Science, Dartmouth College, 2006.
[10] A.C. Popes cu and H. Farid, Statistical tools for
digital forensics, in 6th International Workshop on
Information Hiding, Toronto, Canada,
2004.
[11] T. Pevny and J. Fridrich, Detection of doublecompression in JPEG images for applications in
steganography, IEEE Trans. InformationForensics and
Security, vol. 3, no. 2, pp. 247258, June 2008.
[12] M. Kirchner and R. Bohme, Hiding traces of
resampling in digital images, IEEE Trans. Information
Forensics and Security, vol. 3, no.4, pp. 582592, Dec.
2008.
www. ijraset.com
SJ Impact Factor-3.995
SJ Impact Factor-3.95
www. ijraset.com
ABSTRACT
I. INTRODUCTION
The recent developments in the manufacturing world
have led to a revolutionary change in the design and
development of various systems. Developments in
welding technology are one of such changes.
Welding processes have been used extensively as a
joining technique, used in design and fabrication of
various structures like naval ships, airplanes,
automobiles, bridges, pressure vessels, etc. Welding
has emerged as a better option in contrast to other
joining techniques in terms of joint efficiency,
mechanical properties with a greater application
impact.
107
SJ Impact Factor-3.95
www. ijraset.com
108
SJ Impact Factor-3.95
www. ijraset.com
Propeller
Electromagnetic Wheels
Welding Rod holder and Rod
Stepper Motors
ATmega 16 Microcontroller
Camera
Lights
a.) Propeller
A propeller is a mechanical device for
propelling a boat or aircraft, consisting of a revolving
shaft with two or more broad, angled blades attached
to it. There are 4 propellers used in this robot. Two
propellers face the front side and the other two
propellers face the top side. When the propellers in
the front rotate clockwise the robot moves forward
and vice versa for anticlockwise direction, and when
the propellers at the top rotate clockwise the robot
moves up and vice versa for the anticlockwise
direction. The side wards movement i.e. Right to left
is done by deflecting the propeller arm.
109
SJ Impact Factor-3.95
www. ijraset.com
110
SJ Impact Factor-3.95
www. ijraset.com
CONCLUSION
The working safety is an important factor
for the weld done in the underwater. The threat to the
welder is from various aspects during the weld. This
exclusive model of a robot will be a solution for the
problems related to the underwater welding. There is
also a numerous future scope for this system.
REFERENCES
[1] Anand and Khajuria(2013), welding processes in
marine applications: a review, International Journal
of mechanical engineering research and robotics,
Vol.2, Jan2013, ISSN 2278-0149
111
SJ Impact Factor-3.95
www. ijraset.com
112
www. ijraset.com
SJ Impact Factor-3.95
ABSTRACT
Although conventional sweeping vehicles
already exist, they are designed to operate on a
small scale and use IC engines which are
proving to be more and more expensive and
polluting with increasing fuel costs and
increasing global warming. The whole system
comprises of three separate DC motor systems
each of which control the vacuum system, the
sweeping system and the overall propulsion
system of the vehicle. The amount of carbon
I. INTRODUCTION
With increasing vehicular traffic and road
usage levels, it is necessary for a machine that
can effectively maintain road related rubbish
to be developed. The electric road cleaner aims
to utilize the high torque that a DC motor can
provide simultaneous vehicular propulsion and
at the same time sweep and vacuum the road
thereby combining the work conventionally
done with different systems under one.
VACCUM SYSTEM
It is the heart of the cleaning process and
is used to suck in all the rubbish present on
the road that is suitably swept in by the
sweeper circuit.
SWEEPER SYSTEM
It is used to suitably push the rubbish
towards the vacuum suction point. It
113
www. ijraset.com
SJ Impact Factor-3.95
SENSOR SYSTEM
The sweeping system is connected to a
mount that can be raised or lowered
depending on the gradient of the road and
obstacles. The sensor and sweeper systems
work in tandem.
Sub-system Battery:
This is used to run the vacuum and
sweeping sub-systems and produce an
output of 12V and comprise of 5-12V
batteries connected in parallel and again
the discharging is controlled by a
dedicated micro-controller.
2. MOTOR
The motor used is a BLDC motor. It can
produce 10 HP output power with an input
voltage of 120V. The current rating is
70A, maximum speed is 3450rpm. The
motor gets its input from the controller.
The motor is directly coupled to the
wheels.
3. CONTROLLER
1. BATTERY SYSTEM
In place of an internal combustion engine,
the proposed car has a bank of batteries -the battery system. The battery system is
composed of two subsystems 1. For the
propulsion motor 2. For the sweeping and
vacuuming systems.
