Kumbi Mugwindiri Rabson Mudzimiri, Special Musoni,
THE EFFECT OF PLANT AVAILABILITY ON LIFE CYCLE PERFORMANCE OF COAL FIRED POWER STATIONS
Kumbi Mugwindiri Rabson Mudzimiri, Special Musoni,
This paper seeks to identify production and maintenance problems that are related to key availability factors such as times to failure (reliability), repair times (maintainability) and waiting times (maintenance support) and use them as a yardstick for adjudging the efficacy of Availability Centred Maintenance, (ACM) using the Pareto analysis for the significant failures. It also explores the possibility of import substitution, and spare part interchangeability and the implementation of internationally recognised standards such as, ISO 9000, ISO 14 000, use of Pareto analysis to establish the unavailability and downtime cost significance regime. The research then recommends the possible use of FMECA to those statistically or maintenance significant (ABC) items. The paper further recommends the implementation of softer aspects of maintenance management such as performance based contracts, benchmarking and identification of training needs. Keywords:Availability Cenred Maintanance, Availability, Pareto Analysis, ISO
Finding similar regions from two strings or nucleotides or protein sequences is very much desirable for determining the functional similarity between them. In the ground of bioinformatics, for determining analogous constituency between two sequences, sequence-alignment can be used, which is the way of arranging sequences. This can also be helpful for non-biological field such as natural language processing or financial data. Finding out the larger sequence from the dissimilar sequences those are suspected to contain regions of similarity motifs within their long sequence context, local-alignment (maximum length exact matching) is very useful which mostly works on identifying the best pair of regions. In this research work an innovative method is proposed for searching bio-sequences/genesequences for the local alignment. This paper also provides an evaluation of the proposed algorithm and turns a black and white comparison with one of the popular existing methods and a modified version of the existing method. The evaluation result shows that the existing method is very time and space/memory consuming where the promising approach of projected technique is to seek out the identical sequences by taking less computational time and using less memory space. Therefore, we have faith that the new era of searching similar region from sequences is going to be raised for this proposed innovative method.
Speed Control of Permanent Magnet Brushless DC Motor Using Fuzzy Logic Controller-Hardware Implementation
Ashish A. Zanjade, J.W.Bakal, Ajit J. More
BLDC motors are very popular and are replacing brush motors in numerous applications. Because the BLDC motor does not require commutator and due to its superior electrical and mechanical characteristics and its capability to operate in hazardous conditions it is more reliable than the DC motor. Traditionally, three-phase inverters are generally used to control these motors, requiring a rotor position sensor for starting and for providing the proper commutation sequence to stator windings. The disadvantages of sensored motor control system are increased cost and size of the motor, and need special mechanical arrangement for mounting the sensors. Another problem associated with BLDC motor control is the use of Conventional controllers; these controllers poses difficulties under the conditions of nonlinearity, load disturbances and parametric variations. This paper presents the design and implementation of a fuzzy logic controller for the sensorless speed control of brushless dc motors which will be helpful in solving problems associated with sensored control and conventional controllers in order to reduce cost and complexity of the drive system without compromising the performance
M. K. Bhaskar, S. S. Mehta N. S. Lingayat, Guneet Singh Mehta,
PNN Based Detection of QRS-complexes in Electrocardiogram using Entropy
M. K. Bhaskar, S. S. Mehta N. S. Lingayat, Guneet Singh Mehta,
This paper deals with the PNN based detection of QRS-complexes in Electrocardiogram (ECG) using entropy criteria. Recorded Raw ECG signal consist of baseline wander and power line interference. This is known as noise and that can be separated by using digital filtering techniques and this signal is known as filtered signal of ECG. In this entropy criteria is used generate the feature signal and this feature signal is applied to pattern classifier. The QRS-complexes are detected using Probabilistic Neural Networks as pattern classifier. The proposed algorithm is implemented using MATLAB. The performance evaluation of the algorithm is validated using each lead of the 12- lead simultaneously recorded ECGs from the dataset-3 of the CSE multi-lead measurement library. The detection rate of QRS-complexes is 99.34% by using proposed algorithm. The percentage of false negative is 0.66% and false positive is 0.83%. The results obtained by the proposed algorithm in terms of performance, based on the detection rate of QRS-detection that is compared with the other methods as reported in the literature. The algorithm that is proposed in this paper, demonstrate the strength for the QRS-detection field.
Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multi tiered design wherein the web server runs the application front-end logic and data are outsourced to a database or file server. Presenting Double Guard, an Intrusion Detection System that models the network behavior of user sessions across both the front-end web server and the back-end database. By monitoring both web and subsequent database requests, it is possible to ferret out attacks that independent IDS would not be able to identify.
Multi-Input– Multi-Output Network Systems in DERS using Self-Tuning Proportional Integrative plus Derivative (SPID) Controller
Shapna Rani E, Karthick.R Karthick.R
With the ever-increasing wireless/wired data applications recently, considerable efforts have focused on the design of distributed explicit rate flow control schemes for multi-input multi- output service. This paper describes two novels wireless/wired multipoint-to-multipoint multicast flow control schemes, which are based on the distributed self-tuning proportional integrative plus derivative (SPID) controller and distributed self-tuning proportional plus integrative (SPI) controller, respectively. The control parameters can be designed to ensure the stability of the control loop in terms of source rate. The distributed explicit rate SPID and SPI controllers are located at the wireless/wired multipoint to- multipoint multicast source to regulate the transmission rate. We further analyze the theoretical aspects of the proposed algorithm, and show how the control mechanism can be used to design a controller to support wireless/wired multipoint-tomultipoint multicast transmissions. Simulation results demonstrate the efficiency of the proposed scheme in terms of system stability, fast response, low packet loss, and high scalability, and the results also show SPID scheme has better performance than SPI scheme, however, SPID scheme requires more computing time and CPU resource.
Soma Sekhar Srinivas V.Kc Suresh Babu C Purusotham S Sundara Murthy M
NETWORK OF P- PATH MINIMUM CONSTRAINED CONNECTIVITY FROM CITIES TO HEAD QUARTER
Soma Sekhar Srinivas V.Kc Suresh Babu C Purusotham S Sundara Murthy M
Many Combinatorial programming problems are NP-hard (Non Linear Polynomial), and we consider one of them called Ppath minimum distance connectivity from head quarter to the cities. Let there be n cities and the distance matrix D (i, j, k) is given from ith city to jth city using kth facility. There can be an individual factor which influences the distances/cost and that factor is represented as a facility k. We consider m
Dept. of Mathematics, S. V. University, Tirupati, Andhra Pradesh, India
Muawia Mohamed , Ahmed Mahmoud,
This paper aims to describe a method of designing a state vector to place the poles of the characteristic equation of the closed loop of the speed transfer function of the DC motor. The method uses the open loop of the speed transfer function or its controllable canonical form to compare it with the desired closed loop transfer function. The desired characteristic equation of the closed loop is specified by a desired damping ratio and natural frequency.
OPINION AND TOPIC DETECTION USING SENTIMENT CLASSIFIER
Rajendran Rahul, K.Kishore kumar , S.Selvakumar,
Sentiment analysis and opinion mining is the field of study that analyzes people's opinions, sentiments, evaluations, attitudes, and emotions from written language. The growing importance of sentiment analysis coincides with the growth of social media such as reviews, forum discussions, blogs, micro-blogs, Twitter, and social networks. Sentiment analysis systems are being applied in almost every business and social domain because opinions are central to almost all human activities. This paper proposes a novel probabilistic modeling framework called joint sentiment-topic (JST).JST model based on latent Dirichlet allocation (LDA), supervised approaches to sentiment classification which often fail to produce satisfactory performance when shifting to other domains. The weakly-supervised nature of JST makes it highly portable to other domains. This is verified by the experimental results on datasets from five different domains. We hypothesize that the JST model can readily meet the demand of large-scale sentiment analysis from the web
Impact of Information Technology on Library Space Requirements
Mohan Lal Vishwakarma, Shivani Govil
This brief research paper was undertaken to determine whether the digitization of information (and other new technological processes) will provide any future space savings for the undergraduate academic library. While the author found evidence that the rate of growth for shelving space in some areas such as reference and periodicals may decline, he found just as much evidence that technology itself is increasing space requirements for the modern library. A concluding table summarizes the probable impact of technology on future space needs for the various major library functions; it shows no clear evidence that technology will help ameliorate such increased needs.
