S.No.

Volume 5, Issue 4, April 2016 (Title of Paper )

Page No.
1.

Phase Tracking of Resonance Frequency to Avoid Fatigue Failure

Authors- Mylaudy Dr. S. Rajadurai, B.Harinivas, D. Karthick

The vibration testing industry has made good use of sine vibrations to find the frequencies at which a particular device under test (DUT) resonates. These frequencies are important to the vibration testing because they are the frequencies at which the DUT vibrates with the peak amplitude and, therefore, may be the most harmful to the DUT. it can be assumed that the ideal phase value for a resonance is 90° under forced vibration. In reality, however, this theoretical phase value of 90° could be different because the phase value may be affected by the location of the accelerometer or due to a lag in the measurement instrumentation. This paper reveals with the automatic phase tracking of DUT to produce the maximum transmissibility value at a particular resonance under forced vibration using vibration controller. This technique makes fatigue tests more consistent with real-life excitations.

Keywords- DUT, Amplitude, Resonance, Frequency, Phase, Forced Vibration, Real Life Excitations.

References-

[1] Dr. Sivanandi rajadurai, M.Guru Prasad, R.Kavin, M.Sundaravadivelu, M.Balaji, Computational simulation to ascertain hot vibration test assembly for converter validation

[2] Improving SRTD Testing with Resonance Phase Settings, Joel Minderhoud, Vibration Research Corporation, Jenison, Michigan

[3] “Fundamentals of Sound and Vibrations” by KTH Sweden.

[4] Measuring vibration, Brüel & Kjær

[5] Signal processing for effective vibration analysis Dennis H. Shreve, IRD Mechanalysis, Inc Columbus, Ohio November 1995

[6] Mechanical Vibrations, Singiresu S. Rao, University of Miami. [7] Electrodynamic Shaker Fundamentals George Fox Lang, Data Physics Corporation, San Jose, California

 

 

1-7
2.

Bacteriological Examination of Cow Milk Samples Collected from Case of Chronic Clinical Mastitis

Author: Subha Ganguly

Abstract- The indiscriminate and injudicious administration of antibiotics and irrational treatment of bovine mastitis with different antibiotics have invited serious complications like multiple drug resistance. The present paper reports the microbiological examination and reporting of a clinical case of mastitis in cow and its recommended therapeutic management with the selected broad spectrum antibiotics. Till date different types of antibiotics have been tried against the pathogens in bovine mastitis with or without identification and drug sensitivity testing.

Keywords- Antibiotics, Antibiogram, Bacteriology, Mastitis

References-

[1] Patnaik, Subhasree, Prasad, Arun, Ganguly, Subha (2013). Mastitis, an Infection of Cattle Udder: A Review. J. Chem. Biol. Physical Sci., Section-B [Biological Sciences]. 3(4): 2676-8.

[2] Paul, I., Isore, D.P., Joardar, S.N., Mukhopadhayay, S.K., Ganguly, S., Pal, S. (2013). Bacteriological investigation and antibiogram on Methicillin-resistant Staphylococcus aureus (MRSA) causing subclinical mastitis in dairy cattle population of West Bengal. Indian J. Comp. Microbiol. Immunol. Infect. Dis., 34(2): 56-9.

[3] Ganguly, Subha (2014). A comprehensive and illustrious review on clinical and diagnostic aspects of Mastitis infection in high yielding lactating cows. World J. Pharma. Res., 3(9): 352-60.

[4] Wakchaure, Rajesh, Ganguly, Subha, Para, Parveez Ahmad, Praveen, Praveen Kumar, Qadri, Kausar (2015). Mastitis, an economically important disease affecting lactating ruminants: A Review. Chap. 15, pp. 199-212. In: New Dimensions in Microbiology [Eds. Dr. M.M. Abid Ali Khan (India), Dr. John K. Grandy (USA), Dr. Egamberdieva Dilfuza (Germany), Murataza Abid (India), Dr. Raaz K. Maheshwari (India), Dr. T.S. Naqvi (India)], Lenin Media, Delhi, India. ISBN 978-93-85160-84-4.

[5] Buxton, A., Fraser, G. (1977). Animal Microbiology. Vol. 1. Blackwell Scientific Publications.

[6] Sinha, S.N. (2006). Focus on College Practical Microbiology. Part-I. Rita Book Agency, Kolkata, India.

[7] Ananthanarayan, R., Paniker, C.K. Jayaram. (2009). Textbook of Microbiology. 8thed. Universities Press (India) Pvt. Ltd. Hyderabad, India. ISBN 978 81 7371 674 4.

