Skip to content
alpha
  • facebook
  • twitter
  • google plus
  • linkedin
  • Home
  • Journal Description
  • Archives
  • Editorial Board
  • Subscription
  • Guidelines
    • Author Guidelines
    • Publication Ethics
  • Indexed
  • Submission
    • Online Submission
    • Submission Guidelines
  • Contact
JGE

Journal of Green Engineering

ISSN: 1904-4720 (Print)
ISSN: 2245-4586 (Online)
Publication Frequency: 12 issues per year

Volume:10 Issue:9

Non-Conventional Magnetic Abrasive Flow Machining Process on Sustainable and Hybrid Metal Matrix Composite
1Vijay Singh, 2Dr. Harish Kumar,3Dr. Sushil Mittal
1Research Scholar, Department of Mechanical Engineering, Chandigarh University, Gharuan, Punjab
2Professor, Department of Mechanical Engineering, Chandigarh University, Gharuan, Punjab
3 Associate Professor, Department of Mechanical Engineering, Chandigarh University, Gharuan, Punjab
Pages: 6477–6489
Abstract: [+]
Magnetic abrasive flow machining (MAFM) is the advanced method to machine Hybrid Metal Matrix composites (HMMC) which has the typical hollow work piece geometry. Composite materials are being utilized by most of the manufacturing industries which give better mechanical properties than other materials. Metal matrix composites (MMCs) have been investigated by many researchers for their experimental work and special characteristics have been established by them. Magnetic abrasive flow machining (MAFM) is improvement in Abrasive Flow Machining (AFM) which improves surface finish and material is removed by applying a magnetic field to the workpiece. A semisolid visco-elastic/visco-plastic abrasive-laden medium is flown through the surface to be finished. This paper provides a review of the MAFM process.
Keywords:  Magnetic Abrasive Flow Machining (MAFM), Hybrid Metal Matrix composites (HMMC), Metal matrix composites (MMCs), Material Removal (MR), Surface Roughness & Surface Finish.
| References: [+]
1. Jain R.K and Jain V.K., “Optimum selection of machining conditions in abrasive flow machining using neural network”, Journal of Materials Processing Technology, Vol.108, pp.62-67,2000.
2. Jain R.K and Jain V.K., “Stochastic simulation of active grain density in abrasive flow machining”, Journal of Materials Processing Technology, Vol.152, pp.17–22, 2003.
3. Jain R.K. and Jain V.K., “Specific energy and temperature determination in abrasive flow machining process”, International Journal of Machine Tools & Manufacture, Vol. 41, pp.1689–1704,2001.
4. Jain R.K., Jain V.K. and Dixit P.M., “Modeling of material removal and surface roughness in abrasive flow machining process”, International Journal of Machine Tools & Manufacture, Vol.39, 1903–1923,1999.
5. Jain V.K. and Adsul S.G., “Experimental investigations into abrasive flow machining (AFM), International Journal of Machine Tool Manufacturing”, Vol.40, pp.1003–1021,2000.
6. Jain V.K., Kumar R., Dixit P.M. and Sidpara A., “Investigations into abrasive flow finishing of complex workpiece using FEM”, Wear, Vol.267, no. 1–4, pp.71-80,2009.
7. Bhardwaj Anant, Ali Parvesh, Walia R.S. Murtaza Qasim , Panday S.M., “Development of Hybrid Forms of Abrasive Flow Machining Process: A Review”, Advances in Industrial and Production Engineering, pp. 41-67,2019.
8. Jain, V.K., “Magnetic field assisted abrasive based micro-/nano-finishing”, Journal of Materials Processing Technology, Vol.209, pp.6022–6038,2009.
9. Jayswal S.C, Jain V.K. and Dixit P.M., “Modeling and simulation of magnetic abrasive finishing process”, International Journal of Advance Manufacturing Technology, Vol.26,pp.477–490,2005.
10. Jeong D.K. and Kyung D.K., “Deburring of burrs in spring collets by abrasive flow machining”, International Journal of Advanced Manufacturing Technology, Vol.24,pp.469–473,2004,
11. Jose Cherian, Dr Jeoju M Issac, “Effect of Process Variable in Abrasive Flow Machining”, International Journal of Emerging Technology and Advanced Engineering. Vol.3, no. 2, pp.554-557, 2013..
12. Junye Li, Lifeng Yang, Weina Liu, Xuechen Zhang, and Fengyu Sun (2014): “Experimental Research into Technology of Abrasive Flow Machining Nonlinear Tube Runner”, Advances in Mechanical Engineering ,Vol.6,pp.752353-752353,2015 .
13. Nagnath Kakde, Tejas Deshmukh, Akshaykumar Puttewar, S.V. Lutade, “Advancement in surface finishing by abrasive flow machining Review”, International Journal of Engineering Research and General Science , Vol.2, no. 6,2014.
14. P.D. Kamble, S.P. Untawale and S.B. Sahare (2012): Use of Magneto Abrasive Flow Machining to Increase Material Removal Rate and Surface Finish, International journal of mechanical, automobile and production engineering VSRD-MAP, 1, issue7, 249–262.
15. Ramandeep Singh and R.S. Walia “Hybrid Magnetic Force Assistant Abrasive Flow Machining Process Study for Optimal Material Removal”, International Journal of Applied Engineering Research, Vol.7,pp. 141–144,2012.
16. D.Sharma, A.Malik, “Optimization of abrasive flow machining process using Taguchi based PCA model”, The IUP Journal of Mechanical Engineering, Vol. 10 ,no.3, pp. 30-41, 2018.
17. S.Kumar, S.Hiremath, “A review on abrasive flow machining”, Global colloquium in recent advancement and effectual researchers in engineering, science and technology, Vol.25, pp. 1297-1304, 2016.
18. D.Bahre, H.Brunnet, M.Swat, “Investigation of one-way abrasive flow machining and in-process measurement of axial forces”, CIRP Conf. on High Performance Cutting, Vol.1, pp.419-424, 2012.
19. A.Kiani, M.Esmailian, H.Amirabadi, “Abrasive flow machining: A review on new developed hybrid AFM process”, International Journal of Advanced design and manufacturing technology, Vol. 9 .no.1, pp. 61-71, 2016.
20. B.Singh, K.Singh, S.Kumar, “Latest trends in abrasive flow machining process”, Journal of Advanced Research, Vol. 4,no.1-2, pp. 1-7, 2017.
21. P.Pal, K.Jain, “Investigations into optimization of abrasive flow machining process parameters: a review”, International Journal of Engineering Research & Technology, Vol.5 ,no.10, pp. 1-6, 2016.
22. A.Soni, P.Agrawal, A.Jha, “A study of abrasive flow machining by modeling with ANSYS”, International Journal of Engineering Science and Computing, Vol. 7 ,no.6, pp.1-4, 2017.
23. M.Tayagi, P.Ali, S.Dhull, R.Walia, Q.Murtaza, “Hybrid abrasive flow machining for nano finishing – a review”, Material Today Proceedings ICAAMM, Vol. 4, pp. 7208-7218, 2017.
24. A.Azizi, A.Azami, “Rotational abrasive finishing (RAF) – Novel design for micro/nanofinishing”, International Journal of Advanced Manufacturing Technology, Vol. 91 ,no. 9-12, pp. 3159-3167, 2017.
25. G.Dong, J.Liu, “Study on machining mechanism of high viscoelastic abrasive flow machining for surface finishing”, Journal of Engineering Manufacture, Vol. 231, no.4, pp. 1-10, 2015.
26. X.Zhang, Y.Xu, J.Li, Z.Zhou, L.Wei, “Quality influence and process parameter optimization of T-pipe in abrasive flow finishing”, Journal of advances in mechanical engineering, Vol. 9 ,no.8, pp.1-13, 2017.
27. Da.Tan, S.Ji, Y.Fu, “An improved soft abrasive flow finishing method based on fluid collision theory”, The International Journal of Advanced Manufacturing Technology, Vol. 85 ,no.5-8, pp. 1261-1274, 2016.
28. H.Gao, Y.Fu, X.Wang, H.Wei, S.Li, “Blade surface uniformity of blisk finished by abrasive flow machining”, The International Journal of Advanced Manufacturing Technology, Vol. 84 ,no.5-8, pp. 1725-1735, 2016.
29. H.Gao, M.Wu, “Experimental study on large size bearing ring raceways precision polishing with abrasive flowing machine (AFM) method”, The International Journal of Advanced Manufacturing Technology, Vol. 83 ,no.9-12, pp. 1927-1935, 2016.
30.V.Mihotovic, E.Uhlmann,S.Robkamp, A.Dethlefs, “A pragmatic modeling approach in abrasive flow machining for complex-shaped automotive components”, CIRP Conference on High Performance Cutting, Vol. 46, pp. 51-54, 2016.
| Download File
Studies on Several Texture Adaptations Methods for Enhancing the Degradation Obstruction of Mg Alloy - Medical Inject
Sushant Kumar
Assistant Professor, Department of Mechanical Engineering, Chandigarh University, Mohali, India
Pages: 6490–6500
Abstract: [+]
As a bio absorbable metal with mechanical properties near bone, unadulterated mg or its combinations have huge potential to be created as clinical inserts for clinical dressing. Be that as it may, extraordinary endeavors ought to be made to keep away from its quick corruption in vivo for orthopedic dressing when utilized for break obsession. Accordingly, how to expire corruption pace of unadulterated mg or its composites is one of the concentrations in work directed towards the innovation of clinical Injects. It has been perceived that texture change is a successful technique to forestall its underlying debasement in vivo to keep up its ideal mechanical quality. This surveys the ongoing advancement in texture changes for counteraction of quick debasement of mg or its combinations utilizing in vitro examine model, a quick yet applicable model before moving forwards tedious and costly in vivo examine.
Keywords:  Magnesium (Mg), degradation rate, in vivo, texture modification, in vitro, orthopedic.
| References: [+]
[1]Maurice E Shils; James A Olson; Moshe Shike, “Modern Nutrition in Health and Disease”, Philadelphia: Lea &Febiger, pp. 164–184,1994.
[2]Vormann J, “Magnesium: nutrition and metabolism”, Mol. Aspects of Med., vol.24, pp.27–37,2003.
[3]Lambotte A.” L'utilisation du magnesium comme materiel perdu dans l'osteosynthèse”, Bull Mem Soc Nat Chir, Vol.28,pp.1325–1334,1932.
[4]Evans FG. “Mechanical properties and history of cortical bone from younger and older man”, Anat. Rec.,Vol.185,pp.1–12,1972.
[5]Wong HM, Yeung KWK, Lam KO, Tam V, Chu PK, Luk KDK, “A biodegradable polymer-based layer to control the performance of magnesium alloy orthopaedic injects”, Biomaterials , Vol.31, pp.2084–2096,2010.
[6]Zhang EL, Xu LP, Yu GN, Pan F, Yang K. “In vivo evaluation of biodegradable magnesium alloy bone implant in the first 6 months implantation”, Biomed. Mater. Res. A, Vol.90,no.3,pp.882–893,2009.
[7]Saris NE, Mervaala E, Karppanen H, Khawaja JA, Lewenstam A, “Mg an update on physiological, clinical and analytical aspects”, Clin.Chim.Acta, Vol.294,pp.1–26,2000.
[8]Drynda A, Hassel T, Hoehn T, Perz A, Bach FW, Peuster M. “Development and biocompatibility of a novel corrodible fluoride-coated magnesium -calcium alloy with improved degradation kinetics and adequate mechanical properties for cardiovascular dressing”, J Biomed Mater Res. Vol.93,pp.763–775,2010.
[9]Liu B, Zheng YF. “Effects of alloying elements (Mn, Co, Al, W, Sn, B, C and S) on biodegradability and in vitro biocompatibility of pure iron”, Acta Biomater., Vol.7, pp.1407–1420, 2011.
[10]Birbilis N, Easton MA, Sudholz AD, Zhu SM, Gibson MA, “On the corrosion of binary mg-rare earth alloys”,Corros. Sci ., Vol.51,pp.683–689,2009.
[11]Huan ZG, Leeflang MA, Zhou J, Fratila-Apachitei LE, Duszczyk J, “In vitro degradation behavior and cytocompatibility of Mg-Zn-Zr alloys”, J Mater Sci. Mater Med , Vol.21, pp.2623–2635,2010.
[12]Gray-Munro JE, Seguin C, Strong M. “Influence of surface modification on the in vitro rate of magnesium alloy AZ31”, J Biomed. Mater. Res. A,Vol.91,pp.221–230,2009.
[13]Keim S, Brunner JG, Fabry B, Virtanen S.,” Control of magnesium corrosion and biocompatibility with biomimetic coatings”, J Biomed Mater Res B Appl Biomater.,vol.96,pp.84–90,2011.
[14]Song GL, Atrens A.,”Understanding magnesium corrosion”, Adv Eng Mater 2003;vol.5,pp.837–858,2003.
[15]Quach NC, Uggowitzer PJ, Schmutz P.,” Corrosion behaviour of an Mg-Y-RE alloy used in biomedical applications studied by electrochemical techniques”, Comptes Rendus Chimie, vol.11,pp.1043–1054,2008.
[16]Kirkland NT, Birbilis N, Walker J, Woodfield T, Dias GJ, Staiger MP.,” In-vitro dissolution of mg-calcium binary alloys: Clarifying the unique role of calcium additions in bioresorbable mg implant alloys”, J Biomed. Mater. Res. B vol.95,pp.91–100,2010.
[17]Muller WD, Nascimento ML, Zeddies M, C_orsico M, Gassa LM, Alicia M,” magnesium and its alloys as degradable biomaterials: Corrosion Studies using potentio dynamic and EIS Energy due to chemical reaction techniques”, Mater. Res. , vol.10,pp.5–10,2007.
[18]Hara N, Kobayashi Y, Kagaya D, Akao N,” Formation and breakdown of texture film on Magnesium and its alloys in aqueous solutions”, Corros. Sci., vol.49,pp.166–175,2007.
[19]Gray JE, Luan B.,” Protective coatings on Magnesium and its alloys—A critical review”, Journal of Alloys and Compounds vol.336, no.1-2,pp.88-113,2002.
[20]Turhan MC, Lynch R, Killian MS, Virtanen S,” Effect of acidic etching and fluoride therapy on corrosion performance in Magnesium alloy AZ91D (MgAlZn)”, Electrochim. Acta, vol.55,pp.250–257,2009.
[21]Lorenz C, Brunner JG, Kollmannsberger P, Jaafar L, Fabry B, Virtanen S., “Effect of texture pre-treatments on biocompatibility of magnesium”, Acta Biomater., vol.5,no.7, pp.2783–2789,2009.
[22]Gu XN, Zheng W, Cheng Y, Zheng YF,”A study on alkaline heat treated Mg-Ca alloy for the control of the bio corrosion rate”, Acta Biomater., vol.5,no.7,pp.2790–2799,2009.
[23] Thomann M, Krause C, Angrisani N, Bormann D, Hassel T, Windhagen H.,” Influence of a magnesium fluoride layer of magnesium based injects (MgCa0.8) on degradation in a rabbit model”, J Biomed. Mater. Res. Part A , vol.93,pp.1609–1619,2010.
[24] Staesche M. U” ber die chemis cheerze ugunge inerdickeren mg fluorid- schutzschicht auf mg-legierungen”, Arch Fu†r Metallkd, vol.3, pp.99–102, 1948.
[25]Chiu KY, Wong MH, Cheng FT, Man HC,” Characterization and corrosion studies of fluoride conversion layer on degradable mg inplants”, Surf. Coat Tech., vol.202,pp.590–598,2007.
[26]Zhao LC, Cui CX, Wang QZ, Bu SJ,” Growth characteristics and corrosion resistance of micro-arc oxidation layer on pure magnesium for biomedical dressing”, Corros.Sci., vol.52,pp. 2228–2234,2010.
[27]Hiromoto S, Yamamoto A. Control of degradation rate of bioabsorbable magnesium by anodization and steam treatment”, Mat. Sci. Eng.: C, vol.30,pp.1085–1093,2020.
[28]Gao B, Hao SZ, Zou JX, Wu WY, Tu GF, Dong C.,” Effect of high current pulsed electron beam therapy on texture microstructure and wear and corrosion resistance of an AZ91HP mg alloy”, Surf. Coat Tech., vol.201,pp.6297–6303,2007.
[29]Ho che D, Blawert C, Cavellier M, Busardo D, Gloriant T,” Magnesium nitride phase formation by means of ion beam implantation technique”, Appl Surf Sci., vol. 257,pp.5626–5633,2011.
[30]Zhang YJ, Zhang GZ, Wei M. ,“Controlling the biodegradation rate of mg using biomimetic apatite coating”, J Biomed. Mater. Res. B, vol.89,no.2,pp.408–414,2009.
[31]Li JN, Cao P, Zhang XN, Zhang SX, He YH,” In vitro degradation and cell attachment of a PLGA coated biodegradable Mg-6Zn based alloy”, J Mater. Sci.,vol.45,pp.6038–6045,2010.
[32]Hiromoto S, Yamamoto A,” High corrosion resistance of mg coated with hydroxyapatite directly synthesized in an aqueous solution”, Electrochimica Acta, vol.54, no.27,pp.7085–7093,2009.
[33]Wang HX, Guan SK, Wang X, Ren CX, Wang LG,”In vitro degradation and mechanical integrity of Mg-Zn-Ca alloy coated with Cadeficient hydroxyapatite by the pulse electrodeposition process”, Acta Biomater.,vol.6,pp.1743–1748,2010.
[34]Chen S, Guan SK, Chen Bin, Li W, Wang J, Wang LG. ,”Corrosion behavior of TiO2 films on Mg-Zn alloy in simulated body fluid”, Appl. Surf. Sci., vol.257,no.9, pp.4464–4467,2011.
| Download File
An Analysis on the Impact of Mobility and Sustainability of TCP Performance in Mobile Adhoc Networks
1S.P.Valli and 2Sharmila Sankar
1Assistant Professor-Selection Grade, Department of Computer Science Engineering, B.S.Abdur Rahman Crescent Institute of Science and Technology, Chennai, India.
2Professor, Department of Computer Science Engineering, B.S.Abdur Rahman Crescent Institute of Science and Technology, Chennai, India.
Pages: 6501–6515
Abstract: [+]
Transmission Control Protocol (TCP) is the extensively used transport layer protocol in the internet. The reliability of the byte oriented protocol is achieved through the acknowledgments sent by TCP receiver upon successful transmissions of the packets received from the sender. The behavior of TCP is not the same in wired and wireless networks. The transport layer protocol produces better results in wired networks. One of the reasons for better performance in wired networks are the packet loss rate in wired networks. Packet loss may occur mostly due to buffer overflow in wired networks. However in wireless networks TCP does not provide the same performance. The performance is degraded due to many reasons such as mobility, route or link failures, misinterpreted congestions and so on. This paper focuses on the impact of mobility in mobile adhoc networks. The paper analyzes the network sustainability when mobility is experienced. The different parameters such as the throughput, number of retransmissions and queue size are analyzed for the impact of the mobility in the network. The simulations are done using Qualnet 5.0
Keywords: TCP, Throughput, Mobility, Congestion, Retransmission.
| References: [+]
[1]V.Jacobson, “Modified TCP Congestion Avoidance Algorithm”, 1990
[2]M. Fomenkov, K. Keys, D. Moore, K, claffy, "Longitudinal study of internet traffic in 1998-2003," Winter International Symposium on Information and Communication Technologies (WISICT), pp. 1--6,2004.
[3]C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, D. Moll, R. Rockell, T. Seely, C. Diot, “Packet-level traffic measurements from the sprint ip backbone,” Network, IEEE, vol.17, no. 6, pp. 6–16, 2003.
[4]F.Klemm, S.V.Krishnamurthy, S.K.Tripathi, “Alleviating Effects of Mobility on TCP Performance in Ad Hoc Networks using Signal Strength based Link Management”, IFIP International Conference on Personal Wireless Communications, pp 611-624,2003.
[5]K. Chandran, S. Raghunathan, S. Venkatesan, R. Prakash, "A feedback based scheme for improving TCPX performance in ad-hoc wireless networks", Proceedings - International Conference on Distributed Computing Systems, 1998.
[6]D. Kim, C.-K. Toh, Y. Choi, "TCP-BuS: improving TCP performance in wireless ad hoc networks", Journal of Communications and Networks Vol.3 no.2, pp. 59–71, 2001.
[7]G. Holland, N. Vaidya," Analysis of TCP performance over mobile ad hoc network routing protocols”, ACM/IEEE International Conference on Mobile Proceedings of IEEE WMCSA, 1999.
[8]J. Liu, S. Singh, "ATCP: TCP for mobile ad-hoc networks", IEEE Journal on Selected Areas in Communications, Vol.19, no.7,pp.1300–1315, 2001.
[9]S. Xu, T. Saadawi, "Performance evaluation of TCP algorithms in multi-hop wireless packet networks", Wireless Communications and Mobile Computing, Vol. 2,no. 1, pp.85–100.2002.
[10]K. Sundaresan, V. Anantharaman, H.-Y. Hsieh, R. Sivakumar, "ATP: a reliable transport protocol for ad-hoc networks", Proceedings of ACM MOBIHOC, 2003.
[11]Tsukamoto, K., Shigeru K. , Yuji O. “Vertical Handover Management Scheme Using Multiple TCP Connections for Heterogeneous Networks”, Proceedings of the WiNTECH’07, Montréal, Canada, 2007.
[12]T. D. Dyer , R. V. Boppana, “A Comparison of TCP Performance over Three Routing Protocols for Mobile Ad Hoc Networks”, Proceedings of ACM MOBIHOC, 2001.
[13]S.P.VallDr.K.M.Mehata "A Throughput Analysis of TCP in Adhoc Networks”, Third International Conference On Advances in Computing & Information Technology , Computer Science & IT , 2013.
[14] Sharmila Sankar , Sankaranarayanan V. “Performance Enhancement of AODV Protocol for Dense MANETs”, Asian Journal of Scientific Research, Vol. 5,no. 3, pp.170-177,2012.
[15]S.P.Valli , K.M.Mehata, “A Cross-Layer Approach for TCP Packet Loss Differentiation in Adhoc Networks””, Middle East Journal of Scientific Research Communications, Vol.23,no.9, pp. 2278-2287, 2015.
[16]Chandrashekhar Goswami, Rahul Shahane, " Transport Control Protocol (TCP) enhancement over wireless environment: Issues and challenges", International Conference on Inventive Computing and Informatics (ICICI), 2017.
[17]Adnan Majeed, N. B. Abu-Ghazaleh, S. Razak, K. A. Harras, “Analysis of TCP performance on Multi-Hop Wireless Networks: A cross layer approach,” Ad Hoc Networks, vol. 10, no. 3, pp. 586–603, 2012.
[18]Yurong Chen, E.G. Sirer , S.B. Wicker "On Selection of Optimal Transmission Power for Ad hoc Networks", Proceedings of the 36th Hawaii International Conference on System Sciences, pp.1-10,2003.
[19]Gautam M. Borkar, A. R. Mahajan, "A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks", Wireless Networks, Vol.23, no.8, pp- 2455,2017.
[20]Satoshi Utsumi, S. M. S. Zabir, “A new high-performance TCP friendly congestion control over wireless networks,” J. Netw. Comput. Appl., vol. 41, no. 1, pp. 369–371, 2014.
| Download File
Adaptive Prediction of User Interaction Based on Deep Learning for Effective Green Communication
1T.Anandhi, 2A.Sivasangari, 3R.M.Gomathi, 4P.Ajitha
1,2,3,4 School of Computing, Sathyabama Institute of Science and Technology, Tamilnadu, India.
Pages: 6516–6525
Abstract: [+]
This application fundamental work in the region of website page expectation is exhibited. The planned and actualized model offers customized cooperation by anticipating the client's conduct from past web perusing history. Those expectations are subsequently used to disentangle the client's future associations. A profile-based interaction prediction framework is presented, which can understand the occasion activated communication expectation issue proficiently and adequately. In profile-based interaction prediction framework, the association sign is changed into a sliding-window evolving graph to diminish the data volume and gradually update SEG as communication log develops. At that point, the profiles are assembled to exhibit clients' conduct by removing the static and astounding highlights from SEG. The static (individually, amazing) include mirrors the normality of clients' conduct (separately, the fleeting conduct). At the point when an occasion happens, the comparability between the occasion and every applicant connect is processed. Customer side logs can catch precise, far reaching utilization data for ease of use investigation. Ease of use is characterized as the fulfillment, productivity and viability with which explicit clients can finish explicit undertakings in a specific situation.
Keywords:  Neural Network, Ad Fraud, Pre-processing, Prediction, Deep Learning.
| References: [+]
[1]J. Gligorijevic, D. Gligorijevic, I. Stojkovic, X. Bai, A. Goyal, Z. Obradovic, ‘‘Deeply supervised model for click-through rate prediction in sponsored search,’’ Proc. 25th ACM SIGKDD Int. Conf. Knowl.Discovery Data Mining, Anchorage, Ak, USA, pp. 1–22,2019.
[2]B. De los Santos S. Koulayev, ‘‘Optimizing click-through in online rankings with endogenous search refinement,’’ Marketing Sci., Vol. 36, no. 4, pp. 542–564, 2017.
[3]W. Zhang, S. Yuan, J. Wang, ‘‘Optimal real-time bidding for display advertising,’’ Proc. 20th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, pp. 1077–1086,2014.
[4]Y. Qu, H. Cai, K. Ren, W. Zhang, Y. Yu, Y. Wen, J. Wang, ‘‘Product-based neural networks for user response prediction,’’ Proc. IEEE 16th Int. Conf. Data Mining (ICDM), pp. 1149–1154,2016.
[5]H. Guo, R. Tang, Y. Ye, Z. Li, X. He, ‘‘DeepFM: A factorizationmachine based neural network for CTR prediction,’’ Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligenc ,pp. 1725–1731, 2017.
[6]O. Chapelle, E. Manavoglu, R. Rosales, ‘‘Simple and scalable response prediction for display advertising,’’ ACM Trans. Intell. Syst. Technol., Vol. 5, no. 4, pp. 1–34, 2015.
[7]K.-C. Lee, B. Orten, A. Dasdan, W. Li, ‘‘Estimating conversion rate in display advertising from past performance data,’’ Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, pp. 768–776, 2012.
[8]X. He, J. Pan, O. Jin, T. Xu, B. Liu, T. Xu, Y. Shi, A. Atallah, R. Herbrich, S. Bowers , J. Candela, ‘‘Practical lessons from predicting clicks on ads at Facebook,’’ Proc. 8th Int. Workshop Data Mining Online Advertising, New York, NY, USA, pp. 1–9, 2014.
[9]A.-P. Ta, ‘‘Factorization machines with follow-the-regularized-leader for CTR prediction in display advertising,’’ Proc. IEEE Int. Conf. Big Data (Big Data), pp. 2889–2891,2015.
[10]G. Huang, Z. Liu, L. van der Maaten, K. Q. Weinberger, ‘‘Densely connected convolutional networks,’’ Proc. 30th IEEE Conf. Comput. Vis.Pattern Recognit. (CVPR), pp. 2261–2269,2017.
[11]D. Bahdanau, K. Cho, Y. Bengio, ‘‘Neural machine translation by jointly learning to align and translate,’’ Proc. 3rd Int. Conf. Learn. Represent., pp. 1–15, 2014.
[12]H.-T. Cheng, L. Koc, J. Harmsen, T. Shaked, T. Chandra, H. Aradhye, G. Anderson, G. Corrado, W. Chai, M. Ispir, R. Anil, Z. Haque, L. Hong, V. Jain, X. Liu, and H. Shah, ‘‘Wide & deep learning for recommender systems,’’ Proc. 1St Workshop Deep Learn. Recommender Syst., pp. 1–4,2016.
[13]Y. Zhang, H. Dai, C. Xu, J. Feng, T. Wang, J. Bian, B. Wang, T.-Y. Liu, ‘‘Sequential click prediction for sponsored search with recurrent neural networks,’’ Proc. AAAI, Quebec City, QC, Canada, pp. 1369–1375,2014.
[14]P. P. K. Chan, X. Hu, L. Zhao, D. S. Yeung, D. Liu, L. Xiao, ‘‘Convolutional neural networks based click-through rate prediction with multiple feature sequences,’’ Proc. IJCAI, Stockholm, Sweden, pp. 2007–2013, 2018.
[15]G. Zhou, X. Zhu, C. Song, Y. Fan, H. Zhu, X. Ma, Y. Yan, J. Jin, H. Li, K. Gai, ‘‘Deep interest network for click-through rate prediction,’’ Proc. KDD, London, U.K., pp. 1059–1068,2018.
[16]M. Gan , K. Xiao, ‘‘R-RNN: Extracting user recent behavior sequence for click-through rate prediction,’’ IEEE Access, Vol. 7, pp. 111767– 111777, 2019.
[17]X. Bai, R. Abasi, B. Edizel, A. Mantrach, ‘‘Position-aware deep character-level CTR prediction for sponsored search,’’ IEEE Trans. Knowl. Data Eng., pp.1-1,2019.
| Download File
Advanced Materials and Resource Optimization Methods of Fused Deposition Modelling Parameters for Biomedical Applications
1Shahbaz Juneja, 2Aman Upadhyay, 3Raman Kumar, 4,*Jasgurpreet Singh Chohan
1,2,3,4,* Department of Mechanical Engineering, Chandigarh University, Punjab, India.
Pages: 6526–6540
Abstract: [+]
FDM technology has been extensively used in almost every manufacturing industry for new product development because of its simple, economical and minimum material consumption strategy. These days apart from designing, testing, conceptualization and prototyping, it is used for functional materials and end-product fabrication. The present work highlights the different materials available for FDM process and the detailed discussion is made on bio-medical applications. The optimization techniques used for minimization of surface roughness and maximization of mechanical strength. The impact and scope of post-processing techniques used of surface finishing are also discussed. The articles also explore various challenges and future areas of research on FDM technology, materials and applications. The Scopus database is used to collect the information about the existing research on surface improvement and strength enhancement of FDM parts.process and the detailed discussion is made on bio-
Keywords: FDM, additive manufacturing, optimization, post-processing, materials, applications.
| References: [+]
[1]Fisher, M. and Schoppner, V., “Some investigations regarding the surface treatment of Ultem 9085 parts manufactured with fused deposition modeling”, Proceedings of 24th Solid Freeform Fabrication Symposium, Austin, pp. 805-815,2013.
[2]Boschetto, A., Bottini, L., &Veniali, F.. “Microremoval modeling of surface roughness in barrel finishing”, International Journal of Advanced Manufacturing Technology, Vol.69,no.9, pp.2343–2354, 2013.
[3]Gregorian, A., Elliett, B., Navarro, R., Ochoa, F., Singh, H., Monge, E., Foyos, J., Noorani, R., Fritz, B., Jayanthi, S. “Accuracy Improvement in Rapid Prototyping Machine (FDM1650)”, Int. J. Prod. Res. ,Vol.40 no.12,pp. 2865–2881,2002.
[4]Pennington, R. C., Hoekstra, N. L., Newcomer, J. L. “Significant factors in the dimensional accuracy of fused deposition modelling”, Proceedings of the Institution of Mechanical Engineers, Part E: Journal of Process Mechanical Engineering, Vol.219,no.1,pp. 89–92, 2005.
[5]Tong, K., Joshi, S., &Lehtihet, E. A.. “Error compensation for fused deposition modeling (FDM) machine by correcting slice files”, Rapid Prototyping Journal, Vol.14, no.1, pp.4-14,2008.
[6]Kumar, Y. R., Rao, C. S. P., Reddy, T. A. J.. “A robust process optimisation for fused deposition modelling”, International Journal of Manufacturing Technology and Management, Vol.14, no.2, pp.228–245,2008.
[7]El-Katatny, I., Masood, S. H., &Morsi, Y. S. “Error analysis of FDM fabricated medical replicas”, Rapid Prototyping Journal, Vol.16,no.1, pp.36–43, 2010.
[8]Chang, D. Y., Huang, B. H.. “Studies on profile error and extruding aperture for the RP parts using the fused deposition modeling process”, International Journal of Advanced Manufacturing Technology, Vol.53,no.9, pp.1027–1037,2011.
[9]Sood, A. K., Ohdar, R. K., Mahapatra, S. S. “Parametric appraisal of fused deposition modelling process using the grey Taguchi method”, Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, Vol.224, no.1,pp.135–145,2010.
[10]Sood, A. K., Ohdar, R. K., Mahapatra, S. S. “Improving dimensional accuracy of Fused Deposition Modelling processed part using grey Taguchi method”, Materials and Design, Vol.30, no.10, pp.4243–4252, 2009.
[11]Equbal, A.; Sood, A. K.; Ohdar, R. K.; Mahapatra, S. S. “Prediction of Dimensional Accuracy in Fused Deposition Modelling: A Fuzzy Logic Approach”, Int. J. Prod. Qual. Manage., Vol. 7, no. 1, pp.22–43, 2001.
[12]Saravanan, M.. “Investigation of thermal stress development by layer manufacturing on fused deposition modelling parts”, International Journal of Enterprise Network Management, Vol.4,no.2, pp. 183–200, 2010.
[13]Tyberg, J., Bøhn, J. H.. “FDM systems and local adaptive slicing”, Materials and Design, Vol.20, no.2, pp.77–82, 1999.
[14]Pandey, P. M., Reddy, N. V., Dhande, S. G, “Real time adaptive slicing for fused deposition modelling”, International Journal of Machine Tools and Manufacture, Vol.43,no.1,pp. 61–71, 2003.
[15]Ma, W., But, W. C., He, P.. “NURBS-based adaptive slicing for efficient rapid prototyping”, CAD Computer Aided Design, Vol.36,no.13, pp. 1309–1325, 2004.
[16]Chakraborty, D., Aneesh Reddy, B., RoyChoudhury, A. “Extruder path generation for Curved Layer Fused Deposition Modeling”, CAD Computer Aided Design, Vol.40, no.2,pp. 235–243, 2008.
[17]Singamneni, S., Roychoudhury, A., Diegel, O., & Huang, B.,“Modeling and evaluation of curved layer fused deposition”, Journal of Materials Processing Technology, Vol. 212,no.1, ,pp. 27–35,2012.
[18]Masood, S. H., Rattanawong, W., &Iovenitti, P. “Part build orientations based on Volumetric error in fused deposition modelling”, International Journal of Advanced Manufacturing Technology, Vol. 16 ,no.3, pp. 162–168, 2000.
[19]Pandey, P. M., Thrimurthulu, K., & Reddy, N. V. “Optimal part deposition orientation in FDM by using a multicriteria genetic algorithm”, International Journal of Production Research, Vol. 42 ,no.19, pp. 4069–4089,2004.
[20]Li, A., Zhang, Z., Wang, D., & Yang, J. “Optimization method to fabrication orientation of parts in fused deposition modeling rapid prototyping”, International Conference on Mechanic Automation and Control Engineering(MACE2010), pp. 416–419,2010.
[21]Huang, X., Ye, C., Mo, J., & Liu, H. “Slice Data Based Support Generation Algorithm for Fused Deposition Modeling”, Tsinghua Science and Technology, Vol. 14 ,no. 1, pp. 223–228.,2009.
[22]Xiaomao Huang, Chunsheng Ye, Siyu Wu, KaiboGuo&Jianhua Mo, “Sloping wall structure support generation for fused deposition modeling”,The International Journal of Advanced Manufacturing Technology, vol.42,2009.
[23]Yardimci, M. A., Güçeri, S. “Conceptual framework for the thermal process modelling of fused deposition”, Rapid Prototyping Journal, Vol. 2 ,no.2, (1996), pp. 26–31,1996.
[24]Lam, T. W., Yu, K. M., Cheung, K. M., & Li, C. L. “Octree reinforced thin shell objects rapid prototyping by fused deposition modelling”, International Journal of Advanced Manufacturing Technology, Vol. 14 ,no.9, pp. 631–636,1998.
[25]Han, W., Jafari, M. A., &Seyed, K. “Process speeding up via deposition planning in fused deposition-based layered manufacturing processes”, Rapid Prototyping Journal, Vol. 9 ,no.4, pp. 212–218,2003.
[26]Bellini, A., Güçeri, S., &Bertoldi, M. “Liquefier dynamics in fused deposition”, Journal of Manufacturing Science and Engineering, Transactions of the ASME, Vol. 126 ,no.2, pp. 237–246,2004.
[27]Agrawal, S., &Dhande, S. G. “Analysis of mechanical error in a fused deposition process using a stochastic approach”, International Journal of Production Research, Vol. 45 ,no.17, pp. 3991–4012,2007.
[28]Zhang, Y., & Chou, K. “A parametric study of part distortions in fused deposition modelling using three-dimensional finite element analysis”,Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, Vol. 222 ,no.8, pp. 959–967, 2008.
[29]Mostafa, N., Syed, H. M., Igor, S., & Andrew, G. “A Study of Melt Flow Analysis of an ABS-Iron Composite in Fused Deposition Modelling Process”, Tsinghua Science and Technology, Vol. 14 ,no. 1,pp. 29–37,2009.
[30]Zein, I., Hutmacher, D. W., Tan, K. C., &Teoh, S. H. “Fused deposition modeling of novel scaffold architectures for tissue engineering applications”, Biomaterials, Vol. 23 ,no.4, pp. 1169–1185, 2002.
[31]Too, M. H., Leong, K. F., Chua, C. K., Du, Z. H., Yang, S. F., Cheah, C. M., & Ho, S. L.. “Investigation of 3D non-random porous structures by fused deposition modelling”, International Journal of Advanced Manufacturing Technology, Vol. 19 ,no.3, pp. 217–223, 2002.
[32]Cao, T., Ho, K. H., &Teoh, S. H. “Scaffold design and in vitro study of osteochondralcoculture in a three-dimensional porous polycaprolactone scaffold fabricated by fused deposition modeling”. Tissue Engineering, Vol. 9 ,no.1, 2003.
[33]Kalita, S. J., Bose, S., Hosick, H. L., &Bandyopadhyay, A. “Development of controlled porosity polymer-ceramic composite scaffolds via fused deposition modeling”, Materials Science and Engineering , Vol. 23 ,no.5, pp. 611–620.
[34]Schantz, J. T., Brandwood, A., Hutmacher, D. W., Khor, H. L., & Bittner, K.. “Osteogenic differentiation of mesenchymal progenitor cells in computer designed fibrin-polymer-ceramic scaffolds manufactured by fused deposition modeling”, Journal of Materials Science: Materials in Medicine, Vol. 16 ,no.9, pp. 807–819, 2005.
[35]Drummer, D., Cifuentes-Cuéllar, S., Rietzel, D.. “Suitability of PLA/TCP for fused deposition modeling”, Rapid Prototyping Journal, Vol. 18 ,no.6, pp. 500–507, 2012.
[36]Moreno Madrid, A. P., Vrech, S. M., Sanchez, M. A., & Rodriguez, A. P. “Advances in additive manufacturing for bone tissue engineering scaffolds”, Materials Science and Engineering C, Vol. 100, pp. 631–644, 2019.
[37]Meakin, J. R., Shepherd, D. E. T., &Hukins, D. W. L.. “Fused deposition models from CT scans”, British Journal of Radiology, Vol. 77 ,no.918, pp. 504–507. 2004.
[38]Masood, S. H. “Application of fused deposition modelling in controlled drug delivery devices”, Assembly Automation, Vol. 27 ,no.3, pp. 215–221, 2007.
[39]McCullough, E. J., Yadavalli, V. K. “Surface modification of fused deposition modeling ABS to enable rapid prototyping of biomedical microdevices”, Journal of Materials Processing Technology, Vol. 213 ,no.6, pp. 947–954,2013.
[40]Owida, A., Chen, R., Patel, S., Morsi, Y., Mo, X. “Artery vessel fabrication using the combined fused deposition modeling and electrospinning techniques”, Rapid Prototyping Journal, Vol. 17 ,no.1, pp. 37–44,2011.
[41]Touri, M., Kabirian, F., Saadati, M., Ramakrishna, S., &Mozafari, M.. “Additive Manufacturing of Biomaterials − the EVolution of Rapid Prototyping”, Advanced Engineering Materials, Vol. 21, no.2, pp. 180-0511,2019.
[42]Masood, S. H., Song, W. Q. “Development of new metal/polymer materials for rapid tooling using fused deposition modelling”, Materials and Design, Vol. 25, no.7, pp. 587–594,2004.
[43]Masood, S. H. “Application of fused deposition modelling in controlled drug delivery devices”, Assembly Automation, Vol. 27, no.3, pp. 215–221,2007.
[44]Ilardo, R., Williams, C. B. “Design and manufacture of a Formula SAE intake system using fused deposition modeling and fiber-reinforced composite materials”, 20th Annual International Solid Freeform Fabrication Sympo, pp. 770–780.,2009.
[45]Macy, B. “Capability Assessment of Hybrid Components Utilizing Fused Deposition Modelling and Aerosol Jet Technologies”, International SAMPE Technical Conference 2012: Navigating the Global Landscape for the New Composites, North Charleston, 2012.
| Download File
Influence of Temperature on Mechanical and Microstructural Properties during FSW of Magnesium Alloys
M A Unnikrishnan and 2J Edwin Raja Dhas
1Department of Mechanical Engineering, Noorul Islam University, Thuckalay, Tamil Nadu, India.
2Department of Automobile Engineering, Noorul Islam University, Thuckalay, Tamil Nadu,India.
Pages: 6541–6560
Abstract: [+]
In material joining techniques the temperature generated during welding and its distribution plays a key role. In the case of Friction stir welding the heat is generated by the frictional force generated by the rotation of the tool along with axial pressure leads to metal joining, therefore the rate of heat transfer, its distribution has to be studied. In this work Mg alloys AZ31B and AZ91B are used for FSW according to taguchi’s L9 orthogonal array with three process parameters tool rotational speed from 1000rpm to 1200 rpm, welding speed from 20mm/min to 30mm/min and tool tilt angle from 1º to 3º.Three sets of welding have been performednamely AZ31B/AZ31B similar joints, AZ91B/AZ91B similar joint and AZ31B/AZ91B dissimilar joints respectively. The temperature has been measured using a contact probe thermocouple and temperature distribution at each second is calculated and the influence on final weld properties has been discussed with the help of ANSYS software. In ANSYS element type SOLID 90is used for thermal analysis which has single degree of freedom, temperature on its each node. The corresponding microstructure of joints with highest UTS and lowest UTS was obtained for validating the results.
Keywords:  Friction stir welding, ANSYS, Magnesium alloy, Microstructural Properties, Temperature
| References: [+]
[1]R O Hussein , D O Northwood, “Improving the performance of magnesium alloys for automotive applications, High Performance and Optimum Design of Structures and Materials”, WIT Transactions on The Built Environment, Vol.137, pp.531 - 544,2014.
[2]W A Monteiro, S J Buso , L V da Silva, “Application of Magnesium Alloys in Transport”, Provisional chapter Materials Science and Technology Centre - IPEN, São Paulo,Brazil, 2012.
[3]M Haghshenas, A P Gerlich, “Joining of automotive sheet materials by friction-based welding methods: A review,”Engineering Science and Technology, an International Journal, Vol.21, no. 1, pp. 130-148,2018.
[4]Mustafa Kemal Kulekci , Magnesium and its alloys applications in automotive industry”, International Journal of Advanced Manufacturing Technology, Vol.39, pp.851–865,2008.
[5]C Blawert, N Hort, K U Kainer, “Automotive applications of Magnesium and its alloys”, Transactions of Indian Institute of Metals, Vol.57, no. 4, pp. 397-408, 2004.
[6]B Ratna Sunil,G Pradeep Kumar Reddy , A S N Mounika , P NavyaSree ,P Rama Pinneswari I Ambica , R Ajay Babu, P Amarnadh, “Joining of AZ31 and AZ91 Mg alloys by FSW”, Journal of Magnesium and Alloys, Vol. 3, pp.330–334, 2015.
[7]D Sameer Kumar, C Tara Sasanka, K Ravindra , K N S Suman, “Magnesium and Its Alloys in Automotive Applications – A Review”, American Journal of Materials Science and Technology, Vol. 4 no. 1 pp. 12-30, 2015.
[8]H Zhang, FSW of magnesium alloys, “University of Science and Technology”, Beijing, China, Wood head Publishing Limited, 2010.
[9]Zheng long Lei Jiang Bi , Peng Li , Tao Guo , Yaobang Zhao, Dengming Zhang, “Analysis on welding characteristics of ultrasonic assisted laser welding of AZ31B magnesium alloy”, Optics and Laser Technology Vol.105,pp. 15–22, 2018.
[10]S Shanavas, J Edwin Raja Dhas, “Weldability of AA 5052 H32 aluminium alloy by TIG welding and FSW process–A comparative study”, IOP Conference Series: Materials Science and Engineering vol. 247,no.1,2016.
[11]S Shanavas, J Edwin Raja Dhas, “Quality Prediction Of Friction Stir Weld Joints On AA 5052 H32 Aluminium Alloy Using Fuzzy Logic Technique”, Materials Today: Proceedings Vol.5, no.5, pp.12124-12132,2018.
[12]Michael de Leon, Hyung-Seop Shin, “Weld ability Assessment of Mg Alloy (AZ31B) Sheets by an Ultrasonic Spot Welding Method”, Journal of Materials Processing Technology, Vol.243, pp.1-8,2017.
[13]Ling Long et.al, “Finite-element analysis of the tool tilt angle effect on the formation of friction stir welds”, Journal of Manufacturing Processes, Vol.30 ,pp.562–569,2017.
[14]C F Silva et.al, “Temperature measurements during friction stir welding”, International journal of advanced manufacturing technology, Vol.9, pp.1-63,2016.
[15]S.Verma .et.al, “Study on temperature distribution during Friction Stir Welding of 6082 aluminum alloy” , Materials Today: Proceedings Vol.4,pp.1350–1356, 2017.
[16]Sadiq Aziz Hussein.et.al, “Unstable Temperature Distribution in Friction Stir Welding”, Advances in Materials Science and Engineering, Vol. 2014.
[17]Yoshimasa Takayama.et.al, “Temperature Measurement During Friction Stir Welding of Dissimilar Aluminum Alloys”, Proceedings of the 12th International Conference on Aluminium Alloys, pp. 1829-1834, 2010.
[18]T.Pavan Kumar.et.al, “Friction stir welding simulation using FEA techniques-Parametric study using Ansys APDL, National Conference on Recent Trends & Innovations in Mechanical Engineering ,pp.194-204, 2016
[19]Abhinand, “Numerical Simulation of Friction Stir Welding for Dissimilar Metal Welding”, Materials Today: Proceedings, Vol.4, no.10, pp. 11265-11269,2017.
[20]Binnur Gören Kıral.et.al, “Finite element modelling of Friction stir welding in Aluminum alloys joint Mathematical and Computational Applications”, Mathematical and Computational Applications , Vol. 18, No. 2, pp.122-131, 2013
[21]Ashu Garg.et.al, “Experimental and finite element analysis of progressive failure in friction stir welded AA6061-AA7075 joints”, Procedia Structural Integrity, Vol. 17,pp.456–463,2019.
[22]Pavan kumar Thimmaraju.et.al, “Parametric Analysis of Friction Stir Welding Process”, Materials Today: Proceedings Vol.5, pp.26981–26989,2018.
[23]M Song, R. Kovacevic, “Thermal modeling of friction stir welding in a moving coordinate and its validation”, International Journal of Machine Tool and Manufacturing , Vol.43, no.6,pp. 605–615, 2003.
[24]Y. Cao, X. Qi, “Thermal and thermo-mechanical modeling of friction stir welding of aluminium alloy 6001-T6”, Journal of Materials Processing and Manufacturing Science, Vol. 7 , no.10, pp. 215–233,1998.
[24]M Song, R. Kovacevic, “Numerical simulation and experimental analysis of heat transfer process in friction stir welding process”, Proceeding of Institution of Mechanical Engineers, Part B, Journal of Engineering Manufacture, Vol.216, no.12,pp.73–85, 2002.
[25]P. Dong, F. Lu, J.K. Hong, Z. Cao, “Coupled thermo mechanical analysis of friction stir welding process using simplified models”, Science and Technology of Welding and Joining, Vol. 6, no. 5,pp.281–287,2001.
[26]C.M. Chen.et.al, “Finite element modelling of friction stir welding—thermal and thermo mechanical analysis”, International Journal of Machine Tools & Manufacture, Vol. 43,pp.1319–1326,2003.
[27]Campbell G, Stotler.T, “Friction stir welding of armor grade aluminum plate welding journal (MIAMI,FLA)”, Friction Stir Welding and Processing,Vol.78,no.12,pp.45-47,1999.
[28]Thomas W M, Nicholas E D. “Friction Stir Welding for the Transportation Industries”, Materials and design,Vol.18,no.4,pp. 269-273,1997.
[29]Sato Y S,Kokawa H, et al.. “Microstructure in the Friction-stir Weld of an Aluminum Alloy”, Metallurgical and material Transactions A: Physical Metallurgy and Materials Science, Vol.32,no.4,pp.941-948,2001.
| Download File
Shoo-in: A Novel Key Generation Scheme in Cloud
1B.Jyoshna and 2K.Subramanyam
1Research Scholar, Department of CSE, KL (Deemed to be University), KMIT, Vaddeswaram, Guntur, India.
2Department of CSE, KL (Deemed to be University), Vaddeswaram, Guntur, India.
Pages: 6561–6568
Abstract: [+]
With the expanding pattern of outsourcing information to the cloud for proficient information stockpiling, secure information coordinated effort benefit including information read and write in cloud computing is earnestly required. In any case, it presents numerous new difficulties toward information security. The key issue is the means by which to bear the cost of secure compose task on ciphertext cooperatively, and alternate issues incorporate trouble in key generation and management. This paper proposes a novel key generation algorithm which provides authenticity of cloud users.