A library's collection development is a continuous process and responds to the needs and goals of its users. It includes not just the policy of collection development itself but also the procedures of selection, acquisition and evaluation. With the use of the Internet and the advent of the virtual library, the new direction in collection development has become a number one issue. This article considers future directions for collection development from four standpoints: changes under the virtual library environment; the means of acquisition; related problems; and future directions.
Reliability Analysis of Failure Mode Screening Using Fuzzy Set Theory
Neeraj Lata, Gourav Agarwal,
In reliability analysis of a system using classical set theoretic approach or some statistical methods, we require exact knowledge about the functioning of the system. But in most of the cases, it is not possible to acquire the information to a high degree of exactness. This brings the importance of fuzzy set theory in reliability analysis. In this paper we shall study the failure mode screening methodology based upon fuzzy set theory.
Detection Of Routing Misbehavior In Manet By Enhanced 2ack Scheme Using Dsr Protocol
Mrs.K.Gomathy, Mr.P.Dineshkumar,
This paper focuses on routing misbehavior in MANET and method for detection of links which causes misbehavior. In MANET all the interested nodes to participate in routing should be fully co operative. But some nodes refuse to share the resources but get benefits for other nodes. Due to the node mobility, open structure and dynamic topology changes performance of network gets affected. The 2ACK scheme is used to detect such behavior by sending acknowledgement through opposite direction of the routing path. The proposed enhanced scheme using DSR protocol reduces the overhead of acknowledgement by 2ACK scheme
From the most beginning two main fundamental technologies are necessary for the evaluation & existence of VoIP i.e. telephone most widely used as first & second is the internet. In 1870sAlexander Gram Bell and Elisha Gray invented the telephone. The Internet is first developed by ARPANET (Advanced Research Projects Agency Network) in 1967, founded by the U.S. Department of Defense in 1957. As ARPANET provide a decentralized communications network would not be interrupted by a potential global war. VoIP stand for Voice over Internet Protocol is a part of internet technologies. It is a communication Protocol that has transmission technologies for delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other technology that is synonym of VoIP i.e. IP telephony, voice over broadband (VoBB), Internet telephony, broadband phone and broadband telephony. VoIP has been progressively more popular in recent times because of its affordability, how-ever; poor reliability and voice quality remain significant factors that limit the extensive adoption of VoIP systems. Good voice quality is a vital factor for users transiting from the Public Switched Telephone Network (PSTN) to VoIP networks. It has been seen that line delay is one of the vital factors that depreciate voice quality in VoIP systems. Numerous non-real-time algorithms have been developed to estimate different aspects of voice quality in VoIP systems. In fact there is no real-time algorithm that estimates the delay content of a VoIP discussion, which could enable to take some curative actions to improve the quality while the call is in progress. In this paper, I propose a real-time fuzzy algorithm to estimate the VoIP call Quality in VoIP networks. The results obtained that shows the algorithm is able to track and estimate VoIP System performance in real-time. This algorithm could be embedding in VoIP systems to allow operators monitors calls in real-time.
