IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of Computational EngineeringResearch

(IJCER)

Volume 4, Issue 7, July, 2014

      
 
Version I
S.No. Article Title Page No. Paper Index PDF
1.

Design, Development and analysis of electrically operated toggle jack using power of car battery

Gaurav Shashikant Udgirkar, Manoj Shantinath Patil, Rajesh Vijay Patil, Nilesh Ramchandra Chavan, Prof. Mangesh Panchbhai

Abstract

Side road emergency like tire puncher, is a problem commonly observed in cars. Conventional car jacks uses mechanical advantage to allow a human to lift a vehicle by manual force. This paper analyzes the modification of the current toggle jack by incorporating an electric DC motor in the screw in order to make load lifting easier for emergency use with using power of car batter (12 Volts). Gear ratio is used to increase the lifting power. The significance and purpose of this work is to modify the existing car jack in order to make the operation easier, safer and more reliable in order to save individual internal energy and reduce health risks especially back ache problems associated with doing work in a bent or squatting position for a long period of time. The car jack is developed using CATIA V5R19 and analyzed using Finite Element Analysis to check safety factor and force acting. Fabrication work has been done using with milling, drilling, grinding, and welding machine. The developed car jack is tested on car. Implementation of design will solve problem associated with ergonomics

Keywords:Car battery, CATIA, D.C motor, ergonomics, gear ratio, jack, screw
01-11  
03.3005/0470101011
PDF
2.

Microcontroller Based Active and Reactive Power Measurement

Kareem A. Hamad

Abstract

The work presented in this paper introduces a simple method for the measurement of active and reactive power digitally using microcontroller. Three signal values are generated, the first is proportional to the peak value (Vm) of the line voltage v(t), the second and third signals are proportional to the instantaneous values of the line current i(t) at the instants of v(t)=0 and v(t)=Vm, i.e. Imsinø and Imcosø respectively, where Im is the peak value of the line current and ø is the phase angle. These signals are inserted in to PIC16F877A by means of analog circuit. The active and reactive power are calculated by the algorithm written on the PIC16F877A. The calculated values by multiplications and digitization will provide a realizable and displayable form on LCD screen.

Keywords:Microcontroller, Active and Reactive Power, Microcontroller, Measurements
12-18  
03.3005/04701012018
PDF
3.

Enhanced Bug Detection by Data Mining Techniques

Promila Devi, Rajiv Ranjan

Abstract

Data mining is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cut costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. Data Mining in Java is a big challenging problem nowadays, When an application opens which consist of large data in database it takes so much time to load and get that data however it may contain large number of bugs. So the problem with " Big Data Mining " is still a issue. We have to rectify this issue with effective approach with decision tree classifier in which we need clustering of data with k-means error and bug search of that particular source code of application. We will enhance the search on Bug Detection the K-means clustering algorithm with the help of multi-threading Decision Tree. In this work of research the problem with classification of bugs is been identified

Keywords:Data Mining, Clustering Analysis, Partitioning, Clustering, K-means, decision tree.
19-27  
03.3005/04701019027
PDF
4.

Matlab Modeling and Simulation of Grid Connected Wind Power Generation Using Doubly Fed Induction Generator

Indrajit Koley, Swarnankur Ghosh, Avishek Ghose Roy, Dr.Pradip Kumar Saha, Dr.Gautam Kr. Panda

Abstract

In recent years, renewable energy has become one of the most important and promising sources of energy generation, which demands additional transmission capacity and better means of maintaining system reliability. The evolution of technology related to wind systems industry leaded to the development of a generation of variable speed wind turbines that present many advantages compared to the fixed speed wind turbines. These wind energy conversion systems are connected to the grid through Voltage Source Converters (VSC) to make variable speed operation possible. The studied system here is a variable speed wind generation system based on Doubly Fed Induction Generator (DFIG). The rotor side converter (RSC) usually provides active and reactive power control of the machine while the grid-side converter (GSC) keeps the voltage of the DC-link constant. The additional freedom of reactive power generation by the GSC is usually not used due to the fact that it is more preferable to do so using the RSC. This report deals with the introduction of Doubly fed induction generator, AC/DC/AC converter control and finally the SIMULINK/MATLAB simulation for isolated Induction generator as well as for grid connected Doubly Fed Induction Generator and corresponding results and waveforms are displayed.