Keywords:  Key Generation Scheme, Cloud, generation algorithm, authenticity, users.
| References: [+]
[1]Singh A, Malhotra M. “Analysis for exploring scope of mobile agents in cloud computing”, International journal of advancements in Technology.Vol.3,no.3, pp.172-83,2012.
[2]Available Online : https://www.bartleby.com/essay/The-Option-of-Cloud-Computing-FKGDY3NJDM6S
[3]Available Online : https://www.coursehero.com/file/p113uc0/3-Software-as-a-Service-SaaS-refers-to-providing-on-demand-applications-over
[4]Goyal V, Pandey O, Sahai A, “Waters B. Attribute-based encryption for fine-grained access control of encrypted data”, Proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
[5]Ostrovsky R, Sahai A, “Waters B. Attribute-based encryption with non-monotonic access structures”, Proceedings of the 14th ACM conference on Computer and communications security, pp. 195-203, 2007.
[6]Available Online : https://www.slideshare.net/PvrtechnologiesNellore/enabling-cloud-storage-auditing-with-key-exposure-resistance-56229174
[7]Available Online : https://www.irjet.net/archives/V3/i11/IRJET-V3I11156.pdf
[8]Zhou, L., Varadharajan, V., Hitchens, M., “Trust enhanced cryptographic role-based access control for secure cloud data storage” IEEE transactions on information forensics and security, Vol.10,no.11, pp. 2381-2395,2015.
[9]Ali, M., Malik, S. U., Khan, S. U, “ DaSCE: Data security for cloud environment with semi-trusted third party”, IEEE Transactions on Cloud Computing, Vol.5,no.4, pp.642-655, 2015.
[10]Tian, J., & Jing, X. “A Lightweight Secure Auditing Scheme for Shared Data in Cloud Storage”, IEEE Access., 2019.
[11]Al Hamid, H. A., Rahman, S. M. M., Hossain, M. S., Almogren, A., Alamri, A. “A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography”, IEEE Access, Vol.5, pp.22313-22328,2017.
[12]Yu, J., Lu, P., Zhu, Y., Xue, G., & Li, M. “Toward secure multikeyword top-k retrieval over encrypted cloud data”, IEEE transactions on dependable and secure computing, Vol.10,no.4, pp.239-250,2013.
[13]Wang, Y., Wu, Q., Qin, B., Shi, W., Deng, R. H., & Hu, J.,”Identity-based data outsourcing with comprehensive auditing in clouds”, IEEE transactions on information forensics and security, Vol.12,no.4,pp. 940-952,2016.
[14]Varadharajan, V., Tupakula, U. “Security as a service model for cloud environment”, IEEE Transactions on network and Service management, Vol.11,no.1,pp. 60-75, 2014.
[15]Available Online : www.amagsmb.wordpress.com
[16]Aparna, J. R., Sonal Ayyappan. "Image watermarking using Diffie Hellman key exchange algorithm." Procedia Computer Science, Vol,. 46,pp. 1684-1691,2015.
| Download File
A Systematic Study of Fog Computing: Challenges, Issues and Applications
Ranjit Rajak
Department of Computer Science and Applications, Dr.HarisinghGour Central University, Sagar, M.P, India.
Pages: 6569–6579
Abstract: [+]
Trend in the technology is changing and its demand also increases. The Conventional computing platform was not too much efficient to solve all the problems and which was also very costly. Today everywhere is challenges of the data processing and fast access to the services are demanded. For this cloud is invented and it is providing service to user as per requirements on the basis of pay and use of resources principle. Fog computing is an extension of cloud computing. Their demand is incorporated in IoT. Fog computing is collections of various fog nodes and these nodes are associated with the cloud. It provides fast access and low latency. It also provides some service to end-user such as application, compute, data and storage capacity. This paper presents fog computing architecture, different type’s characteristics it holds. It also discussesvarious issues, challenges and application of fog computing.
Keywords:  Fog Computing, Abstraction, Edge Location, Heterogeneity, SDN, Cloud computing
| References: [+]
[1]AvailableOnline:https://techradar.cisco.com/pdf/ciscotechnologyradar.pdf
[2]Bonomi, F., Milito, R., Zhu, J., Addepalli, S.,” Fog computing and its role in the internet of things”, MCC '12: Proceedings of the first edition of the MCC workshop on Mobile cloud computing,pp.13–16, 2012.
[3]NehaShrikantDhande,’ Fog Computing: Review Of Privacy And Security Issues”, International Journal of Engineering Research and General Science, Vol.3, no.2, pp.864-868,2015.
[4]ShabnamKumari, Surender Singh, Radha , " Fog Computing: Characteristics and Challenges " , International Journal of Emerging Trends & Technology in Computer Science, Vol.6, no.2, pp.113-117,2017.
[5]Prakash P, Darshaun K.G, Yaazhlene. P, MedidhiVenkata Ganesh, Vasudha B,” Fog Computing: Issues, Challenges and Future Directions”International Journal of Electrical and Computer Engineering, Vol. 7, no. 6, pp. 3669~3673, 2017.
[6]AvirupDasgupta , AsifQumer Gill,” Fog Computing Challenges: A Systematic Review”, Australasian Conference on Information Systems , Hobart, pp.1-8,2017.
[7]RanjitRajak,” A Comparative Study : Taxonomy of High Performance Computing”., International Journal of Electrical and Computer Engineering , Vol. 8, no. 5, pp. 3386-3391,2018.
[8]Gollaprolu Harish, S.Nagaraju, Basavoju Harish, MazeedaShaik,”A Review on Fog Computing and its Applications”, International Journal of Innovative Technology and Exploring Engineering , Vol.8, no.6C2, pp.274-278,2019.
[9]S. Madakam, P. Bhagat, “Fog Computing in the IoT Environment: Principles, Features, and Models,” Fog Computing, Cham, Vol. 43, no. 5, pp. 23–43,2018.
[10]SandeepKaur, Er. C.K.Raina,”Survey Paper on Fog Computing”,International Journal of Scientific Research in Computer Science, Engineering and Information Technology,Vol.2, no.3,pp.420-422, 2017.
[11]ShabnamKumari, SurenderSingh andRadha ,” Fog Computing: Characteristics and Challenges”, International Journal of Emerging Trends & Technology in Computer Science , Vol.6, no.2,pp.113-117, 2017.
[12]S. Yi, Z. Qin , Q. Li, "Security and privacy issues of fog computing: A survey", Proc. Int. Conf. Wireless Algorithms Syst. Appl. (WASA),,pp. 1-10, 2015.
[13]R. Waheetha , Sowmya Fernandez,” Fog Computing And Its Applications,” International Journal of Advanced Research in Basic Engineering Sciences and Technology , Vol.2, no.19, pp.56- 62,2016.
[14] GoharRahman , Chuah Chai Wen,” Fog Computing, Applications , Security and Challenges, Review”, International Journal of Engineering & Technology, Vol.7,no.3,pp1615-1621, 2018.
| Download File
A Hybrid Learning Approach to Detect Malware in Android Applications for Sustainable IT Development
1Saquib Anwar, 2M.Rajalakshmi, 3A.V Abhiram, 4Atharva Mishra, 5Shashank Upadhyay
1,3,4,5 School of Computing, SRM Institute of Science and Technology, KTR, Tamil Nadu, India.
2Assistant Professor, School of Computing, SRM Institute of Science and Technology, KTR, Tamil Nadu, India.
Pages: 6580–6594
Abstract: [+]
The Android working framework is the most well known and most utilized stage in today’s world and it is supported by Google. As it is so much in demand, it has caught the eye of cyber criminals also and they have started introducing malicious applications which are present in Google Play store without the knowledge of users. In this paper, the proposed methodology is using Genetic Selection algorithm to reduce the features for classifying and reducing the time required to process the model. After reducing the features, the data is split into training and test sets and the accuracy is then observed. First the model is tested with simple SVM (Support Vector Machine) and NN (Neural Networks) algorithms and later it is then tested with SVM and NN with Genetic Selection algorithm with the reduced features and the complexity of the classifiers is lessened by a major difference.
Keywords:  Malware Detection, Neural Network, SVM, Genetic Algorithm, Confusion Matrix.
| References: [+]
[1]D. Arp, M. Spreitzen barth, M. Hübner, H. Gascon, K. Rieck, “Drebin: Effective and Explainable Detection of Android Malware in Your Pocket,” Proceedings Network and Distributed System Security Symposium, 2014.
[2]N. Milosevic, A. Dehghantanha, K. K. R. Choo, “Machine learning aided Android malware classification,” Computers & Electrical Engineering, Vol. 61, pp.266-274, 2017.
[3]S. Arshad, M. A. Shah, A. Wahid, A. Mehmood, H. Song, and H. Yu, “SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System,” IEEE Access, vol. 6, pp. 4321–4339, 2018.
[4]J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-An, H. Ye, “Significant Permission Identification for Machine-Learning-Based Android Malware Detection,” IEEE Trans. Ind. Informatics, vol. 14, no. 7, pp. 3216–3225, 2018.
[5]A. Saracino, D. Sgandurra, G. Dini, F. Martinelli, “MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention,” IEEE Trans. Dependable Secur. Comput., vol. 15, no. 1, pp. 83–97, 2018.
[6]Daniel Arp, Michael Spreitzenbarth, Malte H¨ubner, Hugo Gascon, Konrad Rieck, “DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket”, Network and Distributed System Security Symposium (NDSS),2014.
[7]Modupe Odusami, Olusola Abayomi-Alli1, Sanjay Misra, Olamilekan Shobayo, Robertas Damasevicius, Rytis Maskeliunas, “Android Malware Detection: A Survey”, International Conference on Applied Informatics, 2018.
[8]Iker Burguera, Urko Zurutuza Simin Nadjm-Tehrani, “Crowdroid: Behavior-Based Malware Detection System for Android”, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011.
[9]Thomas Blasing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak, “An Android Application Sandbox System for Suspicious Software Detection” Malicious and Unwanted Software (MALWARE), 2010.
| Download File
An Analysis of the Rising Concerns of an Insider Threat for Sustainable IT Development
1M S V Sashi Kumar, 2CRK Reddy, 3DivyaKanchukatla
1Assistant Professor, Department of CSE, Vasavi College of Engineering, Hyderabad, India.
2Professor, Department of CSE, Mahatma Gandhi Institute of Technology, Hyderabad, Telangana, India.
3Department of CSE, Vasavi College of Engineering, Hyderabad, India.
Pages: 6595–6612
Abstract: [+]
Insider threats are occurring across all the organizations and it is causing a great damage to the business.Some of the threats like stealing confidential data or secrets related to business activities.Insider threat can happen when any employ misuse the access and also due to negligence that means he is leaving the system without locking.It also occurs because of the personal benefits of the employs and also competition between the different organization.Insider threats can be stopped by implementing programs related to insider threats and also some strategies for preventing threats.In Insider threat program every employ must participate and they should get awareness regarding the privacy at work.We can also prevent them by having policies,procedures,security controls etc.In this paper,we discussed all the existing machine learning algorithms used for Insider threat detection.We also discussed on tools,products used for Insider threat detection.
Keywords: Insider Threat, Machine Learning, CERT Dataset information,Sustainable development, Information Technology
| References: [+]
[1]D. Costa, "CERT definition of 'Insider Threat'," 7 March 2017, Available Online : https://insights.sei.cmu.edu/insider-threat/2017/03/cert-definition-of-insider-threat--- updated.html.
[2]Diana Haider. " Opportunistic Machine Learning Methods for Effective Insider Threat Detection", Thesis, Birmingham City University, 2018.
[3]T. Rashid, I. Agrafiotis, J. R. Nurse, "A new take on detecting insider threats: Exploring the use of hidden Markov models", Proceedings of the 2016 International Workshop on Managing Insider Security Threats, ACM, pp. 47–56,2016.
[4]A. Michael , J.H.P. Eloff, "A Machine Learning Approach to Detect Insider Threats in E-mails Caused by Human Behaviours", Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance , pp.34-49, 2019.
[5]A. Gamachchi, L. Sun, S. Boztas, "Graph-based framework for malicious insider threat detection," Proceedings of the 50th Hawaii International Conference on System Sciences, pp. 2638-2647, 2017.
[6]D. Haidar , M. M. Gaber, "Adaptive One-Class Ensemble-based Anomaly Detection: An Application to Insider Threats," International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, pp. 1-9, 2018.
[7]B. Bose, B. Avasarala, S. Tirthapura, Y. Y. Chung, D. Steiner, "Detecting insider threats using radish: A system for real-time anomaly detection in heterogeneous data streams," IEEE Systems Journal,Vol.11, no.2 , pp. 471-482, 2017.
[8]Kandias, M., Stavrou, V., Bozovic, N., Mitrou, L., Gritzalis, D, “Can we trust this user? Predicting Insider's attitude via youtube usage profiling”, IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing, pp. 347–354,2013.
[9]Rashid, T., Agrafiotis, I., Nurse, J.R.C, “A new take on detecting insider threats: exploring the use of hidden Markov models”, International Workshop on Managing Insider Security Threats, pp. 47–56, 2016.
[10]J. Zhang, Y. Chen, A. Ju, "Insider threat detection of adaptive optimization DBN for behaviour logs," Turkish Journal of Electrical Engineering & Computer Sciences, Vol.26,no.2 pp. 792- 802, 2018.
[11]A. Tuor, S. Kaplan, B. Hutchinson, N. Nichols and S. Robinson, "Deep Learning for Unsupervised Insider Threat Detection in Structured Cybersecurity Data Streams”, Neural and Evolutionary Computing, " pp. 1-9, 2017.
[12]Hunker, J., & Probst, C. W, “Insiders and insider threats—an overview of definitions and mitigation techniques”. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications,Vol. 2,no.1,pp. 4-27,2011.
[13]Nan Liang , David Biros," IDENTIFYING COMMON CHARACTERISTICS OF MALICIOUS INSIDERS”, Annual ADFSL Conference on Digital Forensics, Security and Law, pp.161-175,2015.
[14]Hayden, M. “The insider threat to US government information systems”, DTIC Document,1999.
[15]Available Online : https://cdw-prod.adobecqms.net/content/dam/cdw/on-domain-cdw/brands/proofpoint/ponemon-global-cost-of-insider-threats-2020-report.pdf
[16]Available Online : https://www.varonis.com/blog/insider-threats/#:~:text=Here%20are%20a%20few%20recent,drive%20full%20of%20personnel%20data.
[17]Available Online : https://empow.co/product/?cn-reloaded=1
[18]Available Online : https://www.sei.cmu.edu/research-capabilities/all work/display.cfm?customel_datapageid_4050=21232
[19]AvailableOnline:https://odin.cse.buffalo.edu/research/insider-threats/index.html
[20]AvailableOnline:https://markets.businessinsider.com/news/stocks/norton-core-validates-need-for-home-wi-fi-network-security-more-than-90-million-threats-blocked-in-first-year-1027446810#
[21]SEUL-GI CHOI , SUNG-BAE CHO, "Evolutionary Reinforcement Learning for Adaptively Detecting Database Intrusions", Logic Journal of the IGPL ,Vol,28, no.4, pp.449–460,2020.
[22]Chinchani, R., Iyer, A., Ngo, H. Q., & Upadhyaya, S. “Towards a theory of insider threat assessment. Paper presented at the Dependable Systems and Networks”, International Conference on Dependable Systems and Networks ,2005.
[23]Available Online : https://www.cybersecurity-insiders.com/tesla-employee-passes-secret-information-to-competitors/
[24]Andropov, S., Guirik, A., Budko, M.,” Network: Anomaly detection using artificial neural networks”, Open Innovations Association, pp. 26–31 ,2017,
[25]Punithavathani DS, Sujatha K, Jain JM , “Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence”, Cluster Computing ,Vol.18,no.1,pp.435–451,2015.
[26]W. Meng, E. W. Tischhauser, Q. Wang, Y. Wang and J. Han, "When Intrusion Detection Meets Blockchain Technology: A Review," Special Section On Research Challenges And Opportunities In Security, pp. 10179 - 10188, 2018.
[27]Suraj Nellikar, David M. Nicol, Jai J Choi, "Role-based differentiation for insider detection algorithms", Insider Threats '10: ACM workshop on Insider threats .pp. 55–62, 2010.
[28]N. Moustafa, G. Creech , J. Slay, "Big Data Analytics for Intrusion Detection System: Statistical Decision-Making using Finite Dirichlet Mixture Models," Data Analytics and Decision Support for Cybersecurity, pp. 137- 177, 2017.
[29]G. Gavai, K. Sricharan, D. Gunning, J. Hanley, M. Singhal, R. Rolleston, "Supervised and unsupervised methods to detect insider threat from enterprise social and online activity data," J. Wireless Mobile Networks, Ubiquitous Computing, & Dependable Applications, vol. 6, no. 4, 2015.
[30]T. E. Senator et al., "Detecting insider threats in a real corporate database of computer usage activity," Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.1393–1401,2013.
[31]Duc C. Le ,A. Nur Zincir-Heywood," Evaluating Insider Threat Detection Workflow Using Supervised and Unsupervised Learning", IEEE Symposium on Security and Privacy Workshops 2018.
[32]Obinna Igbe , Tarek Saadawi, "Insider Threat Detection using an Artificial Immune system Algorithm" , 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON),2018 .
[33]A. Sallam , E. Bertino, "Detection of temporal insider threats to relational databases," IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp. 406–415, 2017.
[34]Lian, Y., Dai, Y., Wang, H, “User behaviour anomaly detection based on pattern mining”, Journal of Computer and System Sciences, Vol.25,no.3,pp. 325–330, 2002.
[35]B. Camiña, C. Hernández-Gracidas, R. Monroy, L. Trejo, “The Windows-Users and Intruder simulations Logs dataset (WUIL): Experimental framework for masquerade detection mechanisms”, Expert Systems with Applications, Vol.41,no. 3,919–930, 2014.
[36]Nance, Kara, Raffael Marty, "Identifying and Visualizing the Malicious Insider Threat Using Bipartite Graphs”, 44th Hawaii International Conference on System Sciences .pp.1-9,2011.
[37]Diana Haidar, Mohamed Medhat Gaber, "Data Stream Clustering for Real-time Anomaly Detection: An Application to Insider Threats", Clustering Methods for Big Data Analytics, pp 115-144,2018.
[38]Available Online : https://www.securonix.com/solutions/insider-threat/
[39] Wei Jiang, Yuan Tian, Weixin Liu and Wenmao Liu," An Insider Threat Detection Method Based on User Behavior Analysis", International Conference on Intelligent Information Processing, pp. 421-429, 2018.
[40]Joakim Bulow , Maja Scherman, " Insider Threat Detection using Isolation Forest",Department of Electrical and Information Technology, 2018.
[41]Junhong Kim, Minsik Park, Haedong Kim, Suhyoun Cho and Pilsung Kang, "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms", Applied Sciences ,Vol.9,no.19,2019.
[42]Glasser, Joshua & Lindauer, Brian, “ Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data”, IEEE CS Security and Privacy Workshops ,pp.98-104, 2013.
[43]Bishop, M., Gates, C. “Defining the insider threat” Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead,2008.
[44]Hayden, Lt Gen Michael V, “The Insider Threat to US government Information Systems”, National Security Telecommunications and Information Systems Security Committee (NSTISSAM) INFOSEC, pp.1-99,1999.
[45]Available Online : https://www.ekransystem.com/en/blog/portrait-malicious-insiders
[46]Available Online : https://towardsdatascience.com/simple-guide-for-ensemble-learning-methods-d87cc68705a2
[47]Available Online : https://undercodenews.com/the-direct-loss-of-the-former-cisco-employees-deletion-of-the-database-after-leaving-the-company-reaches-2-4-million-us-dollars/30/08/2020/amp/
| Download File
Compressive Behaviour of Sustainable RC Columns Confined with Carbon Fibre Reinforced Polymers
1 N.Suthan Kumar and 2M.P.Chockalingam
1Research Scholar, Civil Engineering Department, Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India.
2Professor, Civil Engineering Department, Bharath Institute of Higher Education And Research, Chennai, Tamil Nadu, India.
Pages: 6613–6622
Abstract: [+]
Fiber-reinforced polymer (FRP), also known as fiber-reinforced plastic, is a composite material consisting of a fiber-reinforced polymer matrix. Commonly used fibers are glass, carbon and aramid, while alternative fibers such as paper, wood or asbestos are also used. The polymer matrix used consists of a thermoset plastic made of epoxy, vinyl ester or polyester and phenol-formaldehyde resin.Various field of application of FRPs are aerospace, automotive, marine, alsoconstruction industries. FRPs were found to be an best alternate to conventional construction materials. Hence a strive was made to experimentally study the compressive behavior of RC columns confinedusingCFRPs. The parameters considered in this experimentalstudy were height of the RC column (0.9m, 1.2m, 1.5m and 1.8m) and number of plies (single and double plies). The experimental result shows showsgreaterstrength in compressioncompared toother RC columns confined with carbon fibre reinforced polymers for both single as well as double plies.\
Keywords:  CFRP; RC column; Strengthening; Confinement; Strength in compression.
| References: [+]
[1]Bousselham, A. Chaallal O, “Mechanisms of shear resistance of concrete Specimens strengthened in shear with externally bonded FRP,” Journal of Composites for Construction, Vol,12,no.5,pp. 499-512, 2008.
[2]Eid, R., Paultre, P, “Compressive behavior of FRP-confined reinforced concrete columns”, Engineering Structures, Vol.132, pp.518-530, 2017.
[3]El-Hacha, R., Green, M. F., Wight, G. R, “Effect of severe environmental exposures on CFRP wrapped concrete columns,” Journal of Composites for Construction, Vol.14,no.1, pp.83-93,2010.
[4]Jiang, T., Teng, J. G,“Behavior and design of slender FRP-confined circular RC columns”, Journal of Composites for Construction, Vol.17, no.4, pp.443-453,2013.
[5]Lamanna, A. J., Bank, L.C., Scott, D. W. “Split tensile strengthening of reinforced concrete Specimens by mechanically attaching fibre-reinforced polymer strips”, Journal of Composites for Construction, Vol.8, no.3, pp.203-210, 2004.
[6]Mane, H. H., Pitale, N. H. “Review on use of FRP composite system with RCC beam and column”, International Journal of Science Technology & Engineering, Vol.7,no.2, pp.125-127, 2016.
[7]Manie, S., Jami, E.,Azarian, Z,“Simplified design of FRP-confined square RC columns under bi-axial bending”, Buildings, Vol.7, no.74, pp.1-13, 2017.
[8]Parvin, A., Brighton, D. “FRP composites strengthening of concrete columns under various loading conditions”, Polymers, Vol. 6, pp.1040-1056, 2014.
[9]Rao, P. S., Husain, M. M., Ravishankar, D. V, “An investigation on strength degradation of GFRP laminates under environmental impact”, International Journal of Composite Materials,Vol.2,no.4, pp. 48-52,2012.
[10] Sangeetha, P., Sumathi, R., “Behaviour of glass fibre wrapped concrete columns under uniaxial compression”, International Journal of Advanced Engineering Technology, Vol.1, no.1, pp.74-83, 2010.
| Download File
Sustainable Fibre Reinforced Polymers Confined CFT Columns under Axial Compression
1V.Thanka Jebarsan and 2M.P.Chockalingam
1Research Scholar, Department of Civil Engineering, Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India.
2Professor, Department of Civil Engineering, Bharath Institute of Higher Education and Research, Chennai, Tamil Nadu, India.
Pages: 6623–6631
Abstract: [+]
Using FRP, the structures can be strengthened which seems to be an advantageous method. Due to its composite property, the structural strength is easily achieved and can easily apply in damaged areas. In recent years, the external confinement of FRP on concrete and steel structures for strengthening and retrofitting has been increasing. The compressive strengthof steel tube columnsfilled by concrete (CFT) and strengthened with FRPs are discussed in this paper. The various parameters included in the study aredifferent wrapping materialsarecarbon, glass, basalt fibersand number of piles (single and double piles). It is concluded that CFT columns confined using carbon fiber reinforced polymers (CFRPs) shows greater compressive strength compared to other FRPs in both single and double piles.
Keywords:  GFRP; BFRP; CFRP; CFT column; Strengthening; Confinement; Compressive strength.
| References: [+]
[1]Hadi, M.N.S. “Behaviour Of Frp Wrapped Normal Strength Concrete Columns Under Eccentric Loading”, Composite Structures Vol.72,No.4,pp.503-511,2006.
[2]Hu, Ym., T, Yu, & J.G,.Teng , “Frp-Confined Circular Concrete-Filled Thin Steel Tubes Under Axial Compression”, Journal Of Composites For Construction, Vol. 15, No. 5, pp. 850-860, 2011.
[3]Ilki, A., O. Peker, E. Karamuk, C. Demir, N. Kumbasar , “Frp Retrofit Of Low And Medium Strength Circular And Rectangular Reinforced Concrete Column”, Journal Of Materials In Civil Engineering, Vol. 20, pp. 169-188, 2008.
[4]Lamanna, A.J., L.C. Bank , D.W. Scott, “Split Tensile Strengthening Of Reinforced Concrete Specimens By Mechanically Attaching Fibre-Reinforced Polymer Strips”, Journal Of Composites For Construction, Vol. 8, pp. 203-210,2004.
[5]Miyauchi, K., S. Inoue, T. Kuroda, A. Kobayashi, “Strengthening Effects Of Concrete Column With Fibre Sheet”, Japan Concrete Institute, Vol. 21, pp. 143-150,1999.
[6]Murugan, M., C. Natarajan And K. Muthukkumaran, “Flexural Behavior Of Concrete Prisms Confined With Frp Composites”, International Journal Of Construction Materials And Structures, Vol. 02, pp. 15-28, 2014.
[7]Murugan, M., K. Muthukkumaran , C. Natarajan, “Compressive Behaviour Of Concrete Cubes Confined With Glass And Carbon Fibre Reinforced Polymers”, International Journal Of Engineering & Science Research, Vol. 03, pp. 2618-2626. 2013.
[8]Nishizaki, I., S. Meiarashi, “Long-Term Deterioration Of Gfrp In Water And Moist Environment”, Journal of Composites For Construction”, Vol. 6, pp. 21-27, 2002.
| Download File
Topology and Performance Analysis of Cascadable Nine Level Inverter by Packed UCell Invertor and using Multi-Mode Synchronized PWM Schemes
1S.Jayaprakash, 2K.Gunalan, 3J.Prakash, 4K.R.Sugavanam
1Assistant Professor, School of EEE, Sathyabama institute of science and Technology, Chennai, Tamil Nadu, India.
2Associate Professor, Department of Electrical and Electronics Engineering, R.M.K. College of Engineering and Technology, Chennai, Tamil Nadu, India.
3&4 Department of Electrical and Electronics Engineering, Jaya College of Engineering and Technology, Chennai, Tamil Nadu, India.
Pages: 6632–6646
Abstract: [+]
Packed u cell invertor is used on the cascadable nine level inverter. The two hardware of five level inventor of packed u cell inverter (PUC5) is used for cascadable nine level inverter. The topology and performance analysis are done on the cascadable nine level inverter. Multimode synchronized pulse width modulation scheme integrates this method of self-voltage balancing regardless of change in voltage happen, a nine-level voltage waveform has been yielded with less symphonious twisting, since it maintains the steady capacitor voltage at required level. Design has been completed with MATLAB/Simulink.
Keywords: Nine level inverter, Inverter with less components count, Multilevel inverter (MLI), UCell Invertor , Cascadable inverter topology.
| References: [+]
[1]D. M. D.Mohan and S. B.Kurub, “A Comparative Analysis of Multi Carrier SPWM Control Strategies using Fifteen Level Cascaded H bridge Multilevel Inverter”, Int. J. Comput. Appl., Vol. 41, No. 21, pp. 7–11,2012.
[2]P. Cortes, A. Wilson, S. Kouro, J. Rodriguez, H. Abu-Rub, “Model predictive control of multilevel cascaded H-bridge inverters”, IEEE Trans. Ind. Electron., Vol. 57, No. 8, pp. 2691–2699, 2010.
[3]S. P. Sunddararaj, S. S. Rangarajan, N. Subashini, “An extensive review of multilevel inverters based on their multifaceted structural configuration, triggering methods and applications”, Electron., Vol. 9, No. 3, 2020.
[4]R. Sundar, C. Gnanavel, P. Muthukumar, “A Unique Single Source Nine Level Inverter with Reduced Switching Devices for Single Phase AC Applications”, Int. J. Eng. Adv. Technol., Vol. 9, No. 2, pp. 4098–4101, 2019.
[5]Gao, Fei. "An enhanced single-phase step-up five-level inverter", IEEE Transactions on Power Electronics, vol. 31, no. 12 ,pp.8024-8030,2016
[6]P. Satheesh Kumar, Dr. S. P. Natarajan, Dr. Alamelu Nachiappan, Dr. B. Shanthi, “Performance Evaluation of Nine Level Modified CHB \nMultilevel Inverter for Various PWM Strategies”, International Journal of Modern Engineering Research, Vol. 3, no. 5, pp. 2758–2766, 2013.
[7]S. B. Veeranna, A. R. Beig, U. R. Yaragatti, “Performance analysis of PWM strategies for cascaded H-bridge three-level inverter”, IEEE GCC Conf. Exhib. GCC, pp. 81–84, 2011.
[8]R. Nagarajan and M. Saravanan, “Performance analysis of a novel reduced switch cascaded multilevel inverter”, J. Power Electron., Vol. 14, No. 1, pp. 48–60, 2014.
[9]C. Kannan, N. K. Mohanty, R. Selvarasu, “A new topology for cascaded H-bridge multilevel inverter with PI and Fuzzy control”, Energy Procedia, Vol. 117, pp. 917–926, 2017.
[10]M. F. Yaakub, “The Implementation of Sinusoidal PWM on Single Phase 5-Level Cascaded H-Bridge Multilevel Inverter”, Universiti Tun Hussein Onn Malaysia, no. 1-55, 2013.
[11]M. A. Mostafa, A. F. Abdou, A. F. A. El-Gawad, E. E. El-Kholy, “Comparison of multi-carrier and SHE-PWM for a nine levels cascaded H-bridge inverter”, 19th Int. Middle-East Power Syst. Conf. MEPCON 2017 - Proc., pp. 1483–1491, 2018.
[12]A .Mokhberdoran and A. Ajami, “Symmetric and asymmetric design and implementation of new cascaded multilevel inverter topology”, IEEE Trans. Power Electron., Vol. 29, No. 12, pp. 6712–6724, 2014.
[13]N. Agrawal and R. Katna, “Applications of Computing, Automation and Wireless Systems”, Lecture Notes in Electrical Engineering, Vol. 553, No, 2019.
[14]M. G. HosseiniAghdam, S. H. Fathi, and G. B. Gharehpetian, “Analysis of multi-carrier PWM methods for asymmetric multi-level inverter”, 3rd IEEE Conf. Ind. Electron. Appl. ICIEA ,No. 424, pp. 2057–2062, 2008.
[15]M. Hagiwara, K. Nishimura, and H. Akagi, “A medium-voltage motor drive with a modular multilevel PWM inverter,” IEEE Trans. Power Electron., Vol. 25, No. 7, pp. 1786–1799, 2010.
[16]S.Malathy and U.Shajith Ali, “Performance Analysis of Multi-Carrier PWM Based Cascaded Multilevel Inverter”, G. J. P&A Sc and Tech, pp. 32–40, 2012.
[17]S. Rajalakshmi and P. Rangarajan, “Analysis of Reduced Switch Topology Multilevel Inverter with Different Pulse Width Modulation Technique and Its Application with DSTATCOM”, Circuits Syst., Vol. 07, No. 09, pp. 2410–2424, 2016.
[18]M. Chithra and S. G. B. Dasan, “Analysis of cascaded H bridge multilevel inverters with photovoltaic arrays”, Int. Conf. Emerg. Trends Electr. Comput. Technol. ICETECT , pp. 442–447, 2011.
[19]K. Busireddy, M. M. Lokhande, R. R. Karasani, and V. B. Borghate, “A Modified Space Vector PWM Approach for Nine-Level Cascaded H-Bridge Inverter”, Arab. J. Sci. Eng., Vol. 44, No. 3, pp. 2131–2149, 2019.
[20]A.Ajami, M. R. J. Oskuee, A. Mokhberdoran, and A. Van Den Bossche, “Developed cascaded multilevel inverter topology to minimise the number of circuit devices and voltage stresses of switches”, IET Power Electron., vol. 7, no. 2, pp. 459–466, 2014.
[21]B. K. Anderson, “Synchronized Pulse-Width Modulation (SPWM) Free scale Semiconductor”, pp. 1–24, 2004.
[22]Prakash, J., S.K. Sahoo, S.P. Karthikeyan, “A novel technique for common mode- voltage Elimination and DC- Link Balancing in Three-Level Inverter”, international Review on modeling and simulations, Vol.5, no.2, pp.840-845, 2012.
[23]Prakash, J., S.K. Sahoo, S. Prabhakar Karthikeyan, I. Jacob Raglend, “Design of PSO-Fuzzy MPPT Controller for Photovoltaic Application”, Power Electronics and Renewable Energy Systems, Lecture Notes in Electrical Engineering, Vol. 326, pp. 1339-1348, 2015.
[24]Prakash, J., S.K. Sahoo, “Design of Soft Switching Interleaved Boost converter for Photovoltaic application”, Research Journal of Applied Sciences, Engineering and Technology, Maxwell Scientific Organization, Vol. 9 No .4, 2015.
| Download File
Energy Efficient Routing and LBK for Secure Communication in Vehicular Adhoc Network with End- To-End Authentication
R. Annamalai Saravanan
Associate Professor, Department of Computer Science, Nehru Arts andScienceCollege, India.
Pages: 6647–6661
Abstract: [+]
Independent vehicular clouds require substantial end-to-end communication to become an intelligent transportation system. Though, safety and secrecy disputes are still enormous encounters in autonomous vehicular clouds system. Vehicular Ad hoc (VANET) network has turned out to be an unindustrialized and emerging focus of many researchers. Therefore for instituting consistent end-to-end communication routes, seamless way of data encryption is necessary for having proficient data transfer. VANET on the other hand have network concerns with dissimilar networks, therefore pervasive connectivity and measure to overcome security threats in wireless units is of primary concern. By this paper, an end to end authentication and location based key management for secure communication is proposed. The proposed scheme makes use of VANET architecture and effectively manages authentication over vehicular cloud by overcoming liability in the secure communications.
Keywords:  Energy Efficient Routing, intelligent, transportation system, dissimilar networks ,vehicular clouds system.
| References: [+]
[1]Lin, Y.W., Chen, Y.S., Lee, S.L.” Routing Protocols in Vehicular Ad Hoc Networks: A Survey and Future Perspectives”, J. Inf. Sci. Eng., vol. 26, pp. 913–932, 2010.
[2]Dahiya, A.; Chauhan, R.K. “A Comparative study of MANET and VANET environment”, J. Comput., vol. 7, pp.87–91, 2010.
[3]Pallavi A Targe and M P Satone, “VANET based Real-Time Intelligent Transportation System”, International Journal of Computer Applications, vol.145, no.4, pp. 34-38, 2016.
[4]P. Mohit, R. Amin, and G. P. Biswas, “Design of authentication protocol for wireless sensor network-based smart vehicular system”, Veh. Commun, Vol. 9, pp. 64_71, 2017.
[5]C. Bian, T. Zhao, X. Li, and W. Yan, “`Boosting named data networking for data dissemination in urban VANET scenarios'', Veh. Commun, Vol. 2, No. 4, pp. 195_207, 2015.
[6]Al-kahtani, Salman bin Abdulaziz and Al Kharj, “Survey on security attacks in Vehicular Ad hoc Networks (VANETs)”, 6th International Conference on Signal Processing and Communication Systems (ICSPCS), 2012.
[7]Sherali Zeadally, et al, “Vehicular ad hoc networks (VANETS): status, results, and challenges Telecommunication Systems”, Telecommunication Systems, vol. 50, pp.217–241, 2012.
[8]Navpreet Panjrath and Monika Poriye, “A Comprehensive Survey of VANET Architectures and Design”, International Journal of Advanced Research in Computer Science, Vol 8, No. 5, pp. 2099-2103, 2017
[9]Ameneh Daeinabi et al, “VWCA: An efficient clustering algorithm in vehicular ad hoc networks”, Journal of Network and Computer Applications,vol.34,no.1, pp. 207–222, 2011.
[10]J. A. C. GuerreroIbáñez, C. Flores-Cortés, and S. Zeadally, “Vehicular ad-hoc networks (VANETs): Architecture, protocols and applications in Next-Generation Wireless Technologies”, Next-Generation Wireless Technologies pp 49-70,2013.
[11]P. M. Khilar and S. K. Bhoi, ``Vehicular communication: A survey”, IET Netw., Vol. 3, No. 3, pp. 204217, 2014.
[12]W. Liang, Z. Li, H. Zhang, Y. Sun, and R. Bie, “Vehicular ad hoc networks: Architectures, research issues, methodologies, challenges, and trends”, Int. J. Distrib. Sens. Netw., Vol. 11, No. 8, pp. 102-113, 2015.
[13]D. He, S. Zeadally, B. Xu, and X. Huang, “An efficient identity-based conditional privacy- preserving authentication scheme for vehicular ad hoc networks”, IEEE Trans. Inf. Forensics Security, Vol. 10, No. 12, pp. 2681-2691, 2015.
[14]Jin Jia Chang, Yi-Hua Li, Wanjiun Liao and Ing-Chau Chang, “Intersection-based routing for urban vehicular communications with traffic-light consideration”, IEEE Wireless Communications,vol.19, no.1, pp. 82-88, 2012.
[15]Bency Wilson and Preetha, “Enhanced beaconless routing mechanism in VANET”, International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013.
[16]Bilal, S.M., Khan, A.R., Ali, “Review and performance analysis of position based routing protocols”, Wirel. Pers. Commun., vol.94, pp. 559–578, 2016.
[17]Meriem, Moulay Lahcen and Abdeslam, “Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree”, International Workshop on Technologies, Algorithms, Models, Platforms and Applications for Smart Cities, 2018.
[18]Irshad Ahmed Abbasi and Adnan Shahid Khan, “ A Review of Vehicle to Vehicle Communication Protocols for VANETs in the Urban Environment”, Future Internet, vol.10,no.2 ,2018.
[19]Karan Verma, Halabi Hasbullah and Ashok Kumar, “Prevention of DoS Attacks in VANET”, Wireless Personal Communications,vol.73,no.1, 2013.
[20]J. Alves Junior and E. C. G. Wille, “Increasing connectivity in VANETs using public transport backbones”, Revista IEEE América Latina, Vol. 2015, pp. 3421–3431, 2015.
[21]Lin X., Sun X., Wang X., Zhang C., Ho P.H., Shen X, “TSVC: Timed efficient and secure vehicular communications with privacy preserving”, IEEE Trans. Wirel. Commun., vol. 7, pp. 4987–4998, 2008.
[22]Al-Riyami S.S., Paterson K.G, “Certificateless Public Key Cryptography”, Springer; Berlin, Germany: pp. 452–473, 2003.
[23]Maria Claudia Surugiu, Radu Virgiliu Alexandrescu, “Analysis of the Development and Implementation of VANET Network Intervehiculary Communication Systems”, Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013, 2013.
[24]M. Amadeo, C. Campolo, and A. Molinaro, “CRoWN: Content-centric networking in vehicular ad hoc networks”, IEEE Commun. Lett., Vol. 16, No. 9, pp. 1380_1383, 2012.
[25]S. Rao, M. Pai, M. Boussedjra, and J. Mouzna, “GPSR-L: greedy perimeter stateless routing with lifetime for VANETS”, Proceedings of the 8th International Conference on ITS Telecommunications, 2008.
[26]Gokhan korkmaz, et al, “Urban Multi-Hop Broadcast Protocol for Intervehicle Communication Systems”, VANET '04: Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks, pp.76–85, 1999.
[27]M. Gunes, U. Sorges, and I. Bouazizi, “ARA: the ant-colony based routing algorithm for manets”, Proceedings of the 2002 International Conference on Parallel Processing Workshops,2002.
[28]Joilson Alves Junior and Emilio C. G. Wille, “Routing in Vehicular Ad Hoc Networks: Main Characteristics and Tendencies”, Journal of Computer Networks and Communications, Vol. 2018, pp. 1-10, 2018.
| Download File
Bio-Diesel Generation with IC Engine - An Investigation and Analysis of Trio Fuel
1Muthuluru Rajesh,2Y.V.Hanumantha Rao,3P.S.Srinivas,4A.V.Sitarama Raju
1Assistant Professor, V.R. Siddhartha Engineering College, Andhra Pradesh, India.
2Professor, KLEF University, Vaddeswaram, Andhra Pradesh, India.
3Professor & Vice Principal, PSCMR College, Vijayawada, Andhra Pradesh India.
4Retd. Professor, JNTU, Hyderabad, Andhra Pradesh India.
Pages: 6662–6680
Abstract: [+]
The overuse of non-renewable sources contributes to energy supplies being exhausted and the price of oil-based fuels being higher. Thus, viable and renewable alternatives to fossil fuels are to be sought. Availability and renewability or less reliance on restricted resources followed by little or no emissions are key characteristics for alternative fuel. It was found that global oil production is possibly going to decline rapidly, and alternative fuels are expected to meet the growing energy crisis. Simultaneously energy request is rising quickly, just like the cost of unrefined petroleum. It must therefore turn to some other fuels to replace gasoline and diesel to generate electricity. To satisfy the rising need, and an eco-accommodating option was required. Biodiesel draws in developing consideration due to its eco-accommodating and non-harmful nature. Diverse crude materials, impetuses, and advancements can be utilized to create biodiesel. This paper proposes a trio-biodiesel (TB) mix, which comprises of the mix of three unique sorts of biodiesel: Lemongrass biodiesel, Pongamia biodiesel, Radish biodiesel (LPR biodiesel) in diesel.
This method of calculating the different loads using mechanical property tests in a single-cylinder DI diesel engine are utilized.In this paper, three biodiesels are selected on Specific Gravity, Flash Point, Calorific Value, and Cetane number. The motivation behind this examination is to explore different avenues regarding the productivity and outflows of one-chamber direct infusion diesel motors with covering. The trio-fuel is LPR1, LPR2, LPR3, LPR4, LPR5, and LPR6 respectively. Finally, the findings are analyzed and the emission characteristics are determined.
Keywords:  Lemongrass; Pongamia; Radish; Biodiesel; Flashpoint; Calorific Value; and Tri fuel.
| References: [+]
[1]M.A. Fazal, Saeed Rubaiee, A. Al-Zahrani, “Overview of the interactions between automotive materials and biodiesel obtained from different feed stocks”, Fuel Processing Technology, Vol. 196, No.15, pp.1036-178, 2019.
[2]Gabriel O. Ferrero, Edgar M. Sanchez Faba, Adriana A. Rickert, Griselda A. Eimer, “Alternatives to rethink tomorrow: Biodiesel production from residual and non-edible oils using biocatalyst technology”, Renewable Energy, Vol. 150, pp. 128-135, 2020.
[3]Sharad P. Jagtap, Anand N. Pawar, Subhash Lahane, “Improving the usability of biodiesel blend in low heat rejection diesel engine through combustion, performance and emission analysis”, Renewable Energy, Vol. 155, pp. 628-644, 2020.
[4]Indu Ambat, Varsha Srivastava, Mika Sillanpää, “Recent advancement in biodiesel production methodologies using various feedstock: A review”, Renewable and Sustainable Energy Reviews, Vol. 90, pp. 356–369, 2018.
[5]Janakiraman. S, T. Lakshmanan, V. Chandran, Lingesan Subramani, “Comparative Behavior of Various Nano Additives in A Diesel Engine Powered By Novel Garcinia Gummi-Gutta Biodiesel”, Journal of Cleaner Production, No.1 2019.
[6]V. Karthickeyan, B. Ashok, K. Nanthagopal, S. Thiyagarajan, V. Edwin Geo, “Investigation of novel Pistacia khinjuk biodiesel in DI diesel engine with post combustion capture system”, Applied Thermal Engineering, Vol. 159, 2019.
[7]Dilip Kumar, Tapas Das, Balendu Shekher Giri, Bhawna Verma, “Preparation and characterization of novel hybrid bio-support material immobilized from Pseudomonas cepacia lipase and its application to enhance biodiesel production”, Renewable Energy, Vol. 147, pp. 11-24, 2020.
[8]R. Sathiyamoorthi, G. Sankaranarayanan, “Effect of antioxidant additives on the performance and emission characteristics of a DICI engine using neat lemongrass oil–diesel blend”, Fuel, Vol.174, pp.85-96, 2016.
[9]Digambar Singh, Dilip Sharma, S.L. Soni, Sumit Sharma, Pushpendra Kumar Sharma, Amit Jhalani, “A review on feedstocks, production processes, and yield for different generations of biodiesel”, Fuel, Vol. 262, 2020.
[10]S. Shah, M.N. Gupta, “Lipase catalyzed preparation of biodiesel from Jatropha oil in a solvent free system”, Process Biochemistry, Vol. 42, pp. 409-414, 2007.
[11]J. Rodrigues, A. Canet, I. Rivera, N.M. Osorio, G. Sandoval, F. Valero, “Biodiesel production from crude Jatropha oil catalyzed by non-commercial immobilized heterologous Rhizopus oryzae and Carica papaya lipases”, Bioresource Technology, Vol. 213, pp. 88-95, 2016.
[12]D.C. Cubides-Roman, V.H. Perez, H.F. de Castro, C.E. Orrego, O.H. Giraldo, E.G. Silveira, G.F. David, “Ethyl esters (biodiesel) production by Pseudomonas fluorescens lipase immobilized on chitosan with magnetic properties in a bioreactor assisted by electromagnetic field”, Fuel, Vol. 196, pp. 481-487, 2017.
[13]T.A. Andrade, M. Martin, M. Errico, K.V. Christensen, “Biodiesel production catalyzed by liquid and immobilized enzymes: optimization and economic analysis”, Chem. Eng. Res. Des., Vol. 141, pp. 1-14, 2019
[14]Vineet Kumar, Indu Shekhar Thakur, “Biodiesel production from transesterification of Serratia sp. ISTD04 lipids using immobilised lipase on biocomposite materials of biomineralized products of carbon dioxide sequestrating bacterium”, Bioresource Technology, Vol. 307, 2020.
[15]Murat Kadir Yesilyurt, Mustafa Aydin, “Experimental investigation on the performance, combustion and exhaust emission characteristics of a compression-ignition engine fueled with cottonseed oil biodiesel/diethyl ether/diesel fuel blends”, Energy Conversion and Management, Vol. 205, 2020.
[16]Pallavi Paturu, I. Vinoth kanna, “Experimental investigation of performance and emissions characteristics on single cylinder direct injection diesel engine with PSZ coating using Radish Biodiesel”, International Journal of Ambient Energy, Vol.41, No.7, pp. 1-19, 2018.
[17]S. Prakash, M. Prabhahar, O.P. Niyas, Safavanul Faris, C. Vyshnav, “Thermal barrier coating on IC engine piston to improve efficiency using dual fuel”, proceeding of Today Conference on Materials, 2020.
[18]G. Sandeep, G. Dattatreya, S. Rohini Sri Lakshmi, N. Shiva Kumar, Venkatesh Potnuru, “Karanja Oil as An Alternative Fuel with Air Preheater”, International Journal of Mechanical Engineering and Technology, Vol. 8, No. 5, pp. 218–225, May 2017.
[19]Harish Venu and Venkataramanan Madhavan, “Influence of diethyl ether (DEE) addition in ethanol-biodiesel-diesel (EBD) and methanol-biodiesel-diesel (MBD) blends in a diesel engine”, Fuel, Vol.189,pp. 377-390 2017.
[20]Muthuluru Rajesh, Y.V. Hanumantha Rao, P.S. Srinivas and Srinivas Prasad Sanaka, “Experimental Investigation of Dual Biodiesel by Using VCR Engine”, International Journal of Mechanical and Production Engineering Research and Development, Vol. 10, No.3, pp. 1395–1404, 2020.
| Download File
Calibration Techniques for Securing Web Application in Dual Delegation Interoperability Network Model with Green Communication
1Bilal Hikmat Rasheed and 2,*B. Bazeer Ahamed
1Department of Computer Science, Cihan University-Duhok, Kurdistan Region,Iraq.
2Department of IT, University of Technology and Applied Sciences- Al Musanna, Sultanate of Oman.
Pages: 6681–6693
Abstract: [+]
With the increase in the growth of the Internet, web applications such as net banking, online shopping, social networking and email communications have become central and essential part of our everyday life. Web pages are no longer static; they contain dynamic content from diverse sources that may be trusted or untrusted. Providing a good security for the web application and its user becomes hard, expensive, time consuming and quite confusing. However, mitigating the attacks to secure the web application has become very essential and one of the primary liability of the web developers and researchers. Securing the web applications becomes paramount and it is an intricate process with the current technologies since they are very complex to understand, implement and maintain. Thus, the main goal of this research is to reduce the attack by minimizing the amount of time needed to create and maintain the approach. An Interoperability calibration technique called “Dual Delegation Model(DDM)” to protect the web applications from session attacks has been implemented on client-side and on the server-side. This DDM could be added to the client and server as delegates, does the security checks, and manages the sessions by monitoring the communications between client and the server.
