Editorial: G One S Own Technical Findings. This Issue Is Exclusively Devoted
Editorial: G One S Own Technical Findings. This Issue Is Exclusively Devoted
This Journal is a culmination of our efforts in adding a scientific and technological flavor to
the services that are offered from GIST. The scenario of globalization had provoked the theme of
quality and standard blended with high level of competence amongst the industrial sectors. The
present day technological advancements are more rapid and recommend an amalgamated
Engineering curriculum warranting students to equip with creative thoughts and multi level skills.
This Journal shall motivate the young minds to put forward their technical ideas in a lucid
way and develop the art of publishing one‘s own technical findings. This issue is exclusively devoted
for publishing the research/project works carried out experimentally, analytically or both in different
fields of Science, Engineering and Technology. I wish the editorial Board for their strenuous efforts
in making this issue blossom with contents. Indeed such efforts are never possible for us without the
stupendous support of our noble and service minded Management members.
I hope all our readers would be enlightened through this issue, which shall knock the doors of
numerous enthusiastic readers every year. I request all the teachers and students keep writing to us
and send their valuable technical articles for publication.
CONTENTS
Title of the Paper
2. Optimal Design of Fused Chopper based Standalone Hybrid Wind Solar System
Dr.P.Vinoth Kumar
4. Analysis of IA And PSO Algorithms for Siting and Sizing of DG in Primary Distribution
Networks
Thummala Ravi Kumar
8. A Comparative Study on Concrete Containing E- PlasticWaste and Fly Ash Concrete with
Conventional Concrete
Shaik Nadhim, P.Navya Shree, G.Pranay Kumar
13. Design of Prestressed Concrete Bridge Cross over a Cannol at Gandhi Janasangam
Shaik Nadhim, Vijaya Prathima,Rajeswari Isanakula
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
discussed in this paper is a novel technique and has Multifunctional Devices. IEEE Consumer
achieved the target to control home security Electronics, 51(4),1169-117.
system. Another issue resolved is the remote SMS
[4] Jawarkar, N. P., Ahmed, V., Ladhake, S. A. &
based system satisfying user needs and
Thakare, R. D. (2008). Micro-controller based
requirements. GSM technology capable solution
RemoteMonitoring using Mobile through Spoken
has proved to be controlled remotely, provide home
Commands. Journal Of Networks, 3(2),58-
security and is cost-effective as compared to the
63.University, Prague, 1979
existing systems.
[5] M. Tiuri, ―Microwave Sensor Applications in
References Industry,‖ AltaFrequenza, LVI, No. 10, Dec. 1987,
pp. 393-397.
[1] David Crouse, Michael Dias and
DarkoVudimir, 2004 ―Wireless home security
system‖ University of Connecticut. Acknowledgments
[2] J. Polivka, ―Microwave Radiometry and The authors wish to thank the Principal and the
Applications,‖ International Journal of IR/MM Management of Geethanjali Institute of Science
waves, Vol.16, No.9, Sep. 1995. and Technology, for their support to present this
[3] Alkar, A. Z., &Buhur, U. (2005). An Internet paper.
Based Wireless Home Automation System for
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
Figure 6. Auxiliary circuit Figure 11. Gate Pulses of switches S1, S2, S3, S4.
Figure 15. Torque of the motor achieved with closed loop Control References
5.1 Design Parameters [1] Kim S.K , Jeon J.H, Cho C.H , Ahn J.B , S.H.
Kwon. Dynamic Modeling and Control of a Grid-
The design parameters of fused CUK and Connected Hybrid Generation System with Versatile
SEPIC converter connected to Induction motor Power Transfer .IEEE Transactions on Industrial
shown in Table 1. The output voltage of solar and Electronics. 2008 April, 55, 1677-1688.
wind from the hybrid wind solar system shown in [2] Das D, Esmaili R, Xu L, Nichols D. An Optimal
Table 2. Design of a Grid Connected Hybrid
Table 1. Design Parameters Wind/Photovoltaic/Fuel Cell System for Distributed
Parameters Symbols Values Energy Production. Proc. IEEE Industrial
Inductance L1,L2,L3 2mH Electronics Conference, 2499-2504.