Ushie James Ogri, Donatus Enang Bassey Okwong, Akaiso Etim,
DESIGN AND CONSTRUCTION OF DOOR LOCKING SECURITY SYSTEM USING GSM
Ushie James Ogri, Donatus Enang Bassey Okwong, Akaiso Etim,
This project presents a prototype security door that can be remotely controlled by a GSM phone set acting as the transmitter and another GSM phone set with a dual tone multi-frequency (DTMF) connected to the door motor through a DTMF decoder interfaced with microcontroller unit and a stepper motor .The design is composed of four main functional modules, namely; the GSM module, the decoding module, controlling module and the switching module. The GSM module act as both transmitting and receiving unit employs the use of a mobile phone set serving as the communication device between the user at one end and the object of access (i.e. the door) at the other receiving end. The decoding module and the controlling module are made possible using modern integrated circuit chips ensuring proper conversion of signal to binary codes, enabling the microcontroller to communicate properly with the switching device responsible for opening and closing the door. The codes for this project was written in assembly language with Visual basic software and compiled with M-IDE studio for MC-51compiler which work perfectly with Window XP environment, the program run without error before it was burn onto the microcontroller using a device called the programmer by placing the microcontroller on it socket equal to the pin number
Design and VLSI Implementation of HighPerformance Face-Detection Engine using MCT
P.Mani Mohan, M. Janardhan Raju,
In this paper, we proposes a work of fiction hardware architecture of face-detection engine for mobile applications. We used MCT(Modified Census Transform) and Adaboost learning technique as basic algorithms of face-detection authenthication in mobile applications. We have designed, implemented and verified the hardware architecture of face-detection engine for high-performance face detection and real-time processing. The face-detection chip is developed by verifying and implementing through FPGA. The developed ASIC chip has advantage in real-time processing, low power consumption, high performance and low cost which can be used as an authentication for the mobile applications. So we expect this chip can be easily used in mobile applications.
A Trusted-Group Criteria for Performing Trust Aware Routing in Mobile Networks
Beenu Shokeen Rashmi
Security is a significant issue in Wireless Mobile Networks. Intrusion of malicious nodes may cause serious impairment to the security. MANET often suffer from security attacks because of its features like open medium, changing its topology dynamically, lack of central monitoring and management, cooperative algorithms and no clear defense mechanism. A Mobile network is one of the most widely open network in which any intruder or the selfish node can easily perform an attack and affect the communication reliability. The presented work is about to define an effective and trustful communication approach over the network. . In this approach, a group management approach is defined. Each group will be managed by the base station itself. The group authentication will be done based on Diffie-Hellman algorithm
OPTIMIZED BROADBAND WILKINSON BALUN - DESIGN AND ANALYSIS USING METAMATERIAL
Reetu Sharma, Suman Kaur, Sumit kumar Jha,
The design presented here mainly focuses on implementation of a broadband Wilkinson balun using composite right/left-handed (CRLH) transmission line. This has its components, namely Wilkinson power divider (WPD), microstrip phase shift line and CRLH unit cell along with interdigital capacitor, which forms base of the unit cell. The designing and implementation of WPD, CRLH unit cell and Interdigital Capacitor (IDC) has been done using HFSS 13.0. Results of proposed balun are discussed and compared with broadband Wilkinson balun using purely left handed transmission line (PLHTL). A balun is designed using the same. Compactness, losses and phase response are the key issues in microstrip balun design and are dealt with, for best output. The design idea for this balun was taken from [8] and in this paper the design is implemented with a new more compact unit cell and instead of using two quarter wave bridges at two output lines each, total of λ/8 lines are added in each branch this reduces the size to much extent. The final design has been optimized using HFSS 13.0 for best trade-off between losses and phase response. The presented balun has been optimized for best trade-off between losses and phase response, which is key part of a balun design. Bandwidth achieved is 2.75 GHz, with fractional bandwidth of 122%
A Survey on Voting Algorithms Used In Safety Critical Systems
P.Babul Saheb, Mr. k.Subbarao, Dr. S.Phani kumar,
Several voting algorithms have been described to arbitrate the results of redundant modules in fault-tolerant systems. A voting scheme based on fuzzy set theory was introduced which softens the harsh behavior of the inexact majority voter in the neighborhood of the ‘voter threshold’ and handles uncertainty and some multiple error cases in the region defined by the fuzzy input variables. A set of fuzzy rules determines a single fuzzy agreeability value for each individual input which describes how well it matches the other inputs. Automatic fuzzy parameter selection based dynamic fuzzy voter for safety critical systems with limited system knowledge. Existing fuzzy voters for controlling safety critical systems and sensor fusion are surveyed and safety performance is empirically evaluated. The major limitation identified in the existing fuzzy voters is the static fuzzy parameter selection. Optimally selected static fuzzy parameters work only for a particular set of data with the known data ranges. Dynamic voter is designed in such a way that it can be plugged in and used in any safety critical system without having any knowledge regarding the data produced and their ranges.