[8] Cruickshank, R., Duguid, J.P., Marmion, B.P., Swain, R.H.A. (1975). Medical Microbiology. 12th ed. Vol. II, Churchill Livingstone, London.

[9] Finegold, S.M., Martin, M.J. (1982). Diagnostic Microbiology. 6th ed. The C.V. Morsby Co., London.

[10] Ganguly, Subha, Padhy, Arpita, Sahoo, Saraswat, Garg, Shyam Lal, Praveen, Praveen Kumar, Wakchaure, Rajesh, Para, Parveez Ahmad, Sharma, Subhash, Kumar, Avinash, Pandey, Arvind Kumar, Mahajan, Tanvi, Qadri, Kausar (2015). Bacteriological examination and antibiogram of milk sample of clinically infected dairy cow suffering from mastitis. Int. J. Medi. Microbiol. Trop. Dis., 1(1): 6-7.

[11] Ganguly, Subha, Padhy, Arpita, Sahoo, Saraswat, Garg, Shyam Lal, Wakchaure, Rajesh, Praveen, Praveen Kumar, Para, Parveez Ahmad, Mahajan, Tanvi, Qadri, Kausar, Sharma, Ruchi (2016). Antibiogram of milk sample of a farm maintained dairy cow suffering from mastitis followed by its clinical recovery. Int. J. Sci. Environ. Technol., 5(1): 148-151.

[12] Ganguly, Subha, Qadri, Kausar, Praveen, Praveen Kumar (2016) Bacteriological analysis of mastitic milk sample. Int. J. Multidiscipl. Res. Modern Edu., II(I): 468-470.

[13] Kumar, Mayur, Prasad, Arun, Tiwary, B.K., Ganguly, Subha (2010). Study on incidence of mastitis in cattle population of Ranchi (Jharkhand) under different dairy farm conditions. Livest. Line, 4(6): pp. 8.

[14] Patnaik, Subhasree, Prasad, Arun, Ganguly, Subha (2014). Biochemical characterization and antibiogram of Staphylococcal microorganisms associated with subclinical mastitis in lactating crossbred cows. Anim. Sci. Rep., 8(4): 123-9.

[15] Ganguly, Subha, Praveen, Praveen Kumar (2016). Microbiological examination of milk samples from cow udder affected with chronic clinical mastitis. Int. J. Rec. Dev. Engg. Technol., 5(5): 1-2.

[16] Qadri, Kausar, Kamble, Shweta, Ganguly, Subha, Praveen, Praveen Kumar (2016). Clinical mastitis in a crossbred cow: A case study. J. Biol. Sci. Opin., 4(3): xx-xx (In press for publication in May-June’16 issue).

 

 

8-9
3.

Development and Implementation of Nozzle Clogging Index at Continuous Caster to Improve Length of Casting

Authors: Rajendra. T, Rachappa Kadli, Anil Kumar.S.

Abstract- In the current practice at slab caster shop of JSW Steel, there is no tool available which can correctly quantify the nozzle clogging during casting operation. As a result, operators roughly estimate the extent of clogging by monitoring the stopper rod position during casting. In light of above, a model has been developed which helps the operator to take effective action to either release or avoid clogging which would further improve the length of casting by allowing more heats in tundish.

Keywords- Clogging, Tundish, Clogging index, Flushing, Stopper position

References-

[1] B. Bergman, N.Bannenberg, R. Piepenbrock, “Castability assurance of Al-killed Si- free steel by calcium cored wire treatment”, 1st European Conference on Continuous Casting, 1991, p. 1.501-1.508

[2] Girase, N.U., S. Basu, and S.K. Choudhary, Development of indices for quantification of nozzle clogging during continuous slab casting. Ironmaking and Steelmaking, 2007. 34(6): p. 506- 512.

[3] D. Bolger, Stopper rod and submerged nozzle design and operation in continuous casting”, Steelmaking Conference Proceeding, 1994, p. 531-537.

[4] Yuan, F., et al., Online forecasting model of tundish nozzle clogging. Journal of University of Science and Technology Beijing, Mineral, Metallurgy, Material, 2006. 13(1): p. 21-24.

 

10-14
4.

A Study on the Performance of Crushed Clam (Egeria Radiata) Shells (CCS) as Partial Replacement Material for Fine Aggregates in Concrete

Authors: F.A Olutoge, B.E Yabefa, H.Mujib, Olawale S. O. A.