Keywords:DFIG, rotor side converter, grid side converter, converter control diagram, simulink diagram, wind turbine modeling, wind energy
28-34  
03.3005/03701028034
PDF
5.

Limit Analysis Discussion of Design Methods for Fracture of
Timber Dowel Joints Loaded Perpendicular to Grain

T. A. C. M. Van Der Put

Abstract

The results of an investigation of splitting of joints of [1] are used for a discussion of design methods and as necessary answer give a precise description of fracture behavior for a real calculable reliability in all circumstances. It further is shown that applied cohesive zone models, J-integral, and finite element solutions, are questionable and always need to be explained and controlled by theory. Important is, that these empirical fitting procedures are not able to fit to any relation, as follows from exclusion by the "lack of fit" test. Contrarily, limit analysis theory shows a precise fit (with a coefficient of variation of 10%) to the theory equation and delivers a conclusive confirmation of criticized design rules of Eurocode 5.

Keywords:wood, limit analysis, fracture mechanics, cohesive zone model, J-integral, finite element method, splitting of timber pin-dowel connections.
35-45  
03.3005/04701035045
PDF
6.

Information Reliability Into The Automated System of Managing

Katerina Anevska, Risto Malčeski

Abstract

One of the basic problems into the automated system of managing (ASM) is providing the data reliability. In this paper we will give a model for calculating the data reliability into the ASM and also a model for calculating the complexity of the outputs. The specific roles in ASM have the control feedback connections (CFC-s). If we eliminate them from the oriented data flow graph we get the basic data flow graph, and using CFC-s we construct so called CFC graph.

Keywords:data, data flow graph, basic graph, simple graph, control feedback connections graph, data reliability
46-50  
03.3005/04701046050
PDF
7.

VLSI Implementation of Enhanced AES Cryptography

Lakavath Srinivas, Zuber M. Patel, B Chandra Sekhar Naik

Abstract

Advanced Encryption Standard (AES) is a Federal Information Processing Standard (FIPS) and categorized as Computer Security Standard. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192 and 256 bits. The Rijndael cipher has been selected as the official Advanced Encryption Standard (AES) and it is well suited for hardware. The objective of this paper was to present the hardware implementation of Advanced Encryption Standard (AES) algorithm. This paper proposes an efficient solution to combine Rijndael encryption and decryption in one FPGA design, with a strong focus on low area constraints and high throughput. This Rijndael implementation runs its symmetric cipher algorithm using a key size of 128 bits, mode called AES128. We have worked with the pipelining structure and modifications such as merging of Subbytes and Shift Rows, and optimization of each clock cycle to incorporate maximum number of operations etc. have been successfully implemented. The encryption and decryption process of Rijndael algorithm was captured in VHDL language and corresponding FPGA implementation resulted in reduced number of slices (6901) and achieved a data throughput of 38.346 Gbps which is implemented on Xilinx 14.2 Virtex5

Keywords:AES, Cipher text, Cryptography, FIPS, FPGA, Plaintext, pipelining.
51-58  
03.3005/04701051058
PDF
8.

Exact Derivation of the Geometric Correction Factor of the
Center Notched Test Specimen, Based On Small Cracks Merging
As Explanation of Softening

T. A. C. M. van der Put

Abstract

The exact derivation of the mode I geometric correction factor is given, based on the small crack merging mechanism to show that this always is the real fracture mechanism in wood. This mechanism dominates at late softening and explains fully the apparent decrease of the energy release rate of macrocrack extension as already known for mode I and is derived for mode II. The related exact theory, based on limit analysis, is discussed.

Keywords:wood, fracture mechanics, fracture kinetics, geometric correction factor of the mode I center notched test specimen, mode I and II softening behavior, mixed mode fracture criterion, oblique crack extension, small crack merging mechanism, deformation kinetics
59-71  
03.3005/04701059071
PDF
9.