Keywords:  Web Application, Green Communication, Dual Delegation Interoperability Network Model, Internet, social network Web Application, Security, Dual Delegation Model, Accuracy.
| References: [+]
[1]Ahamed, B. B., & Hariharan, S.,”Integration of Sound Signature Authentication System”, International Journal of Security and Its Applications, Vol.6, no.4, pp. 77-86,2012.
[2]Ahamed, B. B., & Ramkumar, T. “An intelligent web search framework for performing efficient retrieval of data”, Computers & Electrical Engineering, Vol.56, pp.289-299,2016.
[3]Ahamed, B. B., & Yuvaraj, D. ,” Dynamic Secure Power Management System in Mobile Wireless Sensor Network”, International Conference on Intelligent Computing & Optimization, pp. 549-558,2019.
[4]Alanazi, S. T., Anbar, M., Karuppayah, S., Al-Ani, A. K., & Sanjalawe, Y. K.,” Detection techniques for DDoS attacks in cloud environment”, Intelligent and Interactive Computing, pp. 337-354,2019.
[5]B. Ahamed, R. M. S. Najimaldeen and Y. Duraisamy, "Enhancement Framework of Semantic Query Expansion Using Mapped Ontology," 2020 International Conference on Computer Science and Software Engineering (CSASE), pp. 56-60, 2020.
[6]Calzavara, S., Rabitti, A., & Bugliesi, M. “Sub-session hijacking on the web: Root causes and prevention”,Journal of Computer Security, Vol.27, no.2, pp.233-257,2019.
[7]Cui, Y., Cui, J., & Hu, J. “A Survey on XSS Attack Detection and Prevention in Web Applications”,Proceedings of the 2020 12th International Conference on Machine Learning and Computing, pp.443-449,2020.
[8]Gupta, S., & Gupta, B. B. “Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions”, Journal of Ambient Intelligence and Humanized Computing, Vol.10, no.11, pp.4377-4405,2019.
[9]Li, Jinfeng. "Vulnerabilities Mapping based on OWASP-SANS: A Survey for Static Application Security Testing (SAST)", Annals of Emerging Technologies in Computing (AETiC), Vol. 4, No. 3, pp. 1-8, 2020.
[10]Mezei, R. A., Guimaraes, M., & Chen, X. ,”Introducing Cybersecurity Concepts in Non-Security Courses through a POGIL Activity: A Pilot Study”, Proceedings of the 51st ACM Technical Symposium on Computer Science Education, pp. 1290-1290,2020.
[11]Negi, Priyanka, Anupama Mishra, and Brij B. Gupta. "Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment", arXiv:1304.7073,2013.
[12]Srinivasan, K., Mubarakali, A., Alqahtani, A. S., & Kumar, A. D. ,”A Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection and Mitigation Techniques”, Intelligent Communication Technologies and Virtual Mobile Networks, pp. 252-270,2019.
[13]Staicu, C. A., & Pradel, M., “Leaky images: Targeted privacy attacks in the web”, 28th {USENIX} Security Symposium ({USENIX- Security 19), pp. 923-939,2019.
[14]Usha, G., Kannimuthu, S., Mahendiran, P. D., Shanker, A. K., & Venugopal, D.,” Static analysis method for detecting cross site scripting vulnerabilities”, International Journal of Information and Computer Security, Vol.13, no.1,pp.32-47,2020.
[15]Dwivedi, V., Yadav, H., & Jain, A., “SQLAS: tool to detect and prevent attacks in PHP web applications”, International Journal of Security Privacy and Trust Management (IJSPTM), Vol. 4, no.1,2015.
[16]Wang, J. H., Fan, X., Jackson, C. E., Howell, J. R., & Xu, Z.U.S. ,”Patent No. 10,019,570”, Washington, DC: U.S. Patent and Trademark Office, 2018.
| Download File
Sustainable Development of Green Healthcare Communities for Prediction of Autism Spectrum Disorder using Machine Learning Approach
Srividhya Ganesan
SRET, Faculty of Engineering & Technology, SRIHER, Chennai,India.
Pages: 6694–6708
Abstract: [+]
Autism is generally termed as pervasive disorder. The part “Pervasive” infers that the ailment is severe. There have been many technical advances in detection of autism traits, Machine Learning is one among them. This paper presents an approach of Machine Learning algorithms and methods to distinguish autism traits. Although, diagnosis and analysis of this disease are carried out at several age, but its symptoms mostly seems in their infancy. The procedure of diagnosing the disease is laborious and prolonged. The use of machine learning algorithms seems to offer promise in timely diagnostics. It seems to be more efficient and drastically lowers the time to diagnose the disease. Machine learning approach is a vigorous diagnostic algorithm grounded in human coded behavior. In this study, an autism model calculation was improved through combining the algorithms of Classification yet Regression Trees- Random Forest (RF- CART) yet Iterative Dichotomiser 3- Random Forest (RF- ID3). The model was tested and analysed with Autism Spectrum Quotient (AQ10) dataset and 1100 actual dataset gathered from persons of with and without autistic traits. The real datasets are acquired from hospital database. The suggested prediction model shows improved results in respect of accuracy (98%), sensitivity (98%), precision (91%), specificity (98%), and false positive rate (2%).
Keywords:  machine learning, Random Forest, AQ10 dataset
| References: [+]
1. Cruz. J A, & Wishart. D S, “Applications of machine learning in cancer prediction and prognosis”, Cancer informatics. 2, (2006).
2. N. S. Khan, M. H. Muaz, A. Kabir and M. N. Islam, "Diabetes predicting mhealth application using machine learning", IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), pp. 237-240, 2017.
3. Wall D P, Dally R, Luyster R, Jung J Y, & DeLuca, T F, “Use of artificial intelligence to shorten the behavioral diagnosis of autism”, PloS one, 7(8). 43855 (2012).
4. Bone D, Bishop S L, Black M P, Goodwin M S, Lord C, & Narayanan. S, “Use of machine learning to improve autism screening and diagnostic instruments: effectiveness, efficiency, and multi-instrument fusion”, J Child Psychology & Psychiatry. 57 (2016).
5. Allison C. Auyeung B & Baron-Cohen S, “Toward brief red flags for autism screening: the short autism spectrum quotient and the short quantitative checklist in 1,000 cases and 3,000 controls”, J of the American Academy of Child & Adolescent Psychiatry. 51 (2012).
6. F. Thabtah, “Autism spectrum disorder screening: machine learning adaptation and dsm-5 fulfillment,” in Proceedings of the 1st International Conference on Medical and Health Informatics ACM, 2017.
7. F. Hauck and N. Kliewer, “Machine learning for autism diagnostics: Applying support vector classification”.
8. B. van den Bekerom, “Using machine learning for detection of autism spectrum disorder”, 2017.
9. Wall D, Kosmicki J, Deluca T, Harstad E, & Fusaro, V. ”Use of machine learning to shorten observation-based screening and diagnosis of autism”. Translational psychiatry, 2(4), 100 (2012).
10. Heinsfeld A S, Franco A R, Craddock R C, Buchweitz, A, & Meneguzzi, F.: Identification of autism spectrum disorder using deep learning and the abide dataset, Neuro Image: Clinical. 17 (2018).
11. Liu W, Li M, & Yi L, “Identifying children with autism spectrum disorder based on their face processing abnormality”, A machine learning framework. Autism Research. 9(8), 888–898 (2016).
12. Bone D,. Goodwin M S, Black M P, Lee C C, Audhkhasi K & Narayanan, S, “Applying machine learning to facilitate autism diagnostics: pitfalls and promises”, Journal of autism and developmental disorders, 45(5), 1121-1136 (2015).
13. Kosmicki J, Sochat V, Duda M, & Wall D. “Searching for a minimal set of behaviors for autism detection through feature selection-based machine learning”, Translational psychiatry, 5(2), 514 (2015).
14. Alwidian J., Hammo B., and Obeid N, “Enhanced CBA algorithm Based on Apriori Optimization”, 2016.
15. Liu, B., Hsu, W., Ma, Y, “Integrating classification and association rule mining”, In: Proceedings of the fourth international conference on knowledge discovery and data mining, New York, NY, 80–86, August 1998.
16. Uğur Erkan and Dang N.H. Thanh, “Autism Spectrum Disorder Detection with Machine Learning Methods”, Current Psychiatry Research and Reviews 15: 297, 2019.
17. K. S. Omar, P. Mondal, N. S. Khan, M. R. K. Rizvi and M. N. Islam, "A Machine Learning Approach to Predict Autism Spectrum Disorder", International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox'sBazar, Bangladesh, pp. 1-6, doi: 10.1109/ECACE.2019.8679454, 2019.
| Download File
Green Computing Methodology on Screening of Retinopathy of Prematurity using Vital Statistical Features of RetCam Images
1J.Samson Isaac, 2S.Prabakar, 3K.Porkumaran
1Assistant Professor, Karunya deemed University, Coimbatore, India.
2,3Professor, Dr.N.G.P Institute of Technology, Coimbatore, India.
Pages: 6709–6721
Abstract: [+]
Green computing is one of the practice of implementing computing resources to retain or augment overall performance more efficiently. Integration of green computing in medical applications necessitates integration of electronic, software and optimization of the algorithm to meet growing requirements for sustainable healthcare. This paper provides a utilization of computation and IT hardware on sustainable screening devices for early detection of retinopathy during prematurity. In India, Retinopathy of Prematurity (ROP) is the major cause of visual impairments in premature infants. Premature birth suffers from development of the retina vasculature and leaves some of the retina without blood vessels. Visual loss in childhood is a retinal vessel growth condition that affects usually in children under a birth weight of 1,500 grams and have a gestational age of 32 weeks or less. Serial RetCam images are acquired from premature infants. Efficient image classification requires the quantification of abnormal class by applying various pre-processing techniques such as green colour plane, histogram equalization, Contrast Limited Adaptive Histogram Equalization (CLAHE). Computation time is reduced by applying ANFIS (The Adaptive Neuro-Fuzzy Inference System) classifier. The overall system is integrated as a hardware for effective screening tool. MatLab simulations of images shows better improvements in computational time.
Keywords:  Green computing, ANFIS, CLAHE, retina, ROP, watershed transform.
| References: [+]
[1]Karthikeyen .S, “Identification Of The Diabetic Retinopathy By Detecting New Retinal Vessel Using Fundus Image”, International journal of Advanced Research in Technology, Vol. 2, no. 4, pp. 55-59, 2012.
[2] Phelps D.L, ”Retinopathy of Prematurity: History, Classification, and Pathophysiology”, NeoReviews, Vol. 2, no. 7, pp.153–166, 2001.
[3]Lassada Sukkaew, Bunyarit Uyyanonvara, Sarah A Barman, and Jaruwat Jareanjit, “Automated Vessels Detection on Infant Retinal Images”, ICCAS, pp.321-324, 2004.
[4]David K. Wallace, Graham E. Quinn, Sharon F. Freedman, Michael F. Chiang, “Agreement among pediatric ophthalmologists in diagnosing plus and pre-plus disease in retinopathy of prematurity”, Journal of AAPOS, Vol.4,pp.352-356, 2008.
[5] Michelle T. Cabrera, Sharon F. Freedman, Amanda E. Kiely, Michael F. Chiang, David K. Wallace, “Combining ROP tool measurements of vascular tortuosity and width to quantify plus disease in retinopathy of prematurity”, J AAPOS, Vol.15, pp. 40-44, 2011.
[6]Julien Jomier, David K. Wallace, and Stephen R. Aylward, “Quantification of Retinopathy of Prematurity via Vessel Segmentation”, International Conference on Medical Image Computing and Computer-Assisted Intervention, pp.620,626,2003.
[7]Clare M. Wilson, Kenneth D. Cocker, Merrick J. Moseley, Carl Paterson, Simon T. Clay, William E. Schulenburg, Monte D. Mills, Anna L. Ells, Kim H. Parker, Graham E. Quinn, Alistair R. Fielder , Jeffrey Ng, “Computerized Analysis of Retinal Vessel Width and Tortuosity in Premature Infants”, Investigative Ophthalmology & Visual Science , Vol. 49,no.8,pp.3577-3585,2008.
[8]Sukaina ahmad, david k. wallace, sharon f. freedman, zheen zhao, “computer-assisted assessment of plus disease in retinopathy of prematurity using video indirect ophthalmoscopy images”, the journal of retinal and vitreous diseases, Vol.28, no.10, pp.1458-1462,2008.
[9]C Swanson, K D Cocker, K H Parker, et al,”Semiautomated computer analysis of vessel growth in preterm infants without and with ROP”, British Journal of Ophthalmology, Vol.87, no.12,pp. 1474-1477,2003.
[10]Frederic Zana, Jean-Claude Klein, ”Segmentation of Vessel-Like Patterns Using Mathematical Morphology and Curvature Evaluation”, IEEE Transactions On Image Processing, Vol. 10, no.7, 2001.
| Download File
Multi-window Optimized Seizure Detection and Classification using Deep Feature Extraction for Human Environmental Conscientiousness
1 S.Sanila, 2S.Sathyalakshmi, 3D.Venkata Subramanian
1Reseach Scholar, School of Computing Science, Hindustan Institute of Technology and Science, Chennai, India.
2Professor, School of Computing Science, Hindustan Institute of Technology and Science, Chennai, India.
3Professor, Department of Computer Science and Engineering, Velammal Institute of Technology and Science, Chennai India.
Pages: 6722-6739
Abstract: [+]
One of the key approaches for the detection and diagnosis of epileptic seizures which is called as the Electroencephalography, common referred to as EEG. The EEG data that is collected from the numerous patients who undergo this medical procedure is now considered to be part of Big data as we know it. This large volume of rapidly growing data is difficult to handle and the effort and time required for the processing and analysis of this data becomes difficult. There are lots of application in today’s real world for detecting and analyzing of Electroencephalography and there are various dedicated algorithms that are already designed for dealing with these data. This study aims to develop a lightweight algorithm that aims to reduce the time lag in detecting seizures from EEG data with increased accuracy. Its purpose is to filter out essentials, and where needed, the work can be accomplished by combining the capability of existing algorithm such as SVM, PCA and ANN and filtering an algorithm using in deep learning analyzes based on the conventional neural network. Here standard sized window is used by the proposed model to decrease the quantity of EEG data used for analyzing and for obtaining the top-k amplitude from each sample. And these extracted amplitude from multiple windows, after analysis is given to CNN algorithm in order to predict whether it seizure or not. Comparison shows the outcome with existing measures and CNN model along with top k.
Keywords:  Big Data; Multi window measure; Top-k feature; Classification Metrics ; Convolutional Neural Network
| References: [+]
[1]Wei Fan, Albert Bifet, “Mining Big Data: Current Status, and Forecast to the Future”, Journal of Engineering Research and Applications, SIGKDD Explorations, vol.26, 2012.
[2]Aisling O’Driscoll, Jurate Daugelaite, Roy. D. Sleator, “Big Data’, Hadoop and cloud computing in genomics”, Journal in Biomedical Informatics, vol.46, pp.774-781, 2013.
[3]Xindong Wu, Xingquan, Zhu, Gong-Qing Wu, Wei Ding, “Data Mining with Big Data”, IEEE Trans. Knowledge and Data Engineering, vol.26, No.1, pp.1041-4347, 2014.
[4] Michael R. Zimbric, Cia M. Sharpe, Karen C. Albright, Mark P. Nespeca, “Three-Channel Electroencephalogram Montage in Neonatal Seizure Detection and Quantification”, Paediatric Neurology, Vol. 44 No.1, 2011.
[5]Lina Zhou, Shimei Pan, Jianwu Wang and Athanasios V, Vasilakos, “Machine Learning on Big Data: Opportunities and Challenges”, Neuro computing, Vol. 237, pp.350-361 2017.
[6]Robert Nishihara, Philipp Moritz, Stephanie Wang, Alexey Tumanov, William Paul, Johann Schleier-Smith, Richard Liaw, Mehrdad Niknami, Michael I. Jordan, Ion Stoica, “Real-Time Machine Learning: The Missing Pieces”, arXiv:1703.03924v2, 2017.
[7]J. Dean and S. Ghemawat, "MapReduce: Simplified data processing on large clusters," OSDI'04: Sixth Symposium on Operating System Design and Implementation, pp. 137-150, 2004.
[8]Mohit Maske, Dr. Prakash Prasad, “An Introduction to Real Time Processing and streaming of Wireless Network Data”, IJARCCE, Vol.4, no. 1,2015.
[9]Yanqing Duana, John S. Edwardsb, Yogesh K Dwivedic, “Artificial intelligence for decision making in the era of Big Data – evolution, challenges and research agenda”, International Journal of Information Management, vol. 48, pp. 63–71,2019.
[10]Zhigao Zheng, Ping Wang, Jing Liu and Shengli Sun, “Real- Time Big Data Processing Framework: Challenges and Solutions”, Appl. Math. Inf. Sci. 9, No.6, pp.3169-3190, 2015.
[11]QingchenZhanga, Laurence T. Yang, Zhikui Chen, Peng Li, “A survey on deep learning for big data”, Information Fusion, vol.42, pp.146–157, 2018.
[12]Lasitha S. Vidyaratne, Khan M Iftekharuddin,” Real- Time Epileptic Seizure Detection Using EEG”, IEEE Transactions on Neural Systems and Rehabilitation Engineering, Vol. 25 , no. 11 , pp.2146 - 2156 2017
[13]A. H. Shoeb and J. V. Guttag, “Application of machine learning to epileptic seizure detection,”Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 975–982,2010.
[14]R. Varatharajan& Gunasekaran Manogaran& M. K. Priyan, “A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing”, Multimedia Tools and Applications, vol. 77, pp.10195–10215,2018.
[15]Alexandros T. Tzallas, Markos G. Tsipouras, and Dimitrios I. Fotiadis, “Epileptic Seizure Detection in EEGs Using Time–Frequency Analysis”,IEEE Transactions on InformationTechnology In Biomedicine, Vol. 13, No. 5,pp.703 - 710 2009.
[16]Kemal Akyol, “Stacking ensemble based deep neural networks modelling for effective epileptic seizure detection”, Expert Systems with Applications, 2020.
[17]Xiaozeng Gao, Xiaoyan Yan, Ping Gao, Xiujiang Gao, Shubo Zhang, “Automatic Detection of Epileptic Seizure Based on Approximate Entropy, Recurrence Quantification Analysis and Convolutional Neural Networks”, Artificial Intelligence in Medicine, Vol. 102, January 2020,
[18]Laeeq Ahmed, Ake Edlund, ErwinLaure, Stephen Whitmarsh, “Parallel Real TimeSeizureDetection in Large EEG Data”, International Conference on Internet of Things and Big Data, pp.214-222 ,2016.
[19]CHB-MIT scalp EEG database. Available online : http://physionet.org/pn6/chbmit/.
| Download File
Safe Application for Vacuum Exposure in Dental Filling using Gaussian Operator
1Muna Y. Slewa, 2Sarah Ali Abd Ulkareem, 3,*Ziad M. Abood, 4Ban A. Bader, 5Sami Salman Chiad
1Laser and Photonics Research center, University of Al- Hamdaniya , Nineveh, Iraq.
2Ministry of Education, Baghdad,Iraq.
3,5Department of Physics, College of Education, Mustansiriyah University, Baghdad- Iraq.
4Department of Physics, College of Education, University of Al- Hamdaniya, Iraq.
Pages: 6740–6754
Abstract: [+]
The process of edges detecting of images is an important process for the purpose of understanding and analyzing images for many applications, such as the process of distinguishing objects, and the process of edges detecting works to detect discontinuity or sudden change in some optical properties such as light intensity, composition, and color.In this study, modified effects were proposed and applied to edges detection in digital images based on the least squares method to approximate the spot image data to LOG (Laplacian of Gaussian) operator. As it was applied to dental x-ray images by applying the threshold condition, after a procedure to remove noise from the image and contrast enhancement without damaging the real edges of the image, then we used the edge detection effects on the image represented by the LOG operator, which is the standard edge detection effect and the modified operator that depends on the square method to Gussian Function. Through the results, it was found that the modified method works to detect the edges in the dental images to determine the area of the affected teeth (decay) with the possibility of determining the size and shape of the tooth damage.
Keywords: Image Processing, Edge Detection, Dental X-ray, Gussian Function, LOG operator.
| References: [+]
[1]Wong S, “Radiologic image compression-A review”, Proceedings of the IEEE, Vol.83, no.2, 1995.
[2]Ziad M. Abood, “Study and Compare The Histograms For R, G, and B Colors Between Normal and Abnormal Samples of Breast Cancer”, College of Education, 2009.
[3]Ziad M. Abood, Hithem S. Chaid, “Edge detection enhancement by addition images using Matlab”, College of Education, pp. 189-194, 2009.
[4]Shubhangi D.C, Raghavendra S. Chinchansoor, P. S. Hiremath, “Edge Detection of Femur Bones in X-ray images - A comparative study of Edge Detectors”, International Journal of Computer Applications, vol.12,no.2,2012.
[5]T. A. I. T. Alang, T. Swee, T. Hou, Leong Kah Meng, S. Malik, M. As'ari, A. Hussein, A. Yaakub, H. Y. Chai, J. Haron, “ Global Canny algorithm based on Canny edge detector framework in magnetic resonance imaging”, Malaysian Journal of Fundamental and Applied Sciences,vol.13,no.4-2, 2017.
[6]Ziad M. Abood, “Edges Enhancement of Medical Color Images Using Add Images”, IOSR Journal of Research & Method in Education, Vol. 2 ,no.4, pp. 52-60, 2013.
[7]Umbaugh, Scott E,” Digital image processing and analysis: human and computer vision applications with CVIP tools ,2nd Edition”, IEEE Pulse,Vol. 3,no.4,pp.84-85,2012.
[8]T. Lindeberg , “Edge detection and ridge detection with automatic scale selection”, International Journal of Computer Vision, Vol.30 ,no.2, pp. 117–154, 1998.
[9]W. Zhang and F. Bergholm “Multi-scale blur estimation and edge type classification for scene analysis”, International Journal of Computer Vision, Vol. 24,no.3, pp.219–250, 1997.
[10]Ziad M. Abood, Kadhim K. Kadhim, “ Assessment the Quality of Medical Images (CT & MRI) by Using Wavelet Transformation (WT(“, International Journal of Emerging Research in Management & Technology , Vol.4, no.7, 2015.
[11]Ziad M. Abood Ghada S. Karam Rafid. E. “Haleot Enhancement Human Face Recognition Based on Fusing of Infrared and Visible Images”, College of Education, Vol.2, 2015.
[12]J. M. Park and Y. Lu, “Edge detection in grayscale, color, and range images”, wiley Encyclopedia of Computer Science and Engineering, 2008,
[13]J. Canny, “A computational approach to edge detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 8, pp. 679–714, 1986.
[14]Sylvain Fischer, Rafael Redondo, Laurent Perrinet, Gabriel Cristobal, “Sparse approximation of images inspired from the functional architecture of the primary visual areas”, EURASIP Journal on Advances in Signal Processing, vol.2007,2006.
[15]T. Pajdla and V. Hlavac , “Surface discontinuities in range images”, Proc IEEE 4th Int. Conf. Comput. Vision, pp. 524–528, 1993.
| Download File
Security Performance of Block Cipher and Stream Cipher Encryption in Green Cloud Computing
1SP.Chokkalingam and 2E. Srimathi
1Professor, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India.
2Research Scholar, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai, India
Pages: 6755–6765
Abstract: [+]
Cloud security aims to provide security among the shared data in a public cloud between client and server. Cloud encourages all type of online business to launch in easy manner at the same time security risk at payment mode also increases because the details kept over the cloud can be hack in a public cloud. To avoid this risk factor block and cipher and stream cipher is used to reduce the hackers in the cloud storage, cloud designed with the help of Application Program Interface (API) which contains firewalls and Denial of Services to improve the security.Various encryption techniques are available in cloud to provide security in that block cipher per based algorithm and stream-based algorithm plays an important role to increase the security level. This research paper, analyze both the algorithms to find the best encryption techniques to increase the reliability among the cloud storage.
Keywords:  Cloud Storage, API, Security, Security, Block Cipher, Stream Cipher.
| References: [+]
1. Y. Luo, W. Luo, T. Puyang, Q. Shen, A. Ruan and Z. Wu, "OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud," 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, CA, 2016, pp. 51-58, doi: 10.1109/CLOUD.2016.0017.
2. Kui Ren, Cong Wang,"Security Challenges for the Public Cloud" , Sep 2018, IJRTE, Vol 11, PP 183-193.
3. E.Srimathi and Dr. SP.Chokkalingam “Securing Open Source Cloud Storage on OPenStack Cloud Computing Platform”,IJRTE,Vol-7,April/2019.
4. SP.Chokkalingam and E.Srimathi “Efficiency on Public Cloud Storage Providers in Cloud Computing”, IJRTE,Vol-7,April/2019.
5. E.Srimathi and Dr. SP.Chokkalingam, ”OpenKey-Generation for Enabling Cloud Storage Security in Open Source Cloud Computing”,JARDCS,Vol.9.Sp-17/2017.
6. M. F. M. Firdhous and N. A. Hussien, "Data Security Implementations in Cloud Computing: A Critical Review," 2018 3rd International Conference on Information Technology Research (ICITR), Moratuwa, Sri Lanka, 2018, pp. 1-5, doi: 10.1109/ICITR.2018.8736153.
7. W. C. N. Kaura and A. Lal, "Survey paper on cloud computing security," 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2017, pp. 1-6, doi: 10.1109/ICIIECS.2017.8276134.
8. S. Basu et al., "Cloud computing security challenges & solutions-A survey," 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, 2018, pp. 347-356, doi: 10.1109/CCWC.2018.8301700.
9. R. T. Hameed, A. A. Hussain, O. A. Mohamad, K. A. Zidan, O. T. Hamid and S. A. Salman, "Improved Cloud Computing Security," 2018 1st Annual International Conference on Information and Sciences (AiCIS), Fallujah, Iraq, 2018, pp. 170-175, doi: 10.1109/AiCIS.2018.00041.
10. K.Dhinakaran, R.Kirtana, K.Gayathri, R.Devisri,“ Enhance Hybrid Cloud Security Using Vulnerability Management", Advances in Intelligent Systems and Computing book series, Springer, 2017.
| Download File
Barriers in Implementation of Green IOT Technology in Indian Logistics for Sustainable Development: An Interpretive Structural Modeling Approach
1Nishanth Sridhar, 2*Dr. Kiran Karande
1Symbiosis Institute of Operations Management, Nashik
2Senior Assistant Professor, Symbiosis Institute of Operations Management, Nashik Symbiosis International (Deemed University), Pune, India
Pages: 6766–6780
Abstract: [+]
This research paper examines the relationship between several barriers that are involved in the implementation of Internet of Things (IoT) in the Indian logistics sector. The logistics sector in India is growing swiftly and adapting to the shift in necessity for customized goods and services by leveraging the smart connected devices. With help of extensive literature review process, fifteen distinct barriers of IoT adoption in logistics has been found out. Then the interrelationship among these barriers were determined based upon the expert opinions obtained through telephonic interviews with practitioners from Indian logistics organizations. These obtained inputs from the practitioners are then used in experimenting Interpretive Structural Modeling along with MICMAC (Matrice des Impacts Croises Multiplication Appliquee a unClassement) analysis. The outcomes of this research study would be beneficial to the logistics professionals and business experts to plan their strategy efforts in overcoming those constraints in adopting IoT technology in Indian logistics industry.
Keywords:  Internet of Things; Indian Logistics; Interpretive Structure Modeling; MICMAC ; Green IoT; Distinct Barriers
| References: [+]
1.Abdelhadi, A., & Akkartal, E. (2019). A framework of IoT implementations and challenges in Warehouse Management , Transportation and Retailing. Eurasian Business & Economics Journal, 18(May), 25–41. https://doi.org/10.17740/eas.econ.2019.V18-03
2. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys and Tutorials, 17(4), 2347–2376. https://doi.org/10.1109/COMST.2015.2444095
3. Barreto, L., Amaral, A., & Pereira, T. (2017). Industry 4.0 implications in logistics: an overview. Procedia Manufacturing, 13, 1245–1252. https://doi.org/10.1016/j.promfg.2017.09.045
4. Bekara, C. (2014). Security issues and challenges for the IoT-based smart grid. Procedia Computer Science, 34, 532–537. https://doi.org/10.1016/j.procs.2014.07.064
5. Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of Cloud computing and Internet of Things: A survey. Future Generation Computer Systems, 56(October), 684–700. https://doi.org/10.1016/j.future.2015.09.021
6. Chandra, P. (2014). The Logistics Sector in India : Overview and Challenges The Logistics Sector in India : Overview and Challenges Pankaj Chandra Nimit Jain W . P . No . 2007-03-07 The main objective of the working paper series of the IIMA is to help faculty members , Resea (Issue January 2007). https://doi.org/10.1142/9789812814661
7. Chen, S. L., Chen, Y. Y., & Hsu, C. (2014). A new approach to integrate internet-of-things and software-as-a-service model for logistic systems: A case study. Sensors (Switzerland), 14(4), 6144–6164. https://doi.org/10.3390/s140406144
8. DHL. (2017). INTERNET OF THINGS IN LOGISTICS A COLLABORATIVE REPORT BY DHL AND CISCO ON IMPLICATIONS ANDUSE CASES FOR THE LOGISTICS INDUSTRY Powered by DHL Trend Research. https://discover.dhl.com/content/dam/dhl/downloads/interim/full/dhl-trend-report-internet-of-things.pdf
9. Faisal, M. N. (2010). Sustainable supply chains: A study of interaction among the enablers. Business Process Management Journal, 16(3), 508–529. https://doi.org/10.1108/14637151011049476
10. Granjal, J., Monteiro, E., & Sa Silva, J. (2015). Security for the internet of things: A survey of existing protocols and open research issues. IEEE Communications Surveys and Tutorials, 17(3), 1294–1312. https://doi.org/10.1109/COMST.2015.2388550
11. Haddud, A., DeSouza, A., Khare, A., & Lee, H. (2017). Examining potential benefits and challenges associated with the Internet of Things integration in supply chains. Journal of Manufacturing Technology Management, 28(8), 1055–1085. https://doi.org/10.1108/JMTM-05-2017-0094
12. Jharkharia, S., & Shankar, R. (2004). IT enablement of supply chains: Modeling the enablers. International Journal of Productivity and Performance Management, 53(8), 700–712. https://doi.org/10.1108/17410400410569116
13. Kamble, S. S., Gunasekaran, A., Parekh, H., & Joshi, S. (2019). Modeling the internet of things adoption barriers in food retail supply chains. Journal of Retailing and Consumer Services, 48(December 2018), 154–168. https://doi.org/10.1016/j.jretconser.2019.02.020
14. Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431–440. https://doi.org/10.1016/j.bushor.2015.03.008
15. Lee, J., Lapira, E., Bagheri, B., & Kao, H. an. (2013). Recent advances and trends in predictive manufacturing systems in big data environment. Manufacturing Letters, 1(1), 38–41. https://doi.org/10.1016/j.mfglet.2013.09.005
16. Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view. Internet Research, 26(2), 337–359. https://doi.org/10.1108/IntR-07-2014-0173
17. Luthra, S., Garg, D., Mangla, S. K., & Singh Berwal, Y. P. (2018). Analyzing challenges to Internet of Things (IoT) adoption and diffusion: An Indian context. Procedia Computer Science, 125, 733–739. https://doi.org/10.1016/j.procs.2017.12.094
18. Padyab, A., Habibipour, A., Rizk, A., & Ståhlbröst, A. (2020). Adoption barriers of IoT in large scale pilots. Information (Switzerland), 11(1), 1–23. https://doi.org/10.3390/info11010023
19. Raci, V., & Shankar, R. (2005). Analysis of interactions among the barriers of reverse logistics. Technological Forecasting and Social Change, 72(8), 1011–1029. https://doi.org/10.1016/j.techfore.2004.07.002
20. Rutner, S. M., Aviles, M., & Cox, S. (2012). Logistics evolution: A comparison of military and commercial logistics thought. International Journal of Logistics Management, 23(1), 96–118. https://doi.org/10.1108/09574091211226948
21. Singh, R., & Bhanot, N. (2020). An integrated DEMATEL-MMDE-ISM based approach for analysing the barriers of IoT implementation in the manufacturing industry. International Journal of Production Research, 58(8), 2454–2476. https://doi.org/10.1080/00207543.2019.1675915
22. Tadejko, P. (2015). Application of Internet of Things in logistics – current challenges. Ekonomia i Zarządzanie, 7(4), 54–64. https://doi.org/10.12846/j.em.2015.04.07
23. Tao, F., Qi, Q., Liu, A., & Kusiak, A. (2018). Data-driven smart manufacturing. Journal of Manufacturing Systems, 48(January), 157–169. https://doi.org/10.1016/j.jmsy.2018.01.006
24. Timm, I. J., & Lorig, F. (2016). Logistics 4.0-A challenge for simulattion. Proceedings - Winter Simulation Conference, 2016-Febru(December 2015), 3118–3119. https://doi.org/10.1109/WSC.2015.7408428
25. Tsai, C. W., Lai, C. F., Chiang, M. C., & Yang, L. T. (2014). Data mining for internet of things: A survey. IEEE Communications Surveys and Tutorials, 16(1), 77–97. https://doi.org/10.1109/SURV.2013.103013.00206
26. Tu, M. (2018). An exploratory study of internet of things (IoT) adoption intention in logistics and supply chain management a mixed research approach. International Journal of Logistics Management, 29(1), 131–151. https://doi.org/10.1108/IJLM-11-2016-0274
27. Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261–274. https://doi.org/10.1007/s10796-014-9489-2
28. Xu, L. Da, He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics, 10(4), 2233–2243. https://doi.org/10.1109/TII.2014.2300753
29 Pfohl (2001 Pfohl H.Ch. (2001), Systemy logistyczne. Podstawy organizacji i zarządzania, Instytut Logistyki i Magazynowania, Poznań.
30. J.P. Müller, W. Ketter, G. Kaminka, G. Wargner, N. Bulling (Eds.), A Multiagent System Perspective on Industry 4.0 Supply Networks, Multiagent Systems Technologies, 2015.
31. Bozarth, C.C. and Handfield, R.B. (2008) Introduction to Operations and Supply Chain Management. New Jersey: Pearson Prentice Hall.
32. S. Jeschke, C. Brecher, H. Song, & D. B. Rawat (Eds.), Industrial Internet of Things and Cyber Manufacturing Systems, Springer International Publishing, 2017, pp. 3–19.
33. Bedekar, A., 2017. Opportunities& challenges for IoT in India Online available at: 〈http://www.startupcity.com/leaders-talk/-opportunitieschallenges-for-iot-in-india-nid-3444.html〉(last (accessed 12 October 2017)
| Download File
Multicast Priority Routing Based on Energy Level in Maintenance Phase for MANETs
1Katapaka Yadaiah,2B.L.Raju,3D.Nagendra Rao
1Department of Electronics and Communication Engineering, Jawaharlal Nehru Technological University, Hyderabad, India
2Department of Electronics and Communication Engineering, ACE Engineering College, Hyderabad, India
3Department of Electronics and Communication Engineering, Abhinav Hitech Engineering College, Hyderabad, India
Pages: 6783–6800
Abstract: [+]
Mobile Ad hoc Network (MANET) is a set of mobile nodes which creates the network without any infrastructure. The node with limited battery power is considered as an important issue in MANET and this energy constraint creates link failure in the network that degrades the overall network performance. Since the energy consumption of the nodes is increased because of nodes mobility and security is also considered as main issue due to openness of channel medium. In this paper, the Artificial Fish Swarm Optimization (AFSO) is used to select the optimal Cluster Head (CH) from the network. To enhance the energy consumption and security of the MANET, a modified Ad-hoc On-demand Distance Vector (AODV) routing protocol is developed in the MANET. The main objective of this modified AODV routing protocol is to deliver the continuous data transmission. The Priority based on Energy Level with Neighbor Nodes (PEL-NN) methodology is used to modify the AODV to select the optimal path for routing the data packets through the CHs. In addition, the trust value is incorporated in the AODV routing protocol to mitigate the malicious activities in the network. The performance of the PEL-NN methodology is analyzed by means of delay, throughput, energy consumption, Packet Delivery Ratio (PDR) and packet drop and it is compared with three different existing methods such as RPFAODV, P-AODV and ED-EECL. The energy consumption of the PEL-NN methodology is 21.61 Joules for 100 nodes, it is less when compared to the ED-EECL method.
Keywords:  Ad-Hoc on Demand Distance Vector, Energy Consumption, Mobile Ad-Hoc Networks, Priority Based Energy Level and Trust Value
| References: [+]
[1]P. Annadurai, S. Vijayalakshmi,” Highly Reputed Authenticated Routing in MANET”,Wireless Personal Communications, Vol.83,No.1, pp.455-472, 2015.
[2]P. T. Kasthuribai, M. Sundararajan,” Secured and QoS based energy-aware multipath routing in MANET”, Wireless Personal Communications, Vol.101, No.4, pp.2349-2364, 2018.
[3]M. Malathi, S. Jayashri,” Modified Bi-directional Routing with Best Afford Path (MBRBAP) for Routing Optimization in MANET” ,Wireless Personal Communications Vol.90, No.2, pp.861-873, 2016.
[4]M. P. Arthur, K. Kannan,” Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks”, Wireless Networks, Vol.22, No.3, pp.1035-1059, 2016.
[5]B. Muthusenthil, S. Murugavalli,” Privacy preservation and protection for cluster based geographic routing protocol in MANET”, Wireless Networks, Vol.23, No.1, pp.79-87, 2017.
[6]A. Amuthan, N. Sreenath, P. Boobalan, K. Muthuraj,” Dynamic multi-stage tandem queue modeling-based congestion adaptive routing for MANET”, Alexandria engineering journal, Vol.57, No.3, pp.1467-1473, 2018.
[7]N. Veeraiah, B. T. Krishna,” An approach for optimal-secure multi-path routing and intrusion detection in MANET”, Evolutionary Intelligence, 2020.
[8]T. Eissa, S. A. Razak, R. H. Khokhar, N. Samian,” Trust-based routing mechanism in MANET: Design and implementation”, Mobile Networks and Applications, Vol.18, No.5, pp.666-677, 2013.
[9]P. Sethuraman, N. Kannan,” Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET”, Wireless Networks, Vol.23, No.7, pp.2227-2237, 2017.
[10]Y. Yang,” Broadcast encryption based non-interactive key distribution in MANETs”, Journal of Computer and System Sciences, Vol.80, No.3, pp.533-545, 2014.
[11]H. Xia, J. Yu, C. L. Tian, Z. K. Pan, E. Sha,” Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks”, Journal of Network and Computer Applications, Vol.62, pp.112-127, 2016.
[12]S. S. Jamaesha, S. Bhavani,” A secure and efficient cluster based location aware routing protocol in MANET”, Cluster Computing, Vol.22, No.2, pp.4179-4186, 2019.
[13]G. Dhananjayan, J. Subbiah,” T2AR: trust-aware ad-hoc routing protocol for MANET” ,SpringerPlus, Vol.5, No.1, pp.995, 2016.
[14]P. Thiyagarajan, S. SenthilKumar,” Power efficient Memetic Optimized and Adjacent Exponentially Distributed Routing in Mobile Ad Hoc Networks”, Computer Communications, Vol.150, pp.209-215, 2020.
[15]V. Brindha, T. Karthikeyan, P. Manimegalai,” Fuzzy enhanced secure multicast routing for improving authentication in MANET”, Cluster Computing, Vol.22, No.4, pp.9615-9623, 2019.
[16]S. Chettibi, S. Chikhi,” Dynamic fuzzy logic and reinforcement learning for adaptive energy efficient routing in mobile ad-hoc networks”, Applied Soft Computing, Vol.38, pp.321-328, 2016.
[17]W. A. Jabbar, M. Ismail, R. Nordin,” Energy and mobility conscious multipath routing scheme for route stability and load balancing in MANETs”, Simulation Modelling Practice and Theory, Vol.77, pp.245-271, 2017.
[18]S. Venu, A.M.Z. Rahman,” Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks”, Cluster Computing, Vol.22, No.1, pp.661-671, 2019.
[19]D.K. Sharma, A.N. Patra, C. Kumar,” P-AODV: A priority based route maintenance process in mobile ad hoc networks”, Wireless Personal Communications, Vol.95, No.4, pp.4381-4402, 2017.
[20]S. Pandey, D. Agrawal,” An ED-Based Enhanced Energy Efficient Cross Layer Model for Mobile Wireless Sensor Network”, National Academy Science Letters, Vol.40, No.6, pp.421-427, 2017.
| Download File
Analysis of Dust Particle Charging & Its Collection in a Needle Plate Electrostatic Precipitator
1Mohanasundaram, 2T.J.Catherine, 3P.Anandhraj, 4C.S Boopathi
1Professor, Department of Electrical and Electronics Engineering, KPR Institute of Engineering and Technology, Coimbatore, India.
2Associate Professor, Department of Electrical and Electronics Engineering, R.M.K College of Engineering and Technology, India.
3Research Scholar, Anna University Chennai, India.
4Professor, Department of Electrical and Electronics Engineering, SRM Institute of Science and Technology, India.
Pages: 6801–6814
Abstract: [+]
For past some decades, the flue gas emitted from various power plant and industries are found to be a permanent problem for people as well as environment. There have been many filtration devices emerging out over the years, although the Electrostatic Precipitator is found to be an appropriate device owing to high collection efficiency, low pressure drop, and low consumption of energy. The objective of this paper is evaluating the dust collection performance of needle plate type electrostatic precipitators from the outlet gas of medical waste incinerator. This article presents computational fluid-dynamic structure for turbulent flow and particle trajectory simulation using discrete phase model (DPM), and the simulation of particles collecting on the ESP is created in ANSYS Fluent using additional UDS (User Defined Scalars) for Poisson Equation and Conservation of Charge. The results of filtration efficiency, Electrical characteristics, and particle trajectories for needle plate ESP have been attained for different operating conditions such as various applied voltages and particle diameters.
Keywords: Electrostatic Precipitator (ESP), User Defined Function (UDF), Particle Trajectory, Collection Efficiency, Nitrous oxide (NOx).
| References: [+]
[1]M. Robinson, “Electrostatic Precipitation”, Electrostatics and its Applications”, Wiley, 1978.
[2]P. Atten, F.M.J. McCluskey, A.C. Lahjomri, “The electrohydrodynamic origin of turbulence in electrostatic precipitators”, IEEE Trans. Ind., IEEE Transactions on Industry Applications, Vol. IA-23 ,no. 4 , pp. 705-711, 1987.
[3]Adamiak, K, “Numerical models in simulating wire-plate electrostatic precipitators:”, A review. J. Electrostat., vol.71,no.4,pp. 673–680.
[4]N. Neimarlija, I. Demirdzic, S. Muzaferija, “Numerical method for calculation of two-phase electro hydrodynamic flows in electrostatic precipitator”, Numer. Heat Transf. Part A :Applications, Vol. 59, no.5, pp. 321-348 ,2011.
[5]N. Farnoosh, K. Adamiak, G.S.P. Castle, “3-D numerical simulation of particle concentration effect on a single-wire ESP performance for collecting poly dispersed particles”, IEEE Trans. Dielectr. Electr. Insul.. Vol.18, no.1, pp.211-220, 2011.
[6]N. Farnoosh, K. Adamiak, G.S.P. Castle, “Three-dimensional analysis of electro hydrodynamic flow in a spiked electrode-plate electrostatic precipitator”, J. Electrost., vol.69, pp.419-428,2011.
[7]J.L. Davis, J.F. Hoburg, “Wire-duct precipitator field and charge computation using finite element and characteristics method”, J. Electrostat.,vol.14,no.2, pp.187-199,1983.
[8]Z.M. Al-Hamouz, “A combined algorithm based on finite elements and a modified method of characteristics for the analysis of the corona in wire-duct electrostatic precipitators”, IEEE Trans. Ind. Appl., vol. 38, no.1,pp.43-49, 2002.
[9]Goo, J.H. and Lee, J.W, “Monte-Carlo simulation of turbulent deposition of charged particles in a plate-plate electrostatic precipitator”, Aerosol Sci. Technol., vol.25,pp.31–45, 1986.
[10]Varonos, A.A., Anagnostopoulos, J.S. and Bergeles, G.C, “Prediction of the cleaning efficiency of an electrostatic precipitator”, J. Electrostat., vol.55,pp. 111–133, 2002.
[11]Talaie, M.R, “Mathematical modeling of wire-duct single-stage electrostatic precipitators”, J. Hazard. Mater., vol.124,pp. 44–52, 2005.
[12]Wen, T.Y., Krichtafovitch, I. and Mamishev, A.V, “Numerical study of electrostatic precipitators with novel particle-trapping mechanism”, J. Aerosol Sci., vol.95,pp. 95–103, 2016.
[13]G. Skodras, S.P. Kaldis, “Particulate removal via electrostatic precipitators - CFD simulation”, Fuel Process. Technol., vol.87, pp.623-631, 2006.
[14]N. Farnoosh, K. Adamiak, “3-D numerical analysis of EHD turbulent flow and mono-disperse charged particle transport and collection in a wire-plate ESP”, J. Electrost., vol.68, pp.513-522, 2010.
[15]Narendra Gajbhiye, V Eswaran, A K Saha and Anoop Kumar, “Numerical calculation of particle collection efficiency in an electrostatic precipitator”, Sadhana, Vol. 40, Part 3, pp. 863–873,2015.
[16]M. Jedrusik, A. Swierczok, J. Pajak, “Experimental and Calculated Values Of Migration Velocity As A Parameter Of Precipitation Process in Electrostatic Precipitators”, ICESP X–Australia Paper 8B2,2006.
[17]Peyman Dordizadeh, Kazimierz Adamiak, G.S.Peter Castle,” Experimental study of the characteristics of Trichel pulses in the needle-plane negative corona discharge in atmospheric air”, Journal of Electrostatics, Vol.88, pp. 49-54, 2017.
[18]Octavian Blejan, Petru V. Notingher, Laurentiu Marius Dumitran, Mohamed Younes, Adrian Samuila, and Lucian Dascalescu,” Experimental Study of the Corona Discharge in a Modified Coaxial Wire-Cylinder Electrostatic Precipitator”, IEEE Transactions on Industry Applications, Vol. 46 , no.1 , pp.3-8,2010.
[19]Ruttanachot, C., Tirawanichakul, Y. and Tekasakul, P, “Application of Electrostatic Precipitator in Collection of Smoke Aerosol Particles from Wood Combustion”, Aerosol and Air Qual. Res., vol.11, pp. 90-98, 2011.
| Download File
Safe Medical Radiography Compressive Sensing based on Discrete-Fractional-Random-Transform
1ShaimaaKhudhair Salah, 2Ahmed Othman Khalaf, 3WaleedRasheed Humood, 4,*Ziad M. Abood
1,2,3 Department of Computer Science, College of Education, Mustansiriyah University, Baghdad, Iraq.
4Department of Physics, College of Education, Mustansiriyah University, Baghdad, Iraq.
Pages: 6815–6830
Abstract: [+]
Recently, interest in image encryption algorithms has begun to grow and many research and techniques have emerged. These techniques are based on the introduction of the image compression coding system with simplified operation, based on the dual-dimensional sensor and the DFrRT (discrete-fractional-random-transform). This system inherits excellent mathematical properties side by side with some of its own features. As an initial application, Micro-discrete images to encrypt and then decrypt them.The purpose of using encryption technology in radiography is to provide a space of safety to keep these images from theft as a result of lapses and attacks. The optimization process does not delete easy elements for interpretation by improving visual representation.
Keywords:  Compressive sensing, Logistic map, Mathematical technique, Proposed Encryption Algorithm, Simulations results and Analyses, and Secret key.
| References: [+]
[1]Wong, S. et. al., “Radiologic image compression-A review”, Proc. of the IEEE, Vol. 83,no.2, 1995.
[2]Candès, E. and J. Romberg: “Quantitative Robust Uncertainty Principles and Optimally Sparse Decompositions”, Foundations of Computational Mathematics, Vol. 6,no. 2, pp. 227-254, 2006.
[3]ALMashrafi, M. J., Wong, K. K.-H., Simpson, L., Bartlett, H., Dawson, E., “Algebraic analysis of the SSS stream cipher”, Proceedings of the 4th International Conference on Security of Information and Networks - SIN 11, 2011.
[4]Nicolaos B. Karayiannis, and Pin-I Pai. “Fuzzy vector quantization algorithms and their application in image compression”, IEEE Trans Image Process., Vol. 4,no.9, pp. 193-201, 1995.
[5]Natarajan, Balas Kausik, “Sparse approximate solutions to linear systems”, SIAM J. Com- put, Vol. 24, no.2, pp. 227–234, 1995.
[6]Donoho, D.L., “Compressed sensing”, IEEE Trans. Inf. Theory , Vol.52 ,no.4, pp.1289–1306, 2006.
[7]Rawat, N. B. Kim, I. Muniraj, G. Situ, B.G. Lee, “Compressive sensing based robust multispectral double-image encryption”, Appl. Opt., Vol. 54 , no.7, pp. 1782–1793,2015.
[8]Liu, H. D. Xiao, Y. Liu, Y. Zhang, “Securely compressive sensing using double random phase encoding”, Optik, Vol. 126, no. 20, pp. 2663–2670, 2015.
[9]Wan, T. Z. Qin, “An application of compressive sensing for image fusion”, Int. J. Comput. Math., Vol. 88 , no.18, pp. 915–393, 2011.
[10]Yang, Z. Z. Yang, “Novel multi-focus image fusion and reconstruction framework based on compressed sensing”, IET Image Process, Vol.7,no.9, pp.837–847, 2013.