Abstract- The scarcity and high cost of conventional construction materials to the average people in the society has challenged researchers to look for low cost construction materials that are abundantly available in our environment. This study presents the performance of CCS as a constituent material in a concrete as partial fine aggregate replacement. Physical and mechanical properties of CCS and the fresh and hardened concrete were determined. Concrete specimens of 100x100x100mm, 100x100x500mm and 100mm diameter by 200mm height were constructed as cubes, beams and cylinders respectively. The crushed Clam shells were used to replace the fine aggregates at 0%, 10%, 20%, 30% and 40% replacement levels with a mix ratio of 1:2:4 and w/c ratio of 0.5. The slump test method was used to ascertain the workability of the concrete. Compressive, splitting tensile and flexural strengths and density of the concrete were evaluated after 7, 14, 21, and 28days curing period at the different percentage replacement levels. In all, the maximum strengths of 20.31, 2.47, 1.92N/mm2 were obtained at 10% replacement as compressive, splitting tensile and flexural strengths respectively in 28 days curing period. The range of values for the density is 2610, 2650, 2540, 2590, and 2510Kg/m3 for 0-40% replacement level respectively at 28 days curing. Increase in percentage of CCS in the concrete let to a reduction of the density, compressive, splitting tensile and flexural strengths respectively. But in all cases, the strength increased with increasing curing age. Replacement level of 10 -20% was found appropriate for the construction of normal and lightweight concretes.

Keywords- Clam shells, compressive, fine aggregates, flexural, and splitting tensile strength.

References-

[1] Amaziah W. O, Idongesit U. F and Theodore A.I (2013): Exploratory study of periwinkle shell as partial replacement for fine aggregates in concrete.Journal of Emerging Trends in Engineering and Applied sciences (JETEAS) 4(6): 823- 827

[2] Benham P. P. and Wamock F. V. 1983. Mechanics of solids and structures. Pitman Publishing Limited, London, U.K

[3] BS 1377 1990 Part 3; Determination of specific gravity

[4] BS 812 Part 2, Method for determination of Bulk density of aggregate: Standard Institute, London. United Kingdom, 1995

[5] BS 1881: Part 102 Testing Fresh Concrete: Method for determination of slump, British Standards Institute, London, 1983.

[6] BS 1881: Part 116 Method for Determination of Compressive Strength of Concrete, British Standards Institute, London, 1983

[7] BS 1881: Part 114: 1983 Testing Concrete. Method for determination of density. British Standard Institute, London, 1983.

[8] Dahunsi B.I.O, properties of Periwinkle-Granites Concretes, Journal of Civil Engineering 2003, 8, pp. 27-35

[9] Elijah. I, Ohimain, Sunday Bassey and Dorcas D.S Bawo (2009). Used of sea shell for civil construction works in coastal Bayelsa State, Nigeria: A waste management perspective. Reseach Journal of Biological Science 4(9): 1025-1031, 2009

[10] Malu S.P, Abara, A.E, Obochi G.O, Ita B.I and Edem C.A, 2009. Analysis of Egeria radiata and Thais coronate shells as alternative source of calcium for food industry in Nigeria. Pakistan journal of nutrition, 8:965-969.

[11] Olutoge F.A (2010): Investigations on sawdusts and palm kernel shells as aggregate replacement. APRN journal of Engineering and applied science 5(4), 7-13

[12] Yang E., Yi S., and Leem Y., Effect of oyster shell substituted for fine aggregate in concrete characteristics part 1. Fundamental properties, Cement and concrete. Research 2005, 35(11) pp. 2175-2182

 

15-22
5.

Review on LAN Security

Authors: Monika, Savita Bisnoi

Abstract: - Wireless Local Area Networks (WLANs) are cost effective and desirable gateways to mobile computing. They allow computers to be mobile, cable less and communicate with speeds close to the speeds of wired LANs but can’t achieve same speed. So wired network is always best in case of speed of transfer data. These features came with expensive price to pay in areas of security of the network. The functions performed by a client and a server are complementary and can be implemented by a set of software modules, hardware components, or a combination thereof. Client and/or server runs on dedicated separate machines. This paper identifies and summarizes these security concerns and their solutions.

Keyword: LAN, Client-server, Security issue

References-

[1] Shivaputrappa Vibhuti, ―IEEE 802.11 WEP (Wired Equivalent Privacy) Concepts and Vulnerability‖, San Jose State University, CA, USA, CS265 Spring 2005 (26.03.2005)

[2] NETGEAR, Inc. ―Wireless Networking Basics‖, October 2005.

[3] Stubblefield, A; et al, ‗A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP)‘ in ACM Transactions on Information and System Security, Vol. 7, No. 2, May 2004, pg 319– 332.