Heat Transfer Analysis of Gas Turbine Blade Through Cooling Holes

K Hari Brahmaiah , M.Lava Kumar

Abstract

In advanced gas turbines, the turbine blade operated temperature is for above the melting point of blade material. A sophisticated cooling scheme must be developed for continuous safe operation of gas turbines with high performance. Several methods have been suggested for the cooling of blades and one such technique is to have radial holes to pass high velocity cooling air along the blade span. In the present work to examine the heat transfer analysis of gas turbine with four different models consisting of blade with without holes and blades with varying number of holes (5, 9&13) were analysed The analysis is carried out using commercial CFD software FLUENT (a turbulence realizable k-є model with enhanced wall treatment) has been used. On evaluating the graphs drawn for total heat transfer rate and temperature distribution, the blade with 13 holes is considered as optimum. Steady state thermal and structural analysis is carried out using ANSYS software with different blade materials of Chromium steel and Inconel718. While comparing these materials Inconel718 is better thermal properties and induced stresses are lesser than the Chromium steel.

Keywords:Radial holes, realizable k-є model, enhanced wall treatment, Heat transfer rate
72-79  
03.3005/04701072079
PDF
10.

Enhanced Wireless Security System With Digital code lock using RF &GSM Technology

E.Supraja,K.V.Goutham,N.Subramanyam,A.Dasthagiraiah,Dr.H.K.P.Prasad,

Abstract

Security is primary concern in our day-to-day life. Everyone wants to be as much as secure as possible. An access control system forms a vital link in a security chain. This access control system allows only authorized persons to access a restricted area .this system is best suitable for corporate offices ,ATMs and home security. This project is aimed to design a digital code lock system with a status display by using wireless communications RF technology and GSM technology. The wireless communications is established by using RF modules and a digital keypad interfaced to the controller. The authentication is provided through password for locking or unlocking the system and the status will be displayed using LCD module and the acknowledgement is provided to the user by GSM technology

Keywords:GSM,LCD,RF
80-85  
03.3005/04701080085
PDF
Version II
S.No. Article Title Page No. Paper Index PDF
1.

Wimax Broad Band Connectivity Role In Case Of Transforming India in To Digital India

Mrs. Kalpana Chaudhari, Dr.Mr. P.T. Karule

Abstract

Government of India and public sector organizations around the country are facing to reform their public administration organizations and deliver more efficient , transparent and cost effective services, as well as better information and knowledge to their stakeholders using BSNL WiMAX broad band connectivity . E-governance is the effective use of Information and communication Technology (ICT) to improve the system of governance that is in place, and thus provide better services to the Citizens. E-Governance (EG) is considered as a high priority agenda in India, as it is taken into the consideration that each citizen should utilize the E services in number of sectors to transform India in to digital India In this paper we discuss about the WiMAX technology, media for rural development, present scenario in case of E.Governance in India. Problem in case of delivery of different E services to remote rural India and conclude with comment to transform India into digital India.

Keywords:digital India, E Governance, ICT, mobile communication, WiMAX, Wireless broad band connectivity, wireless communication
01-07  03.3005/047020107PDF
2.

Existing Routing Protocols for Wireless Sensor Network – A study

Parvathi C, Dr. Suresha

Abstract

Wide usage of wireless sensor network (WSN) is the reason for development of many routing protocols. Recent advances in WSN observe the increased interest in the potential use in applications like Military, Environmental, Health, Vehicular, Mechanical stress levels on attached objects, disaster management etc. Wireless sensor networks are callously restricted by storage capacity, energy and computing power. So it is essential to design an energy efficient aware protocol in order to augment the network lifetime. WSN also has the influencing features to perform remote communication, it is also shrouded with various loopholes in its precise operation, where majority of the communication issues are raised from deployment of existing standards of routing protocols and algorithm. Sensors are expected to be remotely deployed in unnoticed environments. Routing as one key technologies of wireless sensor network has now become very important research work because the applications of WSN is everywhere, it is impractical that there is a routing protocol suitable for all applications. In this paper, a review on routing protocol in WSNs is carried out which are classified as data-centric, hierarchical and location based depending on the network structure. Then some of the multipath routing protocols which are widely used in WSNs like Multipath Multispeed Protocol (MMSPEED), Braided Multipath Routing Protocol, Energy-Aware Routing to improve network performance are also discussed. Massive research work has already been carried out in past to introduce some of the effective routing protocols to enable robust communication system in WSN. Advantages and disadvantages of each routing algorithm are discussed thereafter. This paper also discusses the critical open issues that are yet to be solved. This paper compares and summarizes the performances of routing protocols

