IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational EngineeringResearch

(IJCER)

Volume 4, Issue 7, July, 2014

      
 
Version I
S.No. Article Title Page No. Paper Index PDF
1.

Design, Development and analysis of electrically operated toggle jack using power of car battery

Gaurav Shashikant Udgirkar, Manoj Shantinath Patil, Rajesh Vijay Patil, Nilesh Ramchandra Chavan, Prof. Mangesh Panchbhai

Abstract

Side road emergency like tire puncher, is a problem commonly observed in cars. Conventional car jacks uses mechanical advantage to allow a human to lift a vehicle by manual force. This paper analyzes the modification of the current toggle jack by incorporating an electric DC motor in the screw in order to make load lifting easier for emergency use with using power of car batter (12 Volts). Gear ratio is used to increase the lifting power. The significance and purpose of this work is to modify the existing car jack in order to make the operation easier, safer and more reliable in order to save individual internal energy and reduce health risks especially back ache problems associated with doing work in a bent or squatting position for a long period of time. The car jack is developed using CATIA V5R19 and analyzed using Finite Element Analysis to check safety factor and force acting. Fabrication work has been done using with milling, drilling, grinding, and welding machine. The developed car jack is tested on car. Implementation of design will solve problem associated with ergonomics

Keywords:Car battery, CATIA, D.C motor, ergonomics, gear ratio, jack, screw
01-11  
03.3005/0470101011
PDF
2.

Microcontroller Based Active and Reactive Power Measurement

Kareem A. Hamad

Abstract

The work presented in this paper introduces a simple method for the measurement of active and reactive power digitally using microcontroller. Three signal values are generated, the first is proportional to the peak value (Vm) of the line voltage v(t), the second and third signals are proportional to the instantaneous values of the line current i(t) at the instants of v(t)=0 and v(t)=Vm, i.e. Imsinø and Imcosø respectively, where Im is the peak value of the line current and ø is the phase angle. These signals are inserted in to PIC16F877A by means of analog circuit. The active and reactive power are calculated by the algorithm written on the PIC16F877A. The calculated values by multiplications and digitization will provide a realizable and displayable form on LCD screen.

Keywords:Microcontroller, Active and Reactive Power, Microcontroller, Measurements
12-18  
03.3005/04701012018
PDF
3.

Enhanced Bug Detection by Data Mining Techniques

Promila Devi, Rajiv Ranjan

Abstract

Data mining is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cut costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. Data Mining in Java is a big challenging problem nowadays, When an application opens which consist of large data in database it takes so much time to load and get that data however it may contain large number of bugs. So the problem with " Big Data Mining " is still a issue. We have to rectify this issue with effective approach with decision tree classifier in which we need clustering of data with k-means error and bug search of that particular source code of application. We will enhance the search on Bug Detection the K-means clustering algorithm with the help of multi-threading Decision Tree. In this work of research the problem with classification of bugs is been identified

Keywords:Data Mining, Clustering Analysis, Partitioning, Clustering, K-means, decision tree.
19-27  
03.3005/04701019027
PDF
4.

Matlab Modeling and Simulation of Grid Connected Wind Power Generation Using Doubly Fed Induction Generator

Indrajit Koley|| Swarnankur Ghosh|| Avishek Ghose Roy|| Dr.Pradip Kumar Saha|| Dr.Gautam Kr. Panda

Abstract

In recent years, renewable energy has become one of the most important and promising sources of energy generation, which demands additional transmission capacity and better means of maintaining system reliability. The evolution of technology related to wind systems industry leaded to the development of a generation of variable speed wind turbines that present many advantages compared to the fixed speed wind turbines. These wind energy conversion systems are connected to the grid through Voltage Source Converters (VSC) to make variable speed operation possible. The studied system here is a variable speed wind generation system based on Doubly Fed Induction Generator (DFIG). The rotor side converter (RSC) usually provides active and reactive power control of the machine while the grid-side converter (GSC) keeps the voltage of the DC-link constant. The additional freedom of reactive power generation by the GSC is usually not used due to the fact that it is more preferable to do so using the RSC. This report deals with the introduction of Doubly fed induction generator, AC/DC/AC converter control and finally the SIMULINK/MATLAB simulation for isolated Induction generator as well as for grid connected Doubly Fed Induction Generator and corresponding results and waveforms are displayed.

Keywords:DFIG, rotor side converter, grid side converter, converter control diagram, simulink diagram, wind turbine modeling, wind energy
28-34  
03.3005/03701028034
PDF
5.