[4] He, C. et al, ‗A Modular Correctness Proof of IEEE 802.11i and TLS‘ in A formal analysis of Crypto Protocols; Proceedings of the 12th ACM conference on Computer and communications security CCS '05, pg 2

[5] Xu, K, ‗TCP Behaviour across Multi-hop Wireless Networks and the Wired Internet‘ in Mobile Ad hoc Networks; Proceedings of the 5th ACM international workshop on Wireless mobile multimedia WOWMOM '02, pg 41- 45

[6] Mahajan, R, ‗Analyzing the MAC-level Behaviour of Wireless Networks in the Wild‘ in ACM SIGCOMM Computer Communication Review , Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications SIGCOMM '06, 36(4) pg75- 79

[7] Gruteser, M. and Grunwald, D. (2005) ‗Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: a Quantitative Analysis‘ Mobile Networks and Applications, 10(3) pg 315-325

[8] Bhagyavati et al. ‗Securing Wireless Data: System Architecture Challenges‘ in Proceedings of the 1st annual conference on Information security curriculum development InfoSecCD '04; pg 82-87

[9] Jones, A., S. Dontharaju, et al (2008) "Radio Frequency Identification Prototyping" ACM 13(2).

[10] Whitman, M. (2003) "Enemy at the gate: Threats to Information Security" Communications of the ACM 46(8): 91-95. [11] http://www.cisco.com/c/en/us/products/collateral/wireless/aironet1200-access-int/prod_white_paper09186a00800b469f.html

[12] Anthony C. Ijeh, Allan J. Brimicombe, David S. Preston, Chris .O. Imafidon ―Security Measures in Wired and Wireless Networks‖.

[13] Mohd Izhar et. al, ―International Journal of Scientific and Research Publications, Volume 3, Issue 11, ISSN 2250-3153 ―Enhanced Security Evaluation and Analysis of Wireless Network based on MAC Protocol‖, November 2013.

 

 

23-25
6.

Enhancing LAN Security Integrated Security Monitoring Tool

Authors: Monika, Savita Bisnoi

Abstract - With the growth of networked systems all around us, it has become imperative for us to monitor their health so as to keep them secure from any external or internal threat. The internal threats being as important as well as the external threats. The users of the networked systems require secure systems and system resources that they can trust. The aim behind our approach is to provide an effective design in the hands of the systems and security administrator so as to help him maintain the required level of trust in his networked environment. The Integrated Security Monitoring Tool allows the administrator to monitor the file system, monitor the audit logs, bandwidth control, probe the system for vulnerabilities and maintain the integrity of important files in his environment.

Keyword- LAN, Client-server, Integrated Security Monitoring Tool.

[1] Saini, “Squid Proxy Server Beginners Guide” Packt Publishing, Open Source Community, 2011

[2] F. Schmidt, The SCSI Bus & IDE Interface, Protocols, Applications & Programming. Addison- Wesley, 1998

[3] M. McKusick, W. Joy, S. Leffler, R. Fabry, “A Fast File System for Unix”, ACM Trans. On Comp. Sys. 2(3), pp. 181-197, Aug. 1984.

[4] Brian White, Wee Teck Ng, Bruce K. Hillyer “Performance Comparison of IDE and SCSI Disks” http://citeseerx.ist.psu.edu.

[5] Jia Wang, “A Survey of Web Caching Schemes for the Internet,” ACM Computer Communication Review, 29(5):36--46, October 1999.

[6] The Automatization of Information Security of Local Calculation Network with the Open Access to Internet on FreeBSD Base” IEEE Paper CADSM‟2009, 24-28 February, 2009, by Writer “Andrian Piskozub, Dmytro Levytskyy, Igor Rudyk, Larisa Rakobovchuk”.

[7] https://saravanesh.files.wordpress.com/2010/06/introduction-toclient1.doc

[8] https://technet.microsoft.com/en-us/library/cc507834.aspx

[9] http://www.linuxsecurity.com/docs/SecurityAdminGuide/SecurityAd minGuide-3.html

26-29
7.

Predictive Analytics of Cluster Using Associative Techniques Tool

Authors: Jyoti, Savita Bisnoi

Abstract: - Mining the data means fetching out a piece of data from a huge data block. The basic work in the data mining can be categorized in two subsequent ways. One is called classification and the other is called clustering. Although both refers to some kind of same region but still there are differences in both the terms. The goal of the thesis is to experimentally exploring clustering and classification technique for predictive analysis. Apriori Algorithms is implemented using C#. Apriori partitioning and sampling algorithms have been implemented and their performance is evaluated extensively. We are also analysis diabetic data on WEKA tool using clustering and classification technique.

