IJEA - Volume 4 Issue 9 (September 2015)

 


Sr/No/ Title Pdf
1 Analysis of Contaminated Soils and Groundwater Management Plan
B.Pajaniappane

Abstract-This Contaminated Soils and Groundwater Management Plan (CSGMP) forms part of a comprehensive suite of environmental controls within the Construction Environmental Management Plan (CEMP) for the construction phase of the MacKays to Peka Peka Expressway (“the Project”). The CSGMP addresses the potential adverse environmental effects resulting from contaminated soil and groundwater at selected locations associated with the construction of the Project. The principal purpose of this Plan is to highlight the minimum standards that must be complied with as well as best practicable options for management of contaminated soil and groundwater for the Project. It is intended as a guide for contractors on how to manage contaminated soil and groundwater at selected locations on site to minimise effects on health and safety and to reduce the impact on the environment. The CSGMP will be updated, with the necessary approval, throughout the course of the Project to account for changes to construction techniques or the natural environment and consent conditions. A copy of any revisions of a material nature will be passed to Greater Wellington Regional Council (GWRC) for comment.

Download
2 Vibration Analysis of Composite Beam with Cracks
Syed Tanweer Husain, S.K. Kushwah, Aslam Hussain

Abstract-The cracks which are developed in the structure causes changes in their physical properties, due to this the stiffness in them also reduces because of the inherent reduction in modal natural frequencies. In this paper vibration analysis of beam with an open edge cracks has been presented. The crack at various locations and with varying depth causes variation in natural frequencies. By applying different boundary conditions, the cracked beam has been analyzed. The previous result which are obtained by experiments are compared with those obtained finite element analysis, the analysis was performed using ANSYS SOFTWARE.

Download
3 Comparative Study of Fossil Fuels for Industrial Furnace
Khare Vikas, Shrivastava Pavan

Abstract-The selection of liquid or gas fuel to be used in an industrial furnace can be of extreme importance, having a direct effect on its performance, of the equipment. These factors are highly dependent on the combustion process and on factors such as the flame shape droplet path and the temperature and heat flux distributions within the furnace. Use of Conventional fossil fuels are widely increasing however there are growing concerns about the security of their supply, volatility in their prices and the environmental impacts of their extraction and use. The objective of this research is to investigate the potential for replacing conventional fuels in various applications. Such investigations require systems-level approaches able to handle multiple criteria, uncertainty, and the views of multiple stakeholders.

Download
4 Optimization and Numerical Analysis of Mono Composite Leaf Spring by FEM
Ali Haider, Bartaria V.N.

Abstract-The Automobile Industry has great interest for replacement of steel leaf spring with that of composite leaf spring, since the composite materials has high strength to weight ratio, good corrosion resistance. The material selected was glass fiber reinforced polymer (E-glass/epoxy) and carbon epoxy is used against conventional steel. The design parameters were selected and analyzed with the objective of minimizing weight of the composite leaf spring as compared to the steel leaf spring. In this modern world reducing weight during increasing or maintaining strength of products is getting to be highly important research issue. One of the material families which are attracting researchers and being solutions of such issue is Composite materials. In this paper we describe design and analysis of composite leaf spring. The objective is to compare the stresses deflection and weight saving of composite leaf spring with that of steel leaf spring. The design constraint is deflection.

Download
5 Numerical Analysis of Composite Beam by Using Ansys - A Review
Syed Tanweer Husain, S.K. Kushwah, Aslam Hussain

Abstract-Composite materials are that materials which made from two or more materials which having significantly different physical and chemical properties, that when combined, produce a material with characteristics different from the individual component. Concrete is the most common composite material which is abundantly used in civil engineering applications. Composition of Concrete depends mainly from water, aggregate and cement. Often reinforcements and additives are included in the mixture to achieve the desired physical properties of the composite material.

Download
6 Numerical Simulation of Mass transfer in Film Boiling Process using Fluent (CFD)
Pandey Pratiksha, Shrivastava Pavan

Abstract-Among the various modes of heat transport to liquids, film boiling is considered to be an inefficient mechanism. However, in many practical engineering applications it occurs. Consequently, film boiling must be studied and understood for design applications. Film boiling is invariably encountered in quenching of metals, in chilling of biological species, in regenerative cooling of rockets, and in cooling down a cryogenic fuel tank, and sometimes film boiling can also happen in the nuclear reactor or in the cryomagnet.This paper will discuss what we know about film boiling and what future work would be productive or of interest. The author will not attempt to cite a every article on film boiling that appears in the literature. Instead, the part "What We Know about Film Boiling" is really meant to set the stage for "What We Would Like to Know.”

Download
7 A Review on Audio Stenography for Secure data Communication
Abhishek Tiwari, Sanchita Sarate

Abstract-Cryptography modifies messages so it can’t be understood. Main Advantage of cryptography is secure data, different size key of data hiding, also fast & flexible easy to design. The main Disadvantage of cryptography is that it is not god for internet and limited of devices like mobile phone, complex hardware, cipher patterns is not typical. Steganography is an ancient art of hiding information. we will have a survey on audio steganography recent researches. Due to it, some basic concepts of audio steganography and HAS (human auditory system) including Least Significant Bit (LSB) Coding, Parity Coding, Phase Coding, Spread Spectrum (SS) and Echo data hiding are covered.