Keywords:Algorithms in WSN, Energy Effficiency, Hierarchical, Performance, Remote deployment, Routing Protocol, Wireless Sensor Network.
08-27  
03.3005/0470208027
PDF
3.

Experimental investigation on the various factors which influences the fatigue-life of brass materials

Rajiv Ranjan, Prof. Jitendra Nath Mahto, Prof. Subrato kumar soren

Abstract

Brass alloy is widely used because of some attractive properties such as high electrical and thermal conductivity. But its fatigue performance is not very well explored in literature. Thus, in the present work, particular emphasis was given to the fatigue behavior of brass of composition 70%-CU and 30%-ZN has been investigated with the aim of studying the factors such as annealing, corrosion and surface roughness which influence the fatigue-life of brass materials. The endurance limit of the specimens have been determined by testing under different loads on the fatigue testing machine and the life cycles of each specimens has been taken after failure of the specimen. Endurance limit is defined as the alternating stress that causes failures after some specified number of cycles. This study or investigation with the aim of studying the factors such as corrosion, annealing and surface roughness which influence the fatigue-life of brass materials has been investigated. Annealing was done by heating the specimens at temperature of 480 0C for 1 hours and then allowing the specimens to cool in the control atmosphere for 3 days. Fatigue test for annealed specimens was done and change in the fatigue endurance investigated. The specimens of groove 1 mm was prepared and the endurance limit of the specimens have been determined by testing under different loads on the fatigue testing machine and the life cycles of each specimens has been taken after fracture occurs on the specimen. Corrosion attack was obtained by immersion of specimens in an salt water for 14 days in order to investigate the effect of corrosion on the fatigue-life of the material. The corrosion agent was a solution of NaCl with a PH close to 6.5-6.8 and solution concentration of 38%.Fatigue test at a revolution of 2800 R.P.M at room temperature and without environment humidity control was carried out on the pre-corroded and non-corroded specimens in order to investigate the corrosion effect on the fatigue endurance Finally, conclusion is listed concerning change in fatigue-life behavior due to annealing, groove and corrosion attacks of surface of the brass materials.

28-39  
03.3005/04702028039
PDF
4.

The effect of Hall current on an unsteady MHD free convective Couette flow between two permeable plates in the presence of thermal radiation

S Harisingh Naik , M V Ramana Murthy, K. Rama Rao

Abstract

An investigation on the non – linear problem of the effect of Hall current on the unsteady magneto hydrodynamic free convective Couette flow of incompressible, electrically conducting fluid between two permeable plates is carried out, when a uniform magnetic field is applied transverse to the plate, while the thermal radiation, viscous and Joule's dissipations are taken into account. The fluid is considered to be a gray, absorbing – emitting but non – scattering medium and the Rosseland approximation is used to describe the radiative heat flux in the energy equation. The dimensionless governing coupled, non – linear boundary layer partial differential equations are solved by an efficient, accurate, and extensively validated and unconditionally stable finite difference scheme of the Crank – Nicolson method. The effects of thermal radiation and Hall current on primary and secondary velocity, skin friction and rate of heat transfer are analyzed in detail for heating and cooling of the plate by convection currents. Physical interpretations and justifications are rendered for various results obtained

Keywords:Hall current, free convection, MHD, Couette flow, Thermal radiation, Finite difference method.
40-55  
03.3005/04702040055
PDF
5.