Keyword: Data Mining, Clustering, Classification, Apriori Algorithm, WEKA tool

References-

[1] W. Pieczynski, Chaînes de Markov Triplet, Triplet Markov Chains, Comptes Rendus de l’ Académie des Sciences – Mathématique, Série I, Vol. 335, No. 3, pp. 275-278, 2002.

[2] W. Pieczynski, Multisensor triplet Markov chains and theory of evidence, International Journal of Approximate Reasoning, Vol. 45, No. 1, pp. 1-16, 2007.

[3] Bertram, Raymond, Alexander Pollatsek, and Jukka Hyönä. "Morphological Parsing and the Use of Segmentation Cues in Reading Finnish Compounds." Journal of Memory and Language 51.3 (2004): 325-345. 27 Apr. 2014.

[4] Nisbet, Robert A. (2006); Data Mining Tools: Which One is Best for CRM? Part 1, Information Management Special Reports, January 2006.

[5] Azevedo, A. and Santos, M. F. KDD, SEMMA and CRISP-DM: a parallel overview. In Proceedings of the IADIS European Conference on Data Mining 2008, pp 182–185

[6] Goebel, Michael; Gruenwald, Le (1999); A Survey of Data Mining and Knowledge Discovery Software Tools, SIGKDD Explorations, Vol. 1, Issue 1, pp. 20–33.

[7] Kobielus, James; The Forrester Wave: Predictive Analytics and Data Mining Solutions, Q1 2010, Forrester Research, 1 July 2008.

[8] Biotech Business Week Editors (June 30, 2008); Biomedicine; HIPAA Privacy Rule Impedes Biomedical Research, Biotech Business Week, retrieved 17 November 2009 from LexisNexis Academic.

[9] Potu Narayana , “Association Rule Mining Based On Apriori Algorithm”, International Journal For Development Of Computer Science & Technology ISSN-2320-7884 (Online)Volume-1, Issue-Iii (April-May 2013).

 

 

30-33
8.

A Review Paper on Improving the Efficiency of IC Engine Fins by Varying its Material and Shape

Authors: Vikash Kumar, Dr.S K Jain, Dr.Sukul Lomash

Abstract- When fuel is burned in an engine, heat is produced. Additional heat is also generated by friction between the moving parts. Only approximately 30% of the energy released is converted into useful work while remaining 70% must be removed from the engine to prevent the parts from melting. In air-cooled I.C engine, extended surfaces called fins are provided at the periphery of engine cylinder to increase heat transfer rate. That is why the analysis of fin is important to increase the heat transfer rate. The main of aim of this work is to study various researches done in past to improve heat transfer rate of cooling fins by changing cylinder fin geometry and material.

Keywords- IC Engine, Fins, Engine Performance, Efficiency.

References-

[1] Pudiri Madhu and N. Sateesh., An experimental investigation into the Modeling and Simulation of Fins for 150cc Engine, SAE paper (2015)R. Caves, Multinational Enterprise and Economic Analysis, Cambridge University Press, Cambridge, 1982.

[2] D. Merwin Rajesh and K Suresh Design and thermal analysis of cylinder fins by varying its geometry and material, IJME International Journal, ISSN NO: 2348- 4845 (2014)

[3] Thornhill D. and May A., An Experimental Investigation into the Cooling of Finned Metal Cylinders in a free Air Stream, SAE Paper 1999-01-3307 (1999)

[4] Gibson H., The Air Cooling of Petrol Engines, Proceedings of the Institute of Automobile Engineers, Vol.XIV, 243-275 (1920)

[5] Biermann E. and Pinkel B., Heat Transfer from Finned Metal Cylinders in an Air Stream, NACA Report No. 488 (1935)

[6] Masao Yoshida, Soichi Ishihara, Yoshio Murakami, Kohei Nakashima and Masago Yamamoto, Air-Cooling Effects of Fins on Motorcycle Engine, JSME International Journal, Series B, 49(3), (2006)

[7] Zakhirhusen, Memon K., Sundararajan T., Lakshminarasimhan V., Babu Y.R. and Harne Vinay, Parametric study of finned heat transfer for Air Cooled Motorcycle Engine, SAE Paper, 2005-26-361, (2005)