Limit Analysis Discussion of Design Methods for Fracture of
Timber Dowel Joints Loaded Perpendicular to Grain

T. A. C. M. Van Der Put

Abstract

The results of an investigation of splitting of joints of [1] are used for a discussion of design methods and as necessary answer give a precise description of fracture behavior for a real calculable reliability in all circumstances. It further is shown that applied cohesive zone models, J-integral, and finite element solutions, are questionable and always need to be explained and controlled by theory. Important is, that these empirical fitting procedures are not able to fit to any relation, as follows from exclusion by the "lack of fit" test. Contrarily, limit analysis theory shows a precise fit (with a coefficient of variation of 10%) to the theory equation and delivers a conclusive confirmation of criticized design rules of Eurocode 5.

Keywords:wood, limit analysis, fracture mechanics, cohesive zone model, J-integral, finite element method, splitting of timber pin-dowel connections.
35-45  
03.3005/04701035045
PDF
6.

Information Reliability Into The Automated System of Managing

Katerina Anevska, Risto Malčeski

Abstract

One of the basic problems into the automated system of managing (ASM) is providing the data reliability. In this paper we will give a model for calculating the data reliability into the ASM and also a model for calculating the complexity of the outputs. The specific roles in ASM have the control feedback connections (CFC-s). If we eliminate them from the oriented data flow graph we get the basic data flow graph, and using CFC-s we construct so called CFC graph.

Keywords:data, data flow graph, basic graph, simple graph, control feedback connections graph, data reliability
46-50  
03.3005/04701046050
PDF
7.

VLSI Implementation of Enhanced AES Cryptography

Lakavath Srinivas, Zuber M. Patel, B Chandra Sekhar Naik

Abstract

Advanced Encryption Standard (AES) is a Federal Information Processing Standard (FIPS) and categorized as Computer Security Standard. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192 and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) and it is well suited for hardware. The objective of this paper was to present the hardware implementation of Advanced Encryption Standard (AES) algorithm. This paper proposes an efficient solution to combine Rijndael encryption and decryption in one FPGA design, with a strong focus on low area constraints and high throughput. This Rijndael implementation runs its symmetric cipher algorithm using a key size of 128 bits, mode called AES128. We have worked with the pipelining structure and modifications such as merging of Subbytes and Shift Rows, and optimization of each clock cycle to incorporate maximum number of operations etc. have been successfully implemented. The encryption and decryption process of Rijndael algorithm was captured in VHDL language and corresponding FPGA implementation resulted in reduced number of slices (6901) and achieved a data throughput of 38.346 Gbps which is implemented on Xilinx 14.2 Virtex5

Keywords:AES, Cipher text, Cryptography, FIPS, FPGA, Plaintext, pipelining.
51-58  
03.3005/04701051058
PDF
8.

Exact Derivation of the Geometric Correction Factor of the
Center Notched Test Specimen, Based On Small Cracks Merging
As Explanation of Softening

T. A. C. M. van der Put

Abstract

The exact derivation of the mode I geometric correction factor is given, based on the small crack merging mechanism to show that this always is the real fracture mechanism in wood. This mechanism dominates at late softening and explains fully the apparent decrease of the energy release rate of macrocrack extension as already known for mode I and is derived for mode II. The related exact theory, based on limit analysis, is discussed.

Keywords:wood, fracture mechanics, fracture kinetics, geometric correction factor of the mode I center notched test specimen, mode I and II softening behavior, mixed mode fracture criterion, oblique crack extension, small crack merging mechanism, deformation kinetics
59-71  
03.3005/04701059071
PDF
9.

Heat Transfer Analysis of Gas Turbine Blade Through Cooling Holes

K Hari Brahmaiah , M.Lava Kumar

Abstract

In advanced gas turbines, the turbine blade operated temperature is for above the melting point of blade material. A sophisticated cooling scheme must be developed for continuous safe operation of gas turbines with high performance. Several methods have been suggested for the cooling of blades and one such technique is to have radial holes to pass high velocity cooling air along the blade span. In the present work to examine the heat transfer analysis of gas turbine with four different models consisting of blade with without holes and blades with varying number of holes (5, 9&13) were analysed The analysis is carried out using commercial CFD software FLUENT (a turbulence realizable k-є model with enhanced wall treatment) has been used. On evaluating the graphs drawn for total heat transfer rate and temperature distribution, the blade with 13 holes is considered as optimum. Steady state thermal and structural analysis is carried out using ANSYS software with different blade materials of Chromium steel and Inconel718. While comparing these materials Inconel718 is better thermal properties and induced stresses are lesser than the Chromium steel.

Keywords:Radial holes, realizable k-є model, enhanced wall treatment, Heat transfer rate
72-79  
03.3005/04701072079
PDF
Further papers are under