[3] Ahmed N. A, Miyatake M , Al-Othman A. K.
Inductance C1,Cdc 1000μf Power fluctuations suppression of stand-alone
Capacitance Cb 1000μf hybrid generation combining solar
Capacitance Ca , Cc 3mf photovoltaic/wind turbine and fuel cell systems
Proc. Of Energy Conversion and Management,
Filter Inductance Lf 15mH 2008, 2711-2719.
Filter [4] Jain S, Agarwal V. Integrated Hybrid Power
Cf 1005 μf Supply for Distributed Generation Applications Fed
Capacitance
by Non conventional Energy Sources. IEEE
Switching Transactions on Energy Conversion, 2008 June ,
fs 10 KHZ
Frequency 23(2),622-631.
S1, S2,S3, [5] Chen Y.M, Liu Y.C, Hung S.C, C.S. Cheng.
Switches IGBT
S4, S5,S6 Multi-Input Inverter for Grid-Connected Hybrid
Diodes D1,D2 0.001Ω PV/Wind Power System. IEEE Transactions on
Power Electronics, 2007 May, 22.1070-1077.
Single [6]Pou J, Pindado R, Boroyevich D. Voltage-
0.5HP,300V,50HZ,
phase balance limits in four level diode-clamped
Rating of Single phase
Asynchron converters with passive front ends. IEEE Trans.
Induction motor capacitor start
ous Ind.Electron., 2005 Feb, 52,190–196.
motor
Machine [7] Alepu S, Busquets-Monge S, Bordonau J, Gago
J, Gonzalez D, Balcells J. Interfacing renewable
Table 2. Output voltage from Hybrid System energy sources to the utility grid using a three-level
inverter. IEEE Trans. Ind. Electron, 2006 October,
Solar Plant Wind Plant Voltage 53(5),1504–1511.
across the [8] Kang D W, Lee B K , Jeon J H, Kim T J , Hyun
Solar
Output Wind Output DC link D S. A symmetric carrier technique of CRPWM for
irradia
voltage velocity( voltage Capacitor( voltage balance method of flying capacitor
nce
(v) m/s) (v) Vdc) multilevel inverter. IEEE Trans. Ind. Electron, 2005
(w/m2)
June, 52(3), 879–888.
75 41.43 10 40 80.72 [9] Lin B R, Huang C H.Implementation of a three-
100 58.30 12 50 98.30 phase capacitor clamped active power filter under
unbalanced condition, IEEE Trans.Ind. Electron.
110 69.2 15 60 120 2006 October, 53(5),1621–1630.
[10] Kou X,Corzin K, Wielebski M. Overdistention
6. Conclusion operation of cascaded multilevel inverters. IEEE
This combined chopper based new topologies Trans. Ind. Appl, 2006 June, 42(3), 817–824.
[11] Rodriguez J, Hammon P, Pontt J, Musalem R,
offer permanent power generation possible to meet
Lezana P, Escobar M. Operation of a medium-
the load demand by making available the two energy
voltage drive under faulty conditions. IEEE Trans.
sources to supply the load either individually or
Ind. Electron. 2005 August, 52(4),1080–1085.
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
[12] Carrara G, Gardella S, Marchesoni M, Salutari Trans. Ind. Appl. 2011 April, 47(2),873–881.