[8] Zakirhusen, Memon K. and Sundararajan T., Indian Institute of Technology Madras, V. Lakshminarasimhan, Y.R. Babu and Vinay Harne, TVS Motor Company Limited, Simulation and Experimental Evaluation of Air Cooling for Motorcycle Engine, 2006-32-0099 / 20066599 (2006)

[9] Pathak Sunil, Turbo charging and oil techniques inlight motor vehicles, Res.J. Recent Sci, 1(1), 60-65 (2012)

[10] Dev Nikhil, Attri Rajesh, Mittal Vijay, Kumar Sandeep, Mohit, Satyapal, Kumar pardeep, Thermodynamic analysis of a combined heat and power system, Res.J. Recent Sci, 1(3), 76-79 (2012)

[11] G.Raju, et al. (2012). "Optimal Design of an I.C. Engine Cylinder Fin Arrays Using a Binary Coded Genetic Algorithms." International Journal of Modern Engineering Research (IJMER) 2(6): 4516-4520.

[12] U. Magarajan, et al. (2012). "Numerical Study on Heat Transfer of Internal Combustion Engine Cooling by Extended Fins Using CFD." International Science Congress Association 1(6): 32-37.

[13] A. Mishra, et al. (2012). "Heat Transfer Augmentation of Air Cooled Internal Combustion Engine Using Fins through Numerical Techniques." Research Journal of Engineering Sciences ISSN 2278:9472.

[14] J.A. Paul, et al. (2012). "Experimental and Parametric Study of Extended Fins in the Optimization of Internal Combustion Engine Cooling Using CFD." International Journal of Applied Research in Mechanical Engineering (IJARME) 2(1).

[15] G. Babu and M. Lavakumar (2013). "Heat Transfer Analysis and Optimization of Engine Cylinder Fins of Varying Geometry and Material." IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) 7(4): 24-29.

[16] S.S.Chandrakant, et al. (2013). "Numerical and Experimental Analysis of Heat Transfer through Various Types of Fin Profiles by Forced Convection." International Journal of Engineering Research & Technology (IJERT) 2(7).

[17] A.R. Kumar, et al. (2013). "Heat Transfer Analysis in the Cylinder Head of a Four-Stroke SI Engine." International Journal of Engineering Research & Technology (IJERT) 2(5).

[18] R.P. Patil and P. H. M. Dange (2013). "Experimental and Computational Fluid Dynamics Heat Transfer Analysis on Elliptical Fin by Forced Convection." International Journal of Engineering Research & Technology (IJERT) 2(8).

[19] N.P.R. Rao and T. V. Vardhan (2013). "Thermal Analysis of Engine Cylinder Fins By Varying Its Geometry and Material." International Journal of Engineering 2(8).

[20] S. Wange and R. Metkar (2013). "Computational Analysis of Inverted Notched Fin Arrays Dissipating Heat by Natural Convection." International Journal of Engineering and Innovative Technology (IJEIT) 2(11).

[21] V. GANESAN, (2008). I C Engines, McGraw-Hill Education (India) PVT Limited.

34-36
9.

Control of Load Frequency of Power System by PID Controller using PSO

Authors: Shiva Ram Krishna, Prashant Singh, M. S. Das

Abstract: The objective of this work is to controlling the load frequency control of generator of power system by using PID controller. Parameters of PID controller such as proportional gain, integral gain and derivative gain can be controlled by new evolutionary technique called particle swarm optimization. By proper tuning of PID controller parameters by PSO, reduce the area control error and to minimize the frequency deviation of single area system as well as two area systems. These works establish a simulink Model by using Matlab for single area control and two area control system. In this work used a global search optimization technique PSO to find out optimum tuning of PID controller parameters. Results obtained by this method shows that the result is improved and get steady state very frequently.

Keywords: Particle Swarm Optimization (PSO), Generation frequency control, PID controller, single area and two area control system, tuning of parameters.

References-

[1] Naimul Hasan, Ibraheem, Shuaib Farooq,” Real Time Simulation of Automatic Generation Control For Interconnected Power System”. International Journal on Electrical Engineering and Informatics ‐ Volume 4, Number 1, March 2012.

[2] HasanBevrani&TakashiHiyama,japan “Intelligent Automatic Generation Control”. Taylor & francis gp. publishing co. -2011.

[3] SandeepBhongade, H.O.Gupta,B.Tyagi.”Performance of SMES unit on Artificial Neural Network based multi area AGC scheme”. Journal of power electronics & power system.Vol-1.Issue no.4March-2011.

[4] Mohd.Hassan Ali “An overview of SMES application in energy & power system”, IEEE Transaction on Sustainable Energy. Vol. No.1, 2010.