The controller used in this vehicle is a dcdc controller manufactured in the name
CURTIS 1231c-86XX. The above shows
Propulsion Battery:
114
www. ijraset.com
SJ Impact Factor-3.95
Input speed=3000rpm
Output speed=1000rpm
Gear efficiency=0.85
Gear torque=50*(3000/1000)*0.85
=127.5Nm
Controller characteristics:
Voltage (V): 96-144.
Current (A): 500.
2 MIN RATING (A): 500.
5 MIN RATING (A): 375.
1 HOUR RATING (A): 225.
1. CHOPPER CIRCUIT
T: Output torque.
N: Operating speed of motor.
Re-arranging:
T= (60*P)/(2*pi*N).
T=(60*20*765)/(2*3.1415*3000).
T=50 NM(approx).
115
www. ijraset.com
SJ Impact Factor-3.95
BUCK
2. CONTROL CIRCUIT
116
www. ijraset.com
SJ Impact Factor-3.95
V. VACUUM SYSTEM
Vaccum-2:
The second vacuum system acts as a
suction/blower device based on the season.
In summer when the moisture on the roads
is minimal the setup is used as a vacuum
device. During rainy seasons, the setup
funnels hot air from the main motor
toward the ground thus drying up moisture
and enabling easier vacuuming and
preventing sand from sticking to the
ground. This is also a universal motor
coupled to the fan controlled by a chopper
and the field has a reversal circuit used to
control the direction of rotation.
Vacuum-1:
This a universal motor driven vacuum
creator used to suck in the dust irrespective
of the season and road conditions. The
universal motor is coupled to the fan and is
driven by a chopper which is fed from a
lead acid battery source. The chopper used
is a BOOST chopper.
Boost Chopper:
The above shows the block diagram of the
reversal system. The motor has two
windings one for forward operation and
the other for reverse operation, by using a
DPDT switch to switch between the
windings, the direction of operation of the
universal motor can be reversed.
Universal motor:
Universal motors can rotate at a speed of
up to 20000 rpm. It is used for low torque
applications. The motor used in the
vacuum system is a 1400W 12v DC motor.
117
www. ijraset.com
SJ Impact Factor-3.95
raised
by
the
stepper
motor.
Suction Pressure=(1/2)*rho*V^2.
rho-Density of air=1.225.
Suction Pressure: 30 KPA.
V-Velocity of the fan blade.
Re-arranging:
V=Sqrt((2*Suction Pressure)/rho).
V=Sqrt((2*30*10^3)/1.225).
V=Sqrt(48,979.592).
V=221.31 M/SEC.
V=(R*W*2*pi)/60
Where,
R-Radius of fan blade.
W-Speed in RPM.
Re-arranging:
R= (60*V)/(W*2*pi).
R= (221.31*60)/(10000*2*3.1415).
R= 13278.6/62830.
R=0.211M.
1. PING SENSOR:
The ping sensor is an ultrasonic sensor
which measures the distance from the
vehicle and any obstacle. If the distance is
lesser than 2m, the sweeper system will be
118
www. ijraset.com
SJ Impact Factor-3.95
VII. ADVANTAGES
The principal advantages of this system
involve its large adaptability and relative cost
efficiency. Absence of regular fuelling reduces
fuel costs and the design of the system with
only a electric energy source means that there
is no need for a separate oil fuel for the vehicle
and additional electricity for the other systems.
VIII. CONCLUSION
The proposed paper deals with the use of a electric
vehicle for sweeping and vacuuming purposes. An
electric vehicle has the dual advantage of both being
relatively eco-friendly as well as much more cost
efficient. Instead of individual systems for the sweeper
and cleaner using electric systems and operating the
vehicle on combustion engine, the systems use of pure
electric propulsion means the unit can be designed as a
whole. The entire vehicle can be modified and
redesigned as needed for operation. The vehicle can save
costs on fuel in the long run as well as the fact that
electricity remains the only future resource for mankind.
This vehicle can also reduce road pollution and thereby
help reduce the amount of accidents that occur due to
improper road maintenance.
3. ALGORITHM:
Step 1: start the process
Step 2: send trigger signals to the
microcontroller
IX. REFERENCES
[1] en.wikipedia.org
[2] http://www.evworld.com
[3] http://www.saxton.org
[4] http://www.fueleconomy.gov
[5] http://auto.howstuffworks.com
119
www. ijraset.com
SJ Impact Factor-3.95
120