[11]Liu, Z. H. Yin, B. Fang, Y. Chai, “A novel fusion scheme for visible and infrared images based on compressive sensing”, Opt. Commun., Vol. 335, pp. 168–177, 2015.
[12]Zhou, N. A. Zhang, F. Zheng, L. Gong, “Image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing”, Opt. Laser Technol., Vol. 62, pp. 152–160, 2014.
[13]Lu, P, Z. Xu, X. Lu, X. Liu, Digital image information encryption based on compressive sensing and double random-phase encoding technique”, Optik, Vol. 124, no.16, pp.2514–2518, 2013.
[14]Liu, X, Y. Cao, P. Lu, X. Lu, Y. Li, “Optical image encryption technique based on compressed sensing and Arnold transformation”, Optik , Vol. 124, no. 24, pp. 6590–6593, 2013.
[15]Stanković, S, I. Orović, E. Sejdić, “Multimedia Signals and Systems Basic and Advanced Algorithms for Signal Processing”, Second Edition, Springer,2015.
[16]Mohimani H, Babaie ZM, Jutten C “A fast approach for overcomplete sparse decomposition based on smoothed norm”. IEEE Trans Signal Process, Vol. 57,no.1, pp.289–301, 2009.
[17]Lin WJ, Zhao RZ, Li H, “The NSL0 algorithm for compressive sensing signal reconstruction”, New Ind, Vol. 7,no.1, pp.78–84, 2011.
[18] Mosslah, A. Abrahim, Reyadh H. “3DMM Fitting for 3D Face Reconstruction”, Journal of Engineering and Applied Sciences, Vol.13,no.24,2018.
[19]Liu ZJ, Zhao HF, Liu ST “A discrete fractional random transform”, Opt. Commun. , Vol.255, no.4, pp.357–365, 2005.
[20]Mosslah, A. Abrahim. ”Telemedicine Medical Image Compression based on ROI A Case Study of Spine Medical Images”, Journal of Global Pharma Technology, Vol.10,no.3, pp.184-190, 2018.
[21]R. Smith. A decoupled feedback structure for covertly appropriating networked control systems. Proc. of the 18th IFAC World Congress, Milano, Italy, 2011.
| Download File
A Water Conservation for Morphometric Exploration of Kodavanar River Basin Using Geographic Information System and Flux Remote Sensing
1 B.Sangeethavani and 2M.Muthu Kannan
1Research scholar, Department of Civil Engineering, Kalasaligam Academy of Research and Education, Srivilliputhur, Tamil Nadu, India.
2Professor, Department of Civil Engineering, Kalasaligam Academy of Research and Education, Srivilliputhur, Tamil Nadu, India.
Pages: 6831–6845
Abstract: [+]
Landforms can be referred in geomorphology for understanding the water of any specific form on land along with understanding the catchment area. Several particular measuring key point such as storage of water, evaporation from the soil to atmosphere value, etc. which are termed as climate measuring terms are made utilized. In general, a map consists of three-fourth of water and in that the covered water to the most. Here, we are focusing on Asian river named Kodavanar river which covers 2591 sq.km also located between the N latitude and E longitudes in Dindigal district Kodaikanal taluk of same place where basin includes Karur district also. This water shed area we considered here is for well planned to utilize the techniques such as remote sensing to notify the aerial parameter as affected morphometric sewerage problem. Also, the geographic information system (GIS) of affected part from the entire area of river is evaluated. The analysis and performance of the landfill spot to segregate the impure water from the drained water without involving human action is carried on. The main focus of the research is to use sensor named flux sensor (FS) for mapping the landslide observation and the affected region which will be referring from GIS that have stored the magnitude of each direction through wireless sensor network connectivity. The proposed system helps in water saving by restoring the catchment with the help of remote sensing as well as save water while considering water conservation.
Keywords:  Catchment, Drainage Features, Flux Sensor, GIS, Morphometric Analysis, River Basin.
| References: [+]
[1]Robert E. Horton,"Drainage basin characteristics", Eos, Transactions American Geophysical Union,vol 13, no. 1, pp 350–361,1932.
[2]Majumdar, J.P ,"Morphometric analyses of the 4th order drainage watersheds of the Khowai river basin, Tripura, India -some preliminary results and observations", Journ. Ind. Soc. Photo-int. & Remote Sensing, vol 10, pp 49–53,1982.
[3]Eze EB, Joel E," Morphometric parameters of the calabar riverbasin: implication for hydrologic processes", Journal of Geography and Geology, Vol. 2, no 1,pp.19–26,2010.
[4]Nautiyal MD,"Morphometric analysis of a drainage basin, district Dehradun, Uttar Pradesh", Journal of the Indian Society of Remote Sensing ,Vol. 22, No. 4 ,pp.251–261,1994.
[5]Magesh NS, Chandrasekar N, Soundranayagam JP," Morphometric evaluation of Papanasam and Manimuthar watersheds, parts of Western Ghats, Tirunelveli district, Tamil Nadu, India: a GIS approach", Environ Earth Science , Vol. 64, No 2, pp.373–381,2011.
[6]National Institute of Hydrology,” Geomorphological characteristics of Narmada basin up to Manot. CS (AR)—128”, NIH, Roorkee, Technical report, pp.1–34,1993.
[7]Rai, P., Singh, P., Mishra, V., Singh, A., Sajan, B., & Shahi, A," Geospatial Approach for Quantitative Drainage Morphometric Analysis of Varuna River Basin, India”, Journal of Landscape Ecology, Vol 12,No 2,pp 1-25,2019.
[8]K. Prakash, Diksha Rawat, S. Singh, K. Chaubey, S. Kanhaiya1,T.Mohanty, "Morphometric analysis using SRTM and GIS in synergy with depiction:a case study of the Karmanasa River basin, North central India", Applied Water Science, Vol.9, No 13, 2019.
[9]Sarkar, D., Mondal, P., Sutradhar, S. et al.,"Morphometric Analysis Using SRTM-DEM and GIS of Nagar River Basin, Indo-Bangladesh Barind Tract", Journal of the Indian Society of Remote Sensing ,Vol 48, pp 597–614,2020.
[10]Esper Angillieri M.Y., Fernández O.M., Pereyra M., Ginesta Torcivia C., Ríos N."Morphometric Analysis of River Basins Using GIS as a Basis for Peak Discharge Calculation. Case of Study: Pre-Andean Section of National Route 150", Argentina Advances in Geomorphology and Quaternary Studies in Argentina, pp 129-135,2019.
[11]Kalaivanan,K.,Gurugnanam,B.,Suresh,M.Andarunkumar,M.,"Drainage morphometric analysis of Kadavanar river basin using GIS techniques, Dindigul district, Tamil Nadu, India", Journal of Applied Geochemistry, vol.18, No.1, pp.69-75,2015.
| Download File
Identification of Economic and Environmental Factors in Logistics using Exploratory Factor Analysis for Sustainable Development
Abinesh A
Symbiosis Institute of Operations Management, Nashik, Symbiosis International (Deemed University), Pune, India
Pages: 6846–6857
Abstract: [+]
Over the years there has been an ever increasing demand for goods which always has an irreversible effect on the environment and as a result higher pressure has been put on supply chain to become sustainable. Also companies are made to follow policies and initiatives by the government so that an individual contributes well to an organization as well as the Indian economy. This papers helps to identify the various variables that influence the logistics industry and this study was done with the help of a survey and asking opinions from experts from the logistics industry in India. An exploratory factory analysis (EFA) was done to group the variables into factors for much easier understanding. From the results, it was found that 14 variables, it was grouped into two factors namely environmental and economic factors as 8 and 6 variables respectively after performing EFA and then reliability test. In an organization the top management directs the economic factors whereas environmental initiatives are practised by all employees so that they can project themselves differently from a competitor.
Keywords:  Sustainability, Green Supply Chain, Logistics, Exploratory Factor Analysis, Green Environment, Logistics Factory
| References: [+]
1. Pagell M, Wu Z (2009) Building a more complete theory of sustainable supply chain management using case studies of 10 exemplars. J Supply Chain Manag 45(2):37–56
2. Esfahbodi, Ali & Zhang, Yufeng & Watson, Glyn & Zhang, Tao. (2016). Governance pressures and performance outcomes of sustainable supply chain management – An empirical analysis of UK manufacturing industry. Journal of Cleaner Production. 10.1016/j.jclepro.2016.07.098.
3. Mitra, Subrata & Datta, Partha. (2014). Adoption of green supply chain management practices and their impact on performance: An exploratory study of Indian manufacturing firms. International Journal of Production Research. 52. 10.1080/00207543.2013.849014.
4. Ansari, Z. N., & Kant, R. (2017). A state‐of‐art literature review reflecting 15 years of focus on sustainable supply chain management. Journal of Cleaner Production, 142, 2524–2543. https://doi.org/10.1016/j.jclepro.2016.11.023
5. Swisher LL, Beckstead JW, Bebeau MJ. Factor Analysis as a Tool for Survey Analysis Using a Professional Role Orientation Inventory as an Example. Physical Therapy. 2004;84(9):784-99.
6. Kaiser HF. A Second-Generation Little Jiffy. Psychometrika. 1970;35(4):401-15.
7. Kaiser HF. Little Jiffy, Mark IV. Educational and Psychological Measurement 1974;34:111-7.
8. Bartlett MS. Tests of significance in factor analysis. British Journal of Psychology. 1950;3(Part II):77-85.
9. Costello AB, Osborne JW. Best Practices in Exploratory Factor Analysis: Four Recommendations for Getting the Most From Your Analysis. Practical Assessment,Research & Evaluation. 2005;10(7):1-9.
10. Henson RK, Roberts JK. Use of Exploratory Factor Analysis in Published Research:Common Errors and Some Comment on Improved Practice. Educational and Psychological Measurement. 2006;66(3)
11. Thompson B. Exploratory and confirmatory factor analysis: understanding concepts and applications. Washington, DC: American Psychological Association; 2004.
12. Patil Vivek H, Surendra N. Singh, Sanjay Mishra, and D. Todd Donavan (2017). Parallel Analysis Engine to Aid in Determining Number of Factors to Retain using R [Computer software], available from https://analytics.gonzaga.edu/parallelengine/.
13. Dahl, Ø, Fenstad, J. & Kongsvik, T., (2014), “Antecedents of safety- compliant behaviour on offshore service vessels: a multi-factorial approach”, Maritime Policy & Management, Vol. 41, No. 1, pp. 20-41.
14. van Griethuijsen, R.A.L.F., van Eijck, M.W., Haste, H. et al. Global Patterns in Students’ Views of Science and Interest in Science. Res Sci Educ 45, 581–603 (2015). https://doi.org/10.1007/s11165-014-9438-6
15. Taber, K. S. (2018). The use of Cronbach’s alpha when developing and reporting research instruments in science education. Research in Science Education, 48(6).
16. Pett, Marjorie & Lackey, Nancy & Sullivan, J.. (2003). Making sense of factor analysis: The use of factor analysis for instrument development in health care research.
17. Brown, Ted & Onsman, Andrys. (2010). Exploratory factor analysis: A five-step guide for novices. Australasian Journal of Paramedicine. 8. 1-13. 10.33151/ajp.8.3.93.
18. IBM Corp. Released 2015. IBM SPSS Statistics for Windows, Version 23.0. Armonk, NY: IBM Corp.
19. Andy Field, Discovering statistics using IBM SPSS statistics. 4th ed, 2009
20. Hair J, Anderson RE, Tatham RL, Black WC. Multivariate data analysis. 4th ed. New Jersey: Prentice-Hall Inc; 1995.
21. Tabachnick BG, Fidell LS. Using Multivariate Statistics. Boston: Pearson Education Inc; 2007
| Download File
Retrofitting Techniques for Reinforced and Sustainable Concrete Column
1Aditya Kumar Tiwary and 2Sakshi Bhatia
1Assistant Professor, Department of Civil Engineering, Chandigarh University, Mohali, India.
2Research Scholar, Department of Civil Engineering, Chandigarh University, Mohali, India.
Pages: 6858–6870
Abstract: [+]
Many reinforced concrete structures are deficient in stiffness, ductility, and strength capacity contrasted with current guidelines. When a powerful event, such as an earthquake, happens, un-reinforced and deficient concrete members may fail and produce cataclysmic outcomes. So as to check this issue, various retrofit and repair techniques have been considered, actualized and have created an assortment of results. This examination is centered on looking at local retrofit and repair methods for reinforced concrete columns so as to break down the viability of these techniques. The essential strategies looked at are reinforced concrete jacketing, steel jacketing and FRP jacketing. An assortment of limitations is analyzed over the techniques including the loading capacity, connection methods, deformation, shear stress and shear strain in the member. Each retrofit strategy works contrastingly under every requirement, and the benefits and drawbacks of each were discussed and compared.
Keywords:  Jacketing, concrete jacketing, steel jacketing, FRP jacketing.
| References: [+]
[1]ACI 440.1R-06, 2006:Guide for the design and construction of structural concrete reinforced with FRP bars.
[2]ACI 440.2R-08, 2008: Guide for design and construction of externally bonded FRP systems for strengthening concrete structures.
[3]Abhijit Mukherjee and Mangesh V. Joshi, “Seismic retrofitting technique using fibre composites”, Indian Concrete Journal, 2001.
[4]A. D. Bournas, “Strengthening and seismic retrofitting of RC columns with advanced materials: Textile reinforced mortar, near surface mounted FRP or stainless-steel reinforcement”, Thesis, Civil Engineering Department, University of Patras, Patras, , 2008.
[5]A. D. Bournas, P. V. Lontou, G. C. Papanicolaou, and T. C. Triantafillou. “Textile-reinforced mortar TRM versus FRP confinement in reinforced concrete columns”, ACI Struct. J., vol.104, no.6, pp. 740–748, 2007.
[6]A. Brueckner, R. Ortlepp, S. Weiland and M. Curbach. “Shear strengthening with textile reinforced concrete.” Proc., 3rd Int. Conf. on Composites in Construction, pp. 1307–1314, 2005.
[7]D. E. Biskinis, “Deformations of concrete members at yielding and ultimate”, Thesis, Civil Engineering Department, University of Patras, Patras, 2007.
[8]EN 1015-11, 1993: Methods of test for mortar for masonry—Part 11: Determination of flexural and compressive strength of hardened mortar.
[9]EN 1998-3, 2005: Euro code 8: Design of structures for earthquake resistance—Part 3: Assessment and retrofitting of buildings.
[10]Amarnath Chakrabarti, Devdas Menon, Amlan Kumar Sengupta,“Handbook on Seismic Retrofit of Buildings”, Narosa Publishing House, 2008.
[11]J. Hegger and S. Voss. “Application and dimensioning of textile reinforced concrete.” 8th International Symposium for Fiber-Reinforced Polymer Reinforcement for Concrete Structures, pp. 17-23, 2007.
[12]K. Amlan Sen Gupta, S. Chemuru Reddy, Badari Narayanan and Asokan A, “Seismic Analysis and Retrofit of Existing Multi Storeyed Buildings in India- An Overview with a Case Study”, 13th World Conference on Earthquake Engineering, pp. 25-71, 2004.
[13]M. Curbach and F. Jesse. “High-performance textile-reinforced concrete.” Structural engineering international, Vol. 9,no.4, pp. 289–291, 1999.
[14]N. Mangulkar Madhuri, V. Gaikwad Madhukar, “Review on Seismic Analysis of Elevated Water Tank”, International Journal of Civil Engineering and Technology, Vol.4, no.2, pp. 288-294,2013.
[15]O. Bhavar Dadasaheb, D. Dhake Pravinchandra, A. Ogale Ramesh, “Retrofiitng of existing RCC buildings by the method of jacketing”, IJRMEET, issue 5,no.1, 2013.
[16]S. N. Bousias, A. L. Spathis and M. N. Fardis. “Seismic retrofitting of columns with lap spliced smooth bars through FRP or concrete jackets”, J. Earthquake Eng., vol.11,no.5,pp. 653–674,2007.
[17]S. Balaji and G.S. Thirugnanam, “Flexural strenghtening of beams using precast SIFCON laminates”, Journal of Structural Engineering, Vol. 40, No.3, pp.262-267, 2013.
[18]W. Brameshuber, J. Brockmann and G. Roessler. “Textile reinforced concrete for formwork elements—Investigations of structural behaviour”, Proc., FRPRCS-5 Fiber Reinforced Plastics for Reinforced Concrete Structures, Vol. 2, pp. 1019–1026, 2001.
| Download File
Performance of Cooling Tower using Sustainable Polymers Packing
1Nagam Obaid Kariem, 2Khalid M. Mousa Al-zobai, 1,*,3Zainab T. Al-Sharify
1Environmental Engineering department, University of Al-Mustansiriyah, Baghdad, Iraq.
2Chemical engineering department, Al- Nahrian University, Baghdad, Iraq.
3Academic Visitor, Chemical Engineering Department, Birmingham university, UK.
Pages: 6871–6884
Abstract: [+]
Nowdays many enginnering works towards green engineeing, and hence it is important to work with sustainable polymers that can be recylabe without damaging our environment, sush as thermoplastic polymers. This paper is deal with the performance of thermoplastic polymer (polystyrene) that had the shape of tri-packs arranged randomly used as fill for an cooling tower.A counter cooling device of (40 cm x 40 cm) was used with cross-sectional area and 1.7m. High was constructed. The fill has been studied theoretically and experimentally. Air rates of 0.7, 1.3,and 1.8 kg/s.m2 were used a with water rates within the range between 1 to 1.8 kg/s.m2 .The overall volumetric-mass transfer coefficient (Mt) volumetric heat-transfer coefficient and the tower characteristics (Mt/L) were discovered to be a function of the water air flow-rates simultaneously . Different variables were investigated these are water flow rate, air flow rate, inlet water temperature, and height of fill. A computer program depends on equations related cooling tower performance was used to calculate the performance coefficient, volumetric mass transfer coefficient, and volumetric heat transfer coefficient.
Keywords:  Green Engineeing, Polystyrene, Sustainable, Thermoplastic Polymer, Cooling Tower, Packed Bed, Air Flow-Rates, Heat Transfer, Mass Transfer Coefficient, Fluid Flow.
| References: [+]
[1]Kalpana M., Muniprasad D, “Analysis And Design Of Cooling Tower”, International Journal Of Pure And Applied Mathematics, Vol. 119, no. 17, 2867-2874, 2018.
[2]Dahikar, P., Patel. R., “Analysis and Design of a Cooling Tower Considering Wind Pressure and Thermal Effect Using Staad”, International Journal of Scientific Research in Civil Engineering. Vol.4 , no.2, pp 32-40, 2020.
[3]Harith H. Al-Moameri, Noor T. Al-Sharify, Mohammed A. Abdulrehman , Zainab T. Al-Sharify, “Impact Of Nanoparticles On Polyurethane Resin's Final Properties”, Journal Of Green Engineering. Vol. 10, no.6, pp.3114-3126, 2020.
[4]Kariem, N. O., Jaffal, H. M. “Performance of cooling tower with honeycomb packing”, Journal of Engineering Technology, Vol.29, no.6, pp. 1080-1093, 2011.
[5]Lemouari, M.; Boumaza, M.; AndMujtaba, I.M., “Thermal Performances Investigation Of A Wet Cooling Tower”, Applied Thermal Engineering, Vol.27, no.5-6, pp. 902-909, 2007.
[6]Ragupathy, R. R. A.,”Thermal performance of forced draft counter flow wet cooling tower with expanded wire mesh packing”, International Journal on Technical and Physical Problems of Engineering, Vol.3, no.6, pp.19-23, 2011.
[7]Kong, Q. J., Liu, D. Y., Wang, P., Xie, D. Q., Wu, Q., & Zhao, X. Y. “Experimental study on the heat and mass transfer characteristics of a counter-flow wet cooling tower with foam ceramic packing”, Thermophysics and Aeromechanics, Vol.26, no.2, 267-279, 2019.
[8]Muhsun, S. S , Al-Sharify, Z. T, “Experimental work and CFD model for flowrate estimating over OGEE spillway under longitudinal slope effect”, International Journal of Civil Engineering and Technology, Vol.9, no.13, pp. 430-439, 2018.
[9]Robert N.Meroney “CFD prediction of cooling tower drift” Journal of Wind Engineering and Industrial Aerodynamics, Vol.94, no.6, pp. 463-490, 2006.
[10]Robert N.Meroney, “Protocol for CFD prediction of cooling-tower drift in an urban environment”, Journal of Wind Engineering and Industrial Aerodynamics, Vol.96, no.10-11, pp.1789-1804, 2008.
[11]Muhsun, S. S., Al-Osmy, S. A. T., Al-Hashimi, S. A. M., Al-Sharify, Z. T. “Theoretical, CFD Simulation and Experimental Study to Predict the Flowrate Across a Square Edge Broad Crested Weir Depending on the End Depth as a Control Section”, AWAM International Conference on Civil Engineering, Vol.53, pp. 15-34, 2019.
[12]Williamson, N., Behnia, M., & Armfield, S., “Comparison of a 2D axisymmetric CFD model of a natural draft wet cooling tower and a 1D model”, International journal of heat and mass transfer, Vol.51, no.9-10, pp.2227-2236, 2008.
[13]Mousa, H. M., Muhsun, S. S, Al-Sharify, Z. T. “Two Phase Flow Experimental Detection Method and CFD models–A review.”, Journal of Engineering and Sustainable Development.pp.1-10, 2020.
[14]H.D.Madhaw, Hettiarach chia, Mihajlo Golubovica, William M.Woreka, YasuyukiIkegamib, “Optimum design criteria for an organic Rankine cycle using low-temperature geothermal heat sources”, Energy, Vol.32, no.9, pp.1698-1706, 2007.
[15]Chaoyuan Wang, Wei Cao Baoming Li, Zhengxiang Shi, Ailian Geng. “ A fuzzy mathematical method to evaluate the suitability of an evaporative pad cooling system for poultry houses in China”, Biosystems Engineering, Vol. 101, no.3, pp.370-375, 2008.
[16]Wu, J. M., Huang, X., Zhang, H. “Numerical investigation on the heat and mass transfer in a direct evaporative cooler”, Applied Thermal Engineering, Vol.29, no.1, pp. 195-201, 2009.
[17]Arash Mirabdolah Lavasania, Zahra Namdar Babolib, Mohsen Zamani zadeh, Masoud Zareh, “Experimental study on the thermal performance of mechanical cooling tower with rotational splash type packing”, Energy conversion and management, Vol.87, 530-538, 2014.
[18]Nagam Obaid Kariem, “Effect of changing packing shapes on the evaporation rates using different combination arrangements of dry-wet cooling towers systems”, Al-Qadisiyah Journal for Engineering Sciences, Vol.6,no.2, pp. 232-246, 2013.
[19]Kelly, N. W., & Swenson, L. K. “Comparative performance of cooling tower packing arrangements”, Chemical Engineering Progress, Vol.52, no.7, 1956‏.
[20]R. Ramkumar, A. Ragupathy “Optimization of cooling tower performance with different types of packings using Taguchi approach”, Journal of the Brazilian Society of Mechanical Sciences and Engineering, Vol.37, no.3, pp.929-936, 2015.
| Download File
Experimental Study of Single Effect Solar Still with Sensible and Latent Heat Storage to Enhance its Performance
1,*Gurprinder Singh Dhindsa, 2Gurpreet Singh Sokhal, 3Gurmail Singh Malhi
1,2,3 Assistant Professor, Department of Mechanical Engineering, Chandigarh University, Mohali, Punjab, India.
Pages: 6885–6899
Abstract: [+]
In present study, the comparative study of two different configurations of solar stills have been done with single effect solar still. To achieve the effect of heat storage on solar still performance, paraffin wax was used as a latent heat storage and solar pond was used as a sensible heat storage. The basin type single effect solar still having float wicks and paraffin wax in the basin water is referred as modified still with paraffin wax.While, the basin type single effect solar still having float wicks in the basin water and coupled with solar pond is referred as modified still with solar pond.Both these configurations of solar stills have been compared individually with single effect basin type still which is referred as conventional still. The overall distillate was found to be 3.3 kg/m2 during the day and 3.9 kg/m2 during the night for conventional and modified still with paraffin wax respectively. The overall and night gain in productivity of modified still with paraffin wax was found to 18.5% and 37.2 % respectively over the conventional still. While, the day and overall cumulative efficiency of modified still was more than that of conventional still by 6.36 % and 19.2 % respectively. The modified still with solar pond produce 5.12 kg/m2, which was 1.78 kg/m2 more distillate for 24 hours as compared to conventional still. The gain in day and night productivity of modified still with solar pond over the conventional still was found to be 52.52% and 55.25% respectively. The night and overall cumulative efficiency of modified still with solar pond was more than that of conventional still by 12.54% and 32.71% respectively.It has been observed that overall gain in cumulative efficiency was found to be more in solar still having float wicks and solar pond as compared to still having float wicks and paraffin wax.
Keywords:  Solar Still, Paraffin wax, Solar pond, Float wicks, Heat Storage.
| References: [+]
[1]G. S. Dhindsa, M. K. Mittal, “Experimental study of basin type vertical multiple effect diffusion solar still integrated with mini solar pond to generate nocturnal distillate,” Energy Convers. Manag., Vol. 165, pp. 669–680, 2018.
[2]G. S. Dhindsa, M. K. Mittal, “An investigation of double-glass-covered trapezoidal salt-gradient solar pond coupled with reflector,” Int. J. Green Energy, Vol. 15, no. 2, pp. 57–68, 2018.
[3]S. Bisht, G. S. Dhindsa, S. S. Sehgal, “Augmentation of diurnal and nocturnal distillate of solar still having wicks in the basin and integrated with solar pond,” Mater. Today Proc., 2020.
[4]R. Sharma, G. S. Dhindsa, G. S. Sokhal, “Experimental investigation of basin type single slope solar still with floating wicks,” Int. J. Mech. Prod. Eng. Res. Dev., Vol. 10, pp. 20–27, 2020.
[5]A. Kumar, D. B. Singh, A. Mallick, S. Kumar, N. Kumar, V. K. Dwivedi, “Performance analysis of specially designed single basin passive solar distillers incorporated with novel solar desalting stills : A review,” Sol. Energy, Vol. 185, pp. 146–164, 2019.
[6]K. Sampathkumar, T. V Arjunan, P. Pitchandi, P. Senthilkumar, “Active solar distillation — A detailed review,” Renewable and Sustainable Energy Reviews, Vol. 14, pp. 1503–1526, 2010.
[7]A. S. Nafey, M. Abdelkader, A. Abdelmotalip, A. A. Mabrouk, “Solar still productivity enhancement,” Vol. 42, pp. 1401–1408, 2001.
[8]E. M. A. Edreis, A. S. Waly, H. Panchal, M. S. Elashry, “A mini review of techniques used to improve the tubular solar still performance for solar water desalination,” Process Saf. Environ. Prot., 2019.
[9]M. Abu-arabi, Y. Zurigat, H. Al-hinaib, S. Al-hiddabib, “Modeling and performance analysis of a solar desalination unit with double-glass cover cooling,” Desalination ,Vol. 143, pp. 173–182, 2002.
[10]T. Elango and K. K. Murugavel, “The effect of the water depth on the productivity for single and double basin double slope glass solar stills,” Desalination, Vol. 359, pp. 82–91, 2015.
[11]Z. M. Omara, A. E. Kabeel, A. S. Abdullah, “A review of solar still performance with reflectors,” Renew. Sustain. Energy Rev., Vol. 68, pp. 638–649, 2017.
[12]A. S. Faidah, “Thermal performance of a single basin solar still with PCM as a storage medium,” Appl. Energy, Vol. 86, no. 7–8, pp. 1187–1195, 2009.
[13]L. Sahota and G. N. Tiwari, “Effect of nano fl uids on the performance of passive double slope solar still : A comparative study using characteristic curve,” Desalination, Vol. 388, pp. 9–21, 2016.
[14]A. Rahmani and A. Boutriaa, “Numerical and experimental study of a passive solar still integrated with an external condenser,” Int. J. Hydrogen Energy, vol.42,no.48,pp. 1–9, 2017.
[15]A. M. Manokar, D. P. Winston, J. Deb, R. Sathyamurthy, A. E. Kabeel, H. Panchal, “Comparative study of an inclined solar panel basin solar still in passive and active mode,” Sol. Energy, Vol. 169, pp. 206–216, 2018.
[16]K. H. Nayi and K. V Modi, “Pyramid solar still : A comprehensive review,” Vol. 81, pp. 136–148, 2018.
[17]H. Hassan, “Comparing the performance of passive and active double and single slope solar stills incorporated with parabolic trough collector via energy, exergy and productivity,” Renew. Energy, 2019.
[18]A. E. Kabeel, K. Harby, M. Abdelgaied, A. Eisa, “A comprehensive review of tubular solar still designs , performance , and economic analysis,” J. Clean. Prod., pp.119-030, 2019.
[19]D. Mevada et al., “Effect of fin configuration parameters on performance of solar still: A review,” Groundw. Sustain. Desalination, pp. 100-289, 2019.
[20]H. Panchal, K. K. Sadasivuni, M. Israr, N. Thakar, “Various techniques to enhance distillate output of tubular solar still: A review,” Groundw. Sustain. Desalination, Vol. 9, pp. 100-268, 2019.
[21]M. S. Yousef and H. Hassan, “Assessment of di ff erent passive solar stills via exergoeconomic , exergoenvironmental , and exergoenviroeconomic approaches : A comparative study,” Sol. Energy, Vol. 182, pp. 316–331, 2019.
[22]H. E. Gad, S. S. El-din, A. A. Hussien, and K. Ramzy, “ScienceDirect Thermal analysis of a conical solar still performance : An experimental study,” Sol. ENERGY, Vol. 122, pp. 900–909, 2015.
[23]P. Pal, P. Yadav, R. Dev, D. Singh, “Performance analysis of modified basin type double slope multi–wick solar still,” Desalination, Vol. 422, pp. 68–82, 2017.
[24]A. Amarloo and M. B. Sha, “Enhanced solar still condensation by using a radiative cooling system and phase change material,” Desalination,Vol. 467, pp. 43–50, 2019.
[25]N. T. Alwan, S. E. Shcheklein, O. Ali, “Experimental investigation of modified solar still integrated with solar collector,” Case Stud. Therm. Eng., pp.100-614, 2020.
[26]V. P. Katekar and S. S. Deshmukh, “A review on research trends in solar still designs for domestic and industrial applications,” J. Clean. Prod., Vol. 257, 2020.
[27]A. Agrawal and R. S. Rana, “Theoretical and experimental performance evaluation of single-slope single-basin solar still with multiple V-shaped floating wicks,” Heliyon, Vol. 5, no. 4, 2019.
| Download File
Analysis of Graph Theory Approach for Energy Optimization in Wireless Sensor Networks
1 R.Arasu, 2N.Parvathi, 3D.Anandhababu
1Research Scholar, Department of Mathematics, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, India.
2Professor, Department of Mathematics, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur,India.
3Research Scholar, Department of Mathematics, Faculty of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, India.
Pages: 6900–6908
Abstract: [+]
Energy conservation is a vital concern for the spectrum of applications in wireless sensor networks. “A Wireless Sensor Network is a network with a number of sensor nodes that communicate with each other using radio signals in order to detect, track and describe these phenomena. The aggregation of data between sensor nodes is enormous unless successful sensor data flow management is enacted. Clustering the sensor nodes is known to be a significant solution to this problem. Databases, machine learning, governing the best or undeviating or cheapest route are the general purpose of the graph theory in technology. This control sub-field of discrete mathematics is used by applications in most network systems. Let G = (V, E) be a simple undirected graph and S is a subset of V if S is referred to as a dominant set of V-S adjacent to at least one vertex in S”. We analysed applications of Enegry Optimization’s secure domination parameters in wireless sensor networks in this article.
Keywords:  Enegry Optimization, Domination, Secure domination number, Bondage number, secure bondage number.
| References: [+]
[1]C. Berge, “Theory of Graphs and its Applications”, Methuen, London, 1962.
[2]Teresa W. Haynes, Stephen Hedetniemi, Peter Slater, “Domination in Graphs Volume 2: Advanced Topics (Chapman & Hall/CRC Pure and Applied Mathematics)”, 1st Edition, CRC Press,1998.
[3]T.W. Haynes, S.T. Hedetniemi, and P.J. Slater. “Fundamentals of Domination in Graphs”, Marcel Dekker Inc., New York, 1998.
[4]W.F. Klostermeyer, C.M. Mynhardt, “Secure domination and secure total domination in graphs”, Discuss. Math., Graph Theory, vol.28,pp.267-284,2008.
[5]M.Xu, “Topological Structure and Analysis of Interconnection Networks”, Kluwer Academic Publishers, 2001.
[6]J. F. Fink, M. S. Jacobson, L. F. Kinch, and J. Roberts, “The bondage number of a graph,” Discrete Mathematics, vol. 86, no. 1–3, pp. 47–57, 1990.
[7]Sambor Guze. “ Graph Theory Approach to the Vulnerability of Transportation Networks”, Algorithms, vol.12, no.12,2019.
[8]V. Kumar, S. Jain and S. Tiwari, “Energy efficient clustering algorithms in wireless sensor networks: A survey”, Int. J. Comput. Sci. Issues, vol. 8, no.5, pp. 259-268,2011.
[9]P. Kuila and P. K. Jana,” Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach”, Eng. Appl. Artif. Intell., vol. 33,pp.127–140,2014.
[10]M. Natarajan, R. Arthi and K. Murugan, “Energy aware optimal cluster head selection in wireless sensor networks”, Proc. 4th Int. Conf. Computing, Communications and Networking Technologies (ICCCNT 13), 2013.
[11]Z. Ali and W. Shahzad, “Analysis of routing protocols in adhoc and sensor wireless networks based on swarm intelligence”, Int. J. Netw. Commun.,vol. 3, no.1,2013.
[12]I. Dietrich and F. Dressler, “On the lifetime of wireless sensor networks”, ACM Trans. Sen. Netw., vol.5,no.1, 2009.
[13]Rashmi SVD, Somasundaram A, Arumugam S. “Upper Secure Domination Number of a Graph”, Electron Notes Discret Math., vol.53,pp.297-306,2016.
| Download File
Performance Analysis of Standalone Photovoltaic System with Variable Step Size Zero Oscillation Perturb &Observe Maximum Power Point Tracking Technique
1E.P Sarika, 2Josephkutty Jacob, 3S Sheik Mohammed, 4Shiny Paul
1Research Scholar, Division of Electrical, Cochin University College of Engineering Kuttanad, Cochin University of Science and Technology, Kochi, India.
2Professor, Division of Electrical and Electronics Engineering, Cochin University of Science and Technology, Kochi, India.
3Assistant Professor, Department of Electrical and Electronics Engineering, TKM College of Engineering, Kollam,India.
4Assistant Professor, Division of Electrical and Electronics Engineering, Cochin University of Science and Technology, Kochi, India.
Pages: 6909–6922
Abstract: [+]
In this paper, a standalone Solar Photovoltaic (SPV) system with Variable Step Size Zero Oscillation Perturb & Observe (VSS ZOPO) Maximum Power Point Tracking (MPPT) technique is studied. The proposed algorithm utilizes variable step sizes inorder to achieve faster tracking and it retains a steady duty ratio with zero oscillation at Maximum Power Point (MPP). To evaluate the proposed system, a standalone SPV systemwith boost converter is modeled in MATLAB/Simulink and the simulation of SPV system is performed under different input conditions. The result shows that, the proposed algorithm has improved tracking for varying atmospheric conditions and has almost zero oscillation around MPP. Moreover, the output power produced by VSS ZOPO MPPT based SPV systemis higher than the VSS P&O based system and hence it is comparatively more efficient.
Keywords:  Maximum Power Point Tracking, Solar Photovoltaic, Variable
| References: [+]
[1]M. Dhimish, "Assessing MPPT Techniques on Hot-Spotted and Partially Shaded Photovoltaic Modules: Comprehensive Review Based on Experimental Data", IEEE Transactions on Electron Devices, vol. 66, no. 3, pp. 1132-1144, 2019.
[2]D. Singh and H. Singh, "Technical Survey and review on MPPT techniques to attain Maximum Power of Photovoltaic system", International Conference on Signal Processing, Computing and Control , pp. 265-268, 2019.
[3]T. O. Sweidan, M. I. Abuashour and N. F. Osman, " Transient Analysis of DC Shunt Motor Supplied by Stand-alone PV System Employing FOCV for MPPT ", International Conferences on Advances in Science and Engineering Technology, pp. 1-6, 2020.
[4]A. Mohapatra, B. Nayak and C. Saiprakash, "Adaptive Perturb & Observe MPPT for PV System with Experimental Validation", International Conference on Sustainable Energy Technologies and Systems, IEEE, pp. 257-261, 2019.
[5]K. Jain, M. Gupta and A. Kumar Bohre, "Implementation and Comparative Analysis of P&O and INC MPPT Method for PV System", International Conference on Power Electronics, IEEE, pp. 1-6, 2018.
[6]P. K. Atri, P. S. Modi and N. S. Gujar, "Comparison of Different MPPT Control Strategies for Solar Charge Controller", International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control, pp. 65-69, 2020.
[7]A. Hussain, H. A. Sher, A. F. Murtaza and K. Al-Haddad, "Revised Perturb and Observe Approach For Maximum Power Point Tracking Of Photovoltaic Module Using Finite Control Set Model Predictive Control", International Symposium on Industrial Electronics, IEEE, pp. 962-967, 2019.
[8]A. K. Podder, N. K. Roy and H. R. Pota, "MPPT methods for solar PV systems: a critical review based on tracking nature", IET Renewable Power Generation, vol. 13, no. 10, pp. 1615-1632, 2019.
[9]E. P. Sarika, J. Jacob, M. S. Sheik and S. Paul, "Performance Analysis of Solar Photovoltaic System with Fuzzy Based Variable Step Size MPPT Algorithm Using Matlab /Simulink", International Conference on Circuits and Systems in Digital Enterprise Technology, pp. 1-7, 2018.
[10]Sheik Mohammed, S., D. Devaraj, T.P. Imthias Ahamed.,”A novel hybrid Maximum Power Point Tracking Technique using Perturb & Observe algorithm and Learning Automata for solar PV system”, Energy, vol.112 ,pp.1096-1106,2016.
[11]K. Bataineh, "Improved hybrid algorithms-based MPPT algorithm for PV system operating under severe weather conditions", IET Power Electronics, vol. 12, no. 4, pp. 703-711, 2019.
[12]S. Öztürk and I. Çadırcı, "A Generalized and Flexible Control Scheme for Photovoltaic Grid-Tie Microinverters", IEEE Transactions on Industry Applications, vol. 54, no. 1, pp. 505-516,2018.
[13]M. S. Sheik, "Multiple Step Size Perturb and Observe Maximum Power Point Tracking algorithm with Zero Oscillation for Solar PV Applications", International Conference on Current Trends towards Converging Technologies, pp. 1-5, 2018.
[14]H. Ikaouassen, A. Raddaoui, M. Rezkallah and A. Chandra, "Real-time implementation of improved predictive model control for standalone power generation system based PV renewable energy", IET Generation, Transmission & Distribution, vol. 13, no. 7, pp. 1068-1077, 2019.
| Download File
Twinned Text Clustering Algorithm Based on IDBSCAN and ConceptNet for Effective Green Communication
1J.Margaret Sangeetha, 2P.Velmani, 3T.C.Rajakumar
1Research Scholar, Department of Computer Science, Manonmaniam Sundaranar University, Tirunelveli, India.
2Assistant Professor, Department of Computer Science, M.D.T. Hindu College, Tirunelveli, India.
3Associate Professor, Department of Computer Science, St. Xavier’s College, Tirunelveli, India.
Pages: 6923–6937
Abstract: [+]
Text is the basic form of data, which is easy to share and manipulate and this feature increases the exploitation of text in all the domains. The needed data must be accessible at any given point of time, in order to ensure data usability. However, data accessibility is highly challenging, due to the increased volume of data and the best solution to deal with this issue is data organization. Clustering is the best form of data organization, which groups the related entities together, while separating unrelated entities. Understanding the effectiveness of data clustering, this article presents a twinned text clustering algorithm based on Improved Density Based Spatial Clustering of Applications with Noise (IDBSCAN), which is an enhanced version of DBSCAN and the ConceptNet. The roughly formed clusters are refined by the sense based ConceptNet, which improves the performance of the clustering. The performance of this work is compared with recent existing approaches in terms of F-measure, purity and entropy. The proposed twinned clustering algorithm exhibits better F-measure and purity rates with minimal entropy rates.
Keywords: Text clustering, ConceptNet, IDBSCAN, cluster labeling,Green communication,
| References: [+]
[1]Xu R, Wunsch D “Survey of clustering algorithms”, IEEE Transactions on Neural Networks , Vol.16,no.3,pp. 645 - 678,2005.
[2]Park H, Jun C “A simple and fast algorithm for K-medoids clustering”,. Expert Systems with Applications, Vol. 36, no 2, pp. 3336-3341,2009.
[3]Kaufman L, Rousseeuw P, “Partitioning around medoids (program pam). Finding groups in data: an introduction to cluster analysis”, Wiley, Hoboken, pp.342,2005.
[4]Velmurugan T, Santhanam T, “A survey of partition based clustering algorithms in data mining:an experimental approach”, Information Technology Journal, Vol.10, no.3, pp. 478-484, 2011.
[5]Johnson S, “Hierarchical clustering schemes”, Psychometrika Vol.32, pp.241–254,1967.
[6]Li, Y., Luo, C., & Chung, S. M. “Text clustering with feature selection by using statistical data”, IEEE Transactions on knowledge and Data Engineering, Vol.20, no.5, pp. 641-652, 2008.
[7]Rashid, J., Shah, S. M. A., Irtaza, A., Mahmood, T., Nisar, M. W., Shafiq, M., Gardezi, A. “Topic Modeling Technique for Text Mining Over Biomedical Text Corpora Through Hybrid Inverse Documents Frequency and Fuzzy K-Means Clustering”, IEEE Access, 7, 146070-146080, 2019.
[8]Nagwani, N. K. “A comment on “a similarity measure for text classification and clustering”, IEEE Transactions on Knowledge and Data Engineering, Vol.27, no.9, pp.2589-2590, 2015.
[9]Fan, Y., Gongshen, L., Kui, M., Zhaoying, S. “Neural feedback text clustering with BiLSTM-CNN-Kmeans”, IEEE Access, Vol.6, pp.57460-57469,2018.
[10]Yang, S., Huang, G., Cai, B, “Discovering Topic Representative Terms for Short Text Clustering”, IEEE Access, Vol.7, pp.92037-92047, 2019.
[11]Afonso, A. R, “Brazilian Portuguese Text Clustering Based on Evolutionary Computing”, IEEE Latin America Transactions, Vol.14,no.7,pp. 3370-3377,2016.
[12]Sheri, A. M., Rafique, M. A., Hassan, M. T., Junejo, K. N., Jeon, M. “Boosting Discrimination Information Based Document Clustering Using Consensus and Classification”, IEEE Access, Vol.7, pp.78954-78962, 2019.
[13]Wang, B., Liu, W., Lin, Z., Hu, X., Wei, J., Liu, C. “Text clustering algorithm based on deep representation learning”, The Journal of Engineering, Vol.2018,no.16, pp. 1407-1414, 2018.
[14]Zhou, S., Xu, X., Liu, Y., Chang, R., & Xiao, Y. , “Text Similarity Measurement of Semantic Cognition Based on Word Vector Distance Decentralization With Clustering Analysis”, IEEE Access, Vol.7, pp.107247-107258, 2019.
[15]Zamora, J., Allende-Cid, H., Mendoza, M., “Distributed Clustering of Text Collections.”, IEEE Access, Vol. 7, pp. 155671-155685, 2019.
[16]Liang, S., Yilmaz, E., Kanoulas, E. “Collaboratively tracking interests for user clustering in streams of short texts”, IEEE Transactions on Knowledge and Data Engineering, Vol.31,no.2,pp. 257-272, 2018.
[17]Alhawarat, M., Hegazi, M. “ Revisiting K-Means and Topic Modeling, a Comparison Study to Cluster Arabic Documents”, IEEE Access, Vol.6, pp.42740-42749, 2018.
[18]Granados, A., Koroutchev, K., de Borja Rodriguez, F., “Discovering data set nature through algorithmic clustering based on string compression”, IEEE Transactions on Knowledge and Data Engineering, Vol.27no.3,pp. 699-711,2014.
[19]Ailem, M., Role, F., Nadif, M. ,” Sparse poisson latent block model for document clustering”, IEEE Transactions on Knowledge and Data Engineering, Vol.29,no.7, pp.1563-1576, 2017.
[20]Buenaño-Fernandez, D., González, M., Gil, D., Luján-Mora, S., “Text Mining of Open-Ended Questions in Self-Assessment of University Teachers: An LDA Topic Modeling Approach”, IEEE Access, Vol. 8, pp.35318-35330, 2020.
[21]Brockmeier, A. J., Mu, T., Ananiadou, S., Goulermas, J. Y., “Self-tuned descriptive document clustering using a predictive network”, IEEE Transactions on Knowledge and Data Engineering, Vol.30,no.10, pp.1929-1942, 2018.
[22]Passalis, N., Tefas, A. “Information clustering using manifold-based optimization of the bag-of-features representation”, IEEE transactions on cybernetics, Vol.48,no.1, pp.52-63,2016.
[23]Yang, H., Peng, H., Zhu, J., Nie, F., “ Co-Clustering Ensemble Based on Bilateral K-Means Algorithm”, IEEE Access, Vol.8, pp. 51285-51294,2020.
[24]Sangeetha, M., Padikkaramu, V., Chellan, R. T. “A Novel Density Based Clustering Algorithm by Incorporating Mahalanobis Distance”, International Journal of Intelligent Engineering and Systems, Vol.11, No.3, pp. 121-129, 2018.
[25]Available online: http://conceptnet5.media.mit.edu/
[26]Available online: http://mlg.ucd.ie/datasets/bbc.html
| Download File
Experimental Studies on Strength and Durability of Sustainable Concrete Using Bottom Ash by Replacement of Fine Aggregate
1D.S.Vijayan,2A.Lema Rose,3V.Gokulnath1D.Parthiban 4P.Dinesh Kumar
1Department of Civil Engineering, Aarupadai Veedu Institute of Technology, VMRF, TN, India.
2Department of Civil Engineering, SRM Valliammai Engineering College, Chennai, India.
3Saveetha School of Engineering, Saveetha Institute of Medical & Technical Sciences, TN, India.
4Department of Civil Engineering, Krishnasamy college of Engineering and Technology, India.
Pages: 6938–6949
Abstract: [+]
The experimental investigations has carried out to identify the effect of use on bottom ash which is replacement for fine aggregate. By adding the bottom ash in Concrete can be improved the strength and the cost of the concrete will be reduced. The waste materials which is extracted from the thermal power plant is harmful for human health so by using this materials in the concrete will be an eco-friendly for the environmental. Even though the cost of the sand is high by using the bottom as the cost will reduce up to 20%. The different types of strength and the properties of the concrete has been identified. To find the strength two different types of concrete test has be consists of compressive strength and flexural strength of the concrete beam. To development the strength of the concrete different percentages of bottom Ash has been add 0%, 10%,20%, 30% and 40% has replaced with fine aggregates. The concrete has various age of curing like 7days and 28days with two different types of water one is normal water and the salt water for compressive strength. The strength and durability of the concrete has been identified in this research.
Keywords:  Bottom ash, Effect, Fine Aggregate, Eco-Friendly, waste materials.
| References: [+]
[1]K. Soman, DivyaSasi, K.A Abubaker, “Strength properties of concrete withpartial replacement of sand by bottom ash”, International Journal of Innovative Research in Advanced Engineering , Vol.1, no. 7, pp.223-227, 2014.
[2]S.Lokesh, M.G.Ranjith Kumar, S.Loganathan, “ Effective Utilization of High Volume Fly ash with Light Weight Aggregate in Concrete for Construction industry”, Inernational Journal of Advanced Structures and Geotechnical Engineering ,Vol. 02, no. 04, pp. 142-146,2013.
[3]D.S.VijayanS, Arvindan, D.Parthiban, , R. SanjayKumarB.Saravanan, YumnamRobert, “An experimental study on mechanical and durable properties of self-curing concrete by adding admixture”, Materials Today: Proceedings,2020.
[4]Gurpreet Singh and Rafat siddique “Effect of waste foundry sand [WFS] as partial replacement of sand on the strength, ultrasonic pulse velocity and permeability of concrete”, International journal Construction and Building Materials, Vol. 26, no.1, pp.416-422,2012.
[5]D.S.Vijayan, K.Naveen Kumar, S.Aravindan, “Analytical Study on Industrial Steel Building with Braceing”, International Journal of Scientific & Technology Research, Vol. 8, no.10, pp.1275 – 1278, 2019.
[6]Mohd Syahrul Hisyam bin Mohd Sani, Fadhluhartini bt Muftah, Zulkifli Muda, “The Properties of Special Concrete Using Bottom Ash (WBA) as Partial Sand Replacement”, International Journal of Sustainable Construction Engineering Technology, Vol. 1, no. 2, pp.65-76, 2010.
[7]S.Aravindan, D.S.Vijayan, K.Naveen Kumar, B.Saravanan, “Characteristic Study of Concrete by Replacing Glass Cullet and Ceramic Tiles over Conventional Aggregates”, International Journal of Scientific & Technology Research, Vol. 8, no.10, pp. 1802 – 1805, 2019.