[5] G.Shabib, Mesalam Abdel Gayed, And A.M. Rashwan.” Optimal Tuning of PID Controller for AVR System using Modified Particle Swarm Optimization”. 14th International Middle East Power Systems Conference (MEPCON’10), Cairo University, Egypt, December 19-21, 2010.

[6] S.P.Ghoshal, Pragnesh Bhatt & Ranjit Roy “Optimized AGC by SSSC & TCPS in coordination with SMES for two area Hydro power system”. International Conference on advances in computing, control & telecommunication technologies-pages-476.2009.

[7] H. Shayeghi , H.A. Shayanfar, A. Jalili. “LFC Design of a Deregulated Power System with TCPS Using PSO”. World Academy of Science, Engineering and Technology, pp. 671-680, 2009.

[8] Hassan W. Qazi, “Development of Sensitivity Based Indices for Optimal Placement of UPFC to Minimize Load Curtailment Requirements”, Master Thesis, Electrical Power System, Royal Institute of Technology-KTH, Stockholm, Sweden, Jun 2009.

[9] Shayeghi H. “A robust mixed H2/H∞ based LFC of a deregulated power system including SMES” Energy Conversion and Management. 49.pp: 2656–2668. 2008

 

 

37-43
10.

Design and Analysis of Microstrip High Pass Filter using Metamaterial

Authors: Rupam Shah, Dr. Awadhesh K.G. Kandu

 

44-47
11.

Review on Clustering Technique on Segmentation in Data Mining

Authors: Jyoti, Savita Bisnoi

Abstract: - Clustering techniques have obtained adequate results when are applied to text mining problems. However, different runs of the same clustering technique on a specific text set may result in different solutions. The cause of this difference is the choice of the initial cluster setting and the values of the parameters associated with the technique. A definition of good initial settings and optimal parameters values is not an easy task, particularly because both vary largely from one text set to another.

Keyword- Data Mining, Clustering, Classification, Apriori Algorithm, WEKA tool

References-

[1] Sadi Evren Seker, Cihan Mert, Khaled Al-Naami, Ugur Ayan, Nuri Ozalp, "Ensemble classification over stock market time series and economy news", Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on, pp. 272- 273..

[2] Johannes Grabmeier and Andreas Rudolph “Techniques of Cluster Algorithms in Data Mining” Received November 12, 1998; Revised May 23, 2001

[3] Ching-Tang Hsieh and Chia-Shing –u, “Humanoid Fingerprint Recognition Based on Fuzzy Neural Network”, International Conference on Circuit, Systems, Signal and Telecommunications, pp. 85-90, (2007).

[4] Liu Wei, “Fingerprint Classification using Singularities Detection”, International Journal of Mathematics and Computers in Simulation, issue 2, vol. 2, pp. 158-162, (2008).

[5] Eric P. Kukula, Christine R. Blomeke, Shimon K. Modi, and Tephen J. Elliott, “Effect of Human Interaction on Fingerprint Matching Performance, Image Quality, and Minutiae Count”, International Conference on Information Technology and Applications, pp. 771- 776, (2008).

[6] Luping Ji, Zhang Yi, “Fingerprint Orientation field Estimation using Ridge Protection”, The Journal of the Pattern Recognition, vol. 41, pp. 1491-1503, (2008).

[7] M. R. Girgisa, A. A. Sewisyb and R. F. Mansourc, “Employing Generic Algorithms for Precise Fingerprint Matching Based on Line Extraction”, Graphics, Vision and Image Procession Journal, vol. 7, pp. 51-59, (2007).

[8] G.Sambasiva Rao, C. NagaRaju, L. S. S. Reddy and E. V. Prasad, “A Novel Fingerprints Identification System Based on the Edge Detection”, International Journal of Computer Science and Network Security, vol. 8, pp. 394-397, (2008).

[9] Robert Hastings, “Ridge Enhancement in Fingerprint Images Using Oriented Diffusion”, IEEE Computer Society on Digital Image Computing Techniques and Applications, pp. 245-252, (2007).

[10] Jinwei Gu, Jie Zhou, and Chunyu Yang, “Fingerprint Recognition by Combining Global Structure and Local Cues”, IEEE Transactions on Image Processing, vol. 15, no. 7, pp. 1952 – 1964, (2006).

[11] V. Vijaya Kumari and N. Suriyanarayanan, “Performance Measure of Local Operators in Fingerprint Detection”, Academic Open Internet Journal, vol. 23, pp. 1-7, (2008).