Liquor Detection through Automatic Motor Locking System: In Built (LDAMLS)

Phani Sridhar.A, Samuel Susan.V, G. Kalyan Chakravathi, Ravi Teja.G

Abstract

Now a days it has been an accepted fact that major part of the accidents are due to the uneven interruptions, inappropriate driving by the drivers. It's a very undesirable situation which is true. So a system has been proposed to automatically lock the motor of the vehicle with the use of AT89C51, if any alcoholic person tries to drive the car/bus/any other. Also the potential of device will depend on the availability of the functional components as well as the capacity of the motor used. This could be implemented by comparing various factors along with the consumption of energy sources.

Keywords:AT89C51, Energy sources, Interrupt latency, Interrupt, SFR, MQ3.
56-61  
03.3005/04702056061
PDF
6.

Radiation and Soret Effects to MHD Flow in Vertical Surface with Chemical reaction and Heat generation through a Porous Medium

Srinathuni Lavanya,D Chenna Kesavaiah

Abstract

The present paper is the effects of radiation, chemical reactions and thermo Diffusion (Soret effect) to MHD flow of an electrically conducting, incompressible, viscous fluid past an impulsively moving isothermal vertical plate through porous medium in the presence of uniform suction. Thermo diffusion is one of the mechanisms in transport phenomena in which molecules are transported in a multi component mixture driven by temperature gradients. A flow of this type represents a new class of boundary layer flow at a surface of finite length. The equations governing the flow field are solved by analytical method. The velocity, temperature, concentration and skin friction have been evaluated for variation in the different governing parameters.

Keywords:Chemical reaction, Heat generation/absorption, Radiation, Soret number, MHD, Porous medium, Radiation
62-73  
03.3005/04702062073
PDF
7.

Oil Spill Trajectory Simulations Offshore Nigeria

Badejo O.T., Folarin, Y.E., Anwanane, E.E.

Abstract

The Niger Delta region has witnessed the continuous destruction of its environment due to oil and gas exploration, exploitation, corrosion of oil pipes and tanks, sabotage, port operations and inadequate care in oil production operations and engineering drills. The transport and fate of spilled oil in water bodies are governed by physical, chemical, and biological processes that depend on oil properties, hydrodynamics, meteorological and environmental conditions. These processes also include advection, surface spreading, evaporation, dissolution, emulsification, hydrolysis, photo-oxidation, biodegradation and particulation. As an oil spill management strategy, OIL SPILL MAPtrajectory model was used in this study to carry out simulations for six Floating Production Storage Offshore (FPSO) facilities offshore Nigeria for rainy and dry seasons. The results of the simulations for wet and dry seasons show that oil spill moves slower in deep sea and faster between the distances of 10km to 20km from the shoreline. The reason for this is that in the deep sea, there is minimal tidal effect while the tidal effect is more prevalent in the 10km to 20km region. Also, the net effect of the longshore current and tides increased the speed of the oil spill near the shoreline.This study reveals that in case of any major oil spill from any of the six FPSOs, the probability that the oil spill will get to the shore is very high. It therefore becomes highly imperative that more care should be taken in oil spill exploration and exploitation activities to prevent oil spill incidents.Existing laws and policies regulating oil exploration and exploitation activities should be strengthened and enforced to ensure strict compliance by the oil and gas companies in Nigeria so as to reduce oil spill incidents in the country.

Keywords:Niger Delta, Oil, Exploration, Exploitation, Floating Production Storage 0ffshore, Oil Spill Incidents, Trajectory Simulations.
74-87  
03.3005/04702074087
PDF
8.

A Numerical Study and Performance of a Sirocco Fan Using Contra-Rotating Rotors

V.Ragavendra Vamsi Krishna, M.Lava Kumar

Abstract

A sirocco fan is a centrifugal fan with a forward curved blade. It is used for low pressure but has a large discharge use. The outlet port of this fan may have a rectangular shape. Indeed, a forward-curved vane can give large momentum to the fluid, but it cannot make for better efficiency. A sirocco fan using contra-rotating rotors in which an inner rotor is settled inside the sirocco fan rotor and each rotor rotates in an opposite direction was proposed for the purpose of getting the higher pressure and making the structure of a sirocco fan more compact. In this thesis, analysis is carried out with two models of sirocco and sirocco fan with contra rotating rotors by varying number of blades (50, 45&40) are analysed. CFD analysis is done on all the models of sirocco fan and sirocco fan with contra rotating rotors running at speeds of 800rpm and 2000rpm. Steady state Structural analysis carried out with two models to verify the strength of the Blades.