R, Sciutto G. A new multilevel PWM method: A [21] Kjaer S B, Pedersen J. K, Blaabjerg F . A
theoretical analysis. IEEE Trans. review of single-phase grid connected inverters for
PowerElectron.1992 July, 7(3), 497–505. photovoltaic modules. IEEE Trans. Ind. Appl. 2005
[13] Kjaer S. B, Pedersen J. K, Blaabjerg F. A September. 41(5), 1292–1306.
review of single-phase grid connected inverters for [22] Rahim N A Chaniago K, Selvaraj J. Single-
photovoltaic modules. IEEE Trans. Ind. Appl, 2005 Phase Seven-Level Grid-Connected Inverter for
September, 41( 5),1292–1306.. Photovoltaic System. IEEE Transactions on
[14] Pandian G, Rama Reddy S.Simulation and Industrial Electronics, 2010 August, 58(6) , 2435 –
Analysis of Multilevel Inverter Fed Induction Motor 2443
Drive. Indian Journal of Science and [23] Hinga P. , Ohnishi T, Suzuki T. A new PWM
Technology.2009 Feb, 2(2), 67-69. inverter for photovoltaic power generation
[15] Sudharsan A, Yohan M, Shrujan R, Gayathri Y. system.Conf. Rec. IEEE Trans. Power Electron.
Hybrid Wind Solar Energy System Using Cuk Fused Spec. Confernce,1994, 391–395.
converter,IJERA, 2013 December,3(6),287-293. [24] Rahim N A Chaniago K, Selvaraj J. Single-
[16] Saha T, Kakkr S, Jha D K. Fused converter Phase Seven-Level Grid-Connected Inverter for
topology for wind-solar hybrid system. Power and Photovoltaic System.IEEE Transactions onIndustrial
Energy Engineering Conference (APPEEC), 2013 Electronics, 2011 June, 58(6), 2435-2443.
December, 1-7. [25]Ghaisari J, Habibi M, Bakhshai A. An MPPT
[17]Jacob T, Arun S. Maximum Power Point Controller Design for Photovoltaic (PV) Systems
Tracking of hybrid PV and wind energy systems Based on the Optimal Voltage Factor
using a new converter topology. International Tracking.Electrical Power Conference, 2007.359-
Conference on Green Technologies (ICGT), 2012 362.
December ,280-287. [26]Noguchi T, Togashi S, Nakamoto R. Short-
[18]. Simonetti S L, Sebastian J,Uceda J. The current pulse-based maximum-power-point tracking
Discontinuous Conduction Mode Sepic and Cuk method for multiple photovoltaic-and-converter
Power Factor Preregulators: Analysis and Design. module system. IEEE Transactions on Industrial
IEEE Trans. On Industrial Electronics, 1997.44(5). Electronics, Feb 2002, 49(1), 217-223.
[19]Abbas A. Fardoun, Esam H. Ismail, Ahmad J. [27] Calais M, Agelidis V. G. Multilevel converters
Sabzali, Mustafa A. Al-Saffar. New Efficient for single-phase grid connected photovoltaic
Bridgeless CUK Rectifiers for PFC systems. Proc. IEEE Int. Symp. Ind. Electron, 1998,
Applications.IEEE Trans. on power electronics, 224 -229
2012 July, 27(7).3292-3301. [28] Selvaraj J, Rahim N A. Multilevel inverter for
[20] Sabzali A, Ismail E. H, Al-Saffar M, Fardoun A. grid connected PV system employing digital PI
New bridgeless DCM sepic and CUK PFC rectifiers controller. IEEE Trans. Ind. Electron. 2009
with low conduction and switching losses. IEEE January, 56(1), 149–158.
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
both ways. Software life-cycle models describe phases systems specifications from the System Design step
of the software cycle and the order of execution of are translated into machine readable computer code.
those phases. Many models are being adopted by Testing
software companies, but most of them have similar As the software is created and added to the
patterns. Typically each phase produces deliverables developing system, testing is performed to ensure
required by the next phase in the life cycle. that it is working correctly and efficiently. This is the
Requirements are translated into design. Code is very big problem in system development in this
produced during the implementation phase and is paper we provide some security methods to enhance
driven by the design. Code is finally tested against the water fall model.
requirements to ensure quality. In this paper we were Security in Design Phase:
implemented some security principles in Waterfall In every phase we have to include the security
method.