[12] Raju Sonavane and B. S. Sawant, “Noisy Fingerprint Image Enhancement Technique for Image Analysis: A Structure Similarity Measure Approach”, Journal of Computer Science and Network Security, vol. 7 no. 9, pp. 225-230, (2007).

[13] Hartwing Fronthaler, Klaus kollreider, and Josef Bigun, “Local Features for Enhancement and Minutiae Extraction in Fingerprints”, IEEE Transactions on Image Processing, vol. 17, no, 3, pp. 354- 363, (2008)

[14] Bhupesh Gour, T. K. Bandopadhyaya and Sudhir Sharma, “Fingerprint Feature Extraction using Midpoint Ridge Contour Method and Neural Network”, International Journal of Computer Science and Network Security, vol. 8, no, 7, pp. 99-109, (2008)

[15] Mana Tarjoman, and Shaghayegh Zarei, “Automatic Fingerprint Classification using Graph Theory”, Proceedings of World Academy of Science, Engineering and Technology, vol. 30, pp. 831-835, (2008).

[16] Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu, “Fingerprint Verification System using Minutiae Extraction Technique”, Proceedings of World Academy of Science, Engineering and Technology vol. 36, pp. 497-502, (2008).

[17] Prabhakar, S, Jain, A.K, Jianguo Wang, Pankanti S, Bolle, “Minutia Verification and Classification for Fingerprint Matching”, International Conference on Pattern Recognition vol. 1, pp. 25-29, (2002)

48-50
12.

Evaluation of Enhanced SLM method for PAPR diminution in OFDM scheme

Authors: Mohammad Moin Ansari, Rajesh Parashar

 

51-55
13.

Effects of Various Reinforcements in Oblique Loading of Rectangular Thin Walled Structure using FEA

Authors: Abhishek Pratap Singh, Rahul Mishra

Abstract— This paper investigates the oblique loading of rectangular hollow box using reinforcements to absorb crash energy. The rectangular hollow rectangular box is a thin walled structure commonly used as crash box in automobiles today. It is loaded from one end with help of rigid mass impactor and other side is fixed. The performance of box in oblique loading is compared with axial loading so that we can estimate the difference in energy absorption, force displacement, stiffness variation, acceleration, specific energy absorption & crush force efficiency characteristics. This calculation is done using FEA Explicit code Pam-Crash which is suitable for dynamic analysis.

Keywords— Frontal crash, Oblique loading, Crushing mechanism, Crashworthiness, Impact Energy absorption, Thin walled structures.

References-

[1] Jones, N. (2003). Several phenomena in structural impact and structural crashworthiness. European Journal of MechanicsA/Solids, 22(5), 693-707.

[2] Jones, N., & Wierzbicki, T. (Eds.). (2010). Structural Crashworthiness and Failure: Proceedings of the Third International Symposium on Structural Crashworthiness held at the University of Liverpool, England,14-16 April 1993. CRC Press.

[3] Song, J. (2013). Numerical simulation on windowed tubes subjected to oblique impact loading and a new method for the design of obliquely loaded tubes. International Journal of Impact Engineering, 54, 192-205.

[4] Gao, G., Dong, H., & Tian, H. (2014). Collision performance of square tubes with diaphragms. Thin-Walled Structures, 80, 167-177.

[5] Peixinho, N., Soares, D., Vilarinho, C., Pereira, P., & Dimas, D. (2012).Experimental study of impact energy absorption in aluminium square tubes with thermal triggers. Materials Research, 15(2), 323-332.

[6] Tarlochan, F., Samer, F., Hamouda, A. M. S., Ramesh, S., & Khalid, K. (2013). Design of thin wall structures for energy absorption applications: Enhancement of crashworthiness due to axial and oblique impact forces. Thin-Walled Structures, 71, 7-17.

[7] Abdewi, E. F., Sulaiman, S., Hamouda, A. M. S., & Mahdi, E. (2008).Quasi-static axial and lateral crushing of radial corrugated composite tubes. Thin-Walled Structures, 46(3), 320-332.

[8] Ibrahim, H. K. (2009). Design optimization of vehicle structures for crashworthiness improvement (Doctoral dissertation, Concordia University).

[9] Langseth, M, Hopperstad, 0.S. & Berstad, T, Crashworthiness of aluminuium extrusions: validation of numerical simulation, effect of mass ratio and impact velocity, International Journal of Impact Engineering,22,829-854, 1999

[10] Opheim, B.S, Bending of Thin-Walled Aluminium Extrusions, Doctoral thesis, Department of Structural Engineering, Norwegian University of Science and Technology, Trondheim, 1996

56-62