Keywords:Sirocco fan, forward curved vane, Contra-Rotating rotors, Strength
88-94  
03.3005/04702088094
PDF
9.

Artifact Removal from the Radial Bioimpedance Signal using Adaptive Wavelet Packet Transform

Pranali C. Choudhari, Dr. M. S. Panse

Abstract

Impedance cardiography has become a synonym for indirect assessment of monitoring the stroke volume, cardiac output and other hemodynamic parameters by monitoring the blood volume changes of the body in terms of changes in the electrical impedance of a body segment. Changes occurring in the impedance of the body due to various physiological processes are captured in terms of the voltage variation. But this method is affected by electrical noise such as power line hum and motion and respiratory artifacts due to movement of the subject while acquiring the bioimpedance signal. This can cause errors in the automatic extraction of the characteristic points for estimation the hemodynamic parameters. This paper presents an adaptive algorithm for baseline wander removal from the bioimpedance waveform, obtained at the radial pulse of the left hand, using the wavelet packet transform. The algorithm computes the energy in scale of the wavelet coefficients. The energies in the successive scales are compared and the branch of wavelet binary tree with the higher energy is selected. The impedance signals have been acquired by using the peripheral pulse analyzer and excellent results are obtained.

Keywords:Artifact, Baseline wander, Bioimpedance, Energy, Impedance cardiography, Radial, Wavelet packet transform
95-101  
03.3005/047020950101
PDF
10.

Reducing of Roads Congestion Using Demand Management Techniques

Yazan Issa

Abstract

Normally, people associate congestion with heavy traffic volumes, but it is not limited exclusively to roadways, other examples of congestion as overcrowded buses, trains, and commuter parking lots. Movement of people and goods are adversely impacts by traffic congestion. More delay in travel to motor vehicles and traffic operates less efficiently (motorist dissatisfaction), wasting fuel and increased levels of air pollution. The main objectives of this research are to identify the possible congestion management techniques that are used around the world, and the softwares available to evaluate such techniques. The applicability and effectiveness of some of these techniques are then tested on available national and international data by comparing measures of effectiveness (capacity, LOS, delay, and speed) before and after applying these management measures. It was found that some congestion management measures can be applied urban arterials, while others could not be applied easily. Also it was found that some softwares are more applicable than others when dealing with congestion aspects. Efficiency enhancement appeared in the road that congestion management techniques applied on.

Keywords:Congestion, demand, supply, Traffic Safety, management techniques.
102-111  
03.3005/0470201020111
PDF
11.

Technique Planned For Collecting Mobile Data in Wsn

Prof.Ramya S. Pure, BalvinderkaurNawab

Abstract

The Mobile Data gathering technique used for Wireless Sensor Network on large networks called Mobile Data Collector or M-Collector which uses battery power and a transceiver. This M-Collector brings mobility into the network for the data collection mechanism by roaming in the network for collecting data from the nodes like a mobile base station. The M-Collector polls the data periodically from the nodes and from each sensor using the Single Hop mechanism and eventually transfer the data collected from the sensor and the nodes to the Static Sink. Here mainly focus on the problem of minimizing the length of each data gathering traversing area which refer to as a Single Hop data gathering problem. To minimize this problem proposed an algorithm to utilize the M-Collector data collecting path to the fullest and also for certain applications where restricted distance and time constraint can setup multiple M-collector by using algorithm designed according to collect data and handle the multiple M-Collector. This scheme can improve scalability and balance the energy consumption between the sensors. This scheme can improve and increase the network lifetime as compared to the static data collection sinks.

Keywords:M-Collector, static sink, data collection, Single Hop.
112-114  
03.3005/0470201120114
PDF