enhancement. Even though it‘s very essential for
2. PROPOSED METHOD every phase depth security features needed from the
design phase onwards. In requirement gathering
The Waterfall Model is the old method of structured phase information fetching mostly happen between
system development. It‘s the base for all models
user and developer due to that need of security level
although it has come under attack in recent years for
being too rigid and unrealistic when it comes to will be less. Apart from the user collecting
quickly meeting customer‘s needs and development, information should be trust worthy as well as valid
the Waterfall Model is still widely used because of information should be taken for the system
easy model for developers. It is attributed with development. In analysis phase, the information‘s
providing the theoretical basis for other Process what we obtain from the requirement phase that will
Models, because it most closely resembles a generic give to the analysis phase. Collected information will
model for software development
be analysis used some valid documents materials,
The Procedure of Waterfall Model for software white papers, existing methods, etc.
development:
Information grouped into the structure form from
System Requirements:
System Requirement refers to the consideration of all the unstructured form. In the analysis phase itself we
aspects of the targeted business function or process, have to estimate what kind of security requirements
need for our system. Security elements and features
with the goals of determining how each of those
should be included in every aspect of the system like
aspects relates with one another, and which aspects
user, data, module, design, testing, etc. Developers
will be incorporated into the system. What is the
need to know secure software design principles and
essential thing needed in developing system.
how they are employed in the design of resilient and
System Analysis:
trustworthy systems. Two essential concepts of
This step refers to the gathering of system
design include abstraction and decomposition of the
requirements, with the goal of determining how
system using the architecture and constraints to
these requirements will be accommodated in the
achieve the security requirements obtained during the
system. Extensive communication between the
requirements phase. Most of the readers are probably
customer and the developer is essential.
familiar with these concepts.
Developer has to understand the exact
Abstraction is a process for reducing the
requirement of user.
complexity of a system by removing unnecessary
System Design: details and isolating the most important elements to
Once the requirements have been collected and make the design more manageable. Decomposition is
analyzed, it is necessary to identify in detail how the process of describing the generalizations that
the system will be constructed to perform compose an abstraction. One method, top-down
necessary tasks. More specifically, the System decomposition, involves breaking down a large
Design phase is focused on the data requirements, system into smaller parts. For object-oriented
the software construction and the interface designs, the progression would be application, module,
construction. class, and method. Other secure software design
Coding: principles are detailed in a multitude of books, white
Allies name is programming, this step involves the papers, web portals, and articles. In this paper we are
creation of the system software. Requirements and providing some techniques to improve the SDLC.
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
the ordinary development life cycle models. Rational Unified Process, 2005.
Compare with SQUARE and CLASP methods this [3] Kruchten, P. The Rational Unified Process: An
one is different in functionalities. Introduction, 3rd ed. Boston, MA: Addison-Wesley,
2003.
REFERENCES: [4] Mead, N. R., E. Hough, and T. Stehney. Security
Quality Requirements Engineering (SQUARE)
[1] Mead, N.R., Viswanathan, V., Padmanabhan, Methodology. Pittsburgh, PA: Software Engineering
D., and Raveendran, A., Incorporating Security Institute, Carnegie Mellon University, 2005.
Quality Requirements Engineering (SQUARE) into [5] Rational Unified Process: Best
Standard Life-Cycle Models. Pittsburgh, PA: Practices for Software Development Teams.
Software Engineering Institute, Carnegie Mellon Rational Software White Paper TP026B, Rev 11/01,
University, 2008.
2001.
[2] Ambler, S. W. A Manager’s Introduction to
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
Abstract- In Power Systems, Distributed DGs are certainly changing the greater highly-priced
Generation (DG) has been developing quickly grid electricity. DG can meet all or part of a patron‘s
because of their prospective solutions for power energy wishes. The principle motives for the
quality issues, similar to the deregulation in power increasingly full-size use of DG are it may be more
system, to take care of the shortage of economic than running a transmission lines to remote
transmission capabilities and power demand. locations [5], it gives require power, with the
Inappropriate placement of DG sources in power effectiveness giving back up and supplemental
system would not just prompt to increase power power, it can give support control amid effectiveness
or energy losses but it also collapses voltage profile system blackouts. DG units must be located in
of the system. The ideal location of DG is needed suitable areas with proper capacities to realize system
for improving reliability and stability of a power advantage. It is observable that any loss reduction is
system. This paper investigates the difficulty of important to distribution utilities, those are for the
distributed generator location to obtain an maximum part the substance successful to maintain
unnecessary loss reduction and enhancement of losses at minimum. Losses diminishment is, in this
voltage profile in distribution networks. A stepped manner, the most significant calculate to be regarded
Improved Analytical (IA) technique and Particle because the locating and function of DG [6], [7].