A development of prospective synthetic methods to produce Pyridine including those of complex structure will allow to makes the latter more available and hence Pyridine bases will be widely used in industry. In this paper the Hetrocyclization of Acetylenes with nitriles catalyzed by palladinium Complex has been carried out. We have limited our aim to study the palladinium catalyzed activation of bifunctional vinyl halide a-Bromoacrylic amides with 1, 3 dines and alkynes to form an unsaturated butyrolactums. The compounds so obtained is 1.1-(4- Methoxyphenyl)-3(1 phenyl-(E)- methylidene)- 2,3,3a,4,5,7a- hex hydro- 1H-2-indolone and 1N-(4-Methoxyphenyl)-2-bromo-3-phenyl-(Z)- 2-propenamide
Channel Feedback Scheduling For Wireless Communications
N.Dinesh, G. Maheswari,
Opportunistic scheduling can significantly improve wireless network performance by exploiting the underlying channel condition. There has been a lot of work on opportunistic scheduling, but the problem of finding the right feedback mechanism to convey channel information has largely been untouched. In emerging multichannel systems, the per-channel feedback induces a substantial amount of feedback overhead and requires high computational complexity. To reduce the feedback overhead, we consider an opportunistic feedback strategy that activates the channel feedback opportunistically according to the channel condition. Then, we combine the opportunistic feedback with the best-n channel feedback scheme where a mobile user chooses the best n channels and transfers this information to the base station. We analyze the throughput and the amount of channel feedback information for proportionally fair opportunistic scheduling under Rayleigh fading channels. The numerical results confirm that our partial feedback schemes achieve a remarkable reduction in the amount of feedback information without significant throughput degradation, thereby saving the scarce wireless bandwidth and limited battery power.
Multi-Path Routing and Secure Data Collection In Wireless Sensor Networks
P.Sudhashini, G.Prema, A.Fairosebanu
Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in mobile ad-hoc networks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, we propose a routing mechanism that uses cross layer strategies. The cross-layer strategy involves incorporating feedback and information from layers below the network layer to make decisions at the network layer. We also propose a path evaluation mechanism for the paths returned by the proposed multi-path routing mechanism. Compromised node and denial of service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires the routing algorithm, it can compute the same routes known to the source, hence, making all information sent over these routes vulnerable to its attacks. In this paper, we develop mechanisms that generate randomized multipath routes. Under our designs, the routes taken by the “shares” of different packets change over time. So even if the routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes. We analytically investigate the security and energy performance of the proposed schemes. We also formulate an optimization problem to minimize the end-to-end energy consumption under given security constraints. Extensive simulations are conducted to verify the validity of our mechanisms.
Multicasting with Localized Control in Wireless Ad Hoc Networks
1 k.Ravikumar, c.Thangamalar
The problem of broadcasting in an ad - hoc wireless network where all nodes of the network are sources that want to transmit information to all other nodes. Here the figure of merit is energy efficiency, a critical dcesign parameter for wireless networks since it directly affects battery life and thus network lifetime. To prove that, applying ideas from network cryptogram allows realizing significant benefits in terms of energy efficiency for the problem of broadcasting, and proposing very simple algorithms that allow realizing ting, and proposing very simple algorithms that allow raptly for some canonical configurations. Then it is shown that in network these benefits in practice. In particular, the theoretical analysis shows that network coding improves performance by a constant factor in fixed networks. This factor is calculated exactly for some canonical configurations. Then it is shown that in networks where the topology dynamically changes, for example due to mobility, and where operations are restricted to simple distributed algorithms, network cryptogram can offer improvements of a factor of , where is the number of nodes in the network. The insights gained from the theoretical analysis is used to propose low-complexity distributed algorithms for realistic wireless ad- hoc scenarios, discuss a number of Practical considerations, and evaluate the algorithms through packet level simulation.