Download
8 Review on Different Methods for Optimized watermarking
Aradhna Gautam, Kopal Gangrade

Abstract-Watermarking is an approach to hide the image efficiently into any covering object (image in our case) and it should do that any intruder cannot interpret it by any means, as from the proposed method that is been achieved and one can say that our generated stegno image cannot be interpreted easily by any intruder, proposed work is a unique DWT based method for watermarking. The Covering image is divided into four sub bands using transform technique DWT. Two different privet images set fixed in the HL and HH sub-bands respectively. When inserted privet images are spread within each band and use a semi random succession and only one Session key. Privet images are retrieved using the session key along with size of the images. In this approach the stego image produce is of acceptable level with good imperceptibility and less distortion as compared to other cover image with different methods and enhance the overall security.

Download
9 Gesture Recognition Using Advance Pre-Processing and Correlation Method
Nidhi Patel, Devyanshu Rao

Abstract-We propose a domain-independent machine learning methodology to automatically generate low-level spatio-temporal descriptors for high-level gesture recognition using Correlated Variance Mean based programming (CVMBP). Most important thing is feature extraction for the purpose of gesture recognition. Feature extraction is very important in terms of giving input to a classifier. Our prime feature is Correlated Variance Mean based programming. In feature extraction first we have to find edge of the segmented and morphological filtered image. Canny edge detector algorithm is used to find the edge which leads us to get boundary of hand in image. Then CVMBP applied for recognition of gesture.

Download
10 A Unique Method for Face Recognition using Variance and Correlation
Shilpa Valecha, Devyanshu Rao

Abstract-Face detection and recognition has many applications in a variety of fields such as security system, videoconferencing and identification. This paper present various conventional and standard methods of face recognition and there pros and cons also it is a review of some latest technique of face recognition. Throughput and recognition rate is been discussed and paper is mainly target to compare all this method so we can develop optimized method. Proposed method is a combination of correlation and the new approach of base paper work, as we know correlation is uses when to compare any signals, proposed method use this for comparing variance of faces.

Download
11 Managing disruption in an imperfect production fuzzy inventory system
M.Gomathi, S.Chandrasekaran

Abstract-In this paper, a disruption recovery model is developed for an imperfect single-stage production – inventory system. For it, the system may inexpertly face either a single disruption or a mix of multiple dependent and/or independent disruptions. As the system may produce some defective items, we consider processing reliability to calculate the effective production rate (rP).Several methods such as classical differential calculus, cost difference, rate comparison approach, are employed to determine the optimal lot size with the assumption that demand and the cost involved are deterministic in nature, which are not possible in this world of uncertainty. This leads to the transformation of deterministic parameter to fuzzy parameter. In this paper the demand and the associated costs are taken as fuzzy variables. To determine the optimal inventory policies, Yajers ranking method for fuzzy numbers is utilized. A set of numerical data is employed to analyse the characteristics of the proposed model.

Download
12 Performance Evaluation of Boiler Subjected to Washed and Unwashed Coal- Case Study
Swarnika Sharma, Santosh Kumar Bajpai

Abstract-In this case study the main focus has been given to evaluate the effect of processed (Washed) and Raw (Unwashed) coal on the performance of plant efficiency. During the questionnaire author has trying to evaluate the user’s opinion which is quiet complicated, Each and every user may have different opinion. Some wanted less amount of ash, others want such type of coal which is in bulky nature so that flow can be easy. Many wants big size, heavy coals, the engineers wanted coal that was less moist and grind able. The maintenance persons demand such type of coal which contains low abrasive properties. The environmental people liked low sulfur and low ash levels. Then, the ash sales department wanted high ash to dilute the carbon and increase the sales volume. The fuel purchasing group liked low cost coals. Till the end of the discussion author asked if the group was describing good coal. In this entire case study, we will be just try to conclude some desirable points which is usually asked by most of the end user of the coal.

Download
13 A Bess STATCOM Based Control Scheme for Grid Connected Wind Energy System for Power Quality Improvement
A.Veera Maheswara Rao, M.Balasubba reddy, SK.Meera shareef

Abstract-Injection of the wind power into an electric grid affects the power quality. The performance of the wind turbine and thereby power quality are determined on the basis of measurements and the norms followed according to the guideline specified in International Electro-technical Commission standard, IEC-61400. The influence of the wind turbine in the grid system concerning the power quality measurements are-the active power, reactive power, variation of voltage, flicker, harmonics and electrical behavior of switching operation and these are measured according to national/international guidelines. The installation of wind turbine with the grid causes power quality problems are determined by studying this paper. For this Static Compensator (STATCOM) with a battery energy storage system (BESS) at the point of common coupling to mitigate the power quality problems. The grid connected wind energy generation system for power quality improvement by using STATCOM-control scheme is simulated using SIMULINK in power system block set. The STATCOM control scheme for the grid connected wind energy generation system for power quality improvement is simulated using MATLAB/SIMULINK in power system block set. The effectiveness of the proposed scheme relives the main supply source from the reactive power demand of the load and the induction generator. The development of the grid co-ordination rule and the scheme for improvement in power quality norms as per IEC-standard on the grid has been presented.

Download
14 Islanding Detection in Distributed Generations Using Wavelet Transform
Neelam Anuradha, SK.Meera shareef, M.Balasubba reddy

Abstract-This paper presents the distribution generation system which is new technology like fuel cell. Wind turbine.it is very popular in power industry due to environmental assets. When a distribution system becomes isolated from the remainder of power then islanding occurs. Important advantage of distribution generation is to detect islanding detection. It reduces the lot of problems and connected loads. This paper discusses about various existing techniques used for islanding detection.

Download