[8]Aggarwal.P, Aggarwal.Y, Gupta.S.M , “Effect of bottom ash as replacement of fine aggregate in concrete”, International Journal of Advance Research in Science and Engineering, vol.7,no.2,pp.51-57 , 2018.
[9]John zachar , Tarun R.naikin, “Replacement of fine aggregate with foundry sand”, Milwaukee journal –sentinel, Vol.3,2007
[10]Mahmoud solyman “Classification of Recycled Sands and their Applications as Fine Aggregates for Concrete and Bituminous Mixtures”, Dissertation,den Fachbereich Bauingenieurwesen der Universität Kassel, 2005.
| Download File
Investigation on Properties of Sustainable Concrete contains Silica Fume
1,*Rana H. Shabbar, 2Jaber Kadhim Taher, 1Zainab A. Shukur, 1Zarhraa S. Al-Charrakh
1Lecturer, Department of structures and water resources, Faculty of Engineering, University of Kufa, Najaf, Iraq.
2Lecturer, Faculty of Engineering, University of Kufa, Najaf, Iraq.
1Engineer, Department of structures and water resources, Faculty of Engineering, University of Kufa, Najaf, Iraq.
Pages: 6950–6965
Abstract: [+]
Concrete is considered as an important building material used for construction. This study aims to investigate the potential of silica fume to enhance the mechanical and physical properties of structural concrete. Silica fume is an industry-based non-metallic and non-hazardous waste material that is suitable for strengthening cement composites and concrete strength. It was used as an additive material with a cement weight range of 5 per cent, 10 per cent and 15 per cent. After 7 and 28 days of water curing, compression, breaking, flexure tests and density were achieved. Sorptivity and water absorption after 28 days have been tested. The results show that the density and flexural strength substantially increased with an increase in silica fume, while sorptivity and absorption of water decreased. By increasing the percentage of silica fume, the price gain in the compressive and tensile strength increased. In this analysis, a maximum compressive and tensile strength of 7 and 28 days was obtained by adding 15 per cent of silica smoke while sorptivity and water absorption showed a maximum value of 0 per cent of silica smoke. A maximum value of 10 per cent silica fume was seen for flexural strength (bending stress). In addition, standard silica fume concrete specimens have comparable sorptivity, with a mix without silica fume.
Keywords:  Concrete, compressive strength, splitting tensile, flexural strength, dry density and silica fume.
| References: [+]
[1]Ajay, V., C. Rajeev, and K. Yadav, “Effect of micro silica on the strength of concrete with ordinary portland cement”, Research Journal of Engineering Sciences,vol.1, no.3, pp. 1-4, 2012.
[2]Rong, Z., et al., “Effect of silica fume and fly ash on hydration and microstructure evolution of cement based composites at low water–binder ratios”, Construction and Building Materials, vol.51, pp. 446-450, 2014.
[3]Srivastava, V., et al., “Effect of silica fume in concrete”, International Journal of Innovative Research in Science, Engineering and Technology, vol.3, no.4, pp. 254-259,2014.
[4]Higgins, D., “Sustainable concrete: How can additions contribute”, The institute of concrete technology annual technical symposium, 2006.
[5]Sarkar, S., X. Aimin, and D. Jana, “Scanning Electron Microscopy, X-Ray Microanalysis of Concretes”, Handbook of Analytical Techniques in Concrete Science and Technology,pp. 231-274, 2001.
[6]Khan, M.I. and R. Siddique, “Utilization of silica fume in concrete: Review of durability properties Resources”, Conservation & Recycling, vol.57, pp.30-35,2011.
[7]Constantinides, G., “Nanoscience and nanoengineering of cement-based materials”, Materials, Processes and Applications Woodhead Publishing Series in Civil and Structural Engineering, pp. 9-37, 2013.
[8]Lazaro, A., Q. Yu, and H. Brouwers, “Nanotechnologies for sustainable construction”, Sustainability of Construction Materials, Woodhead Publishing, pp. 55-78, 2016.
[9]ACI-Committee 2000, ACI-2349: Guide for the use of silica fume in concrete.
[10]OBE, R., et al., “Strength Development of Concrete”, Sustainable Construction Materials: Recycled Aggregates, pp. 219-282, 2019..
[11]Mazloom, M., A. Ramezanianpour, and J. Brooks, “Effect of silica fume on mechanical properties of high-strength concrete”, Cement & Concrete Composites, Vol.26, no.4,pp. 347-357, 2004.
[12]Kadri, E., et al., “The compressive strength of high-performance concrete and ultrahigh-performance”, Advances in Materials Science and Engineering, 2012.
[13]Çakır, Ö. and Ö. Sofyanlı, “Influence of silica fume on mechanical and physical properties of recycled aggregate concrete”, HBRC Journal, Vol.11, no.2, pp. 157-166, 2015.
[14]Benlib, A., M. Karataşa, and Y. Bakir, “An experimental study of different curing regimes on the mechanical properties and sorptivity of self-compacting mortars with fly ash and silica fume”, Construction and Building Materials, Vol.144, pp. 552-562, 2017.
[15]Wongkeo, W., et al., “Compressive strength and chloride resistance of self-compacting concrete containing high level fly ash and silica fume”, Materials & design, vol.64, pp. 261-269,2014.
[16]Turk, K., S. Caliskan, and S. Yazicioglu, “Capillary water absorption of self-compacting concrete under different curing conditions”, Indian Journal of Engineering & Materials Sciences, vol.14, p. 365-372, 2007.
[17]Almajeed, l. and S. Turki, “Enhance Properties of Autoclaved Aerated Concrete by Adding Silica Fume”, International Journal of Recent Technology and Engineering , Vol.7, no.6, pp. 11-15, 2019.
[18]Amudhavalli, N. and J. Mathew, “Effect of silica fume on strength and durability parameters of concrete”,International Journal of Engineering Sciences and Emerging Technologies, vol.3, no.1, pp. 28-35, 2012.
[19]BS-EN 2011, BS EN 197-1: Cement. Composition, specifications and conformity criteria for common cements. Zement. Zusammensetzung, Anforderungen und Konformitätskriterien von Normalzement. British Standards Institution (BSI).
[20]BS-EN 1990, BS EN 812-102: Testing aggregates. Methods for sampling. Pruefung von Aggregaten. Verfahren zur Probenahme. British Standards Institution (BSI).
[21]ASTM-Committee 2005, ASTM-C- 494 -05: Standard Specification for Chemical Admixtures for Concrete. The American Society for Testing and Materials.
[22]ASTM-Committee 2003, ASTM C1240 - 03: Standard specification for use of siliac fume as a mineral admixtures in hydrolic cement concrete, mortar and grout. The American Society for Testing and Materials.
[23]BS-EN 2002, BS EN 12390-3: Testing hardened concrete. Compressive strength of test specimens. British Standards Institution (BSI).
[24]BS-EN 2010, BS EN 12390-6: Testing hardened concrete. Tensile splitting strength of test specimens. Prüfung von Festbeton. Spaltzugfestigkeit von Probekörpern. British Standards Institution (BSI).
[25]BS-EN 2009, BS EN 12390-5: Testing hardened concrete. Flexural strength of test specimens. British Standards Institution (BSI).
[26]BS-EN 2009, BS EN 12390-7: Testing hardened concrete: Density of hardened concrete. British Standards Institution (BSI).
[27]BS-EN 2011, BS EN 772-11: Methods of test for masonry units. Determination of water absorption of aggregate concrete, autoclaved aerated concrete, manufactured stone and natural stone masonry units due to capillary action and the initial rate of water absorption of clay masonry units. British Standards Institution (BSI).
[28]Pardhasaradhi, K. and G.G. Prasad, “Investigation on Hardened properties of Concrete with Silica fume as Partial Replacement of Cement”,International Journal of Innovative Research in Science, Engineering and Technology , vol.5, no.3,2016.
[29]Smarzewski, P. “Influence of silica fume on mechanical and fracture properties of high performance concret”,3rd International Conference on Structural Integrity(ICSI), 2019.
[30]Kim, S., et al., “Tensile Behavior Characteristics of High-Performance Slurry-Infiltrated Fiber-Reinforced Cementitious Composite with Respect to Fiber Volume Fraction”, Materials, vol.12, no.20, 2019.
[31]Pavani, S. and R. Ramarao, “To study the effect on partial replacement of cement by silica fumes and coarse aggregate by coconut shells”, International journal of engineering sciences & research technology, Vol.5, no.11, pp. 336-344,2016.
[32]Bhanja, S. and B. Sengupta, “Influence of silica fume on the tensile strength of concrete”, Cement and Concrete Research, vol.35, no.4,pp. 743-747,2005.
[33]Nambiar, E.K.K. and K. Ramamurthy, “Air-void characterisation of foam concrete”,Cem. Concr. Res., vol.37, no.2, pp. 221-230,2007..
[34]Gökçe, H., D. Hatungimana, and K. Ramyar, “Effect of fly ash and silica fume on hardened properties of foam concrete”, Construction and Building Materials, vol.194, pp. 1-11, 2019.
[35]Sabir, B., S. Wild, and M. O'Farrell, A water sorptivity test for mortar and concrete”, Materials and Structures, Vol.31,pp. 568-574,1998.
[36]ASTM-Committee 2007, ASTM C1585 - 13: Standard Test Method for Measurement of Rate of Absorption of Water by Hydraulic-Cement Concretes.
| Download File
SaaS Cloud Selection by Optimizing Energy Utilization and Response Time
1Preeti Sirohi, 2Amit Agarwal, 3Piyush Maheshwari, 4,*Bhupesh Kumar Dewangan, 5,*Tanupriya Choudhury
1,2,4,5School of Computer Science, University of Petroleum and Energy Studies, Dehradun, India.
3 Professor,British University in Dubai (BUiD), UAE.
Pages: 6966–6989
Abstract: [+]
An evolutionary algorithm is an efficient approach for solving multiple objective optimization problems and is getting popular among decision-makers and experts in deciding the solution. The cloud model is becoming popular due to its flexibility in offering a diversity of cloud services to its customers. The selection of cloud services from the vast list of available services may be challenging. The number of comparisons, response time, and energy also increases if the number of services or objectives increases. The growing record size of services or objectives is time-consuming and raises the overall response time and energy overhead. This paper presents a novel efficient approach known as Non-dominated sorting and ranking of services (NS-ROS), to find optimal services by avoiding unnecessary comparisons. The proposed method is compared with three other competing approaches on the same dataset to show the proposed method's efficiency. Experimental results show that our NS-ROS is computationally efficient than all the compared algorithms on response time, energy, and the number of comparisons required.
Keywords:  Evolutionary Algorithms, Multi-Optimization Problem, Response Time, Cloud Services, Energy Consumption
| References: [+]
[1] Jahani, Arezoo, and Leyli Mohammad Khanli. "Cloud service ranking as a multi-objective optimisation problem." The Journal of Supercomputing 72.5 (2016): 1897-1926.
[2]Ding, Shuai, et al. "Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems." Knowledge-Based Systems 56 (2014): 216-225.
[3]H. Keeney and L. R. Raiffa, Decisions with Multiple Objectives PreferencesandValueTradeoffs, NewYork,NY,USA,1976.
[4]R. L. Keeney, "Common mistakes in making value tradeoffs," OperationsResearch,vol.50,no.6,pp.935–1077,2002.
[5]Mishra, Sudhansu Kumar, et al. "A fast multi-objective evolutionary algorithm for finding wellspread pareto-optimal solutions." In KanGAL Report No. 2003002, lndian Institute Of Technology Kanpur. 2002.
[6]Deb, Kalyanmoy, et al. "A fast and elitist multi-objective genetic algorithm: NSGA-II." IEEE transactions on evolutionary computation 6.2 (2002): 182-197.
[7]Corne, David W., et al. "PESA-II: Region-based selection in evolutionary multi-objective optimisation." Proceedings of the 3rd Annual Conference on Genetic and Evolutionary Computation. 2001.
[8]Zitzler, Eckart, Marco Laumanns, and Lothar Thiele. "SPEA2: Improving the strength Pareto evolutionary algorithm." TIK-report 103 (2001).
[9]Giagkiozis, Ioannis, and Peter J. Fleming. "Pareto front estimation for decision making." Evolutionary computation 22.4 (2014): 651-678.
[10]Abraham, Ajith, and Lakhmi Jain. "Evolutionary multi-objective optimisation." Evolutionary Multi-objective Optimisation. Springer, London, 2005. 1-6.
[11]Irnich, Stefan, Birger Funke, and Tore Grünert. "Sequential search and its application to vehicle-routing problems." Computers & Operations Research 33.8 (2006): 2405-2429.
[12]Gustavsson, Patrik, and Anna Syberfeldt. "A new algorithm using the non-dominated tree to improve non-dominated sorting." Evolutionary computation 26.1 (2018): 89-116.
[13] Deb, Kalyanmoy, et al. "A fast and elitist multi-objective genetic algorithm: NSGA-II." IEEE transactions on evolutionary computation 6.2 (2002): 182-197.
[14]Jensen, Mikkel T. "Reducing the response time complexity of multi-objective EAs: The NSGA-II and other algorithms." IEEE Transactions on Evolutionary Computation 7.5 (2003): 503-515.
[15]Kung, Hsiang-Tsung, Fabrizio Luccio, and Franco P. Preparata. "On finding the maxima of a set of vectors." Journal of the ACM (JACM) 22.4 (1975): 469-476.
[16]Tang, Suqin, Zixing Cai, and Jinhua Zheng. "A fast method of constructing the nondominated set: arena's principle." Natural Computation, 2008. ICNC'08. Fourth International Conference on. Vol. 1. IEEE, 2008.
[17]Fang, Hongbing, et al. "An efficient non-dominated sorting method for evolutionary algorithms." Evolutionary computation16.3 (2008): 355-384.
[18]Zhang, Xingyi, et al. "An efficient approach to nondominated sorting for evolutionary multi-objective optimisation." IEEE Transactions on Evolutionary Computation 19.2 (2015): 201-213.
[19]Zhang, Xingyi, et al. "A decision variable clustering-based evolutionary algorithm for large-scale many-objective optimisation." IEEE Transactions on Evolutionary Computation22.1 (2018): 97-112.
[20]Zhang, Xingyi, et al. "Empirical analysis of a tree-based efficient non-dominated sorting approach for many-objective optimisation." Computational Intelligence (SSCI), 2016 IEEE Symposium Series on. IEEE, 2016.
[21]McClymont, Kent, and Ed Keedwell. "Deductive sort and climbing sort: New methods for non-dominated sorting." Evolutionary computation 20.1 (2012): 1-26.
[22]Roy, Proteek Chandan, Md Monirul Islam, and Kalyanmoy Deb. "Best order sort: a new algorithm to non-dominated sorting for evolutionary multi-objective optimisation." Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion. ACM, 2016.
[23]Wang, Handing, and Xin Yao. "Corner sort for Pareto-based many-objective optimisation." IEEE transactions on cybernetics 44.1 (2013): 92-102.
[24]Silas, Salaja, Elijah Blessing Rajsingh, and Kirubakaran Ezra. "Efficient service selection middleware using ELECTRE methodology for cloud environments." Information Technology Journal 11.7 (2012): 868.
[25]Saripalli, Prasad, and Gopal Pingali. "MADMAC: multiple attribute decision methodology for adoption of clouds." 2011 IEEE 4th International Conference on Cloud Computing. IEEE, 2011.
[26]Yang, Wanchun, et al. "A hybrid particle swarm optimisation algorithm for service selection problem in the cloud." International Journal of Grid Distribution Computing 7.4 (2014): 1-10.
[27]Klein, Adrian, Fuyuki Ishikawa, and Shinichi Honiden. "Towards network-aware service composition in the cloud." Proceedings of the 21st international conference on World Wide Web. ACM, 2012.
[28] Pan, Yuchen, et al. "Trust-enhanced cloud service selection model based on QoS analysis." PloS one 10.11 (2015): e0143448.
[29] Wu, Qingtao, et al. "Reputation revision method for selecting cloud services based on prior knowledge and a market mechanism." The Scientific World Journal 2014 (2014).
[30] Pandey, Sarvesh, and A. K. Daniel. "QoCS and Cost Based Cloud Service Selection Framework." International Journal of Engineering Trends and Technology (IJETT) – Volume 48 Number 3 June 2017.
[31] Durao, Frederico, et al. "A systematic review on cloud computing." The Journal of Supercomputing 68.3 (2014): 1321-1346.
[32] Sun, Le, et al. "Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selection." Future Generation Computer Systems 57 (2016): 42-55.
[33] Roy, Proteek Chandan, Md Monirul Islam, and Kalyanmoy Deb. "Best order sort: a new algorithm to non-dominated sorting for evolutionary multi-objective optimisation." Proceedings of the 2016 on genetic and evolutionary computation conference companion. 2016.
[34] Zhang, Xingyi, et al. "An efficient approach to nondominated sorting for evolutionary multi-objective optimisation." IEEE Transactions on Evolutionary Computation 19.2 (2014): 201-213.
[35] Lei, Yang, and Song Tao. "The Array-Based Bucket Sort Algorithm [J]." Journal of Computer Research and Development 2 (2007).
[36] Choudhary, V., Kacker, S., Choudhury, T., & Vashisht, V. (2012). An approach to improve task scheduling in a decentralized cloud computing environment. International Journal of Computer Technology and Applications, 3(1), 312–316.
[37]Dewangan, B. K., Agarwal, A., Choudhury, T., Pasricha, A., & Chandra Satapathy, S. (2020). Extensive review of cloud resource management techniques in industry 4.0: Issue and challenges. Software: Practice and Experience.
[38]Brar, Y., Krishan, S., Mehta, A., Talwar, V., Choudhury, T., & Vashisht, V. (2014). An Advanced Security-A Two-Way Password Technique for Cloud Services. International Journal of Computer Science and Mobile Computing, 3(4), 4–15.
[39] Dewangan Agarwal, A., Choudhury, T., Pasricha, A., B. K. (2020). Cloud resource optimization system based on time and cost. International Journal of Mathematical, Engineering and Management Sciences, 5(4), 758–768.
[40] Chauhan, N., Agarwal, R., Garg, K., & Choudhury, T. (2020). Redundant Iaas Cloud Selection With Consideration Of Multi Criteria Decision Analysis. Procedia Computer Science, 167, 1325–1333.
[41] Dewangan, B. K., Agarwal, A., & Pasricha, A. (2016). Credential and security issues of cloud service models. In 2016 2nd International Conference on Next Generation Computing Technologies (NGCT) (pp. 888–892). IEEE.
[42] Wadhwa, M., Goel, A., Choudhury, T., & Mishra, V. P. (2019). Green Cloud Computing-A Greener Approach To IT. 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), 760–764.
| Download File
Crisis- Driven Interaction: Crisis Informatics Model for Green Building Resilience
1,4UA Bukar, 2,3Fatimah Sidi, 1Marzanah A. Jabar, 1Salfarina Abdullahand, 2Iskandar Ishak
1Department of Software Engineering and Information System, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, Malaysia.
2Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Serdang, Selangor, Malaysia.
3Infocomm Development Centre, Universiti Putra Malaysia, Serdang, Selangor, Malaysia.
4Department of Mathematical Sciences, Computer Science Unit, Taraba State University Jalingo, Nigeria.
Pages: 6990–7001
Abstract: [+]
The coronavirus outbreak has left everyone frightened with high level risk globally. Coronavirus has become a threat to interaction as everyone tries to have little interaction as possible. Stakeholders turn to social media to seek information, provide information’s and moreover engage and collaborate in the advent of the crisis. Social media is now the game-changer that could impact every aspect of life through which people interact. In this study, our aim is to demonstrate how interaction on social media can improve community resilience. With the help of the literatures, the findings shows that, 1) crisis has a significant impact on crisis response, resilience and interaction, 2) crisis response has significant impact on resilience and interaction, and overall, 3) the interaction has a positive or negative significant impact on resilience. This paper offers theoretical implications to social media based interaction to improved community resilience.
Keywords:  Crisis informatics, Social media, Interaction, Resilience, Coronavirus outbreak, WeChat.
| References: [+]
[1]Adrian, C., Sidi, F., Abdullah, R., Ishak, I., Affendey, L. S., & Jabar, M. A.,”Big data analytics implementation for value discovery: A systematic literature review”, Journal of Theoretical and Applied Information Technology, vol.93, no.2,pp.385-393,2016.
[2]Alwan, A. A., Ibrahim, H., Udzir, N. I., & Sidi, F.,” An efficient approach for processing skyline queries in incomplete multidimensional database”, Arabian Journal for Science and Engineering, vol.41,no.8,pp.2927-2943,2016.
[3]Alwan, A. A., Ibrahim, H., Udzir, N. I., & Sidi, F, “Processing skyline queries in incomplete distributed databases”, Journal of Intelligent Information Systems, vol.48,no.2, pp.399-420,2017.
[4]Cheng, Y.,“How Social Media Is Changing Crisis Communication Strategies: Evidence from the Updated Literature”, Journal of Contingencies and Crisis Management, vol.26, pp.58-68,2018.
[5]Cheong, M. & Lee, V. C. S.,”A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter”, Inf. Syst. Front, vol.13, pp.45-59,2011.
[6]Coombs, W. T. & Holladay, J. S., “The paracrisis: The challenges created by publicly managing crisis prevention”, Public Relations Review, vol.38, pp.408 – 415,2012.
[7]DiStaso, M. W., Vafeiadis, M. & Amaral, C., "Managing a health crisis on Facebook: How the response strategies of apology, sympathy, and information influence public relations," Public Relations Review, vol.41, pp.222-231,2015.
[8]Ektefa, M., Jabar, M. A., Sidi, F., Memar, S., Ibrahim, H., & Ramli, A.,” A threshold-based similarity measure for duplicate detection”, IEEE Conference on Open Systems(ICOS 2011), pp.37-41,2011.
[9]Ektefa, M., Sidi, F., Ibrahim, H., Jabar, M. A., & Memar, S.,” A comparative study in classification techniques for unsupervised record linkage model”, Journal of Computer Science, vol.7, no.3, pp.341-347,2011.
[10]Gheni, A. Y., Jusoh, Y. Y., Jabar, M. A., & Ali, N. M.” Factors affecting global virtual teams’ performance in software projects”, Journal of Theoretical and Applied Information Technology, vol.92, no.1, pp.90-97,2016.
[11]Goggins, S. P., Mascaro, C. & Valetto, G.,”Group Informatics: A Methodological Approach and Ontology for Sociotechnical Group Research”, Journal of the Amerıcan Socıety for Informatıon Scıence And Technology, vol.64,no.3,pp. 516-539,2013.
[12]Hellsten, I., Jacobs, S. & Wonneberger, A.,“Active and passive stakeholders in issue arenas: A communication network approach to the bird flu debate on Twitter”, Public Relations Review, vol.45,pp.35-48,2019.
[13]Hossain, J., Sani, N. F. M., Affendey, L. S., Ishak, I., & Kasmiran, K. A. ,” Semantic schema matching approaches: A review”, Journal of Theoretical and Applied Information Technology, vol.62,no.1, pp.139-147,2014.
[14]Iannarino, N. T., Veil, S. R. & Cotton, A. J.,”Bringing Home the Crisis: How US Evening News Framed the 2011 Japan Nuclear Crisis”, Journal of Contingencies and Crisis Management, vol.23,no.3,pp.169-181,2015.
[15]IskandarIshak, Sidi, F., Jabar, M. A., Sani, N. F. M., Mustapha, A., Supian, S. R., & Apau, M. N.,“A survey on security awareness among social networking users in Malaysia”, Australian Journal of Basic and Applied Sciences, vol.6, no.12,pp. 23-29,2012.
[16]Jabar, M. A., Khalefa, M. S., Abdullah, R. H., & Abdullah, S.,”Meta-analysis of ontology software development process”, International Review on Computers and Software, vol.9, no.1,pp. 29-37,2014.
[17]Jamil, N. B. C. E., Ishak, I. B., Sidi, F., Affendey, L. S., & Mamat, A.,” A systematic review on the profiling of digital news portal for big data veracity”, Procedia Computer Science,vol.72,pp.390-397,2015.
[18]Kar, Bandana. 2016. "Citizen science in risk communication in the era of ICT", Concurrency and Computation: Practice and Experience , vol.28, no.7,pp.2005-2013,2016.
[19]Lambret, C. V. & Barki, E.,”Social media crisis management: Aligning corporate response strategies with stakeholders’ emotions online”, J Contingencies and Crisis Management, vol.26,pp.295-305, 2018.
[20]Liu, B. F., Austin, L. & Jin, Y., ”How publics respond to crisis communication strategies: The interplay of information form and source”, Public Relations Review, vol.37, pp.345- 353,2011.
[21]Meer, T. G. v. d., Verhoeven, P., Beentjes, H. W. & Vliegenthart, R., “Communication in times of crisis: The stakeholder relationship under pressure”, Public Relations Review, vol.43, pp.426-440,2017.
[22]Moller, C., Wang, J. & Nguyen, H.T.,“#Strongerthanwinston: Tourism crisis communication through Facebook following tropical cyclones in Fiji”, Tourism Management, vol.69, pp.272-284,2018.
[23]Onorati, Teresa, Paloma, D., & Belen Carrion, "From social networks to emergency operation centers: A semantic visualization approach", Future Generation Computer Systems, vol.95,pp.829-840,2019.
[24]Palttala, P. & M. Vos, M.,"Quality Indicators for Crisis Communication to Support Emergency Management by Public Authorities," Journal of Contingencies and Crisis Management, vol.20, no. 1,pp. 39-49,2012.
[25]Panahy, P. H. S., Sidi, F., Affendey, L. S., & Jabar, M. A., “The impact of data quality dimensions on business process improvement”, 4th World Congress on Information and Communication Technologies (WICT 2014), pp.70-73,2014.
[26]Plessis, C. D., “Social media crisis communication: Enhancing a discourse of renewal through dialogic content”, Public Relations Review, vol.44,pp.829-838, 2018.
[27]Reuter, C., & Kaufhold, M. A.”Fifteen years of social media in emergencies: a retrospective review and future directions for crisis informatics”, Journal of Contingencies and Crisis Management, vol.26,no.1,pp.41-57,2018.
[28]Saad, N. H. M., Ibrahim, H., Alwan, A. A., Sidi, F., & Yaakob, R. “A framework for evaluating skyline query over uncertain autonomous databases”, Procedia Computer Science,vol.29,pp.1546-1556,2014.
[29]Saad, N. H. M., Ibrahim, H., Sidi, F., Yaakob, R., & Alwan, A. A.,”Computing range skyline query on uncertain dimension”, International Conference on Database and Expert Systems Applications,2016.
[30]Seeger, Matthew W. & Sellnow, Timothy L.,”Theorizing crisis communication”, Wiley,2013.
[31]ShariatPanahy, P. H., Sidi, F., Affendey, L. S., Jabar, M. A., Ibrahim, H., & Mustapha, A. “A framework to construct data quality dimensions relationships”, Indian Journal of Science and Technology, vol.6, no.5,pp. 4422-4431,2013.
[32]ShariatPanahy, P. H., Sidi, F., Affendey, L. S., Jabar, M. A., Ibrahim, H., & Mustapha, A.,” Discovering dependencies among data quality dimensions: A validation of instrument”, Journal of Applied Sciences, vol.13,no.1,pp. 95-102,2013.
[33]Sidi, F., Ishak, I., & Jabar, M. A. ,” Malayik: An ontological approach to knowledge transformation in malay unstructured documents”, International Journal of Electrical and Computer Engineering, vol.8, no.1, pp.1-10,2018.
[34]Sidi, F., Marzanah, A. J., Affendey, L. S., Ishak, I., Sharef, N. M., Zolkepli, M., Ming, T. M., AbdMokthi, M. F., Daud, M., Zainuddin, B. Z. and Hamid, R. A.,” A Comparative Analysis Study on Information Security Threat Models: A Propose for Threat Factor Profiling”, Journal of Engineering and Applied Sciences,vol.12,no.3, pp.548-554,2017.
[35]Soehner, C., Godfrey, I & Bigler, G. S.,”Crisis communication in libraries: Opportunity for new roles in public relations”, The Journal of Academic Librarianship, vol.43, no.3, pp.268–273,2017.
[36]Stewart, M. C. & Wilson, B. G., “The dynamic role of social media during Hurricane #Sandy: An introduction of the STREMII model to weather the storm of the crisis lifecycle”, Computers in Human Behavior,vol.54,pp.639-646,2016.
[37]Syed, R.,”Enterprise reputation threats on social media: A case of data breach framing. Information System”, 28, no.1,pp. 257-274,2018.
[38]Tan, M. L., Prasanna, R., Stock, K., Hudson-Doyle, E., Leonard, G. & Johnston, D. ,”Mobile applications in crisis informatics literature: A systematic review”, International Journal of Disaster Risk Reduction, Vol.24, pp. 297-311,2017.
[39]Ulmer, Robert R., Sellnow, Timothy L., & Seeger, Matthew W.,”Effective crisis communication: Moving from crisis to opportunity”, Fourth edition, Sage Publications,2017.
[40]Valecha, R.,"An Investigation of Interaction Patterns in Emergency Management: A Case Study of The Crash of Continental Flight 3407," Information Systems Frontiers, vol.22,pp.897–909,2020.
[41]WHO, “Novel Coronavirus (2019-nCoV)” Situation Report –20, Geneva,2020.
| Download File
Experimental Investigations on finishing of SUS304 Stainless steel Weld Beads with Magnetic Abrasive Finishing Process for sustainability
1*Harish Kumar, 2Abhishek Dhadwal,3Harsimran Singh, 4Harmeet Singh
1Department of Mechanical Engineering, Chandigarh University, Gharuan, Mohali, Punjab,
2Department of Mechanical Engineering, Chandigarh University, Gharuan, Mohali, Punjab,
3Department of Mechanical Engineering, Chandigarh University, Gharuan, Mohali, Punjab,
4Department of Industrial Design, Chandigarh University, Gharuan, Mohali, Punjab, India
Pages: 7002–7017
Abstract: [+]
SUS 304 stainless steel is most commonly used austenitic stainless steel which finds many industrial as well as domestic applications. SUS304 stainless steels can be welded by various welded by various welding processes like TIG welding, MIG welding, Friction stir welding, Explosive welding etc. In most of the welding processes, weld bead are very rough and needs to be finished to meets customer requirements. In present research work, an attempt has been made to finish TIG welded SUS 304 stainless steel weld beads with magnetic abrasive finishing process. Three process parameters: processing time, weight percentage of abrasives and tool rotational speed has been selected to finish work surfaces. Response surface methodology (RSM) has been utilized to design experiments to finish the work surface. Influence of selected process parameters on percentage improvement in surface finish has been observed and analyzed. Scanning electron microscopy (SEM) has been also implemented to check the impact of process parameters on work surface microstructure.
Keywords:  SUS304 stainless steel, weld beads, TIG welded joints, surface finish, Scanning electron microscopy
| References: [+]
1. Hsieh, R.I., Pan, Y.T. and Liou, H.Y., “The study of minor elements and Shielding gas on penetration in TIG welding of type 304 Stainless Steel”, ASM International, Vol.8, pp 68-74, 1998.
2. Xu, J., Chena, J., Duana, Y., Yua, C., Chena, J. and Lua, H., “Comparison of residual stress induced by TIG and LBW in girth weld of AISI 304 Stainless Steel pipes”, Journal of Materials Processing Technology, Vol. 248, pp 178-184, 2017.
3. Ragavendrana, M., Chandrasekharb, N., Ravikumarb, R., Saxena, R, Vasudevanb, M. and Bhadurib, A.K., “Optimization of hybrid laser -TIG Welding of 316LN Steel using response surface methodology (RSM)”, Optics and Laser in Engineering, Vol. 94, pp 27-36, 2017.
4. Chuaiphan, W., and Srijaroenpramong, L., “Optimization of Gas Tungsten Arc welding parameter for the dissimilar welding between AISI 304 and AISI 201 Stainless Steel”, Defence Technology, Vol 15, No. 2, pp 170-178, 2018.
5. Balram , Y., Vardhan, T.V., Babu,B.S., Ramana, G.V.and Preethi, C.H., “Thermal stress analysis of AISI 316 stainless steels weldments in TIG and pulse TIG welding processes”, Materials Today Vol. 19, No. 2, pp 182-187, 2019.
6. Abioye, T.E. , Ariwoola, O.E., Ogedengbe, T.I. , Farayibi, P.K. and Gbadeyan , O.O., “Influences of Welding Speed on the Microstructure and Corrosion Behaviour of Dissimilar Gas Metal Arc Weld Joints of AISI 304Stainless Steel and Low Carbon Steel”, Materials Today, Vol. 17, pp 871-877, 2019.
7. Lin, Y. C. and Lee, K. H., “Influence of preheating on the residual stress in type 304 stainless steel weldment”, Journal of Materials Processing Technology, Vol. 63, pp 797-801, 1997.
8. Yazdian, N., Mohammadpour, M., Kong, F. and Kovacevic, R., “Hybrid laser/arc girth welding of 304L stainless steel tubes, part 1 – Pore mitigation, thermal analysis and mechanical properties”, International Journal of Pressure Vessels and Piping, Vol. 163, pp 75-93, 2018.
9. Shinmura, T., Takazawa, K., Hatano, E., and Aizawa, T., "Study on Magnetic Abrasive Process", Bulletin, Japan Society of Precision Engineering, Vol. 18, pp 347-349, 1984.
10. Shinmura, T., Takazawa, K., Hatano, E., and Aizawa, T., "Study on Magnetic Abrasive Process – Process Principle and Finishing Possibility", Bulletin, Japan Society of Precision Engineering, Vol.19, pp 54-55, 1985.
11. Yamaguchi, H. and Shinmura, T. “Study of an internal magnetic abrasive finishing using a pole rotation system: Discussion of the characteristic abrasive behaviour”, Precision Engineering, Vol.24, pp 237-244, 2000.
12. Yamaguchi, H. and Shinmura, T. “Internal finishing process for alumina ceramic components by a magnetic field assisted finishing process”, Precision Engineering, Vol. 28, pp135-142, 2004.
13. Singh, L., Kumar, H. and Kumar, A., “Parametric study in surface finish of Inconel 718 surface with magnetic abrasive finishing process”, international journal of material and production engineering research and development (IJMPERD), Vol.7, pp 223-234, 2017.
14. Choudhary, A. and Kumar, H. “studies in surface finish of Inconel 718 flat surface with magnetic abrasive finishing”, international journal of material and production engineering research and development (IJMPERD), Vol.7, pp 2249-6890, 2017.
| Download File
Optical and Structural Properties of Nanostructured CuO Thin Films Doped by Mn
1Hadi Ahmed Hussin, 2Ruaa.S.Al-Hasnawy, 1Rushdi Ibrahim Jasim, 1Nadir Fadhil Habubi, 1,*Sami Salman Chiad
1Department of Physics, College of Education, Mustansiriyah University, Iraq.
2Department of Medical Physics, Al–Mustaqbal University College, Babylon, Iraq.
Pages: 7018–7028
Abstract: [+]
Nanostructured copper oxide (CuO) doped with Mn thin films were prepared at varying doping (2% and 4%) by chemical spray pyrolysis (CSP) technique. XRD was used to characterize structural properties confirms that films were polycrystalline with a preferred orientation along (002) plane . Films morphology was evaluated via Atomic Force microscopy (AFM). Optical properties were obtained via spectrophotometer and the results indicate that CuO and Mn doped CuO Nanostructured have a range of bandgap values within (1.72 - 1.92) eV.
Keywords:  CSP, Mn, CuO, Structure, Morphological.
| References: [+]
[1]Wu D, Zhang Q , Tao M, “study of cupric oxide: Electronic structure and native point defects”, Physical Review B, Vol. 73,no.23, pp. 235206, 2006.
[2]Serin N, Serin T, Horzum S and Celik Y, “Annealing effects on the properties of copper oxide thin films prepared by chemical deposition”, Semiconductor Science and Technology, Vol. 20, no.5 , pp.398-401, 2005.
[3]SeongHo Jeong , “Thin zinc oxide and cuprous oxide films for photovoltaic applications”, MINNESOTA , pp.5-6, 2010.
[4]Zaman S, “Synthesis of ZnO, CuO and their Composite Nanostructures for Optoelectronics”, Sensing and Catalytic Applications, Linköping University: LiU-Tryck, Linköping, pp. 8-9, 2012.
[5]Rajabi S K, Sohrabnezhad Sh, “Fabrication and characteristic of Fe3O4@MOR@CuO core-shell for investigation antibacterial properties”, Journal of Fluorine Chemistry, Vol. 206, pp. 36-42, 2018.
[6]Al-Mayalee Khalidah, Nawzat Saeed, Badradeen Emad, “Watanabe Fumiya, and Karabacak Tansel, “Optical and Photoconductive Response of CuO Nanostructures Grown by a Simple Hot Water Treatment Method”, J. Phys. Chem. C, Vol.122 ,no.41, pp. 8-10, 2018.
[7]Ding Erli, Hai Jun, Li Tianrong, Wu Jie, Chen Fengjuan, Wen Yin, Wang Baodui, and Lu Xiaoquan, “Efficient Hydrogen-Generation CuO/Co3O4 Heterojunction Nanofibers for Sensitive Detection of Cancer Cells by Portable Pressure”, Meter Anal. Chem., Vol. 89 pp.8140−8147, 2017.
[9]Li T T, Cao S, Yang C, Chen Y, Lv X J, Fu W F, “Electrochemical Water Oxidation by In Situ-Generated Copper Oxide Film from [Cu(TEOA)(H2O)2][SO4] Complex” , Inorg Chem. Vol.54,no.6,pp.3061-3067, 2015.
[10]Gerein N J and Haber J A, “Effect of ac Electrodeposition Conditions on the Growth of High Aspect Ratio Copper Nanowires in Porous Aluminum Oxide Templates”, J. Phys. Chem. B, Vol. 109,no.37, pp. 17372-17385,2005.
[11]Hahn, N T, et al., “Preparing of Copper Oxides Thin Films by Chemical Bath Deposition (CBD) for Using in Environmental Application”, Energy Procedia,Vol.74, pp.1459-1465,2015.
[12]Habubi, N. F., Oboudi, S. F., Chiad, S. S., “Study of some optical properties of mixed SnO2-CuO Thin Films”, 2012, Journal of Nano- and Electronic Physics, vol.4, no.4, pp. 04008,2012.
[13]Cho T S, Choi H and Kim J, “Fabrication of porous noble metal thin-film electrode by reactive magnetron sputtering, J. Nanosci Nanotechnol, Vol. 13, no.6, pp. 4265-70, 2013.
[14]H. Zhou, D. Yi, Z. Yu, L. Xiao and J. Li, “Structural instability of Sn-doped In2O3 thin films during thermal annealing at low temperature”, Thin Solid Films, Vol. 515, pp. 6909, 2007.
[15]Jandow, N. N., Habubi, N. F., Chiad, S. S., Al-Baidhany, I. A. and Qaeed, M. A., “optical parameters of Fe2O3:Ni thin films prepared by chemical spray pyrolysis technique”, International Journal of Nanoelectronics and Materials, Vol. 12, no. 1, pp. 1-10, 2019,.
[16]Hassan, E. S., Elttayef, A. K., Mostafa, S. H., Salim, M. H. and Chiad, S. S., “Silver oxides nanoparticle in gas sensors applications”, Journal of Materials Science: Materials in Electronics, Vol. 30 ,no.17, pp. 15943-15951, 2019.
[17]Tsuji M, Tetsuya A, Taeshi H, Kuniyoshi O., “Characterization of CdS thin film in high efficient CdS/CdTe solar cells”, Japanese Journal of Applied Physics, Vol.39,2000.
[18]Ali, R. S., Sharba, K. S., Jabbar, A.M., Chiad, S.S., Abass, K. H. , Habubi, N. F., “Characterization of ZnO thin film/p-Si fabricated by vacuum evaporation method for solar cell applications”, NeuroQuantology, Vol. 18,no. 1, pp. 26-31,2020.
[19]Dawood, M. O., Chiad, S. S., Ghazai, A. J., Habubi, N. F. and Abdulmunem, O. M., “Effect of Li doping on structure and optical properties of NiO nano thin-films by SPT”, AIP Conference Proceedings, Vol. 2213 no.1 , pp. 020102, 2020.
[20]Chiad, S. S. and Mubarak, T. H., “The Effect of Ti on Physical Properties of Fe2O3 Thin Films for Gas Sensor Applications”, International Journal of Nanoelectronics and Materials, Vol.13 ,no.2, pp. 221-232, 2020.
[21]Abdulmunem, O. M., Abdulameer, F. S., Kadhum, H.A., Dawood, M. O., Abass, K.H., Habubi, N.F, Chiad, S.S., “Influence of Bismuth dopant on physical properties of nanostructured TiO2 thin films”, Test Engineering and Management, Vol. 83, pp. 11142-11147, 2020.
[22]Muhammad, S. K., Hassan, E. S., Qader, K. Y., Abass, K.H., Chiad, S. S. , Habubi, N. F., “Effect of vanadium on structure and morphology of SnO2 thin films”, Nano Biomedicine and Engineering, Vol. 12,no.1, pp. 67-74, 2020.
[23]Khadayeir, A.A., Hassan, E.S., Chiad, S.S., Habubi, N.F., Abass, K.H., Rahid, M.H., Mubarak T. H, Dawod M. O. and Al-Baidhany, I.A., “Structural and Optical Properties of Boron Doped Cadmium Oxide”, Journal of Physics: Conference Series, Vol. 1234, no.1, pp.012014, 20119.
[24]Habubi, N. F., Mishjil, K. A. and Chiad, S. S., “Structural properties and refractive index dispersion of cobalt doped SnO2 thin films”, Indian Journal of Physics, Vol. 87,no.3, pp. 235-239, 2013.
[25]Alkelaby, A. S., Abass, K. H., Mubarak, T. H., Habubi, N. F., Chiad, S. S., Al-Baidhany, I., “Effect of MnCl2 additive on optical and dispersion parameters of poly methyl methacrylate films”, Journal of Global Pharma Technology, Vol.11,no.4, pp. 347-352,2019.
[27]Hassan, E.S., Mubarak, T.H., Chiad, S.S., Habubi, N.F., Khadayeir, A.A., Dawood, M.O., Al-Baidhany, I.A., “ Physical Properties of indium doped Cadmium sulfide thin films prepared by (SPT) ”, Journal of Physics: Conference Series, Vol.1294,no.2, 2019.
[28]Ali R S, Sharba K S, Jabbar A M, Chiad S S, Abass K H and Habubi N F, “Characterization of ZnO thin film/p-Si fabricated by vacuum evaporation method for solar cell applications”, Journal of NeuroQuantology, Turkey, Vol.18, no.1, pp. 26-31, 2020.
[29]Habubi, N. F., Abass, K. H., Chiad, S., Latif, D. M. A., Nidhal, J. N. and Al Baidhany, A.I., “Dispersion Parameters of Polyvinyl Alcohol Films doped with Fe”, Journal of Physics: Conference Series, Vol. 1003,no.1, pp. 012094, 2018.
[30]Chiad, S. S., Abass, K. H., Mubarak, T. H., Habubi, N. F., Mohammed, M. K. and Khadayeir, A .A., “Fabrication and study the structure, optical and dispersion parameters of PMMA with InCl3 additive”, Journal of Global Pharma Technology, Vol. 11,no.4, pp. 369-375, 2019.
[31]Khadayeir, A. A., Abass, K. H., Chiad, S. S., Mohammed, M. K., Habubi, N. F., Hameed, T. K. and Al-Baidhany, I. A., “Study the influence of antimony trioxide (Sb2O3) on optical properties of (PVA-PVP) composites”, Journal of Engineering and Applied Sciences, Vol. 13, no.22, pp. 9689-9692, 2018.
[32]Jandow, N.N., Habubi, N.F., Chiad, S.S., Al-Baidhany, I.A., Qaeed, M.A., “Annealing effects on band tail width, urbach energy and optical parameters of Fe2O3:Ni thin films prepared by chemical spray pyrolysis technique”, International Journal of Nanoelectronics and Materials, Vol.12,no.1, pp. 1-10, 2019.
[33]L. Y. Isseroff and E. A. Carter, “Electrodeposited Cu2O doped with Cl: Electrical and optical properties , Chem. Mater., Vol. 25, pp. 253, 2013.
[34]Latif D M A, Chiad S S, Erhayief M S, Abass K H, Habubi N F, Hussin H A, “Effects of FeCl3 additives on optical parameters of PVA” , IOP Conf. Series: Journal of Physics, Vol. 1003,no.1 , pp. 012108, 2018.
| Download File
I-REED– A Novel Adaptive Energy-Distance Aware Routing Protocol based on Bio-Inspired High Speed Feed Forward Networks.
1D.Anitha and 2R.A.Karthika
1Assistant Professor, Department of Software Engineering,SRM Institute of Science and Technology, Kattankulathur, India.
2Associate Professor,Department of CSE,Vels Institute of Science, Technology & Advanced Studies, India.
Pages: 7029–7046
Abstract: [+]
Under water Communication networks contains several important constituents such as sensors and wireless vehicles that are employed in underwater acoustic area for an efficient data collection and monitoring applications. These networks plays an important role in the various applications such as commercial, military and defense. Presently, these networks faces numerous problems such as limited bandwidth, high propagation delay, three model topology and mostly importantly limited power constraints. Presently, these challenges remains to be darker side of the research due to the variable characteristics of acoustics. In this paper, machine learning based energy efficient routing algorithmI-REED(Intelligent Reliable Energy Efficient Routing Protocol) has been proposed which finds its suitable for the underwater communication networks. The proposed algorithm works on the principle of hybrid optimized learning algorithms for fixing the energy efficient routing path thus to surge the network life time of the acoustic networks. The anticipated intelligent algorithms takes the two different parameters such as adaptive energies and distance , which uses the BAT algorithm for optimization and Extreme learning machines for determination of best energy efficient routing path. The proposed algorithm has been tested under acoustic environment andcompared with the other existing algorithms such as VBF, REE-VBF, and HH-VBF routing algorithms in which the proposed routing protocol has outperformedthe other existing algorithm in terms of high network reliability,low energy consumption with high packet delivery ratio.
Keywords:  Under water Communication networks, BAT Algorithms, Extreme Learning machines, Adaptive Energy , Distance , VBF,REE-VBF ,HH-VBF.
| References: [+]
[1] W. Zhang, M. Stojanovic, U. Mitra, “Analysis of a simple multihop under water acoustic network”, Proceedings of the third ACM international workshop on Underwater Networks,pp.3–10, 2008.
[2]A. Stefanov and M. Stojanovic, “Design and performance analysis of under water acoustic net works”, IEEE Journal on Selected Areas in Communications , Vol.29 , no.10 ,2011 .
[3]C. W. Ahn and J.-H. Lee, “Wireless cooperative communication: A survey,” Proc. ACM ICUIMC, 2011.
[4]D.Pompili, T.Melodia, F.Akyildiz,“ Distributed routing algorithms For underwater acoustic sensor networks”, IEEE Transactions on Wireless Communications, Vol. 9, no. 9, pp. 2934–2944, 2010.
[5]D. Pompili, T. Melodia, I. F. Akyildiz, “Routing algorithms for delay-insensitive and delay-sensitive applications in underwater sensor networks Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, MOBICOM 2006, Los Angeles, CA, USA, pp.23-29, 2006
[6]A. Bletsas, A. Khisti, D. P. Reed, and A. Lippman, “A simple cooperative diversity method based on network path selection”, IEEE J. Sel. Areas Commun., Vol. 24, no. 3, pp. 659–672, 2006.
[7]J.N.Laneman, D.N.C.Tse, G.W.Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior”, IEEE Trans. Inf. Theory, Vol. 50, no. 12, pp. 3062–3080, 2004.
[8]Z. Han, Y. L. Sun, and H. Shi, “Cooperative Transmission for Underwater Acoustic Communications”, IEEE International Conference on Communications, pp.2028–2032.
[9]Dario Pompili, Rutgers “Overview of Networking Protocols for Underwater Wireless Communications”, IEEE Communications Magazine , Vol. 47 , no.1 , pp.97 - 102,2009.
[10]Samera Batool, Muazzam.A. Khan, Nazar A. Saqib, Saad Rehman, “A Survey of Routing Protocols for Underwater Wireless Sensor Networks”, Future Technologies Conference Vancouver, Canada ,pp.994-1000, 2017.
[11]Anwar Khan, Ihsan Ali, Abdullah Ghani, Nawsher Khan, “Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions”, Sensors , Vol.18,no.5, pp.1619,2018.
[12]Seyed Mohammad Ghoreyshi,Alireza Shahrabi, Tuleen Boutaleb, “A Stateless Opportunistic Routing Protocol for Underwater Sensor Networks”, Hindawi Wireless Communications and Mobile Computing, Vol.2018, pp.18,2018.
[13]Azlina Kamaruddin, Md Adri Ngadi, Hafizah Harun, “Energy Efficient Opportunistic Routing Protocol (EE-OR) for Underwater Wireless Sensor Network”, IOP Conf. Series: Journal of Physics, 2nd International Conference on Women in Science, Engineering and Technology , 2018.
[14]MeijuLi, XiujuanDu, XinLiu,ChongLi, “Shortest Path Routing Protocol Based on the Vertical Angle for Underwater Acoustic Networks”,Hindawi Journal of Sensors, Vol.2019, 2019
[15]Muhammad Faheem , Rizwan Aslam Butt, Basit Raza, Hani Alquhayz, Muhammad Waqar Ashraf, Syed Bilal Shah, Md Asri Ngadi, “QoSRP: A Cross-Layer QoS Channel-Aware Routing Protocol for the Internet of Underwater Acoustic Sensor Networks”, Sensors, Vol.19,no.21,pp. 4762,2019.