Real Time System Relate to Time Travel for DesigningUltrafast Spaceship.
Samir Kumar Rout.
This paper relate the designing issues of Real time System into the designing issues of ultra fast spaceship, the concept of ultra fast spaceship is approach by the famous scientist Dr. Albert Einstein for travel in space with light speed (3.00, 000Km/sec) which enable us to see the past or future, here five designing issues of a real time system are closely relate to the designing issues of ultra fast spaceship and all the description should made in theoretical.
Impeccable Data Dispatching In Strenuous Mobile Ad Hoc Network
Sale Sandeep, M.Sri Bala,
This paper addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner. Most existing ad hoc routing protocols are susceptible to node mobility, especially for largescale networks. Driven by this issue, we propose an efficient Position-based Opportunistic Routing (POR) protocol which takes advantage of the stateless property of geographic routing and the broadcast nature of wireless medium. When a data packet is sent out, some of the neighbor nodes that have overheard the transmission will serve as forwarding candidates, and take turn to forward the packet if it is not relayed by the specific best forwarder within a certain period of time. By utilizing such in-the-air backup, communication is maintained without being interrupted. The additional latency incurred by local route recovery is greatly reduced and the duplicate relaying caused by packet reroute is also decreased. In the case of communication hole, a Virtual Destination-based Void Handling (VDVH) scheme is further proposed to work together with POR. Both theoretical analysis and simulation results show that POR achieves excellent performance even under high node mobility with acceptable overhead and the new void handling scheme also works well.
Texture Image Classification using Neurofuzzy Approach
Sushant Panigrahi, Toran Verma,
Image classification is most emerging area in today’s world. Variety of images classified using different methods. In this paper image classification based on two different approaches Artificial neural network and Neurofuzzy system and it is seen that Neurofuzzy system is better classification technique than ANN. The design used the discrete cosine transform (DCT) for feature extraction and artificial neural networks and neurofuzzy system for Classification. As DCT works on gray level image, the color image is transformed into gray levels. A neuro-fuzzy approach was used to take advantage of neural network’s ability to learn, and membership degrees and functions of fuzzy logic. This paper proves that neuro-fuzzy model performed better than the neural network in classification of texture image of 2 different types.
N. M. Z. Hashim, N. M. T. N. Ibrahim,Z. Zakaria, , Fadhli Syahrial , H. Bakr
Development New Press Machine using Programmable Logic Controller
N. M. Z. Hashim, N. M. T. N. Ibrahim,Z. Zakaria, , Fadhli Syahrial , H. Bakr
The Press Machine is a project that is designing a new way to improve the previous press machines in industries which has a few weaknesses in safety while operating processes. This will create a lot of problem to the operators which have the higher risk to have an accident. The new press machine is a project to improve previous press machine which have weakness in safety while operating it. This matter creates a lot of problem and at the same time the operators and technician have the higher risk to have an accident in industries. The solution for this problem is a development of a new program of machine which running same operation but the machine is more safety and easy to setup when machine pressing the radio panel using external timer. This machine controlled by the Programmable Logic Controller (PLC). It consists of 5 pneumatic cylinders which each cylinder have their own function. This project contains in 2 states of operations which in automatic and manual mode. In automation mode, all the operation will begin automatically after the operators pressed the 2 switch simultaneously. In manual mode, the operator need to press (switch on) in every state condition to complete the operation. That mean, every state operation has its own switch for the operation. The result showed press machine is able to press the component and device, push it to pick up unit then it will be hold by the pickup unit before it placed on the target place. For the future work, this system should be building with a larger machine as the press components. It will give more power to press the device. The suggestion that can carry out from this research is to use a circuit that can make the Direct Current (DC) current more stable and linear. This project uses the DC current from the motorcycle battery because it more safety for this project.