[16]Pan Feng, Danyang Qin, Ping Ji, MinZha, “Improved energy-balanced algorithm for under water wireless sensor network based on depth threshold and energy level partition”, EURASIP Journal on Wireless Communications and Networking vol.2019, 2019.
[17]V.Sivakumar, D.Rekha “A QoS-aware energy-efficient memetic flower pollination routing protocol for underwater acoustic sensor network”, Concurrency and Computation Practice and Experience,vol.32,no.4,2019.
| Download File
An Effective Approach for Emotions Detection from Pose Invariant Environment using CNN
1M.Jagadeesh and 2Dr.B.Baranidharan
1Assistant Professor, Department of Information Technology, Misrimal Navajee Munoth Jain Engineering College, Chennai, India.
22Associate Professor, Department of Computer Science & Engineering,SRM Institute of Science and Technology, Chennai, India.
Pages: 7047–7063
Abstract: [+]
Expressions of a Face are usually identified from a certain facial feature that reveals true emotions people deliberate to conceal. Although Convolution Neural Network (CNN) has been proved for its effectiveness on facial verification and classification, there are few obstacles like (i) the requirement of large data sets to avoid over-fitting and (ii) variations in person-specific characteristics of expressions. We therefore recommend an approach to facial expression recognition (FER) from invariant facial images with multi-channel CNNs that incorporates both the full facial features and local patches. The proposed work makes use of two CNNs, one for extracting global features in the image and another CNN for processing features from the local patches.
After learning the high-level features of all the channels they are fused in the aggregation layer. The contribution of the aggregation layer representing global and local features are fed into two fully interconnected layers accompanied by Softmax towards final prediction. Finally, we tested the feasibility of our existing design across observations on public benchmarking databases such as FER-2013 and Labeled Faces in Wild (LFW).Our proposed CNN architecture achieves a maximum accuracy of 84.56% with Adam optimizer.
Keywords:  Face expression recognition, emotion recognition, facial features, convolutional neural network, deep learning.
| References: [+]
[1] Daniel Canedo, Antonio J.R.Neves "Facial Expression Recognition Using Computer Vision: A Systematic Review", Applied Sciences, Vol. 9, no. 21, pp. 4678, 2019.
[2] Kaihao Zhang, Yongzhen Huang, Yong Du, Liang Wang ‘‘Facial Expression Recognition Based on Deep Evolutional Spatial-Temporal Networks’’, IEEE Transactions on Image Processing, Vol. 26, no.9, pp.4193–4203, 2017.An Effective Approach for Emotions Detection from Pose Invariant Environment using CNN 15
[3] Behzad Hasani, Mohammad H. Mahoor ‘‘Facial Expression Recognition Using Enhanced Deep 3D Convolutional Neural Networks’’, Conference on Computer Vision and Pattern Recognition Workshops, IEEE, pp. 30–40, 2017.
[4] Andre Teixeira Lopes, Edilson de Aguiar, Alberto F. De Souza, Thiago Oliveira-Santos ‘‘Facial Expression Recognition with Convolutional Neural Networks: Coping with Few Data and the Training Sample Order’’, Pattern Recognition, Vol. 61, pp. 610–628, 2017.
[5] Guosheng Hu, Yongxin Yang, Dong Yi, Josef Kittler, William Christmas, Stan Z. Li, Timothy Hospedales “When Face Recognition Meets With Deep Learning: An Evaluation of Convolutional Neural Networks for Face Recognition”, International Conference on Computer Vision Workshops, IEEE, , pp. 142–150, 2015.
[6] S L Happy, Aurobinda Routray ”Automatic Facial Expression Recognition Using Features of Salient Facial Patches”, IEEE Transactions on Affective Computing, Vol. 6, no.1, pp.1–12, 2014.
[7] Lin Zhong, Qingshan Liu, Peng Yang, Junzhou Huang, Dimitris N. Metaxas “Learning Multiscale Active Facial Patches for Expression Analysis”, IEEE Transactions on Cybernetics, Vol. 45, no.8, pp.1499–1510, 2014.
[8] Sun Yi, Xiaogang Wang, Xiaoou Tang “Deep Learning Face Representation from Predicting 10,000 Classes”, Conference on Computer Vision and Pattern Recognition, IEEE, pp.1891-1898, 2014.
[9] Chongsheng Zhang, Pengyou Wang, Ke Chen, Joni-Kristian Kamarainen “Identity-Aware Convolutional Neural Networks for Facial Expression Recognition”, Journal of Systems Engineering and Electronics, Vol. 28, no.4, pp.784-792, 2017.
[10] Sajid Ali Khan, Shariq Hussain, Sun Xiaoming, Shunkun Yang “An Effective Framework for Driver Fatigue Recognition Based on Intelligent Facial Expressions Analysis”, IEEE Access, Vol. 6, pp.67459–67468, 2018.
[11] Ke Shan, Junqi Guo, Wenwan You, Di Lu, Rongfang Bie “Automatic Facial Expression Recognition Based on a Deep Convolutional-Neural-Network Structure”, International Conference on Software Engineering Research, Management and Applications (SERA), IEEE, pp. 123–128, 2017.
[12] Zhiding Yu, Cha Zhang “Image Based Static Facial Expression Recognition With Multiple Deep Network Learning”, International conference on multimodal interaction, ACM, pp. 435-442,2015.
[13] Jianfeng Zhao, Xia Mao, Jian Zhang “Learning Deep Facial Expression Features from Image and Optical Flow Sequences Using 3D CNN”, Visual Computer, Vol. 34, no.10, pp.1461–1475, 2018.
[14] Peter Irgens, Curtis Bader, Theresa Le, Devansh Saxena, Cristinel Ababei “An Efficient and Cost Effective FPGA Based Implementation of the Viola-Jones Face Detection Algorithm”, HardwareX, Vol. 1, pp. 68-75, 2017.
[15] Yanhong Zhang, Kun Shang, Jun Wang, Nan Li, Monica M.Y. Zhang “Patch Strategy for Deep Face Recognition”, IET Image Processing, Vol.12, no.5, pp. 819-825, 2018.
[16] Changxing Ding, Dacheng Tao “Robust Face Recognition via Multimodal Deep Face Representation”, IEEE Transactions on Multimedia, Vol. 17, no.11, pp. 2049–2058, 2015.
| Download File
Preservation of Location Based Privacy using Question Based Protocol for Effective Green Communication
1Ms.P.V.Ashwathy Devraj, 2Ms. Yamuna Devi S, 3Sowmya, 4Harishma K V
1,2Assistant Professor, Department of Computer Science and Engineering, Karpagam College Of Engineering,
3Assistant Professor, Department of Information Science and Engineering, Srinivas Institute of Technology, Mangalore,
4L.B.S College of engineering Muliyar, Kerala
Pages: 7064–7077
Abstract: [+]
Presently a-days Location-Based Service (LBS) has become increasingly better known the sensational development of advanced cells and informal community administrations (SNS) for green communication. Its setting rich functionalities draw in significant clients. A few LBS providers use information identifying with client's area to gracefully them accommodation and supportive capacities. Notwithstanding, the LBS may significantly break individual security because of area itself contains a ton of information. In this way, preserving client's area information and at consistent time accomplishing utility from applications that remaining parts a troublesome undertaking. This paper manages non-paltry test by arranging a lot of novel fine-grained Privacy-safeguarding Location Question Protocol (PLQP) for green communication.
The conventions structured license entirely unexpected degrees of area question on encoded area information for different clients and it will be applied to portable stages on account of its high intensity.
Keywords:  abstraction cloaking, k- anonymity, location privacy, privacy protocol, location question, location primarily based server.
| References: [+]
1. Hua Lu , Christian S. author and Man respiratory organ Yiu planned “PAD: Privacy-Area Aware Dummy based mostly Location Privacy for Mobile Services” within the year 2008 ACM 978-1-60558-221-4
2. Po-Yi Li , Wen-ChihPeng, Tsung-Wei Wang, Wei-Shinn Rf, JianliangXuand J. A. Hamilton, Jr. planned “A Cloaking rule supported abstraction Networks for Location Privacy” within the year 2008 IEEE Interior ten.1109/SUTC.2008.56
3. B.Gedik and Ling Liusuggested“Protecting Location Privacy with customized k-Anonymity: design and Algorithms” , 2008
4. Yu Wang, DingbangXu, Xiao He, Chao Zhang, Fan Li and Bin Xu planned “L2P2: Location-aware Location Privacy Protection for Location-based Services” within the year 2012 continuing IEEE Infocom
5. Kar method Tan, Yimin architect and KyriakosMouratidis planned “Spatial Cloaking Revisited: identifying data run from Anonymity” within the year 2009 analysis assortment faculty of data Systems (Open Access). Paper 880.
6. G. Sun, S. Sun, J. Sun, H. Yu, X. Du and M. Guizani, "Security and privacy preservation in fog-based crowd sensing on the Internet of vehicles", J. Netw. Comput. Appl., vol. 134, pp. 89- 99, 2019.
7. H. Shen, G. Bai, M. Yang and Z. Wang, "Protecting trajectory privacy: A user-centric analysis", J. Netw. Comput. Appl., vol. 82, pp. 128-139, 2017.
8. R. Gupta and U. P. Rao, "An exploration to location based service and its privacy preserving techniques: A survey", Wireless Pers. Commun. Int. J., vol. 96, pp. 1973-2007, 2017.
9. M. Ghaffari, N. Ghadiri, M. H. Manshaei and M. S. Lahijani, " P 4 QS: A peer-to-peer privacy preserving query service for location-based mobile applications ", IEEE Trans. Veh. Technol., vol. 66, no. 10, pp. 9458-9469, 2017.
10.Z. Zhou, H. Zhang, X. Du, P. Li and X. Yu, "Prometheus: Privacy-aware data retrieval on hybrid cloud", Proc. IEEE INFOCOM, pp. 2643-2651, 2013.
11.G. Sun, D. Liao, H. Li, H. Yu and V. Chang, "L2P2: A location-label based approach for privacy preserving in LBS", Future Gener. Comput. Syst., vol. 74, pp. 375-384, 2016.
12.R. Gupta and U. P. Rao, "Achieving location privacy through CAST in location based services", J. Commun. Netw., vol. 19, no. 3, pp. 239-249, 2017.
13.S. Gang, S. Liangjun, L. Dan, Y. Hongfang and C. Victor, "Towards privacy preservation for „check-in‟ services in location-based social networks", Inf. Sci., vol. 481, pp. 616- 634, 2019.
14.L. Wu, X. Du and J. Wu, "Effective defense schemes for phishing attacks on mobile computing platforms", IEEE Trans. Veh. Technol., vol. 65, no.
15.G. Sun, V. Chang, M. Ramachandran,Z. Sun, G. Li, H. Yu, et al., "Efficient location privacy algorithm for Internet of Things (IoT) services and applications", J. Netw. Comput. Appl., vol. 89, pp. 3-13,2017.
| Download File
AgriOn: A Comprehensive Ontology for Green IoT based Agriculture
1,*Giridhar Urkude and 2Manju Pandey
1,2Department of Computer Applications, National Institute of Technology Raipur, India.
Pages: 7078–7101
Abstract: [+]
The AgriOn ontology is the advancement of the agriculture ontology. The ontology for agriculture already published is either taxonomy such as AGROVOC that defines common terms or ontologies that have been developed for smart farming but have not published their ontology for reuse. AgriOn promises a description of ontology to be reused as it follows the best practices for ontology development. In this paper, we presented the 'AgriOn' agricultural ontology concept along with the IoT concept of smart farming with nearreal-time activities. Along with AgriOn Ontology, the data annotation for smart agriculture with lightweight IoT-Lite ontology instead of SSN ontology is presented in this paper. Some knowledge-based taxonomies for soil moisture data are defined using the Semantic Reasoner Rules. The M3 ontology and the M3-Lite taxonomy are used to express the sensor data unit and the quantity type information. To make the annotated data sensor lighter, a notation 3 (n3) data format is used, which takes less space than XML and JSON. To demonstrate the logical knowledge extract from the sensor data, the Reasoner Rules and the SPARQL queries are included, which extract the soil moisture knowledge from the field partition. An open-source protected tool is used to develop ontology.
Keywords:  Internet of Things (IoT); Smart farming;Ontology; Semantic reasoner rules; soil-moisture;
| References: [+]
[1]M. Bermudez-Edo, T. Elsaleh, P. Barnaghi, K. Taylor, “IoT-Lite: a lightweight semantic model for the internet of things and its use with dynamic semantics”, Pers. Ubiquitous Comput., Vol. 21, no. 3, pp. 475– 487, 2017.
[2]M. Bermudez-Edo, T. Elsaleh, P. Barnaghi, K. Taylor, “IoT-Lite: A Lightweight Semantic Model for the Internet of Things”, Proc. - 13th IEEE Int. Conf. Ubiquitous Intell. Comput. 13th IEEE Int. Conf. Adv. Trust. Comput. 16th IEEE Int. Conf. Scalable Comput. Commun. IEEE Int., pp. 90–97, 2017.
[3]A. Gyrard, S. K. Datta, C. Bonnet, K. Boudaoud, “Cross-Domain Internet of Things Application Development: M3 Framework and Evaluation”, Proceedings - International Conference on Future Internet of Things and Cloud, FiCloud , International Conference on Open and Big Data, pp. 9–16.2015.
[4]A. Gyrard, M. Serrano, P. Patel, “Building Interoperable and CrossDomain Semantic Web of Things Applications”, Managing the Web of Things, Linking the Real World to the Web, Elsevier Inc., pp. 305–324.2017.
[5]A. Gyrard, P. Patel, A. Sheth, M. Serrano, “Building the Web of Knowledge with Smart IoT Applications”, IEEE Intell. Syst., Vol. 31, no. 5, pp. 83–88, 2016.
[6]A. Gyrard, M. Serrano, J. B. Jares, S. K. Datta, M. I. Ali, “Sensor-based Linked Open Rules (S-LOR): An Automated Rule Discovery Approach for IoT Applications and Its Use in Smart Cities”, pp. 1153–1159, 2017.
[7]A. Gyrard, A. Zimmermann, A. Sheth, “Building IoT-Based Applications for Smart Cities: How Can Ontology Catalogs Help?”, IEEE Internet of Things Journal, Vol. 5, no. 5, pp. 3978–3990, 2018.
[8]T. Elsaleh, S. Enshaeifar, R. Rezvani, S. T. Acton, V. Janeiko, a M. Bermudez-Edo, “IoT-stream: A lightweight ontology for internet of things data streams and its use with data analytics and event detection services”, Sensors (Switzerland), vol. 20, no. 4, pp. 1–22, 2020.
[9]T. Elsaleh, M. Bermudez-Edo, S. Enshaeifar, S. T. Acton, R. Rezvani, P. Barnaghi, “IoT-stream: A lightweight ontology for internet of things data streams”, Proceedings Global IoT Summit, GIoTS, 2019.
[10]M. Compton et al., “The SSN ontology of the W3C semantic sensor network incubator group”, J. Web Semant., Vol. 17, pp. 25–32, 2012.
[11]A. Kamilaris, F. Gao, F. X. Prenafeta-Boldu, and M. I. Ali, “Agri-IoT: A semantic framework for Internet of Things-enabled smart farming applications”, IEEE 3rd World Forum Internet Things, WF-IoT, pp. 442–447, 2017.
[12]A. I. Walisadeera, A. Ginige, G. N. Wikramanayake, “User centeredontology for Sri Lankan farmers”, Ecol. Inform., Vol. 26, no. P2, pp. 140–150, 2015.
[13]D. R. Vincent, N. Deepa, D. Elavarasan, K. Srinivasan, S. H. Chauhdary, C. Iwendi, “Sensors driven ai-based agriculture recommendation model for assessing land suitability”, Sensors (Switzerland), Vol. 19, no. 17, 2019.
[14]S. Hu, H. Wang, C. She, and J. Wang, “AgOnt: Ontology for agriculture internet of things”, International Conference on Computer and Computing Technologies in Agriculture, Vol. 344, no. PART 1, pp. 131–137, 2011.
[15]B. Drury, R. Fernandes, M. F. Moura, A. de Andrade Lopes, “A survey of semantic web technology for agriculture”, Information Processing in Agriculture, Vol. 6, no. 4, pp. 487–501, 2019.
[16]Q. H. Ngo, N. A. Le-Khac, T. Kechadi, “Ontology based approach for precision agriculture”, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 1124, pp. 175–186,2018.
[17]Luigi Atzori, Antonio Iera, Giacomo Morabito, “The internet of things: a survey”, Comput. Networks, Vol. 54, no. 15, pp. 2787–2805, 2010.
[18]A. Sheth, C. Henson, S. S. Sahoo, “Semantic Sensor Web”, IEEE Internet Comput., Vol. 12, pp. 78–83, 2008.
[19]W. Wei and P. Barnaghi, “Semantic Annotation and Reasoning for Sensor Data”, European Conference on Smart Sensing and Context, Vol. 5741,pp. 66–76, 2009.
[20]N. F. Noy and D. L. Mcguinness, “Ontology Development 101: A Guide to Creating Your First Ontology”, Knowledge Systems Laboratory Stanford University, 2001.
[21]Cox, Sidney. "Information technology: the global key to precision agriculture and sustainability", Computers and electronics in agriculture Vol.36.no.2-3, 93-111,2002.
[22]Tripicchio, Paolo, et al. "Towards smart farming and sustainable agriculture with drones", IEEE- International Conference on Intelligent Environments, 2015.
[23]Jabbar, Sohail, et al. "Semantic interoperability in heterogeneous IoT infrastructure for healthcare", Wireless Communications and Mobile Computing, 2017.
[24]Navulur, S., Prasad, M. G., “Agricultural management through wireless sensors and internet of things”, International Journal of Electrical and Computer Engineering, Vol.7,no.6, pp.3492, 2017.
[25]Sisinni, E., Saifullah, A., Han, S., Jennehag, U., Gidlund, M., “Industrial internet of things: Challenges, opportunities, and directions” IEEE Transactions on Industrial Informatics, Vol.14,no.11, pp.4724-4734, 2018.
[26]Ayaz, M., Ammad-Uddin, M., Baig, I., “Wireless sensor‟s civil applications, prototypes, and future integration possibilities: A review”, IEEE Sensors Journal, Vol.18,no.1, pp.4-30,2017.
[27]Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., Zhao, W., “A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications”, IEEE Internet of Things Journal, Vol.4,no.5, pp.1125-1142,2017.
[28]Shi, X., An, X., Zhao, Q., Liu, H., Xia, L., Sun, X., & Guo, Y. “State-ofthe-art internet of things in protected agriculture”, Sensors, Vol.19,no.8, pp.1833, 2019.
[29]Elijah, O., Rahman, T. A., Orikumhi, I., Leow, C. Y., Hindia, M. N. “An overview of Internet of Things (IoT) and data analytics in agriculture: Benefits and challenges”, IEEE Internet of Things Journal, Vol.5,no.5, pp.3758-3773,2018.
[30]Janowicz, K., Haller, A., Cox, S. J., Le Phuoc, D., Lefrançois, M., “SOSA: A lightweight ontology for sensors, observations, samples, and actuators”, Journal of Web Semantics, Vol.56, pp.1-10, 2019.
[31]http://aims.fao.org/vest-registry/vocabularies/agrovoc
[32] http://www.fao.org/home/en/
[33]https://www.w3.org/2006/07/SWD/Vocab/principles
[34]http://xmlns.com/foaf/spec/
[35]https://www.w3.org/wiki/Good_Ontologies
[36]https://www.w3.org/2003/01/geo/
[37]https://www.w3.org/2006/time
[38]http://purl.oclc.org/NET/UNIS/fiware/iot-lite#
[39]http://purl.oclc.org/NET/ssnx/ssn
[40]http://sensormeasurement.appspot.com/m3.owl
[41]http://smart-ics.ee.surrey.ac.uk/ontology/m3-lite.owl#
[42]http://agropedia.iitk.ac.in/
| Download File
Voltage Sag /Swell Compensation Using Solar Photovoltaic Inverter based Dynamic Voltage Restorer (SPVI-DVR)
1Viswaprakash Babu, 2Dr,Shafeeque Ahmed K,3Dr. Y. Mohamed Shuaib, 4Dr Manikandan M,5Dr. S. Sathik Basha
1Research Scholar Department of E.E.E, B.S.Abdur Rahman Crescent Institute of Science and Technology- A deemed to be University, Chennai. T.N, India
2,3professor, Department of E.E.E, B.S.Abdur Rahman Crescent Institute of Science and Technology- A deemed to be University, Chennai. T.N, India
4Professor, Department of E.E.E, Jyothishmathi Institute of Technology and science, karimnagar, Telangana, India
5Associate professor, Department of Physics, B.S.Abdur Rahman Crescent Institute of Science and Technology- A deemed to be University, Chennai. T.N, India
Pages: 7102–7114
Abstract: [+]
This paper introduces a new system design for voltage sag and swelling compensation using a Dynamic voltage restorer based on a Solar Photovoltaic Inverter (SPVI-DVR). The common DVR topics listed here have some shortcomings, such as high-cost, more harmonic and easier electromagnetic interference and are only used to mitigate voltage disturbances. It consumes more energy from the utility grid to compensate for long-distance voltage sag and swelling that can be overcome with the SPVI-DVR intended to mitigate deep, voltage-disturbing voltage bags. Hence, the voltage regulation of the inverter voltage is reduced due to the proposed SPVI-DVR. It reduces the power consumption from the grid by removing the utlity grid from the load. The SPVI design reduces the inverter switching losess. The proposed design also injects the reactive power to the sensitive load. The SPVI-based DVR system consists of a PV system with a low-power and high-power DC-DC booster converter, a series injection transformer and semiconductor switches. SPVI-DVR execution is simulated under dynamic conditions and the load contains various parameters such as steady state error, Efficiency, Total Harmonic Distortion (THD). All of these conditions are performed in MATLAB-Simulink software.
Keywords:  Dynamic Voltage Restorer, Distributed Energy Resources, Harmonic Compensation SPVI-DVR.
| References: [+]
[1]. Shakir, Sharma, & Manish, (2019), ‘IRPT Based DVR Application for Voltage Enhancement’ in International Confer on Signal Processing and the Integrated Networks System, Confer Location: India.
[2]. Abhilash Krishna, A. & Karthikeyan, D.G, (2019), ‘Dual Role CDSC based Dual Vector Control for Efficient Operation DVR system with Harmonic Mitigation’ in IEEE Trans on Industrial Electronics, Vol. 66, Issue. 1, Pages no: 4-13.
[3]. Peng Yao &ZhikangShuai, (2015) ‘Design and Considerations of a Fault Current with Preventive analysis of DVR’ IEEE Trans on Smart Grid system, Vol. 6, .Issue.1, Pages no. 14-25.
[4]. Yao Sun & Min Zhou1, (2018) ‘Transformer-less DVR based on a 3-leg ac to ac converter’ in IET Power Electronics, Vol. 11, Issue.13, Page. 2045-2052.
[5]. Aurelio Garcıa-Cerrada, Javier Roldan-Perez, (2019), ‘Delayed Signal Cancellation based Sag detection for a DVR in distorted grids’ in IEEE Trans on sustainable energy system, Pages. 1-1.
[6]. Linfang Yan & Xia Chen, (2018), ‘A Novel DVR ESS with embedded Wind power Conversion System’ in IEEE Trans on Sustainable Energy, Vol. 9, Issue.3, Pages. 1265-1274.
[7]. Linfang Yan, & Xia Chen, (2018), ‘Perturbation and compensation based non-linear adaptive control system for ESS DVR for the LVRT capability improvement of wind system’ in IET Renewable Power Generation, Vol. 12, Issue.13, Pages. 1500-1507.
[8]. Dr. M. Manikandan and Vishwaprakash Babu, 2017 Total Harmonic Distortion Reduction for Power Quality Improvement: A Review, International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2015): 78.96 Impact Factor (2015): 6.391 pp 1681-1684
[9]. Manikandan M, Mahabub Basha A 2016, Optimized Dual Fuzzy Flow Controller Based Voltage Sag Compensation for SMES-based DVR in Power Quality Applications , Circuits and Systems, Scientific Research Publication, Acceptance, May 12, 2016.(A-I)
[10]. Manikandan, M & Mahabub Basha A 2016, ‘Voltage Sag Compensation Using DVR Based Superconducting Magnetic Energy Storage Coil with PI Controller’, Asian Journal of Research in Social Science and Humanities, Accepted for publication. (Updated list-2016).
[11]. Manikandan M., Mahabub Basha A 2013, Power Quality Compensation Using SMES Coil With FLC, International Journal of Advances in Engineering & Technology, Vol. 6, Issue 4, pp. 1855-1868.
[12]. Ashwanth, S. Manikandan M, and Mahabub Basha A 2014, Superconducting Magnetic Energy Storage System based Improvement of Power Quality on Wind/PV Systems, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 4.(A-II)
[13]. Manikandan M, Mahabub basha A. and Arul R 2015, A Novel Reduced Switch Power Quality Improvement for Current Harmonic Compensation and Voltage Sag Mitigation Using Model Predictive Control, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 4, Issue 12.
[14]. Ashwanth.S and Manikandan.M 2014, Enhancement of Power Quality on Wind Generation Systems by Superconducting Magnetic Energy Storage System, International Journal of Innovative Research in Science, Engineering and Technology, Volume 3, Special Issue 1.
| Download File
Advanced in Antivirus Software and System Stochastic Fluctuations in Green Computing Network Model
1M. Radha and 2S.Balamuralitharan
1,2Department of Mathematics, College of Engineering and Technology, SRM Institute of science and technology, Kattankulathur,Kancheepuram District, Tamil Nadu, India.
Pages: 7115–7132
Abstract: [+]
A stochastic perturbation of computer worm in networks, with the Long-time behavior is formed and analyzed.Cases with numerous and uncountable numbers have resulted in a burden on protection and information networks. The stochastic model of the worm propagation which has stochastic perturbations in contact rate between the nodes, general withdrawal rate, new computers inclusion rate, the withdrawal rate of infected computers, and the rate of recovery from infection. The stability analysis is associated with equilibrium which is globally stable in probability and exponential stability using mean-square of computer network worm propagation of stochastic model with random perturbations. Numerical simulations are provided to illustrate our theoretical works using MATLAB software.
Keywords:  Antivirus software, stochastic perturbation, stochastic fluctuation, network model and control measure.
| References: [+]
[1]Ramziya Rifhat, Xamxinur Abdurahman, and Ahmadjan Muhammadhaji, “Stability of SIRS Epidemic Model with Stochastic Perturbation and Distributed Delays”, Applied Mathematics, vol. 6,2013.
[2]Driss Kiouach and Yassine Sabbar, “Stability and Threshold of a Stochastic SIRS Epidemic Model with Vertical Transmission and Transfer from Infectious to Susceptible Individuals”, Discrete Dynamics in Nature and Society, vol. 13, 2018.
[3]Xiaoming Fan, “Global Stability of Multigroup SIRS Epidemic Model with Varying Population Sizes and Stochastic Perturbation around Equilibrium”, Abstract and Applied Analysis, vol. 14, 2014.
[4]Haokun Qi, Lidan Liu, and Xinzhu Meng, “Dynamics of a Nonautonomous Stochastic SIS Epidemic Model with Double Epidemic Hypothesis”, Complexity, vol. 14,2017.
[5]A. Lahrouz, L. Omari, D. Kiouach,A. Belmaati,“Deterministic and stochastic stability of a mathematical model of smoking”, Statistics and Probability Letters, vol. 81, pp. 1276-1284, 2011.
[6]P.J. Witbooi, “Stability of a Stochastic Model of an SIR Epidemic with Vaccinatio,” Acta Biotheor, vol. 65, pp. 151-165, 2017.
[7]Z. Wang, X. Fan, Q. Han, “Global stability of deterministic and stochastic multigroup SEIQR models in computer network”, Applied Mathematical Modelling, vol. 37, pp. 8673-8686, 2013.
[8]Y. Lin, D. Jiang, P. Xia, “Long-time behavior of a stochastic SIR model”, Applied Mathematics and Computation, vol. 236, pp. 1-9, 2014.
[9]Fangwei Wang, Fang Yang, “Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination”, International Journal of Network Security, vol. 18, pp. 493-500, 2016.
[10]B.K. Mishra, S.K. Pandey, “Dynamic model of worm propagation in computer network”, Applied Mathematical Modelling, vol. 38, pp. 2173-2179, 2014.
[11]B.K. Mishra, S.K. Pandey, “Dynamic Model of worms with vertical transmission in computer network”, Applied Mathematics and Computation, vol. 217, pp. 8438-8446, 2011.
[12]B.K. Mishra, S.K. Pandey, “Effect of antivirus software on infectious nodes in computer network: a mathematical model”, Physics Letters A, vol. 376, pp. 2389-2393, 2012.
[13]B.K. Mishra, N. Jha, “SEIQRS model for the transmission of malicious objects in computer network”, Applied Mathematical Modelling, vol. 34, pp. 710-715, 2010.
[14]L.X. Yang, X. Yang, “ A new epidemic model of computer viruses”, Communications in Nonlinear Science and Numerical Simulation, vol. 19, pp. 1935-1944, 2014.
[15]L. Yang, X. Yang, Q. Zhu, L. Wen, “A computer virus model with graded cure rates”, Nonlinear Analysis: Real World Applications, vol. 14, pp. 414-422, 2013.
[16]X. Liu, L. Yang, “Stability analysis of an SEIQV epidemic model with saturated incidence rate”, Nonlinear Analysis: Real World Applications, vol. 13, pp. 2671-2679, 2012.
[17]E. Gelenbe, “Keeping viruses under control”, 20th International Symposium Computer and Information Sciences ISCIS, Lecture Notes in Computer Science, vol. 3733, pp. 304-311, 2005.
[18]J.R.C. Piqueira, F.B. Cesar, “Dynamic models for computer virus propagation”, Mathematical Problems in Engineering,pp.11 ,2008.
[19]J.R.C. Piqueira, V.O. Araujo, “A modified epidemiological model for computer viruses,” Applied Mathematics and Computation, vol. 213, pp. 355-360, 2009.
[20]B.K. Mishra, D.K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network”, Applied Mathematics and Computation, vol. 88, pp. 1476-1482, 2007.
[21]B.K. Mishra, N. Jha, “Fixed period of temporary immunity after run of anti-malicious software on computer nodes”, Applied Mathematics and Computation, vol. 190, pp. 1207-1212, 2007.
[22]A. Rathinasamy, Baojian Yin, B. Yasodha, “Numerical analysis for stochastic age-dependent population equations with Poisson jump and phase semi-Markovian switching”, Communications in Nonlinear Science and Numerical Simulation, vol. 1, no.6, pp. 350-362, 2011.
[23]R.Z. Has’minskij, “Stochastic Stability of Differential Equations Sijthoof & Noordhoof”, Alphen aan den Rijn, The Netherlands, 1980.
[24]V.B. Kolmanovskii, V.R. Nosov, “Stability of Functional Differential Equations”, Academic Press,pp.691-716, 1986.
[25]Mehmet Merdan, et al “Comparison of stochastic and random models for bacterial resistance”, Advances in Difference Equations, vol.2017,,2017.
[26]Yanfeng Liang, David Greenhalgh, and Xuerong Mao, “A Stochastic Differential Equation Model for the Spread of HIV amongst People Who Inject Drugs”, Computational and Mathematical Methods in Medicine, vol.2016, 2016.
| Download File
Machine Learning Techniques on Big Data Analytics using Spark-R for Sustainable IT Sector
1Dr.N.Srinivasu,2Manam Srilatha,3A.S.V.Bala Krishna,4Kama Aruna
1Professor, Department of Computer Science and Engineering, Koneru Lakshmaiah
2Assistant Professor, VR Siddhartha Engineering College, Vijayawada.
3Research Scholar, Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
4Assistant Professor, Department of Computer Science and Engineering, CKM Arts & Science College, Warangal.
Pages: 7133–7140
Abstract: [+]
According to the prevailing definition, Big Data can be described as an incredibly broad data collection to be computationally evaluated for patterns and trends to be revealed. It varies and changes so quickly for handling, production, and alteration. Data analytics is the practise of processing unrefined information so that conclusions can be taken from that evidence. Currently there are many emerging developments in medicine and healthcare towards digital data sources and creative data processing. Methods of data analytics will expose patterns and measurements which would otherwise be overlooked in the mass of data. This knowledge will also be used to refine practises and improve the overall efficacy of an organisation or system.
In this paper, we are developing three models like KNN (K-Nearest neighbours), SVM (Support Vector Machines) and Random Forest to analyse the health care treatment and insurance analytics using Spark-R. By utilizing these three models we will test the dataset and find the utmost accuracy to obtain the enhanced results. With data samples downloaded from Kaggle repository, these approaches are checked. The utility of the algorithms is measured and compared in terms of accuracy, sensitivity and precision in both situations, that means data set with noisy data and data set without noisy data.
Keywords:  Analytics, Big data, Kaggle, sensitivity, support vector machine
| References: [+]
[1] Aparna, P, Kishore, PVV, “Biometric-based efficient medical image watermarking in E-healthcare application”, IET Image Processing, feb 28, 2019, 10.1049/iet-ipr.2018.5288.
[2] Danapaquiame N, Balaji V, Gayathri R, Kodhai E, Sambasivam G. “Frequent Item set Using Abundant Data on Hadoop Clusters in Big Data”, Bioscience Biotechnology Research Communications, 2018, vol-11,issue 1,pp:104-112
[3] Aparna Puvvadi, Kishore Polurie, Venkata Vijay, “An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm”, Journal of Intelligent Systems, jan 2018, vol-27, issue1, pp:115 – 133.
[4] Radhika D., & Aruna Kumari D, “Adding big value to big businesses: A present state of the art of big data” frameworks and algorithms doi:10.1007/978-981-10-6602-3_17, 2018.
[5] Sagar Imambi, S Vidyullatha, P Santhi, M. V. B. T., & Haran Babu, P, “Explore big data and forecasting future values using univariate ARIMA model in R”, International Journal of Engineering and Technology(UAE), 7, 1107-1110, 2018.
[6]. Rama Rao K, V. S. N Sivakannan, S., Prasad, M. A., & Agilesh Saravanan R, “ Technical challenges and perspectives in batch and stream big data machine learning”, International Journal of Engineering and Technology(UAE), 7(1), 48-51, 2018.
[7] Vasantham, V. K., & Haritha, D, “A survey on cost minimization techniques for big data processing”,Journal of Advanced Research in Dynamical and Control Systems, 10(2), 547-551, 2018.
[8] Alladi, B. S, & Prasad S, “Big data life cycle: Security issues, challenges, threat and security model. International Journal of Engineering and Technology (UAE), 7(1.3 Special Issue 3), 100-103, 2018.
[9] Raghav R. S., Amudhavel J, Dhavachelvan P., “A Survey on Tools Used in Big Data Platform”, Advances and Applications in Mathematical Sciences, nov-2017, vol 17,issue 1,pp:213-229.
[10] Jayanthi N, Babu B. V., & Rao N. S, “Survey on clinical prediction models for diabetes prediction’, Journal of Big Data, 4(1) doi:10.1186/s40537-017-0082-7, 2017.
[11] Moganarangan N., Sambasivam G., Balaji N., & Babukarthik R. G, “Efficient multilevel authentication in an integrated pervasive healthcare environment”, Journal of Advanced Research in Dynamical and Control Systems, 9(Special Issue 12), 1661-1672. 2017.
[12] Praveena M., & Kameswara Rao M, “Survey on big data analytics in healthcare domain”, International Journal of Engineering and Technology(UAE), 7, 919-925, 2017.
[13] Banchhor C., & Srinivasu N., “CNB- MRF: Adapting correlative naive bayes classifier and MapReduce framework for big data classification”, International Review on Computers and Software, 11(11), 1007-1015,2016.
[14] Hema Latha S., & Subrahmanyam, “Extraction and processing of situation spatiotemporal traffic using SVM algorithm with big data, “Journal of Theoretical and Applied Information Technology, 88(3), 632-637, 2016.
[15] Hemanth Chowdary S., Bhattacharya S., & Satyanarayana, K. V. V, “A scalable model for big data analytics in healthcare based on temporal and spatial parameters doi:10.1007/978-3-319-30933-0_13, 2016.
| Download File
Physical Characterization of Nickel Doped Nanostructured TiO2 Thin Films
1Atyaf S. AL Rawas, 2Muna Y.Slewa, 3Ban A. Bader, 4Nadir Fadhil Habubi, 5Sami Salman Chiad
1Department of Basic Science, College of Dentistry, Mosul University, Iraq.
2Laser and photonics Research center,University of Al-Hamdaniya, Nineveh, Iraq.
3,4,5Department of Physics, College of Education, Mustansiriyah University, Iraq.
Pages: 7141–7153
Abstract: [+]
TiO2 and TiO2: Ni films were prepared via spray pyrolysis technique (SPT). XRD measurements assure that film grown by this method was polycrystalline tetragonal structure. The dominant peak was along (110) plane. The grain size of the samples was maximum at the(TiO2:3% Ni )film and it was minimum at the nanocomposite the pure-TiO2, whereas the strain(%) parameter decreases from 35. 35 to 31.13, AFM studies disclosed smooth surface morphology with root mean-square roughness from 8.84 nm to 3.99 nm of TiO2 and TiO2: 3% Ni. AFM image showed that The grain size observed was in the area of 94.37 nm to 59.05 nm with TiO2 and TiO2: 3% Ni nm respectively. spray pyrolysis technique - TiO2 and TiO2: Ni films have optical transmittance in the visible region 95 and 84 %, respectively. Sprayed Spray Pyrolysis Technique TiO2 and TiO2: Ni thin films have optical band gap 3.4 and 3.2 eV, respectively.
Keywords:  TiO2 thin film, Ni, XRD, AFM,Optical Properties, bandgap.
| References: [+]
[1]Satoru Mohri,Yasushi Hirose, Shoichiro Nakao, Naoomi Yamada, Toshihiro Shimada, and Tetsuya Hasegawa,” Transparent conductivity of fluorine-doped anatase TiO2 epitaxial thin films”, J Appl Phys., vol.111,no.9, 2012.
[2]Sakhno OV, Goldenberg LM, Stumpe J, Smornova TN,” Surface modified ZrO2 and TiO2 nanoparticles embedded in organic photopolymers for highly effective and UV-stable volume holograms”, Nanotechnology, vol.18, no.10,2007
[3]Prajna PD, Mohapatra SK, Mano M “Photoelectrolysis of water using heterostructural composite of TiO2 nanotubes and nanoparticles”, J Phys D Appl Phys., vol. 41,no.24,2008
[4]Gra¨zel M “Heterogeneous photochemical electron transfer”, CRC Press,pp.170 , 2017.
[5]Serpone N, Lawless D, Khairutdinov R” Size Effects on the Photophysical Properties of Colloidal Anatase TiO2 Particles: Size Quantization versus Direct Transitions in This Indirect Semiconductor?”, he Journal of Physical Chemistry, vol.99, no.45,pp. 16646-16654, 1995.
[6]D. H. Song, S. H. Uhm, S. B. Lee, J. G. Han, K. N. Kim, “Antimicrobial silver-containing titanium oxide nanocomposite coatings by a reactive magnetron sputtering,” Thin Solid Films, Vol.519,no.20, pp.7079-7085,2011.
[7]T. Shibata, H. Irie, K. Hashimoto: “Photoinduced hardness change on TiO2 single crystal surfaces,” Chemical Communications, Vol.25,pp.3735-3737,2009.
[8]J. R. Devore: “Refractive Indices Of Rutile And Sphalerite”, Journal of the Optical Society of America, Vol. 41, no.6,pp. 416-419,1951.
[9]O'Regan, B., Grätzel, M.,”A low-cost, high-efficiency solar cell based on dye-sensitized colloidal TiO2 films”, Nature, vol.353,pp.737–740,1991.
[10] Kitano M, Matsuoka M, Ueshima M, Anpo M,” Recent developments in titanium oxide-based photocatalysts”, Appl. Catal. A:Gen., vol.325, no.1,2007
[11]Kment S ˇ , Gregora I, Kmentova´ H, Novotna´ P, Hubicˇka Z, Kry´sa J, Sajdl P, Dejneka A, Brunclı´kova´ M, Jastrabı´k L, Hrabovsky´ M ,” Raman spectroscopy of dip-coated and spin-coated sol–gel TiO2 thin films on different types of glass substrate “,J Sol–Gel Sci Technol., vol.63, no.3, pp. 294 – 306, 2012
[12]Al-Homoudi Ibrahim A, Thakur JS, Naik R, Auner GW, Newaz G “Anatase TiO2 films based CO gas sensor: Film thickness, substrate and temperature effects” Appl. Surf. Sci., vol.253, pp.8607- 8614,2007
[13] San Vicente G, Morales A, Gutie´rrez MT,” Sol–gel TiO2 antireflective films for textured monocrystalline silicon solar cells “,Thin Solid Films, vol.403,pp. 335-338,2002
[14]Z. Tan, K. Sato, S. Ohara, “Synthesis of layered nanostructured TiO2 by hydrothermal method,” Adv. Powder Technol., Vol. 26, no. 1, pp. 296–302, 2015.
[15]M. Torrell, L. Cunha, M. R. Kabir, A. Cavaleiro, M. I. Vasilevskiy, F. Vaz: '”Nanoscale color control of TiO2 films with embedded Au nanoparticles”, Materials Letters, Vol. 64, no.23, pp.2624-2626, 2010.
[16]B. S. Liu, X. J. Zhao, Q. N. Zhao, C. L. Li, and X. He: “The effect of O-2 partial pressure on the structure and photocatalytic property of TiO2 films prepared by sputtering,” Materials Chemistry and Physics, Vol.90,no.1,pp. 207-212,2005.
[17] Guo D, Ito A, Goto T, Tu R, Wang C, Shen Q, Zhang L., “Effect of laser power on orientation and microstructure of TiO2 films prepared by laser chemical vapor deposition method”, Mater Lett. Vol.9,pp.179–182,2013.
[18] Sasani Ghamsari M, Bahramian AR., “High transparent sol–gel derived nanostructured TiO2 thin film”, Mater Lett. Vol.9,no.361–364, 2008.
[19]S. Phadke, J. D. Sorge, S. Hachtmann, D. P. Birnie, “optical characterization of sol-gel TiO2 thin film microstructure evolution with temperature”, Thin Solid Films, Vol.518,pp.54-67, 2010.
[20]M.M. Yusuf, H. Imai, H. Hirashima, “Preparation of porous titania film by modified sol-gel method and its application to photocatalyst”, J. Sol-Gel, Sci. Technol., Vol.25,pp.65, 2002.
[21]Nguyen-Phan T-D, Pham VH, Cuong TV, Hahn SH, Kim EJ, Chung JS, Hur SH, Shin EW. “Fabrication of TiO2 nanostructured films by spray deposition with high photocatalytic activity of methylene blue”, Mater Lett., Vol.9,pp.1387–1390,2010.
[22]Senthilkumar V, Vickraman P, Jayachandran M, Sanjeeviraja C. “Structural and optical properties of indium tin oxide (ITO) thin films with different compositions prepared by electron beam evaporation”, Vacuum., Vol.84 , no.6, pp. 864–869, 2010.
[23]R. Ayouchi, C. Casteleiro, R. Schwarz, J.R. Barrado, n. F. Mart , “Optical properties of TiO2 thin films prepared by chemical spray pyrolysis from aqueous solutions”, Phys. Status Solidi Cpp., vol.7,no.3-4, 933-936,2010.
[24]Chiad, S.S., Mubarak, T.H.,”The Effect of Ti on Physical Properties of Fe2O3 Thin Films for Gas Sensor Applications”, International Journal of Nanoelectronics and Materials, Vol.13,no.2, pp. 221-232,2020.
[25]Abdulmunem, O.M., Abdulameer, F.S., Kadhum, H.A., Dawood, M.O., Abass, K.H., Habubi, N.F., Chiad, S.S., “Influence of Bismuth dopant on physical properties of nanostructured TiO2 thin films,” Test Engineering and Management, Vol. 83, pp. 11142-11147,2020.
[26]C. Shao, W. H. Wang, M. Y. Hsu, L. C. Wang, “Characteristics of ion-beam-sputtered high-refractive-index TiO2-SiO2 mixed films”, J. Opt. Soc. Am. Vol.16, no.6, pp. 1477-1483,1996.
[27]M. Walczak, M. Oujja, J. Marco, M. Sanz, M. Castillejo, “Pulsed laser deposition of TiO2:Diagnostic of the plume and characterization of nanostructured deposits”, Appl. Phys. A Mater, Vol.93, pp.735–740, 2008.
[28]Ghazai, A.J., Abdulmunem, O.M., Qader, K.Y., Chiad, S.S., Habubi, N.F., “Investigation of some physical properties of Mn doped ZnS nano thin films”, AIP Conference Proceedings 2213, 020101, 2020.
[29]C. ZHANG, W. DING, H. WANG, W. CHAI, D. JU, “Influences of working pressure on properties for TiO2 films deposited by DC pulse magnetron sputtering,” J. Environ. Sci., Vol. 21, no. 6, pp. 741–744, 2009.
[30]L. Lu-Lin, T. Chiau-Yiag, W. Hui-Ping, “Morphologic Characterization of Anodic Titania Nanotube Arrays for Dye-Sensitized Solar Cells,” J. Chinese Chem. Soc., Vol. 57, no. 5, pp. 1147–1150, 2010.
[31]F. C. Chung, Z. Zhu, P. Y. Luo, R. J. Wu, and W. Li, “Fabrication of a Au@SnO core-shell structure for gaseous formaldehyde sensing at room temperature,” Sensors Actuators, B Chem., Vol. 199, pp. 314–319, 2014.
[32]A. Hojabri, M. Adavi , F. Hajakbari, “Synthesis of Nickel-Doped TiO2 Thin Films and Their Structural and Optical Properties at Different Annealing Temperatures”, ACTA Physica Polonica A , Vol.131.pp.386-388, 2017.
[33]Mohamed Shaban , Ashour M. Ahmed , Nora Shehata , Mohamed A. Betiha , “Abdelrahman M. Rabie, Ni-doped and Ni/Cr co-doped TiO2 nanotubes for enhancement of photocatalytic degradation of methylene blue”, Journal of Colloid and Interface Science,Vol.555, no.1, pp.31-41, 2019.
[34] T. Dhandayuthapani, R. Sivakumar, R. Ilangovan,C. Sanjeeviraja, K, Jeyadheepan, C.Gopalakrishnan,P. Sivaprakash, S. Arumugam, “Brown coloration and electrochromic properties of nickel doped TiO2 thin films deposited by nebulized spray pyrolysis technique”, Thin Solid Films, Vol. 694, 2020.
[35]Khadayeir, A.A., Hassan, E.S., Chiad, S.S., Habubi, N.F., Abass, K.H., Rahid, M.H., Mubarak T. H, Dawod M. O. Al-Baidhany, I.A., “Structural and Optical Properties of Boron Doped Cadmium Oxide”, Journal of Physics: Conference Vol.1234, no. 1,2019.
[36]Dawood, M. O., Chiad, S.S., Ghazai, A.J., Habubi, N.F., Abdulmunem, O.M., “Effect of Li doping on structure and optical properties of NiO nano thin-films by SPT”, AIP Conference Proceedings, Vol.2213,no.1 , 2020.
[37]Habubi, N.F., Mishjil, K.A., Chiad, S.S., “Structural properties and refractive index dispersion of cobalt doped SnO2 thin films”, Indian Journal of Physics, Vol.87,no.3, pp. 235-239,2013.
[38]Alkelaby, A.S., Abass, K.H., Mubarak, T.H., Habubi, N.F., Chiad, S.S., Al-Baidhany, I., “Effect of MnCl2 additive on optical and dispersion parameters of poly methyl methacrylate films Effect of Li doping on structure and optical properties of NiO nano thin-films by SPT”, Journal of Global Pharma Technology Vol.11,no.4, pp. 347-352, 2019.
[39]Hassan, E.S., Mubarak, T.H., Chiad, S.S., Habubi, N.F., Khadayeir, A.A., Dawood, M.O., Al-Baidhany, I.A., “Physical Properties of indium doped Cadmium sulfide thin films prepared by (SPT),” Journal of Physics: Conference Series,Vol. 1294,no.2, 2019.
[40]Hassan, E.S., Elttayef, A.K., Mostafa, S.H., Salim, M.H., Chiad, S.S., “Silver oxides nanoparticle in gas sensors applications”, 2019, Journal of Materials Science: Materials in Electronics, 2019, Vol. 30, no.17, pp. 15943-15951,2019.
[41]Muhammad, S.K., Hassan, E.S., Qader, K.Y., Abass, K.H., Chiad, S.S., Habubi, N.F., “Effect of vanadium on structure and morphology of SnO2 thin films”, Nano Biomedicine and Engineering, Vol. 12,no.1, pp. 67-74,2020.
[42]Jandow, N. N., Habubi, N. F., Chiad, S. S., Al-Baidhany, I. A. and Qaeed, M. A., “optical parameters of Fe2O3:Ni thin films prepared by chemical spray pyrolysis technique”, International Journal of Nanoelectronics and Materials, Vol.12,no.1, pp. 1-10,2019.
[43]Ali, R.S., Sharba, K.S., Jabbar, A.M., Chiad, S.S., Abass, K.H., Habubi, N.F., “Characterization of ZnO thin film/p-Si fabricated by vacuum evaporation method for solar cell applications”, NeuroQuantology, Vol. 18,no.1, pp. 26-31,2020.
[44]Raoufi D, Kiasatpour A, Fallah HR, Rozatian ASH. “Surface characterization and microstructure of ITO thin films at different annealing temperatures”, Applied Surface Science, Vol. 253, no. 23, pp.9085-9090, 2007,
[45]Habubi, N.F., Abass, K.H., Chiad, S., Latif, D.M.A., Nidhal, J.N., Al Baidhany, A.I., “Dispersion Parameters of Polyvinyl Alcohol Films doped with Fe”, 2018, Journal of Physics: Conference Series, Vol. 1003,no.1,pp.1-7,2018.
[46]Khadayeir, A.A., Abass, K.H., Chiad, S.S., Mohammed, M.K., Habubi, N.F., Hameed, T.K., Al-Baidhany, I.A., “Study the influence of antimony trioxide (Sb2O3) on optical properties of (PVA-PVP) composites”, Journal of Engineering and Applied Sciences, Vol.13,no.22, pp. 9689-9692,2018.
[47]Chiad, S.S., Abass, K.H., Mubarak, T.H., Habubi, N.F., Mohammed, M.K., Khadayeir, A.A., “Fabrication and study the structure, optical and dispersion parameters of PMMA with InCl3 additive”,Journal of Global Pharma Technology, Vol.11,no.4, pp. 369-375,2019.
[48] Jandow, N.N., Habubi, N.F., Chiad, S.S., Al-Baidhany, I.A., Qaeed, M.A., “Annealing effects on band tail width, urbach energy and optical parameters of Fe2O3:Ni thin films prepared by chemical spray pyrolysis technique”, International Journal of Nanoelectronics and Materials , Vol.12,no.1, pp. 1-10,2019.
[49] Latif, D.M.A., Chiad, S.S., Erhayief, M.S., Abass, K.H., Habubi, N.F., Hussin, H.A., “Effects of FeCl3 additives on optical parameters of PVA”, Journal of Physics: Conference Series , Vol.1003,no.1, 2018.
[50] Habubi, N.F., Mishjil, K.A., Chiad, S.S., “Structural properties and refractive index dispersion of cobalt doped SnO2 thin films”, Indian Journal of Physics , Vol.87, no.3, pp. 235-239,2018.
| Download File
Performance of a Parallel Communication Network Having Non-Homogeneous Binomial Bulk Arrivals with Phase Type Transmissionfor Dynamic Resource Allocation
1Debnath Bhattacharyya, 2N.Thirupathi Rao, 3Sk. Meeravali, 4K.Srinivas Rao
1Department of CSE,K L Deemed to be University, KLEF, Guntur, India.
2Department of CSE,Vignan’s Institute of Information Technology (A),Visakhapatnam, AP, India.
3Department of IT,C R Reddy College of Engineering,Eluru, AP, India.
4Department of Statistics,Andhra University, Visakhapatnam,AP, India.
Pages: 7155–7177
Abstract: [+]
In the current article, a parallel communication network model in which three nodes are connected in a tandem fashion with binomial bulk arrivals developed. The messages arrived at the network are transformed into packets for forwarding transmission. After completing the transmission at first node, the packet may join buffer 2 or 3, parallel and connected to node 1 with specific probabilities. The inter transmission time of packets in each node follows the Poisson process. The transient behavior of the network is assessed by obtaining the unambiguous expression for various performance metrics of the network model, like utilizing buffers at nodes, the throughput of each node, delay at each node, and the total number of packets at each node, etc. It is observed that the current model can model the traffic under burstness and non-smooth conditions. The non-homogeneous bulk arrival process considered for the current model is compared with the homogeneous bulk arrival process. The comparative results had been given separately for a better understanding of the current model performance.
Keywords:  Dynamic bandwidth allocation,Non-homogeneous compound Poisson process, performance evaluation, p.g.f (Probability generating function).
| References: [+]
[1]Leung, Kin K, “Load-dependent service queues with application to congestion control in broadband networks”, Performance Evaluation, Vol. 50, No. 1, pp.27-40, 2002.
[2]Ahmed, M.M.S., “Multi-Channel Bi-Level Heterogeneous Servers Bulk Arrivals Queuing System with Erlangian Service Time”, Mathematical Computations Applications, Vol.12, No.2, pp. 97–105, 2007.
[3]Suresh Varma, P., SrinivasaRao, K., “A Communication Network with Load Dependent Transmission”, International Journal of Mathematical Sciences, Vol.7, No.2, pp.199–210, 2007.
[4]Padmavathi, G., SrinivasaRao, K., Reddy, K.V.V.S., “Performance Evaluation Of Parallel And Series Communication Network With Dynamic Bandwidth Allocation”, CIIT International Journal on Networking Communication Engineering, Vol.1, No.7, pp.410–421, 2009.
[5]Singh, C.J., Jain, M., Kumar, B., “Queuing Model with State-Dependent Bulk Arrival and Second Optional Service”, International Journal of Mathematical Operations Research, Vol.3, No.3, pp.322–340, 2011.
[6]Haridass, M., Arumuganathan, R., “Analysis Of A Batch Arrival General Bulk Service Queuing System With Variant Threshold Policy For Secondary Jobs”, International Journal of Mathematical Operations Research, Vol. 3, No.1, pp.56–77, 2011.
[7]A.V.S.Suhasini, K.SrinivasaRao, P. R. S. Reddy, “Transient Analysis Of Tandem Queuing Model With Non-Homogeneous Poisson Bulk Arrivals Having State-Dependent Service Rates”, International Journal Of Advanced Computer And Mathematical Sciences, Vol.3, No.3, pp.272-289, 2012.
[8]N.ThirupathiRao, K. SrinivasRao, P.SrinivasaRao, And K. NageswaraRao, “Performance Evaluation Of Two Node Tandem Communication Network With Dba Having Compound Poisson Binomial Bulk Arrivals”, Computer Engineering And Intelligent Systems, Vol.5, No.1, pp.14-37, 2014.
[9]K.SrinivasaRao, N.ThirupathiRao, KudaNageswaraRao, And P.SrinivasaRao, “Stochastic Control And Analysis Of Two-Node Tandem Communication Network Model With Dba And Binomial Bulk Arrivals With Phase Type Transmission”, International Journal Of Computer Applications, Vol.87, No.10, pp. 33-46, 2014.
[10]KalavalaAsishVardhan, K. SrinivasaRao, P. SrinivasaRao, “Three Node Tandem Communication Network Model with Duane Arrival Process having Phase Type Service,” International Journal of computer applications, Vol.181, No.38, pp.30-39, 2019.
[11]N.ThirupathiRao, Debnath Bhattacharyya, and Tai-hoon Kim, “Analyzing the Performance of DSR Protocol on MANET’s Network Models with Various Scenarios using ViSim”, International Journal of Engineering and Technology (IJET UAE), Vol.7, No.4, pp. 3190-3194, 2019.
[12]NakkaThirupathiRao, K SrinivasRao, KudaNageswaraRao, And P SrinivasaRao, “Transient Analysis Of A Two Node Communication Network With Two-Stage Compound Poisson Binomial Bulk Arrivals And DBA”, International Journal of Computer Applications, Vol.96, No.25, pp. 19-31, 2014.
[13]R. Rajakumar, J. Amudhavel, P. Dhavachelvan, T. Vengattaraman, “GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks”, Journal of Computer Networks and Communications, vol. 2017, 2017.
[14]Rajendra Prasad, C., &Bojja, P, “A review on bio-inspired algorithms for routing and localization of wireless sensor networks”, Journal of Advanced Research in Dynamical and Control Systems, Vol.9, No 18, pp.1366-1374, 2017.
[15]S. Ramanath and K. S. Babu, “Experimental evaluation of an LTE cognitive radio network”, 9th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, pp. 381-382, 2017.
[16]Prasad, C. M. V. S., Rao, K. R., Satish Kumar, D., Prabhu, A. V, “Performance evaluation of power optimization in wireless sensor networks using particle swarm optimization”. International Journal of Engineering and Technology (UAE), Vol.7, pp. 404-408, 2018.
[17]Amiripalli, S. S., Bobba, V., “Impact of trimet graph optimization topology on scalable networks”, Journal of Intelligent and Fuzzy Systems, Vol.36, No.3, pp.2431-2442, 2019.
| Download File
Energy Efficient Hash Table Based Clustered Routing Approach in Wireless Sensor Networks
1S John Justin Thangaraj, 2E Indra,3G Kalyan Kumar,4Deepak V,5M.Rajesh Khanna
1Associate Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences,Chennai,India
2Assistant Professor, Department of Computer Science and Engineering, Mailam Engineering College, Tindivanam, Tamil Nadu, India.
3Assistant Professor, Department of Electronics and Communications Engineering, Rajalakshmi Institute of Technology, Chennai,india.
4Assistant Professor, Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh.
5Associate Professor, Department of Information Technology, Vel Tech Multi Tech Dr.RengarajanDr.Sakunthala Engineering College, Chennai
Pages: 7178–7194
Abstract: [+]
Wireless Sensor Network (WSN) has an essential job and influence of ongoing correspondence applications. Area of obscure hub is hard to discover within the sight of portable sensor hubs. Pilot assumes a significant job in recognizing system deficiency and obscure hub area. Remote sensor systems can possibly screen situations for both military and common applications [4]. Because of unfriendly conditions these sensors are not generally conveyed consistently in the territory of intrigue. Since sensors are commonly compelled in ready vitality supply, productive administration of the system is urgent to expand the life of the sensors. Sensors vitality can't bolster long stretch correspondence to arrive at a remote direction site and in this manner requires numerous degrees of jumps or a passage to advance the information for the benefit of the sensor [2].
In this paper we propose a calculation to organize these sensors in to well characterize bunches with less-vitality obliged passage hubs going about as group heads, and parity load among these entryways.Reenactment results show how our methodology can adjust the heap and improve the lifetime of the framework. To maintain a strategic distance from these overheads and uneven utilization of vitality we propose a methodology where we have some high-vitality hubs called Gateways sent in the system. These Gateways, bunch sensors to frame unmistakable groups in the framework and deal with the system in the bunch, perform information combination to associate sensor reports and sort out sensors by actuating a subset important to required missions or assignments as appeared. Every sensor just has a place with one bunch and speaks with the direction hub just through the door in the group. Keywords:  WSN, Cluster Routing, Hash Table, Packet Delivery, Sensor Nodes
| References: [+]
[1] Manjula, R.B. furthermore, Sunilkumar, S. M., “Issues in Underwater Acoustic Sensor Networks”, Global Journal of Computer and Electrical Engineering, Vol.3, No.1, pp.101-110, 2011.
[2] Liu, L., Zhou, S., and Cui, J. H., "Possibilities and Problems of Wireless Communication for Submerged Sensor Networks", Wireless Communications and Mobile Computing, Vol. 8, pp. 977-994, 2008.
[3] Victor Klemas,"Remote sensing of emergent and submerged wetlands: an overview",International Journal of Remote Sensing ,Vol.34,no18,pp.6286-6320,2013.
[4] ThangarajS. John Justin, M.RajeshKhanna, R. Balamanigandan., “Failure Node Detection And Recovery In Wireless Sensor Networks”, International Journal of Innovative Technology and Exploring Engineering, Vol.8,no.12, pp.2688-2695, 2019.
[5] S.BalaSugirtha, Thangaraj S. John Justin, M.JeyaPriya., “Secure Data And Network Reachability For Performance Expansion”, Advances in Natural and Applied Sciences, Vol 10,no.5,pp.186-191, 2016.
[6] Thangaraj, S. John Justin and Rengarajan, A., “Unreliable Node Detection by Elliptical Curve Diffie-Hellman Algorithm in MANET,” Indian Journal of Science and Technology, Vol. 9, No. 19, pp. 1-6, 2016.
[7] K. Lin, "Research on adaptive target tracking in vehicle sensor networks", Journal of Network and Computer Applications, Vol. 36, no. 5, pp.1316-1323, 2013.
[8] M.A.Yigitel, 0.0. Incel, and C. Ersoy, "QoSaware MAC protocols for wireless sensor networks: A survey", Computer Networks, VoI.55, no.8, pp.1982-2004,2011.
[9] Mukund R. , John Justin Thangaraj S , S P. Chokkalingam, “SemiSupervised Learning Using Procreative Modelling Techniques”, TEST Engineering & Management, Vol.81, pp.5554 – 5559, 2019
[10] Thangaraj S. John Justin, Rengarajan A, Selvanayaki S, “Comprehensive Learning On Characteristics, Applications, Issues And Limitations In MANETS”, International Journal of Innovative Technology and Exploring Engineering , Vol.8, no.9S2, pp.311-314, 2019.
[11] Ruchuan Wang, Fu Xiao, “Advances in Wireless Sensor Networks”, 6th China Conference, CWSN 2012, Huangshan, China, 2012.
[12] A Wahid, D Kim, “An energy efficient localization-free routing protocol for underwater wireless sensor networks”,Int. J. Distrib. Sensor Netw., vol.8, no.4, 2012.
[13] Ali T., Jung L.T., Faye I. “A Reliable Data Flooding in Underwater Wireless Sensor Network. In: Herawan T., Deris M., Abawajy J”, Proceedings of the First International Conference on Advanced Data and Information Engineering, Lecture Notes in Electrical Engineering,2013.
[14]Ayaz, M., A. Abdullah., “An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks”, Comput. Commun., Vol.35,no.4, pp. 475-486 ,2012.
[15] Feng, P., Qin, D., Ji, P. et al. “Improved energy-balanced algorithm for underwater wireless sensor network based on depth threshold and energy level partition” EURASIP Journal on Wireless Communications and Networking,vol.2019,2019.
[16]Ayaz, M., A. Abdullah., “An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks”, Comput. Commun., Vol.35,no.4, pp. 475-486 ,2012
| Download File
Fabrication and Characterization of Vanadium Doped Nanostructured Cdo Thin Films to Improve the Energy Band Gap
1Esraa H. Hadi, 2Fatin M. Hmam Salih, 3Muna Y. Slewa, 3Ban A. Bader, 1Nadir Fadhil Habubi
1Department of Physics, College of Education, Mustansiriyah University, Iraq.
2Department of basic, College of Dentistry , Mosul University, Iraq .
3Laser and photonics Research center, University of Al- Hamdaniya, Nineveh, Iraq.
Pages: 7195–7207
Abstract: [+]
CdO and CdO: V with 1% and 3% concentrations were prepared using spray pyrolysis technique SPT. The impacts of vanadium (V) content on structural, morphology, and optical properties were obtained. XRD anaylsis assures that CdO films are polycrystalline cubic structure with recognized peak at (111). Crystallite size increases from 13.3 nm to 17.2 nm as vanadium concentration increases. Surface topography and nanostructural signalizes cluster grain size and porosity decreased substantially with an increase of Vanadium (V) content in CdO films. The transmittance is more than 80% in the visible range for 1 to 3% Vanadium (V) doping. The optical bandgap of CdO: V film for direct allowed transition has been decreased from (2.75 to 2.55) eV.
Keywords: CdO: V, SPT, structural, optical properties, XRD, AFM.
| References: [+]
[1]R. Kumaravel, K. Ramamurthi and V. Krishnakumarm, “Effect of Indium doping in CdO thin films prepared by spray pyrolysis technique”, Journal of Physics and Chemistry of Solids , vol. 71, no.11, pp .1545-1549, 2010.
[2]F. P. Koffyberg, “Diffusion of donors in semiconducting CdO”. SolidState Communications., vol.9, no.24, pp.2187-2189, 1971.
[3]Yakuphanoglu F, “Preparation of nanostructure Ni doped CdO thin films by sol gel spin coating method”, Journal of Sol-Gel Science and Technology, Vol. 59, pp.569–573, 2011.
[4]Khalid Haneen Abass, Duha M. A. Latif “The urbach energy and dispersion parameters dependence of substrate temperature of CdO thin films prepared by chemical spray pyrolysis”, International Journal of Chem Tech Research, Vol. 9, no.9, pp. 332-338, 2016.
[5]R. L. Mishra, A. K. Sharma and S. GPrakash, “Gas sensitivity and characterization of cadmium oxide semiconducting thin film deposited by spray pyrolysis technique”, Digest Journal of Nanomaterials and Biostructures, Vol. 4, no.3, pp. 511-518, 2009.
[6]K. Gurumurugan, D. Mangalraj and S.K. Narayanandas, “Correlations between the optical and electrical properties of CdO thin films deposited by spray pyrolysis”, Thin Solid Films, Vol.251,no.1, pp. 7-9, 1994.
[7]A Arias-Carbajal Reádigos, V M García, O Gomezdaza, J Campos, M T S Nair, P K Nair, “Substrate spacing and thin - film yield in chemical bath deposition of semiconductor thin films”, Semiconductor Science and Technology, Vol.15, No. 11, pp.1022-1029, 2000.
[8]D.C.Reynolds, D.C.Look, B.Jogai “Optically pumped ultraviolet lasing from ZnO,” Solid State Comm., Vol. 99,no.12, pp. 873-875, 1996.
[9]K. Siraj, “Institute of Applied Physics”, thesis, Johannes Keple University Linz, Austria, 2007.
[10]Murugesan Rajini, Marimuthu Karunakaran and Kasinathan Kasirajan, “An Investigation of SILAR Grown CdO Thin Film”s, Materials Science-Poland, Vol. 37, no.1, pp. 25-32, 2019.
[11] Harun Güney , Demet İskenderoğlu, “The effect of Zn doping on CdO thin films grown by SILAR method at room temperature”, Physica B: Condensed Matter, Vol.552, pp. 119–123, 2019.
[12]A. Shameem, P. Devendran, V. Siva, M. Raja, S. Asath Bahadur , A. Manikandan, “Preparation and Characterization Studies of Nanostructured CdO Thin Films by SILAR Method”, Journal of Inorganic and Organometallic Polymers and Materials, Vol.27, pp. 692–699, 2017.
[13]V. Radhika and V. Annamalai , “Antibacterial Application of Undoped and Doped CdO, Nanocrystalline Thin Films”, Journal of Environmental Nanotechnology, Vol. 8, no.2, pp 1 -10, 2019.
[14]Fekadu Gashaw Hone , Tizazu Abza, “Short Review of Factors Affecting Chemical Bath Deposition Method for Metal Chalcogenide Thin Films”, International Journal of Thin Films Science and Technology, Vol. 8, no. 2, pp. 43-52, 2019.
[15]A. Ashok, G. Regmi , A. Romero Núñez, M. Solis López, S. Velumani, H. Castaneda, “Comparative studies of CdS thin films by chemical bath deposition techniques as a buffer layer for solar cell applications”. Journal of Materials Science: Materials in Electronics, Vol.31, pp. 7499-7518, 2020.
[16]Khadayeir, A. A., Hassan, E. S., Chiad, S. S., Habubi, N. F., Abass, K. H., Rahid, M. H., Mubarak T. H, Dawod M. O, Al-Baidhany, I. A., “Structural and Optical Properties of Boron Doped Cadmium Oxide”, Journal of Physics Conference Series, Vol. 1234, no.1, pp. 012014, 20119.
[17]Jandow, N. N., Othman, M. S., Habubi, N. F., Chiad, S. S., Mishjil, K. A, Al-Baidhany, I. A., “Theoretical and experimental investigation of structural and optical properties of lithium doped cadmium oxide thin films”, Materials Research Express, Vol.6, no.11, 2020.
[18]Ali, R. S., Sharba, K. S., Al-Timimi, M. H., Abass, K.H., Habubi, N. F., Al-Baidhany, I. A, Chiad, S. S, “Enhancement of CdO film Via Li additive: Structural and optical properties”, Test Engineering and Management, Vol. 83, pp. 11148-11153, 2020.
[19]M. S. Othman, Kh. A. Mishjil, H. G. Rashid, S. S. Chiad, N. F. Habubi, I. A. Al-Baidhany, “Comparison of the structure, electronic, and optical behaviors of tin-doped CdO alloys and thin films”, Journal of Materials Science: Materials in Electronics, Vol. 31, pp. 9037-9043, 2020,
[20]Ahmed, F. S., Ahmed, N. Y., Ali, R. S., Habubi, N. F., Abass, K. H, Chiad, S. S, “Effects of Substrate Type on Some Optical and Dispersion Properties of Sprayed CdO Thin Films”, NeuroQuantology , Vol. 18, no.3, pp. 56-65, 2020.
[21]Chiad, S. S., Habubi, N. F., Abass, W. H, Abdul-Allah, M. H., “Effect of thickness on the optical and dispersion parameters of Cd0.4Se0.6 thin films”, Journal of Optoelectronics and Advanced Materials, Vol. 18, no.9, pp. 822-826, 2016.
[22]Hassan, E. S., Mubarak, T. H., Chiad, S.S., Habubi, N. F., Khadayeir, A. A., Dawood, M. O, Al-Baidhany, I. A., “Physical Properties of indium doped Cadmium sulfide thin films prepared by (SPT)”, Journal of Physics: Conference Series, Vol. 1294, no.2 ,2019.
[23]Shawki Khalaph Muhammad, Ehssan Salah Hassan, Kameran Yasseen Qader, Khalid Haneen Abass, Sami Salman Chiad, Nadir Fadhil Habubi , “Effect of vanadium on structure and morphology of SnO2 thin films, Nano Biomedicine and Engineering”, Vol. 12, no.1, pp. 67-74, 2020.
[24]AZhiyongZhao, D.LMorelC, SFerekides, “Electrical and optical properties of tin-doped CdO films deposited by atmospheric metalorganic chemical vapor deposition”, Thin Solid Films, Vol.413, no.1, pp. 203–21, 2002.
[25]Gupta RK, Ghosh K, Patel R, Kahol PK, “Highly conducting and transparent Ti-doped CdO films by pulsed laser deposition”, Applied Surface Science, Vol.255, no.12, pp. 6252–6255, 2009.
[26]Khaled Z Yahya, Muhanad Adil Ahmed, “ Influence of substrate temperature on structure and optical properties of CdO thin films prepared by pulsed laser deposition”, Journal of Global Scientific Research , Vol. 30 , pp.416–425, 2012.
[27]AA Dakhel, Fryad Henari, Crystal Research and Technology, “Optical characterization of thermally evaporated thin CdO films”, Crystal Research and Technology, Vol.38, no.11, pp.979 - 985, 2003.
[28]Zhou Q, Ji Z, Hu BB, Chen C, Zhao L , Wang C, “Low resistivity transparent conducting CdO thin films deposited by DC reactive magnetron sputtering at room temperature”, Materials Letters, Vol.61, no.2, pp.531-534,2007.
[29]Y.J. Li,K.M. Yu, G.B. Chen,Chao Ping Liu, W. Walukiewicz, “Conduction band modifications by d states in vanadium doped CdO”, Journal of Alloys and Compounds, Vol. 822 , pp.153-567, 2020.
[30]B D Cullity, Stuart R Stock ,“Elements of X-ray diffraction”, 3rd edn. Prentice Hall, 2001.
[31]Jandow, N. N., Habubi, N. F., Chiad, S. S., Al-Baidhany, I. A, Qaeed, M. A., “optical parameters of Fe2O3:Ni thin films prepared by chemical spray pyrolysis technique”, International Journal of Nanoelectronics and Materials, Vol. 12, no.1, pp. 1-10,2019.
[32]Hassan, E. S., Elttayef, A.K., Mostafa, S. H., Salim, M. H, Chiad, S. S., “Silver oxides nanoparticle in gas sensors applications”, Journal of Materials Science: Materials in Electronics,Vol. 30, no.17, pp. 15943-15951, 2019.
[33]Jabbar, A. M., Alkelaby, A. S., Ali, R. S., Habubi, N. F., Abass, K. H., Chiad, S. S., “Effect of Bismuth addition on thin films of ZNO on structure and optical properties”, Test Engineering and Management, Vol. 83, pp. 11125-11132, 2020.
[34]Reem Sami Ali,.Characterization of ZnO Thin Film/p-Si Fabricated by Vacuum Evaporation Method for Solar Cell Applications , NeuroQuantology, Vol. 18, no.1, pp.26-31,2020.
[35]Dawood, M. O., Chiad, S. S., Ghazai, A. J., Habubi, N. F, Abdulmunem, O. M., “Effect of Li doping on structure and optical properties of NiO nano thin-films by SPT”, AIP Conference Proceedings, Vol.2213, no.1, pp. 020-102, 2020.
[37]Blakemore J S, “Solid state physics”, 2nd edn. Cambridge University Press, Cambridge, 1985.
[38]Sami Salman, Chiad, Tahseen H, Mubarak ,”The Effect of Ti on Physical Properties of Fe2O3 Thin Films for Gas Sensor Applications”, International Journal of Nanoelectronics and Materials, Vol. 13, no.2, pp. 221-232, 2020.
[39]Abdulmunem, O. M., Abdulameer, F. S., Kadhum, H.A., Dawood, M. O., Abass, K.H., Habubi, N.F, Chiad, S.S., “Influence of Bismuth dopant on physical properties of nanostructured TiO2 thin films”, Test Engineering and Management, Vol. 83, 2020, pp. 11142-11147,2020.
[40]Tauc J, Grigorovici R, Vancu A ,”Optical properties and electronic structure of amorphous germanium”, Phys. Status Solid, Vol. 15,pp. 627-637, 1966.
[41]Jacques I, Pankove and David A, Kiewit, “Optical Processes in Semiconductors”, Journal of The Electrochemical Society, Vol.119, no. 5,1972.
[42]Habubi, N. F.; Mishjil, K. A.; Chiad, S. S, “Structural properties and refractive index dispersion of cobalt doped SnO2 thin films”, indian Journal of Physics, Vol. 87, no. 3, pp.235-239, 2013.
[43]Alkelaby, A. S., Abass, K. H., Mubarak, T. H., Habubi, N. F., Chiad, S. S, Al-Baidhany, I., “Effect of MnCl2 additive on optical and dispersion parameters of poly methyl methacrylate films”, Journal of Global Pharma Technology, Vol.11, no.4, pp. 347-352, 2019.
[44]Habubi, N. F., Abass, K. H., Chiad, S., Latif, D. M. A., Nidhal, J. N., Al Baidhany, A.I., “Dispersion Parameters of Polyvinyl Alcohol Films doped with Fe”, Journal of Physics: Conference Series, Vol. 1003, no.1, pp. 012-094, 2018.
[45]Chiad, S. S., Abass, K. H., Mubarak, T. H., Habubi, N. F., Mohammed, M. K., Khadayeir, A .A., “Fabrication and study the structure, optical and dispersion parameters of PMMA with InCl3 additive”, Journal of Global Pharma Technology, Vol. 11, no.4, pp. 369-375, 2019.
[46]Khadayeir, A. A., Abass, K. H., Chiad, S. S., Mohammed, M. K., Habubi, N. F., Hameed, T. K., Al-Baidhany, I. A., “Study the influence of antimony trioxide (Sb2O3) on optical properties of (PVA-PVP) composites”, Journal of Engineering and Applied Sciences, Vol.13, no.22, pp. 9689-9692, 2018.
[47]Khadayeir, A. A., Hassan, E. S., Mubarak, T. H., Chiad, S.S., Habubi, N. F., Dawood, M.O., Al-Baidhany, I. A., “The effect of substrate temperature on the physical properties of copper oxide films”, Journal of Physics: Conference Series, Vol.1294 , no.2, 2019.
[48]L. R. de León-Gutiérrez, J. J. CayenteRomero, J. M. Peza-Tapia, E. BarreraCalva, J .C. and Martínez-Flores, M. OrtegaLópez, “Some physical properties of Sndoped CdO thin films prepared by chemical bath deposition”, Material letters, Vol. 60 , pp.3866–3870,2006.
| Download File
Effect of Gold Dopant on Physical Characterization of Nanostructured Cadmium Sulfide Thin Films
1Fatma Ismail Abbas, 2Rajaa A. Basheer, 2Amal M. Banoosh, 2Ban A. Bader, 1Nadir Fadhil Habubi
1Department of Physics, College of Education, Mustansiriyah University, Iraq.
2Department of Physics, College of Education, University of Al- Hamdaniya, Iraq.
Pages: 7208–7221
Abstract: [+]
Thin Cadmium Sulfide films doped with Au were grown via spray pyrolysis technique (SPT). An increase in Au dopant from 0 to 3% in CdS thin films led to pronounced changes in the film morphology. X-ray diffraction has shown that the peak of the maximum intensity corresponds to the (002) of deposited films. The crystallite size was maximum at the(CdS: 3% Au ) film and it was minimum for nanostructured CdS , whereas the strain(%) parameter decreases from 22.50 to 19.13, Study of the morphology of CdS films indicates the presence of homogeneous grains, while when Au atoms are added, the grains are not homogeneous and have different sizes. AFM images disclosed a smooth surface topography with a decrement in rms roughness values from 16.70 nm to 3.66 nm The average particle size was observed to be 59.95 nm to 39.96 nm for the deposited films. The optical transmittance exhibits excellent optical transparency, in the visible region 95 and 84 %, for CdS and 3% Au doping. It was also found that the absorption coefficient increased with increasing of dopant concentration, It follows from the optical properties that the bandgap of pure CdS thin film is 2.55 eV, was decreased from to 2.35 eV via doping
Keywords:  CdS thin film, Au, Doping, Structural properties, AFM, Optical properties, bandgap.
| References: [+]
[1]H. R. Motinho, D. Albin, Y. Yaan, R. G. Dheo, X. Li, C. Perkis, C.S. , “Deposition and properties of CBD and CSS CdS thin films for solar cell application”, Jiang, Thin Solid Films, Vol. 436, pp. 175-180, 2003.
[2]H. Metin, R. Esen, “Annealing effects on optical and crystallographic properties of CBD grown CdS films”, Semicond. Sci. Technol., Vol. 18 no.7, pp. 647-654, 2003.
[3]G.S. Vorobjov, V.O. Zhurba, A.S. Krivets, “Structural and Optical Properties of CdS Thin Film Grown by Chemical Bath Deposition”, J. Nano- Electron. Phys., Vol. 2 no.4, pp.47-52, 2010.
[4]A. Zeho, J.G. Vazquez Luna, “Magnetic field influenced growth kinetics in chemical CdS thin-film depositionSol”, Sol. Energ. Mater. Sol. C, Vol. 68, pp.217- 226 , 2001.
[5]J. Levinson, F.R. Shepherd, P.J. Scanlon, W.D. Westwood, G. Este, M. Rider, “Conductivity behavior in polycrystalline semiconductor thin film transistors Aip Journal of Applied Physics, Vol. 53, pp. 1193 1982.
[6]U. Pal, R. Silva-Gonzalez, G. Martinez-Montes, M. Gracia-Jimenez, M.A. Vidal, S. Torres, “Optical characterization of vacuum evaporated cadmium sulfide films”, Thin Solid Films, Vol. 305, pp. 345- 250, 1997.
[7]LeeseungKang et al “Low-voltage operating solution-processed CdS thin-film transistor with Ca2Nb3O10 nanosheets deposited using Langmuir–Blodgett method for a gate insulator”, Applied Surface Science, Vol. 476, pp. 374-377, 2019.
[8]Okorie O Buba A and R Abubakar, “Optical and Dielectric Properties of Cadmium Sulphide Thin Film Grown Using Chemical Bath Deposition Technique”, IOSR Journal of Applied Physics, Vol. 9, pp. 82-89, 2017.
[9]Ibrahim M A Ibrahim A R and Musa O, “Investigation of the Properties of Cadmium Sulphide Thin Films for Solar Cell Applications”, International Journal of Energy Engineering, Vol.4, no. 3, pp.61-67, 2014.
[10]Zhong Lin Wang, Functional oxide nanobelts: materials, “properties and potential applications in Nanosystems and biotechnology”, Annu Rev Phys Chem ,Vol. 55, pp. 159– 96 2004.
[11]Sagadevan S and Pandurangan K 2014, “Synthesis, structural, optical and electrical properties of cadmium sulphide thin films by chemical bath deposition method”, International Journal of ChemTech Research, Vol. 6, no.7, pp. 3748-3752, 2014.
[12]Chtouki T El Kouari Y Kulyk B Louardi A Rmili A Erguig H Elidrissi B Soumahoro L and Sahraoui B, “Spin-coated nickel doped cadmium sulfide thin films for third harmonic generation applications”, journal of alloy and compounds, Vol. 696, pp. 1292- 1297, 2017.
[13]Baturay Şilan, “Indium doping on the structural, surface and optical properties of CdS thin films prepared by ultrasonic spray pyrolysis method”, J. BAUN Inst. Sci. Technol., vol. 19 no.2, pp. 264-274, 2017.
[14]Hernandez N Berrellez F Mizquez R Ramirez O Mejia I and M Quevedo, “CdS-based p-i-n diodes using indium and copper doped CdS films by pulsed laser deposition”, Semiconductor Science and Technology, Vol. 30 no.6, pp. 065003-065007, 2015.
[15]Ashour A., El-Kadry N. and Mahmoud S.A., “On the electrical and optical properties of CdS films thermally deposited by a modified source”, Thin Solid Films, Vol.269, pp.117-120, 1995.
[16] Mahmoud S.A., Ibrahim A.A. and Riad A.S., “Physical properties of thermal coating CdS thin films using a modified evaporation source”, Thin Solid Films, Vol.372, pp.144-148, 2000.
[17]Oliva A.I., O. Solis-Canto, R. Castro-Rodriguez and Quintana P., “Formation of the band gap energy on CdS thin films growth by two different techniques”, Thin Solid Films, Vol. 391, pp. 28-31, 2001.
[18]DavideBarreca, Alberto Gasparotto,CinziaMaragno, and Eugenio Tondello. “CVD of Nanosized ZnS and CdS thin films from single-source precursors Journal of The Electrochemical Society, Vol. 151, no.6, pp. 428-35, 2004.
[19]Hofimann Ph, , Horn K., Bradshaw A.M., Johnson R.L., Fuchs D. and Cardona M., “Dielectric function of cubic and hexagonal CdS in the vacuum ultraviolet region”, Physical Review B ,Vol. no. 47, pp. 16-39, 1993.
[20]Battisha I.K., Afify H.H., Abd El-Fattah G. and Badr Y., Fizika, “Raman and photoluminescence studies of pure and Sn-enriched thin films of CdS prepared by spray pyrolysis Fizika” , Vol. 11, pp. 31-41, 2002.
[21]Ehssan S Hassan, Tahseen H Mubarak, Sami S Chiad, Nadir F Habubi, Abdulhussain A Khadayeir, Mohamed O Dawood and Ismaeel A Al-Baidhany, “Physical Properties of indium doped Cadmium sulfide thin films prepared by (SPT)”, IOP Conf. Series: Journal of Physics: Conf. Series, Vol.1294, pp. 022-008, 2019.
[22]Jing Wang, Yun Shan, Wei-Wei Zhao, Jing-Juan Xu, and Hong-Yuan Chen, “Gold Nanoparticle Enhanced Electrochemiluminescence of CdS Thin Films for Ultrasensitive Thrombin Detection”, Anal. Chem., Vol, 83, PP.4004–4011,2011.
[23]M. Becerril , H. Silva-López and O. Zelaya-Angel, “Au doping of CdS polycrystalline films prepared by co-sputtering of CdS–Cd-Au targets”, Superficies y Vacío, Vol. 25, no.4, pp. 214-217, 2012.
[24] Shour H, El Akkad F, Bohari R, Herrmann KH. , “Properties of RF sputtered CdS thin films”, Eleventh International Conference on Microelectronics, Vol. 99, pp. 263-65, 1999.
[25]Byung-Sik Moon, Jae-Hyeong Lee, Hakkee Jung., “Comparative studies of the properties of CdS films deposited on different substrates by R.F. sputtering”, Thin Solid Films, Vol. 511-512, pp. 299-303,2006.
[26]L.S. Ravangave, S.D. Misal, U.V. Biradar, K.N. Rothod, “Comparative study of Structural, Morphological and Optical Characterization of CdS, CdAlS Annealed Thin Films”, Materials Physics and Mechanics, Vol. 14, pp. 129-136,2012.
[27]A. Hasnat , J. Podder, '“'Structural and Electrical Transport Properties of CdS and Al-doped CdS Thin Films Deposited by SprayPyrolysis”',J.Sci.Res., Vol. 4, no.1, pp.11-19, 2012.
[28]Uplane M.D. and Pawar S.H., Effect of substrate temperature on transport and optical properties of sprayed Cd1−x ZnxS films”, Solid state commun. Vol. 46, pp. 847-850,1983.
[29] Jandow, N. N., Habubi, N. F., Chiad, S. S., Al-Baidhany, I. A. and Qaeed, M. A., “optical parameters of Fe2O3:Ni thin films prepared by chemical spray pyrolysis technique”, International Journal of Nanoelectronics and Materials, Vol. 12,no.1, pp. 1-10, 2019.
[30]Hassan, E. S., Elttayef, A.K., Mostafa, S. H., Salim, M. H. and Chiad, S. S., “Silver oxides nanoparticle in gas sensors applications”, Journal of Materials Science: Materials in Electronics, Vol.30 no.17, pp. 15943-15951, 2019.
[31]Tsuji M, Tetsuya A, Taeshi H, Kuniyoshi O., “Characterization of CdS thin film in high efficient CdS/CdTe solar cells”, Journal of Crystal Growth, Vol. 214-215, pp.1142-1147, 2000.
[32]Ali, R. S., Sharba, K. S., Jabbar, A.M., Chiad, S.S., Abass, K. H. and Habubi, N. F., “Characterization of ZnO thin film/p-Si fabricated by vacuum evaporation method for solar cell applications”, NeuroQuantology, Vol. 18,no.1, pp. 26-31,2020.
[33]Dawood, M. O., Chiad, S. S., Ghazai, A. J., Habubi, N. F. and Abdulmunem, O. M., “Effect of Li doping on structure and optical properties of NiO nano thin-films by SPT”, AIP Conference Proceedings, Vol. 2213 , no.1, pp.020-102, 2020.
[35]Chiad, S. S. and Mubarak, T. H., “The Effect of Ti on Physical Properties of Fe2O3 Thin Films for Gas Sensor Applications”, International Journal of Nanoelectronics and Materials, Vol.13, no.2, pp. 221-232, 2020.
[36]Abdulmunem, O. M., Abdulameer, F. S., Kadhum, H.A., Dawood, M. O., Abass, K.H., Habubi, N.F. and Chiad, S.S., “Influence of Bismuth dopant on physical properties of nanostructured TiO2 thin films”, Test Engineering and Management, Vol. 83, pp. 11142-11147, 2020.
[37]Ehssan S. Hassan, Abdulhussain K., “Elttayef, Suzan Hadi Mostafa, Mohammed Hadi Salim, Sami Salman Chiad, Silver oxides nanoparticle in gas sensors applications”, Journal of Materials Science: Materials in Electronics, Netherlands, pp.15943–15951, 2019.
[38]L. I. Soliman, H.H. Afify , I.K. Battisha, '“'Growth impedence of pure CdS films”, Indian J. of Pure and Applied Phys., Vol. 42, pp. 12-17, 2004.
[39]Al-Jumaili S. Hamid. , Taha N. Mahmood, “'Structural and optical properties of CdS:In nanoparticals thin films prepared by CBD technique”, Journal of the Association of Arab Universities for Basic and Applied Sciences, Vol. 11, no.1, pp.27-31,2012.
[40]L.S. Ravangave ,S.D. Misal, U.V. Biradar, K.N. Rothod, “Comparative Study of Structural, Morphological And Optical Characterization of CdS, CdAlS and CdAlS Annealed Thin Films”, 'Materials Physics and Mechanics, Vol. 14 ,pp. 129-136, 2012.
[41]J. Nicholas Alexander, Seiichiro Higashiya , Douglas Caskey Jr , Harry Efstathiadis , “Pradeep Haldar,'' Deposition and characterization of cadmium sulfide (CdS) by chemical bath deposition using an alternative chemistry cadmium precursor”, Solar Energy Materials & Solar Cells, Vol.125 pp.47–53, 2014.
[42]Jacques I, Pankove and David A, Kiewit, “Optical processes in Semiconductors'', Journal of The Electrochemical Society,Vol.6, no.11,1971.
[43]Habubi, N. F., Mishjil, K. A. and Chiad, S. S., Structural properties and refractive index dispersion of cobalt doped SnO2 thin films”, Indian Journal of Physics, Vol. 87, no.3, pp. 235-239, 2013.
[44]Alkelaby, A. S., Abass, K. H., Mubarak, T. H., Habubi, N. F., Chiad, S. S. and Al-Baidhany, I., “Effect of MnCl2 additive on optical and dispersion parameters of poly methyl methacrylate films”, Journal of Global Pharma Technology Vol.11, no.4, pp. 347-352, 2019,
[45]B. Ray, “II-VI Compound,1st ed”, Neili and Co. Ltd, of Edinburgh, 1969.
[46]Y. Al-Douri, Q. Khasawneh, S. Kiwan , U. Hashim, S.B. Abd Hamid, A. H. Reshak, A. Bouhemadou, M. Ameri and R. Khenata, “Structural and optical insights to enhance solar cell performance of CdS nanostructures”', Energy Conversion and Management, Vol. 82, pp. 238-243, 2014.
[47]Powlowski. L., “The Science and Engineering of Thermal Spray coating”, John Wiley and sons, 2ndEdition,2008.
[48]Habubi, N. F., Abass, K. H., Chiad, S., Latif, D. M. A., Nidhal, J. N. and Al Baidhany, A.I., “Dispersion Parameters of Polyvinyl Alcohol Films doped with Fe”, Journal of Physics: Conference Series, Vol. 1003,no.1, pp. 012-094, 2018.
[49]Chiad, S. S., Abass, K. H., Mubarak, T. H., Habubi, N. F., Mohammed, M. K. and Khadayeir, A .A., “Fabrication and study the structure, optical and dispersion parameters of PMMA with InCl3 additive”, Journal of Global Pharma Technology, Vol. 11,no.4, pp. 369-375, 2019.
[50]Khadayeir, A. A., Abass, K. H., Chiad, S. S., Mohammed, M. K., Habubi, N. F., Hameed, T. K. and Al-Baidhany, I. A., “Study the influence of antimony trioxide (Sb2O3) on optical properties of (PVA-PVP) composites”, Journal of Engineering and Applied Sciences, Vol. 13,no.22, pp. 9689-9692, 2018.
[51]K.K. Nanda, S.N. Sarangi, S. Mohanty, and S.N. Sahu, “Optical properties of CdS nanocrystalline films prepared by a precipitation technique”, Thin Solid Films, Vol. 322, pp.21–27, 1998.
[52]N.N. Parvathy, G. “Optical prosperities of (CdS) and (PbS) Thin Films and their mixtures”, J. Mater. Synth.Proc, Vol.7, pp. 221, 1999.
[53]M.Muthusamy,S. Muthukuma-ran , M. Ashokkumar, “Composition dependent optical, structural and photoluminescence behavior of CdS:Al thin films by chemicalbath deposition method” , Ceramics International, Vol.40, pp.10657–10666, 2014.
| Download File
The Improvement of Controller Based on Dynamic Voltage Restorer (DVR) for Distribution System
1Ali Basim Mohammed, 1Ahmad Fateh Bin Mohamad Nor, 1Norfaiza Fuad, 1Danial bin Md. Nor, 2Shibly Ahmed AL-Samarraie
1Faculty, Department of Electrical and Electronic Engineering, University Tun Hussein Onn Malaysia, Malaysia.
2Department of Control and Systems Engineering, University of Technology, Iraq.
Pages: 7222–7277
Abstract: [+]
Power quality is an important issue for power system network; the load voltage should be as a sinusoidal waveform. Many disturbances affect supply voltage like notching, transients, under voltage, voltage sag/swell. Sag/swell voltages and harmonics are the major problems of power quality causing malfunctioning or tripping the equipment. This paper put an effective and economic solution for the system from disturbances that occur such as voltage sag/swell and harmonics by employing the dynamic voltage restorer by protecting the sensitive loads and network through a series transformer to inject a suitable voltage waveform to maintain the sensitive loads at a fixed value. DVR controller have a low complexity by utilizing a powerful differentiator called approximate classical sliding mode controller to eliminate the disadvantages of the linear differentiator with a nonlinear sliding variable as a terminal sliding mode controller or sigmoid function named arctan to maintain the load voltage magnitude approximately 1 pu, the total harmonic distortion at the standard level and the steady state error as small as possible. The proposed system is investigated by utilized MATLAB/Simulink to improve the distribution system when any disturbances occur. The results illustrated the capability of the DVR structure to overcome any disturbance and keep the sensitive load voltage at a constant value by maintaining the THD at the standard rand. The proposed model was evaluated by used the common voltage sag indices.
Keywords: PID controller, voltage sag/swell, sliding mode controller, dynamic voltage restorer, power quality, total harmonic distortion.
| References: [+]
[1]M. Rauf and V. Khadkikar, "An Enhanced Voltage Sag Compensation Scheme for Dynamic Voltage Restorer", IEEE Trans. Ind. Electron., Vol. 62, no. 5, pp. 2683–2692, 2015.
[2]M. R. Alam, K. M. Muttaqi, and A. Bouzerdoum, "Characterizing Voltage Sags and Swells Using Three-Phase Voltage Ellipse Parameters", IEEE Trans. Ind. Appl., Vol. 51, no. 4, pp. 2780–2790, 2015.
[3]M. Danbumrungtrakul, T. Saengsuwan, and P. Srithorn, "Evaluation of DVR Capability Enhancement-Zero Active Power Tracking Technique", IEEE Access, Vol. 5, pp. 10285–10295, 2017.
[4]P. Li, L. Xie, J. Han, S. Pang, and P. Li, "New Decentralized Control Scheme for a Dynamic Voltage Restorer Based on the Elliptical Trajectory Compensation", IEEE Trans. Ind. Electron., Vol. 64, no. 8, pp. 6484–6495, 2017.
[5]A. B. Mohammed, M. A. M. Ariff, and S. N. Ramli, "Power quality improvement using dynamic Voltage restorer in electrical distribution system: An overview", Indonesian Journal Electrical Engineering and Computer Science, Vol. 17, no. 1, pp. 86–93, 2020.
[6]Al Kadhimi, B. M., & Mohammed, A. B. "The aspect of power quality in a wind generation: Overview", Journal of Physics: Conference Series, 2020.
[7]D. A. Fernandes, F. F. Costa, J. R. S. Martins, A. S. Lock, E. R. C. Da Silva, and M. A. Vitorino, "Sensitive Load Voltage Compensation Performed by a Suitable Control Method", IEEE Trans. Ind. Appl., Vol. 53, no. 5, pp. 4877–4885, 2017.
[8]A. B. Mohammed, M. A. M. Ariff, "The Enhancement of Power Quality for the Distribution System via Dynamic Voltage Restorer (DVR)", International Journal of Power Electronics and Drive System (IJPEDS), Vol. 11, no. 3, pp. 1588-1595, 2020.
[9]A. B. Mohammed, M. A. M. Ariff, "An Improved Method for Efficient Controlling of the Dynamic Voltage Restorer to Enhance the PoweQuality in the Distribution System", International Journal of Power Electronics and Drive System (IJPEDS), Vol. 11, no. 4, pp. 1958-1965, 2020.
[10]G. V. N. Kumar and D. D. Chowdary, "DVR with Sliding Mode Control to Alleviate Voltage Sags on a Distribution System for Three Phase Short Circuit Fault,” IEEE Region 10 Colloquium and 3rd International Conference on Industrial and Information Systems, 2008.
[11]G. Chowdary, D. D., and Kumar, "Restoration of Single Phase Distribution System Voltage under Fault Conditions with DVR using Sliding Mode Control", Indian J. Sci. Technol., Vol. 5, no. 1, pp. 1–5, 2008.
[12]D. D. Chowdary and G. V. N. Kumar, "Mitigation of Voltage Sags in a Distribution System due to Three Phase to Ground Fault Using DVR,” Indian J. Eng. Mater. Sci., Vol. 17, no. 2, pp. 113–122, 2010.
[13]J. F. Pires, V. F., Guerreiro, M., and Silva, "Dynamic Voltage Restorer Using a Multilevel Converter with a Novel Cell Structure", IEEE EUROCON-International Conf. Comput. as a Tool, pp. 1–4, 2011.
[14]S. Biricik, H. Komurcugil, and M. Basu, "Sliding Mode Control Strategy for Three-Phase DVR Employing Twelve-Switch Voltage Source Converter,” IECON 2015 - 41st Annu. Conf. IEEE Ind. Electron. Soc., pp. 921–926, 2015.
[15]S. Biricik and H. Komurcugil, "Optimized Sliding Mode Control to Maximize Existence Region for Single-Phase Dynamic Voltage Restorers", IEEE Trans. Ind. Informatics, Vol. 12, no. 4, pp. 1486–1497, 2016.
[16]L. P. Vasudevan and V. Prasad, "Performance enhancement of a dynamic Voltage restorer", Turkish J. Electr. Eng. Comput. Sci., Vol. 25, no. 3, pp. 2293–2307, 2017.
[17]A. Pandey, R. Agrawal, R. S. Mandloi, and B. Sarkar, "Sliding Mode Control of Dynamic Voltage Restorer by Using a New Adaptive Reaching Law", J. Inst. Eng. Ser. B, Vol. 98, no. 6, pp. 579–589, 2017.
[18]H. Vsi, "Time-Varying and Constant Switching Methods for Transformerless DVR Employing", IEEE Transactions on Industrial Electronics,Vol. 64, no. 4, pp. 2570–2579, 2017.
[19]N. Kassarwani, J. Ohri, and A. Singh, "Performance Analysis of Dynamic Voltage Restorer using Modified Sliding Mode Control,” Int. J. Electron. Lett., Vol. 7, no. 1, pp. 25–39, 2019.
[20]A. J. Sguarezi Filho, D. A. Fernandes, J. H. Suárez, F. F. Costa, and J. A. T. Altuna, "Recursive Least Squares and Sliding Mode Control for Voltage Compensation of Three-Phase Loads", J. Control. Autom. Electr. Syst., Vol. 29, no. 6, pp. 769–777, 2018
[21]K. Jeyaraj, D. Durairaj, and A. I. S. Velusamy, "Development and Performance Analysis of PSO-Optimized Sliding Mode Controller–Based Dynamic Voltage Restorer for Power Quality Enhancement", Int. Trans. Electr. Energy Syst., Vol. 30, no. 3, pp. 1–14, 2020.
[22]S. Biricik, H. Komurcugil, N. D. Tuyen, and M. Basu, "Protection of sensitive loads using sliding mode controlled three-phase DVR with adaptive notch filter", IEEE Trans. Ind. Electron., Vol. 66, no. 7, pp. 5465–5475, 2019.
[23]S. K. Spurgeon, "Sliding Mode Control: Theory and Applications", Taylor Francs, 1998.
[24]JING LIU, "Comparative Study of Differentiation and Integration Techniques for Feedback Control Systems", Thesis, Cleveland State University , 2002.
[25]Y. Shtessel, C. Edwards, L. Fridman, and A. Levant, “Sliding Mode Control and Observation”, Springer, 2014.
[26]S. A. Al-Samarraie and M. Hussein Mishary Me, "A Chattering Free Sliding Mode Observer with Application to DC Motor Speed Control", 3rd Sci. Conf. Electr. Eng., pp. 259–264, 2018.
[27]A. Basu, S. Mohanty, and R. Sharma, "Designing of the PID and FOPID Controllers using Conventional Tuning Techniques,” Proc. Int. Conf. Inven. Comput. Technol., 2016.
[28]H. O. Bansal, R. Sharma, and P. R. Shreeraman, "PID Controller Tuning Techniques: A Review", J. Control Eng. Technol., Vol. 2, no. pp. 168–176, 2012.
[29]K. J. A. and T. Hagglund, “PID controllers, Theory, Design and Tuning”, Instrument Society of America, 1995.
[30]Shibly Ahmed AL-Samarraie and Yasir Khudhair Abbas "Design of Electronic Throttle Valve Position Control System using Nonlinear PID Controller", International Journal of Computer Applications,Vol.59, no.15, 2012.
[31]Shibly Ahmed Al-Samarraie, Bashar Fateh Midhat, Ivan Isho Gorial "Nonlinear Integral Control Design for DC Motor Speed Control with Unknown and Variable External Torque " Journal of Engineering and Sustainable Development, Vol. 20, no.04, 2016.
[32]M. Zhihong, A. P. Paplinski, and H. R. Wu, "A Robust Mimo Terminal Sliding Mode Control Scheme For Rigid Robotic Manipulators", IEEE Trans. Automat. Contr., Vol. 39, no. 12, pp. 2464–2469, 1994.
[33]X. Zhihong, M., & Yu, "Adaptive Terminal Sliding Mode Tracking Control for Rigid Robotic Manipulators with Uncertain Dynamics", Int. J. Ser. C Mech. Syst. Mach. Elem. Manuf., Vol. 40, no. 3, pp. 493-502, 1997.
[34]S. Venkataraman, S. T., and Gulati, "Control of Nonlinear Systems using Terminal Sliding Modes", American Control Conference, 1993.
[35]L. Fridman, J. A. Moreno, B. Bandyopadhyay, and S. Kamal, “Recent Advances in Sliding Modes: From Control to Intelligent Mechatronics”, springer, 2015.
[36]R. Fridman, L., Moreno, J., and Iriarte, "Sliding Modes after the First Decade of the 21st Century", Lect. notes Control Inf. Sci., Vol. 412, pp. 113–149, 2011.
[37]J. Han and C. Moraga, "The Influence of the Sigmoid Function Parameters on the Speed of Backpropagation Learning,” International Workshop on Artificial Neural Networks, Vol. 930, pp. 195–201, 1995.
[38]Wikipedia. Available online: https://en.wikipedia.org/wiki/Sigmoid_function.
[39]A. I. Omar, S. H. E. Abdel Aleem, E. E. A. El-Zahab, M. Algablawy, and Z. M. Ali, "An Improved Approach for Robust Control of Dynamic Voltage Restorer and Power Quality Enhancement using Grasshopper Optimization Algorithm", ISA Trans., Vol. 95, , pp. 110–129, 2019.
[40]B. Wang and G. Venkataramanan, "Operation and Control of a Dynamic Voltage Restorer Realized Using Cascaded H-bridge Converters", IEEE 36th Power Electronics Specialists Conference, 2005.
[41]S. N. A. Ahmed F Zobaa, Paulo F Ribeiro, Shady H E Abdel Aleem, “Energy Storage at Different Voltage Levels : Technology, integration, and market aspects”, IET, 2018.
[42]A. M. Saeed, S. H. E. Abdel Aleem, A. M. Ibrahim, and E. E. A. El-Zahab, "Power Quality Improvement and Sag Voltage Correction by Dynamic Voltage Restorer", Int. Rev. Autom. Control, Vol. 7, no. 4, pp. 386–393, 2014.
[43]S. S. Choi, B. H. Li, and D. M. Vilathgamuwa, "Dynamic Voltage Restoration with Minimum Energy Injection", IEEE Transactions on Power Systems, Vol.15, no.1, pp. 1156, 2002.
[44]B. V. Damor AK, "Voltage Sag Control Using DVR", Nat. Conf. Recent Trends Eng. Technol., 2011.
[45]H. Marefatjou and M. Sarvi, "Compensation of Single-Phase and Three-Phase Voltage Sag and Swell Using Dynamic Voltage Restorer", Int. J. Appl. Power Eng., Vol. 1, no. 3, pp. 129–144, 2012.
[46]IEEE Approved Draft Guide for Voltage Sag Indices, Institute of Electrical and Electronics Engineers, 2014.
[47]A. Polycarpou, “Power Quality and Voltage Sag Indices in Electrical Power Systems”, Electrical Generation and Distribution Systems and Power Quality Disturbances,intechopen, 2011.
[48]Ahmed M.SaeedaShady, H.E.Abdel, AleembAhmed, M.IbrahimaMurat, E.BalcicEssam, E.A.El- Zahaba, "Power Conditioning Using Dynamic Voltage Restorers Under Different Voltage Sag Types", Journal of Advanced Research,Vol 7, no 1, pp. 95-103, 2016.
[49]R. H. PARK, "Two-Reaction Theory of Synchronous Machines: Generalized Method of Analysis-Part I", Trans. Am. Inst. Electr. Eng., Vol. 48, no. 3, pp. 716–727, 1929.
[50]Electromagnetic compatibility (EMC)-limits-Assessment of Emission Limits for the Connection of Unbalanced Installations to MV, HV and EHV Power Systems", Technical report TECrrR 61000-3-13, Ed. I, International Electrotechnical Commission, 2008.
[51]IEEE Recommended Practice for Monitoring Electric Power Quality," in IEEE Std 1159-2019 (Revision of IEEE Std 1159-2009) , vol., no., pp.1-98, 2019
[52]Chattopadhyay, Surajit, Mitra, Madhuchhanda, Sengupta, Samarjit, "Electric Power Quality", Springer, pp. 5–12, 2011.
[53]Mehran Esmaeili , Hossein Shayeghi, Khalil Valipour, Amin Safari, Farzad Sedaghati , "Power Quality Improvement of Multimicrogrid Using Improved Custom Power Device Called as Distributed Power Condition Controller", Int. Trans. Electr. Energy Syst., Vol. 30, no. 3, pp. 1–16, 2020.
| Download File
Performance Analysis of Novel Three Stage Dual Active Bridge based Solid State Transformer with Dual Secondary Winding for Renewable Energy Integration
1N. Saju and 2V.Jegathesan
1Research Scholar, Karunya Institute of Technology & Sciences, Coimbatore, India.
22Associate Professor,Karunya Institute of Technology & Sciences, Coimbatore, India.
Pages: 7278–7289
Abstract: [+]
Solid state transformer (SST) is one of the greatest emergent technologies in the field of renewable energy integration. Various topologies of SST are available, out of which the most promising one is the three stage SST with Dual Active Bridge (DAB). In this paper, a novel three stage DAB based SST with dual secondary winding is proposed. The transformer of the DAB stage is replaced by with dual secondary winding transformer enabling load sharing among the winding. The simulation model is developed using MATLAB/Simulink. The performance of the system is analyzed for various load conditions. The results infer that the proposed SST system can be wisely used for integration of distributed energy resources of the renewable energy system.
Keywords:  Solid State Transformer (SST), H-Bridge inverter, Dual Secondary Winding, THD, Dual Active Bridge (DAB), Voltage Sag, Voltage Swell, Power factor
| References: [+]
[1] Huang, Alex Q "Medium-voltage solid-state transformer: Technology for a smarter and resilient grid", IEEE Industrial Electronics Magazine, Vol. 10, no. 3,pp. 29-42, 2016.
[2] Satyamsetti, Vijayakrishna, Andreas Michealides, and Antonis Hadjiantonis "Forecasting on solid state transformer applications”, 2017 International Conference on Intelligent Sustainable Systems (ICISS), pp. 330-335, 2017.
[3] Syed, Imran, and Vinod Khadkikar "Replacing the grid interface transformer in wind energy conversion system with solid-state transformer", IEEE Transactions on Power Systems, Vol. 32, no. 3, pp. 2152-2160, 2016.
[4] Gao, Rui, Xu She, Iqbal Husain, and Alex Q. Huan "Solid-state-transformer-interfaced permanent magnet wind turbine distributed generation system with power management functions", IEEE Transactions on Industry Applications, Vol. 53, no. 4 pp. 3849-3861, 2017.
[5] Gao, Rui, Iqbal Husain, and Alex Q. Huang, "An autonomous power management strategy based on DC bus signaling for solid-state transformer interfaced PMSG wind energy conversion system", 2016 IEEE Applied Power Electronics Conference and Exposition (APEC), pp. 3383-3388, 2016.
[6] Verma, Neevatika, Navdeep Singh, Shekhar Yadav, and Sandeep Gupta "Reactive Power Compensation of Solid State Transformer for WECS", 2018 2nd International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech), 2018.
[7] Chen, Hao, and Deepak Divan "Soft-switching solid-state transformer (S4T)", IEEE Transactions on Power Electronics, Vol. 33, no. 4,pp. 2933-2947, 2017.
[8] Leibl, Michael, Gabriel Ortiz, and Johann W. Kolar "Design and experimental analysis of a medium-frequency transformer for solid-state transformer applications", IEEE Journal of Emerging and Selected Topics in Power Electronics, Vol. 5, no. 1,pp. 110-123, 2016.
[9] Sun, Baiyan, Congzhe Gao, Xiangdong Liu, Zhen Chen, and Tong Zheng "Voltage Adjustable Capacitor Isolated Solid State Transformer", IEEE Transactions on Industrial Electronics,vol.67,no.9,pp. 7550 – 7559,2019.
[10] Dong, Dong, Mohammed Agamy, Jovan Z. Bebic, Qin Chen, and Gary Mandrusiak "A Modular SiC High-Frequency Solid-State Transformer for Medium-Voltage Applications: Design, Implementation, and Testing”, IEEE Journal of Emerging and Selected Topics in Power Electronics, Vol. 7, no. 2, pp. 768-778, 2019.
[11] Cisneros, Rafael, Rui Gao, Romeo Ortega, and Iqbal Husain "A PI+ passivity-based control of a wind energy conversion system enabled with a solid-state transformer”, International Journal of Control, pp.: 1-11, 2020.
[12] Rashidi, Mohammad, Necmi N. Altin, Saban S. Ozdemir, Abedalsalam Bani-Ahmed, and Adel Nasiri "Design and Development of a High-Frequency Multiport Solid-State Transformer With Decoupled Control Scheme”, IEEE Transactions on Industry Applications, Vol. 55, no. 6, pp. 7515-7526, 2019.
[13] Liu, Tao, Xu Yang, Wenjie Chen, Yang Li, Yang Xuan, Lang Huang, and Xiang Hao "Design and implementation of high efficiency control scheme of dual active bridge based 10 kv/1 mw solid state transformer for pv application", IEEE Transactions on Power Electronics, Vol. 34, no. 5, pp. 4223-4238, 2018.
| Download File
An Investigation on Urban Soundscape Essentials in Ecological Acoustics
1Hany Hossam Eldien, 2Karim Gazzeh, 3Emad Hammad
1Department of Building Engineering, College of Architecture and Planning, Imam Abdulrahman Bin Faisal University, 31451Dammam, Kingdom of Saudi Arabia.
2Department of Urban and Regional Planning, College of Architecture and Planning, Imam Abdulrahman Bin Faisal University, 31451 Dammam, Kingdom of Saudi Arabia.
3Department of Interior Architecture, College of Architecture and Planning, Imam Abdulrahman Bin Faisal University, 31451 Dammam, Kingdom of Saudi Arabia.
Pages: 7290–7311
Abstract: [+]
The goal of the current survey is to grasp how the utilization of the idea of sound scapes can help in considering encompassing sound situations in better places. Sound is a huge attribute of the prominence of the urban open air biological system. Inside the field of ecological acoustics, urban sound scape study implies a respectably current however fundamental hypothesis change, which continues from the perspective that a reasonable acoustic condition may inspiringly affect the prosperity of masses and visitors. With the appearance of novel methodologies and techniques for practical ruralisation of open air zones, and with the utilization of mimicked/expanded authenticity procedures turning out to be increasingly broad, research centrality in the preliminary of forming the acoustic air of urban open spaces has expanded significantly. The motivation behind urban open spots is characteristically accomplished by draftsmen and urban organizers, which regularly just accentuation on the graphical feel of the urban space. However, an outwardly appealing open space made arrangements for mitigating will be underused in the event that it sounds cruel. Ideally, sound-related plan ought to be durable with visual structure, an essential the sound scape methodology responses. The present tendency of co-making the urban space made with all investors, including neighborhood occupants, opens up new possibilities to represent all thanks in the urban plan movement. Deplorably, draftsmen and urban proposers ‘scuffle to join the sound scape technique in the urban plan procedure and use in the circumstance of co-creation. Along these lines, this survey intends to assemble accessible exploration on the sound scape approach versus urban arranging, in explicit.
Keywords:  PEO/PVDF blend, Electrochemical Impedance Spectroscopy, Ionic conductivity, SEM, XRD.
| References: [+]
[1]Marc T. J. Johnson,Jason Munshi-South,, "Evolution of life in urban environments", Science. Vol. 358, no. 6363, 2017.
[2]Hélène Lowry, Alan Lill , Bob B. M. Wong,, "Behavioural responses of wildlife to urban environments", Biological reviews, Vol. 88, no.3, pp. 537-549, 2012.
[3]R. S. Ulrich, R. F. Simons, B. D. Losito, E. Fiorito, M. A. Miles, and M. Zelson, "Stress recovery during exposure to natural and urban environments", Journal of Environmental Psychology, Vol. 11, no. 3, pp. 201-230,1991.
[4]Chris Urmson, Joshua Anhalt, Drew Bagnell, Christopher Baker, Robert Bittner, M. N. Clark, John Dolan, Dave Duggins, Tugrul Galatali, Chris Geyer, Michele Gittleman, Sam Harbaugh, Martial Hebert, Thomas M. Howard,Sascha Kolski,"Autonomous driving in urban environments Boss and the urban challenge", Tracts in Advanced Robotics, Vol. 56,pp.1-59,2009.
[5]Luca Mora,Xinyi Wu and Anastasia Panoric, "Mind the gap: Developments in autonomous driving research and the sustainability challenge", J Clean Prod., vol.275, 2020.
[6]Paul Compton, Dimitri Devuyst, Luc Hens, Bhaskar Nath, "Urban environments", Environmental Management in Practice: Managing the Ecosystem, 2013.
[7]Mark A.Goddard,Andrew J, Dougill, Tim G.Benton, "Scaling up from gardens: biodiversity conservation in urban environments", Trends in Ecology & Evolution, Vol. 25, no.2, pp. 90-98, 2010.
[8]David Simon, "Urban Environments: Issues on the Peri-Urban Fringe", Annual Review of Environment and Resources, Vol. 33, pp.167-185 , 2008.
[9]P. W. Bateman and P. A. Fleming, "Big city life: Carnivores in urban environments", Journal of Zoology, Vol.287, pp.1-23,2012.
[10]AlainMuzet, "Environmental noise, sleep and health", Sleep Medicine Reviews, Vol .11, no.2, pp. 135-142, 2007.
[11]David A. Vasseur, Peter Yodzis, "The color of environmental noise", Ecology, Vol.85, no.4, pp. 1146-1152, 2004.
[12]S. Stansfeld, C. Clark, , "Environmental noise", Encyclopedia of Environmental Health, 2011.
[13]Thomas Münzel, Tommaso Gori, Wolfgang Babisch, Mathias Basner, "Cardiovascular effects of environmental noise exposure", European Heart Journal, Vol.35,no.13, pp.829–836,2014.
[14]European Aviation Environmental Report ,European Environmental Agency, 2016.
[15]Bryan C. Pijanowski, Luis J. Villanueva-Rivera, Sarah L. Dumyahn, Almo Farina, Bernie L. Krause, Brian M. Napoletano, Stuart H. Gage, Nadia Pieretti Author Notes, " Soundscape Ecology: The Science of Sound in the Landscape", BioScience, Vol.61, no.3, pp. 203–216,2011.
[16]Bryan C. Pijanowski, Almo Farina, Stuart H. Gage, Sarah L. Dumyahn , Bernie L. Krause , "What is soundscape ecology? An introduction and overview of an emerging new science", Landscape Ecology, vol 26, pp.1213–1232,2011.
[17]R. E. Happel and R. J. Happel, ‘Soundscape Ecology’, Reference Module in Earth Systems and Environmental Sciences, 2019.
[18]R. Murray Schafer, "The Soundscape: Our Sonic Environment and the Tuning of the World", Kindle Edition Destiny Books ,1993
[19]A. Weston, ‘The Soundscape: Our Sonic Environment and the Tuning of the World’, Environ. Ethics, vol.18 ,no.3,pp.331-333,1996.
[20]Ali Madanipour, "Roles and challenges of urban design", Journal of Urban Design, Vol.11, no.2, pp.173-193,2006.
[21]NorsidahUjang, KhalilahZakariya,, "The Notion of Place, Place Meaning and Identity in Urban Regeneration", Procedia - Social and Behavioral Sciences, Vol. 170, pp.709-717,2015.
[22]R. Pheasant, K. Horoshenkov, G. Watts, and B. Barrett, "The acoustic and visual factors influencing the construction of tranquil space in urban and rural environments tranquil spaces-quiet places?", The Journal of the Acoustical Society of America Vol. 123,no.3,pp.1446-57,2008.
[23]Patsy Healey, ‘Collaborative Planning in perspective", IEEE Speech, and Signal Processing Newsletter, Vol.2,no.2,pp.101-123 , 2003.
[24]E. Mack and H. Mayer, "The evolutionary dynamics of entrepreneurial ecosystems", Urban Studies, Vol. 53,no.10,2015.
[25]N. M. N. Mohammad, M. Saruwono, S. Y. Said, and W. A. H. W. Hariri, "A Sense of Place within the Landscape in Cultural Settings", Procedia - Social and Behavioral Sciences, Vol.105, no3,pp. 506-512,2013.
[26]Wei Yang, Jian Kang, "Soundscape and sound preferences in urban squares: A case study in Sheffield", Journal of Urban Design Vol.10,no.1 , pp. 61-80 ,2005.
[27]D. T. C. Cox, D. F. Shanahan, H. L. Hudson, R. A. Fuller, and K. J. Gaston, "The impact of urbanisation on nature dose and the implications for human health", Landscape and Urban Planning, Vol. 179, pp. 72-80, 2018.
[28]Seckin Basturk, Luigi Maffei, Massimiliano Masullo, "Introducing soundscape", AESOP 26th Annual Congress, 2012.
[29]M. Masullo, L. Maffei,, A. Pascale, "Effects of combination of water sounds and visual elements on the traffic noise mitigation in urban green parks", International Congress and Exposition on Noise Control Engineering: Towards a Quieter Future, 2016.
[30]A. L. Brown, A. Muhar, "An approach to the acoustic design of outdoor space" Journal of Environmental Planning and Management, Vol.47,no.6,2004.
[31]H. Booi and F. van den Berg, "Quiet areas and the need for quietness in Amsterdam", International Journal of Environmental Research and Public Health , Vol.9,no.4, pp.30-50,2012.
[32]R. J. Pheasant, G. R. Watts, K. V. Horoshenkov, "Validation of a Tranquillity Rating Prediction Tool", Acta Acustica united with Acustica, Vol.95,no.6,pp.1024-1031,2009.
[33]R. J. Pheasant, K. V. Horoshenkov, G. R. Watts, "Tranquillity rating prediction tool (TRAPT)", Acoustics Bulletin, Vol. 35, no.6, pp.18-24,2010.
[34]K. M. De Paiva Vianna, M. R. Alves Cardoso, R. M. C. Rodrigues, "Noise pollution and annoyance: An urban soundscapes study", Noise and Health , Vol.17, no.76, pp.125-133, 2015.
[35]L. T. Silva, ‘"Environmental quality health index for cities", Habitat International,Vol. 45, pp.29-35, 2015.
[36]WHO, "How air pollution is destroying our health", World Health Organization, 2018. .
[37]K. Wrightson, "An introduction to acoustic ecology", J. Electroacoust. Music, 1999.
[38]C. E. Anton ,C. Lawrence, "Home is where the heart is: The effect of place of residence on place attachment and community participation", Journal of Environmental Psychology, Vol.40,pp.451-461, 2014.
[39]P. D. Summers, G. M. Cunnington, L. Fahrig, "Are the negative effects of roads on breeding birds caused by traffic noise?", Journal of Applied Ecology , Vol.48, no.6, pp.1527 - 1534, 2011.
[40]R. A. Hood, "Calculation of Road Traffic Noise", Appl. Acoust., 1987.
[41]J. A. G. Jaeger et al., "Predicting when animal populations are at risk from roads: An interactive model of road avoidance behavior", Ecological Modelling , Vol.185,pp.329-348, 2005.
[42]G. L. Bluhm, N. Berglind, E. Nordling, M. Rosenlund, "Road traffic noise and hypertension", Environmental Research, Vol.133, pp. 380-387,2014.
[43]C. J. W. McClure, H. E. Ware, J. Carlisle, G. Kaltenecker,J. R. Barber, "An experimental investigation into the effects of traffic noise on distributions of birds: Avoiding the phantom road", Proceedings of the Royal Society B: Biological Sciences Vol.280,no.1773,2013.
[44]M. A. Bee and E. M. Swanson, "Auditory masking of anuran advertisement calls by road traffic noise", Animal Behaviour,Vol. 74,no. 6, pp.1765-1776, 2007.
[45]M. D. Fowler, "Soundscape as a design strategy for landscape architectural praxis", Design Studies, Vol.34, no.1, pp.111-128, 2013.
[46]W. J. Davies et al., "Perception of soundscapes: An interdisciplinary approach", Applied Acoustics, Vol. 74, no.2, pp. 224-231, 2013.
[47]M. Adams, T. Cox, G. Moore, B. Croxford, M. Refaee, S. Sharples, "Sustainable soundscapes: Noise policy and the urban experience", Urban Studies Vol.43, no.13, 2006.
[48]S. R. Payne, W. J. Davies, M. Adams, "Research into the practical and policy applications of soundscape concepts and techniques in urban areas (NANR 200)", 2009.
[49]N. S. Bruce, W. Davies, M. D. Adams, "Expectation as a factor in the perception of soundscapes", 8th European Conference on Noise Control (EURONOISE ), Vol.31, 2009.
[50]M. Adams, B. Davies, N. Bruce, "Soundscapes: An urban planning Process Map", 38th International Congress and Exposition on Noise Control Engineering ,2009.
[51]R. Cain et al., "SOUND-SCAPE: A framework for characterising positive urban soundscapes", Proceedings - European Conference on Noise Control, 2008.
[52]N. S. Bruce, W. J. Davies, M. D. Adams, "Development of a soundscape simulator tool", 38th International Congress and Exposition on Noise Control Engineering 2009,
[53]William J. Davies, Mags D. Adams, Neil Spencer Bruce, Rebecca Cain, Paul A. Jennings, Angus Carlyle, Peter Cusack, Ken I. Hume, Christopher J. Plack "A positive soundscape evaluation tool", 8th European Conference on Noise Control 2009,
[54]L. Goines ,L. Hagler, "Noise pollution: A modern plague", Southern Medical Journal, Vol.100 , no.3,pp.287-94,2007.
[55]H. Slabbekoorn, "Noise pollution", Current Biology, Vol.29,no.19,2019.
[56]S. A. Stansfeld, M. P. Matheson, "Noise pollution: Non-auditory effects on health", British Medical Bulletin, Vol.68, no.1, pp.243-57 , 2003.
[57]N. Maisonneuve, M. Stevens, M. E. Niessen, P. Hanappe, L. Steels, "Citizen Noise Pollution Monitoring",Proceedings of the 10th Annual International Conference on Digital Government Research: Social Networks: Making Connections between Citizens, Data and Government, pp.96–103,2009.
[58]C. D. Francis, C. P. Ortega, A. Cruz, ‘Noise Pollution Changes Avian Communities and Species Interactions’, Current Biology, Vol. 19, no.16, pp.1415-1419,2009.
[59]E. M. Simmonds, S. Dolman, L. Weilgart, "Oceans of noise Oceans of Noise", Journal of Ocean Technology , Vol.9,no.1,pp.71-90,2004.
[60]N. Singh and S. C. Davar, ‘Noise Pollution-Sources, Effects and Control’, Journal of human ecology, Vol. 16, no.3,pp.181-187,2004.
[61]E. Murphy and E. A. King, "Environmental Noise Pollution", Environmental Noise Pollution, 2014.
[62]P. E. K. Fiedler , P. H. T. Zannin, "Evaluation of noise pollution in urban traffic hubs-Noise maps and measurements", Environmental Impact Assessment Review, Vol. 51, pp.1-9,2015.
[63]M. S. Hammer, T. K. Swinburn, R. L. Neitzel, "Environmental noise pollution in the United States: Developing an effective public health response", Environmental Health Perspectives , Vol.122, no.2,2013.
[64]S. J. Dolman and M. Jasny, "Evolution of marine noise pollution management", Aquatic Mammals Journal,Vol. 41, no. 4, 2015.
[65]E. A. King, E. Murphy, A. McNabola, "Reducing pedestrian exposure to environmental pollutants: A combined noise exposure and air quality analysis approach", Transportation Research Part D: Transport and Environment, Vol. 14, no. 5, pp.309-316,2009.
[66]P. C. A. KAM, A. C. KAM, J. F. THOMPSON, "Noise pollution in the anaesthetic and intensive care environment", The Association of Anaesthetists of Gt Britain and Ireland , Vol. 49, pp. 982-986, 1994.
[67]D. Weinhold, "The happiness-reducing costs of noise pollution", Journal of Regional Science , Vol.53,no.2,2013.
[68]Simmonds, M. P., Dolman, S. J., Jasny, M., Parsons, E. C. M., Weilgart, L., Wright, A. J., Leaper, R , "Marine noise pollution - increasing recognition but need for more practical action", Journal of Ocean Technology, Vol, 9, no.1, pp.71-90,2014.
[69]F. Aletta and J. Kang, "Soundscape approach integrating noise mapping techniques: A case study in Brighton, UK", Noise Mapping , Vol.2,no.2,pp.1-12, 2015.
[70]J. Salamon, C. Jacoby, J. P. Bello, "A dataset and taxonomy for urban sound research", 22nd ACM International Conference on MultimediaAt: Orlando, 2014.
[71]K. J. Piczak, "Environmental sound classification with convolutional neural networks", IEEE International Workshop on Machine Learning for Signal Processing, 2015.
[72]J. Salamon ,J. P. Bello, "Unsupervised feature learning for urban sound classification", IEEE International Conference on Acoustics, Speech and Signal Processing , 2015.
[73]J. Y. Jeon ,J. Y. Hong, "Classification of urban park soundscapes through perceptions of the acoustical environments", Landscape and Urban Planning, 2015.
[74]J. Ye, T. Kobayashi, M. Murakawa, "Urban sound event classification based on local and global features aggregation", Applied Acoustics, Vol. 117, pp.246-256, 2017.
[75]KangSuna, BertDe Coensel, KarloFilipan, FrancescoAletta , "Classification of soundscapes of urban public open spaces", Landscape and Urban Planning, Vol.189, pp.139-155,2019.
[76]L. Marchegiani , I. Posner, "Leveraging the urban soundscape: Auditory perception for smart vehicles", IEEE International Conference on Robotics and Automation, 2017.
[77]A. J. Torija, D. P. Ruiz, Á. F. Ramos-Ridao, "A tool for urban soundscape evaluation applying Support Vector Machines for developing a soundscape classification model", Science of The Total Environment, Vol. 482, pp.440-451,2014.
[78]T. Wissmann, Geographies of urban sound. 2014.
[79]K. Wang, "The Aesthetic Principles of Soundscape in Architectural Design and Built Environment", Architecture, 2004.
[80]BS ISO 12913-1:2014 , Acoustics — Soundscape Part 1: Definition and conceptual framework. 2014.
[81]J. Kang et al., "Ten questions on the soundscapes of the built environment", Building and Environment, Vol. 108, pp. 284-294,2016.
[82]R. F. Rupp, N. G. Vásquez, R. Lamberts, "A review of human thermal comfort in the built environment", Energy and Buildings, Vol, 105,pp. 178-205,2015.
[83]J. Zhang, B. C. Seet, T. T. Lie, "Building information modelling for smart built environments", Buildings , Vol,5,no.1,pp.100-115, 2015.
[84]F. Aletta , A. Astolfi, "Soundscapes of buildings and built environments", Building Acoustics Vol.25, no.3,pp.195-197,2018.
[85]N. Hirst, "Buildings and climate change", Design and Management of Sustainable Built Environments, 2013.
[86]A. Heydarian, J. P. Carneiro, D. Gerber, B. Becerik-Gerber, T. Hayes, W. Wood, "Immersive virtual environments versus physical built environments: A benchmarking study for building design and user-built environment explorations", Automation in Construction,Vol.54, pp.116-126, 2015.
[87]R. Cain, P. Jennings, J. Poxon, "The development and application of the emotional dimensions of a soundscape", Applied Acoustics, Vol.74, pp. 232-239,2013.
[88]H. Rashidi, A. Ghaffarianhoseini, A. Ghaffarianhoseini, N. M. Nik Sulaiman, J. Tookey, N. A. Hashim, "Application of wastewater treatment in sustainable design of green built environments: A review", Renewable and Sustainable Energy Reviews, Vol. 49, pp. 845-856, 2015.
[89]A. L. Brown, T. Gjestland, D. Dubois, ‘Acoustic environments and soundscapes’, in Soundscape and the Built Environment, 2016.
[90]M. Raubal , M. J. Egenhofer, "Comparing the complexity of wayfinding tasks in built environments", Environment and Planning B: Planning and Design, Vol .25, no. 6, pp.895-913,1998.
[91]T. C. Mullet, J. M. Morton, S. H. Gage, F. Huettmann, "Acoustic Footprint of Snowmobile Noise and Natural Quiet Refugia in an Alaskan Wilderness", Natural Areas J, Vol. 40, no.3, 2020.
[92]S. E. Reed, J. L. Boggs, J. P. Mann, "SPreAD-GIS: an ArcGIS toolbox for modeling the propagation of engine noise in a wildland setting", Wilderness Soc., 2010.
[93]B. Schulte-Fortkamp , A. Fiebig, ‘Soundscape analysis in a residential area: An evaluation of noise and people’s mind’, Acta Acustica united with Acustica Vol.92,no.6,pp.875-880, 2006.
[94]B. Berglund , M. E. Nilsson, "On a tool for measuring soundscape quality in urban residential areas", Acta Acustica united with Acustica , Vol. 92, no.6, pp.938-944, 2006.
[95]L. M. Kuehne, B. L. Padgham, J. D. Olden, "The Soundscapes of Lakes across an Urbanization Gradient", PLoS One, 2013.
[96]B. De Coensel , D. Botteldooren, "The rhythm of the urban soundscape", Noise & Vibration Worldwide Vol.38,no.9,pp.11-17, 2007.
[97]R. Klæboe, "Are adverse impacts of neighbourhood noisy areas the flip side of quiet area benefits?", Applied Acoustics , Vol.68, no.5, pp.557-575,2007.
[98]S. Kim, J. Y. Hong, J. Y. Jeon, "Landscape factors affecting soundscape in urban environments", 22nd International Congress on Sound and Vibration, ICSV 2015.
[99]K. Vogiatzis , N. Remy, "From environmental noise abatement to soundscape creation through strategic noise mapping in medium urban agglomerations in South Europe", Science of The Total Environment,Vol.482,pp.420-431,2014.
[100]J. Y. Hong, J. Y. Jeon, "Assessing the relationships between soundscape and landscape in urban environment",44th International Congress and Exposition on Noise Control Engineering, 2015.
[101]Y. Hao, J. Kang, J. D. Krijnders, "Integrated effects of urban morphology on birdsong loudness and visibility of green areas", Landscape and Urban Planning, Vol.137, pp. 149-16, 2015.
[102]L. Yu, J. Kang, L. Hong, C. Xie, "Soundscape identification in noise annoyance evaluation", 43rd International Congress on Noise Control Engineering: Improving the World Through Noise Control, 2014.
[103]A. Liu, X. L. Wang, F. Liu, C. Yao, Z. Deng, "Soundscape and its influence on tourist satisfaction", Service Industries Journal Vol.38, no.3, pp.1-18,2017.
[104]J. Jiang, J. Zhang, H. Zhang, B. Yan, "Natural soundscapes and tourist loyalty to nature-based tourism destinations: the mediating effect of tourist satisfaction", Journal of Travel & Tourism Marketing, 2017.
[105]M. F. Sukiman, S. I. Omar, M. Muhibudin, I. Yussof, B. Mohamed, "Tourist Satisfaction as the Key to Destination Survival in Pahang", Procedia - Soc. Behav. Sci, 2013.
[106]J. Huh, M. Uysal, K. McCleary, "Cultural/heritage destinations: Tourist satisfaction and market segmentation", Journal of Hospitality & Leisure Marketing, Vol.14, no.3,pp.81-99, 2006.
[107]F. Aletta, G. Brambilla, L. Maffei, M. Masullo, "Urban Soundscapes: Characterization of a Pedestrian Tourist Route in Sorrento (Italy)", Urban Science Vol.1, no.1,2017.
[108]E. Sadeh, F. Asgari, L. Mousavi, S. Sadeh, "Factors Affecting Tourist Satisfaction and Its Consequences", Journal of Basic and Applied Scientific Researc, Vol.2, no.2, 1557-1560, 2012.
[109]H. Kong, S. Wang, X. Fu, "Meeting career expectation: Can it enhance job satisfaction of generation Y?", International Journal of Contemporary Hospitality Management , Vol.27, no.1, pp.147-168,2015.
[110]N. Khasimah Aliman, S. Mohamed Hashim, S. Dalela Mohd Wahid, S. Harudin, "The Effects Of Destination Image On Trip Behavior: Evidences From Langkawi Island Malaysia",European Journal of Business and Social Sciences, Vol. 3, no.3 , pp 279-291, 2014.
[111]D. Chao, T. Kanno, K. Furuta, "Experimental study on tourist satisfaction using participatory simulation in a virtual environment", SpringerPlus ,Vol.2,no.1,pp.552, 2013.
[112]Z. Mingfang, "Examining the Structural Relationships of Tourist Characteristics and Destination Satisfaction", E-business, Manag. Econ. IPEDR, 2011.
[113]M. S. Sapari, A. Shuib, S. Ramachandran, S. Herman, "Analysis of Tourist Satisfaction Models", 1st Annu. PSU Phuket Int. Conf. 2012.
[114]A. Aksu, T. İçigen, R. Ehtiyar, "A comparison of tourist expectations and satisfaction: A case study from Antalya region of Turkey", Turizam, Vol.14, no.2, pp.66-77, 2010.
[115]Somaskanthan Maruthaiah, Rosmalina Abdul Rashid, "A Review of Visitors Satisfaction and Perception of Crowding", International Conference on Business, Sociology and Applied Sciences, 2014.
[116]M. Qiu, J. Zhang, H. Zhang, C. Zheng, "Is looking always more important than listening in tourist experience?", Journal of Travel & Tourism Marketing, Vol. 35,no.1,pp.1-13,2018.
[117]M. Mansouri , N. Ujang, "Tourist’ expectation and satisfaction towards pedestrian networks in the historical district of Kuala Lumpur, Malaysia", Asian geographer,2016.
[118]S. Ye, J. S. Wu, C. J. Zheng, "Are tourists with higher expectation more sensitive to service performance? Evidence from urban tourism", Journal of Destination Marketing & Management, Vol. 12, pp. 64-73, 2019.
[119]J. Jusoh, N. F. A. Hamid, N. U. M. Najib, "The expectation and satisfaction of the first time and return tourists toward the heritage attractions in Melaka", Pertanika Journal of Social Science and Humanities. Vol.23, no.1,pp. 195-208,2015.
[120]Y. Chen, H. Zhang, L. Qiu, "A review on tourist satisfaction of tourism destinations", 2nd International Conference on Logistics, Informatics and Service Science, 2013.
[121]Shida Irwana Omar, Diana Mohamad, Saliza Rozelee, Badaruddin Mohamed, " Holiday satisfaction in Penang, Malaysia: A quantitative perspective analysis of international and domestic tourists", Vol 11, no 7, 2015.
[122]L. Maffei, V. P. Romero, G. Brambilla, M. Di Gabriele, V. Gallo, " Characterization of the soundscape of urban waterfronts", Proceedings of Forum Acusticum, 2014.
[123]G. Pérez-Martínez, A. J. Torija, D. P. Ruiz, "Soundscape assessment of a monumental place: A methodology based on the perception of dominant sounds", Landscape and Urban Planning, Vol.169, pp.12-21,2018.
[124]P. N. Dökmeci ,J. Kang, "A comparative case study of indoor soundscape approach on objective analyses and subjective evaluations of libraries", Proc. Acoust. 2012.
[125]W. Thompson, L. N. McDonnell, L. Nordlinger, "World Soundscape Project", Music in the Social and Behavioral Sciences: An Encyclopedia, 2014.
[126]B. Truax, "Soundscape Composition as Global Music: Electroacoustic music as soundscape", Organised Sound, vol. 13, no.2, pp.103 - 109,2008.
[127]B. Truax, "Soundscape, Acoustic Communication and Environmental Sound Composition", journal Contemporary Music Review, Vol.15, no. 1,pp. 49-65,1996.
[128]jian Kang, Brigitte Schulte-Fortkamp," Soundscape and the built environment", CRC Press, pp. 124 ,2017.
[129]H. Westerkamp, "Soundscape Newsl", The World Soundscape Project, 1991.
| Download File
Methods that Enable the Effective Condition Monitoring of PV Modules
1Arthur James Swart and 2Pierre Eduard Hertzog
1,2Central University of Technology, South Africa.
Pages: 7312–7323
Abstract: [+]
Condition monitoring involves collecting real-time data that can be transformed into meaningful graphs from which informed decisions can be made with regard to the maintenance, performance and sustainability of a system. An example of such a system is a PV system that should operate continuously over a specified period of time within a given environment despite ever-changing environmental conditions. Monitoring the real-time performance of such a PV system, and especially its PV modules, is vital to ensure its sustainability. The purpose of this article is to highlight four key methods that may be used to enable condition monitoring of PV modules in order to enable system sustainability. Empirical results obtained from an experimental setup are used to illustrate each method, where key anomalies are identified that may lead to premature PV module degradation. These methods include power and temperature measurements along with thermographic and visual images. An interpretation of the graphs associated with these methods is also given in the paper. A key recommendation is to make use of a number of condition monitoring methods to improve the decision making process regarding the maintenance and enhancement of PV systems.
Keywords:  Arduino, thermography, webcam, energy monitoring, PV system
| References: [+]
[1]Brainy Quote. Homepage. Available online: http://www.brainyquote.com/quotes/.
[2]A. Muriel, M. Prokle, and R. Tomastik, "Life-cycle engine fleet simulation for spare part inventory management with advanced condition information", Winter Simulation Conference (WSC), pp. 2309-2320, 2018.
[3]D. Cuciureanu, C. Nituca, G. Chiriac, and D. Sticea, "Analysis of the photovoltaic panels currently in use in different locations", International Conference on Electrical and Power Engineering (EPE), pp. 888-893, 2016.
[4]A. J. Swart, "Cost effective remote energy monitoring using the ESP8266 NodeMCU," International Journal of Recent Technology and Engineering, Vol. 7, no 6s, pp. 974-979, 2019.
[5]A. Poissant, "Optimal replacement strategy for residential solar panels using monte carlo simulations and nonlinear optimization methods," ISR Technical Report, University of Maryland,2017.
[6]A. J. Swart and P. E. Hertzog, "Varying percentages of full uniform shading of a PV module in a controlled environment yields linear power reduction," Journal of Energy in Southern Africa, Vol. 27, no 3, pp. 28-38, 2016.
[7]A. J. Swart and P. E. Hertzog, "Evaluating the Performance of Small-Scale PV Modules in a Semi-Arid Area to Identify any Anomalies," Indian Journal of Science and Technology, Vol. 12, no 28, 2019.
[8]P. E. Hertzog and A. J. Swart, "Pigeon Presence on PV Modules ARE Largely Random Events," International Journal of Innovative Technology and Exploring Engineering, Vol. 8, no 9S2, pp. 524-529, 2019.
[9]S. Dubey, J. N. Sarvaiya, and B. Seshadri, "Temperature dependent photovoltaic (PV) efficiency and its effect on PV production in the world–a review," Energy Procedia, Vol. 33, pp. 311-321, 2013.
[10]J. E. d. L. Barbosa, E. S. F. Medeiros, J. Brasil, R. d. S. Cordeiro, M. C. B. Crispim, and G. H. G. d. Silva, "Aquatic systems in semi-arid Brazil: limnology and management," Acta Limnologica Brasiliensia, Vol. 24, no 1, pp. 103-118, 2012.
[11]S. R. Wenham, M. A. Green, M. E. Watt, and R. Corkish, "Applied photovoltaics", 2nd ed. Cornwall: TJ International Ltd, 2007.
[12]K. A. Kim, P. T. Krein, G.-S. Seo, and B.-H. Cho, "Photovoltaic AC parameter characterization for dynamic partial shading and hot spot detection", 2013 Twenty-Eighth Annual Applied Power Electronics Conference and Exposition (APEC), pp. 109-115, 2013.
[13]K. A. Kim and P. T. Krein, "Hot spotting and second breakdown effects on reverse IV characteristics for mono-crystalline Si photovoltaics", Energy Conversion Congress and Exposition (ECCE), pp. 1007-1014, 2013.
[14]A. J. Swart, "An Analysis of Master Dissertations: A Case Study of Central University of Technology, South Africa," African Journal of Library, Archives and Information Sciences, Vol. 28, no 2, pp. 211-223, 2018.
[15]L. Mi, C. Li, P. Du, J. Zhu, X. Yuan, and Z. Li, "Construction and Application of an Automatic Document Generation Model", 26th International Conference on Geoinformatics, 2018.
[16]J. C. Brand, M. J. Rossi, M. T. Provencher, and J. H. Lubowitz, "Pearls of publishing: Advice for increasing your acceptance odds," The Journal of Arthroscopic & Related Surgery, Vol. 32, no 7, pp. 1223-1224, 2016.
[17]A. Barnard and M. F. Smith, "The effect of rainfall and temperature on the preharvest sprouting tolerance of winter wheat in the dryland production areas of the Free State Province," Field Crops Research, Vol. 112, no 2-3, pp. 158-164, 2009.
[18]S. K. Mulaudzi, M. Muchie, and R. Makhado, "Investigation of the solar energy production and contribution in South Africa: research note," African Journal of Science, Technology, Innovation and Development, Vol. 4, no 4, pp. 233-254, 2012.
[19]A. J. Swart and P. E. Hertzog, "LED’s as viable power loads for experimental purposes relating to PV modules in pico-solar systems", ICETAS , 2017.
[20]A. J. Swart and P. E. Hertzog, "Validating the acceptance zone for PV modules using a simplified measuring approach", ECTI-CON, 13th International Conference on Electrical Engineering, Electronics, Computer and Information Technology, 2016.
[21]P. E. Hertzog and A. J. Swart, "Validating the optimum tilt angle for PV modules in the central region of South Africa for the winter season", 13th International Conference on Electrical Engineering, Electronics, Computer and Information Technology, 2016.
[22]A. J. Swart, "Quantifying the impact of a pigeon dropping on the output power of a 10 W PV module," International Journal of Electrical and Electronic Engineering and Telecommunications, 2020.
| Download File
Analysis of Land Use/Land Cover Change Impacts around Hadadi Lake, Haridra Catchment, Davangere, Karnataka
1S.L.Arun Kumar, 2L.Darshan, 3K.R.Priya,4B.Rachitha,5V.I.Siddappa
1Associate professor GM Institute of Technology, Davanagere, India.
2,3,4,5Department of Civil Engineering, GM Institute of technology, Davanagere, India.
Pages: 7324–7342
Abstract: [+]
Land use Land cover changes were Analyzed and mapped in and around Hadadi lake, Davangere district. Changes that took place between the years 1970 to 2010 were identified and detected by using suitable techniques. Significant tools used to detect changes over the period were RS and GIS tools. Topographic map 48N/15 is obtained from the survey of India, Bengaluru. This topographic map is converted to digital mode. Latitude and longitude of the study area are compared with the digitalized topo sheet using Arc GIS software. Thematic maps were generated and updated using satellite imagery of RS data (IRS 1C LISS-III and LANDSAT ESM+). The overlay analysis carried out helps us to know the land use pattern for 40 years. The five main LU/LC (Land Use/ Land Cover) categories identified through the images of the study area are listed below. The results depicted that there is an increase in the Built-up land and wastelands by 2.94% (12.89 Km2) and 0.53% (2.33Km2) respectively. Agricultural and Forest lands have been decreased by 4.14% (18.17 Km2) and 0.78% (3.48 Km2) respectively. Water bodies in the study area have been increased by an amount of 0.93% (4.04 Km2).
Keywords: Toposheet, Georeferencing, Thematic Maps, Hadadi watershed, Haridra basin.
| References: [+]
[1]B. S. Bisht and B P Kothyari, “Land cover changes Analysis of garur Ganga Watershed Using GIS/RS Technique”, Journal of Indian Society of Remote Sensing, Vol. 29,no.3, pp.165-174, 2001.
[2]Roy, D.P. “Remote sensing for Sustainable Development”, Indian Society of Remote Sensing, Vol. 19, pp. 217-235, 2002.
[3]M.K Jat, P K Garg, D Khare, “Monitoring and modeling of urban sprawl using remote sensing and GIS techniques”, International Journal Of Applied Earth Observation And Geoinformation, Vol.10, no.1, pp. 26-46, 2018.
[4]C A Berlanga-Robels and A. Ruiz-Luna, “Land use mapping and change detection in the coastal zone of northwest Mexico, using Remote sensing techniques,” Journal of coastal research, Vol.18, no.3, pp.514-522, 2002.
[5]Prakasam C, “Land use and land cover change detection through a remote sensing approach: A case study of Kodaikanal Taluk, Tamilnadu”, International journal of geomatics and geosciences ,Vol.1, pp. 150-158, 2010.
[6]Belay T, “Land use/land cover changes in the Derekolli catchment of south Welo zone of Amhara region, Ethiopia”, Michigan State University Press ,Vol.18, pp.1-20, 2002.
[7]Mercy C Cheruto, Matheaus K Kauti, “Assessment of Land Use and Land Cover Change using GIS and Remote sensing Techniques: A case study of Makueni county, Kenya”, Journal of Remote sensing and GIS, Vol.5,no.4, pp. 2469-4134,2016.
[8]Jyotishman Deka, Om Prakash Tripathi, “Study of Land Use/ Land cover Change Dynamics through remote sensing and GIS- A case study of Kamrup District, North East India”, Journal of Remote Sensing and GIS, pp.56-62, 2014.
[9]Freeze, R A., Massmann J., Smith, L., Sperling, T, and James, B, “Hydrogeological decision analysis:1. A framework”,Ground Water, Vol.28, pp. 738-766, 1990.
[10]Fazal S, “urban expansion and agricultural land a GIS-based study of Saharanpura City, India”, environment urbanization, Vol.12, pp. 133-149, 2000.
[11]G. Veeraswamy, A. Nagaraju, “Land use and Land cover analysis using remote sensing and GIS: A case study in Gudur area, Nellore District, Andhra Pradesh, India”, International Journal of research, Vol.4. no.17. 2017.
[12]Arun Kumar S L, Harsha G S, “Land use and Land cover in and around Deverabelekere Reservoir using remote sensing and GIS”, Octa Journal of Environmental Research, Vol.6,4, pp.153-159. 2018.
[13]Sabzar Ahmad Kuchay,T V Ramachandra “Land Use Land Cover Change Analysis Of Uttara Kannada”, "Imperial Journal of Interdisciplinary Research (IJIR), vol.2, no.4,2016
| Download File
« 1 2 3 »
  • Home
  • Editorial Board
  • Online Submission
  • Publication Ethics
  • Contact