Swarm Optimization (PSO) strategies proposed in As an instance, multi target index for execution
this paper. Improved analytical (IA) method [1] is algorithm of distribution network for single DG size
based on IA expressions to calculate the highest and location has been planned [6] in an radial feeder,
capacity of DG unit and a technique to perceive contingent upon the innovation, DG units can deliver
the pleasant place for DG allocation. The other a section of the total active and moreover reactive
task on this work a multi objective formula is power to loads in order that the feeder current
proposed for premiere location and sizing of the diminishes from the supply to the place of DG
DG is optimized the use of Particle Swarm systems.
Optimization (PSO). The proposed concepts Be that as it is able to, thinks about [8]–[10] have
validated the usage of an IEEE 33 bus network proven that if DG systems are disgracefully scattered
and the consequences display the suitability of the and expected, the reverse power flows from the
proposed strategies in decreasing the losses and capacity DG can stimulate to better active and
enhancing the voltage profile of the network. A reactive power loss. A technique for DG placement
few thrilling outcomes are also mentioned on this utilizing "2/3 rule" that's typically related to capacitor
paper. description in distribution system with consistently
distributed Here
Keywords – Analytical expression, loss reduction, a = (sign) tan (cos-1(PFDG)
improved analytical (IA), Distributed Generation sign = +1 Injecting reactive power by DG
(DG), optimal location and size and IEEE 33 Bus
system 𝑛
𝑋𝑖 = 𝑗 =1 (𝛼𝑖𝑗 𝑃𝑗 − 𝛽𝑖𝑗 𝑄𝑗 ) 𝑎𝑛𝑑 𝑌𝑖 =
𝑗 ≠𝑖
I. Introduction 𝑛
Global temperature gradually increases with the 𝑗 =1 (𝛼𝑖𝑗 𝑄𝑗 + 𝛽𝑖𝑗 𝑃)
𝑗 ≠𝑖
continuous exhaustion of fossil energy, and the
restriction of existing transmission network capability the ideal size of DG for every bus i, can be given
causes rapid development of Distributed Generators by formerly mentioned conditions , for the loss to be
(DGs) [2]. Distributed generation (DG) is associated
least. Any size of DG apart from PDGi positioned at
with the use of small generating unit mounted at
bus i can activate to a higher loss.
planned point of electrical power device or places of
Case 2 DG (i.e., 0 < PFDG < 1) is able up for
load centre's [3].
infusing active power however eating reactive power
Distributed generation is an electric powered power (sign = −1). Like kinds 1 DG, the appropriate size of
source linked immediately to the distribution system sort 2 DG at every bus i for the bottom loss is given
or on the purchaser location of the meter [4]. DG by means of (2) and (3). Simple Distribution system
technology consists of diesel engines, wind
with single DG [1] is shown in Figure 1.
generators, solar cells and fuel cells. Despite their
small length, DG technologies are having a more
potent effect in energy markets. In some markets,
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
without DG unit
n : Number of Buses for given network
m: Number of Branches for given network
w1, w2 and w3 are weights in this suggestion they are
theoretical to be equal. Right here w1+ w2+w3=1
system is 3715 kW, 2300 kvar with a total real power of length 2560.23kw at bus number 6 and there is
loss of 202.6 kW. The upper voltage limit is 1.05 p.u greater decrement in losses. It is able to be discovered
and lower voltage limit is 0.9 p.u. The single line from TABLE I, at the same time as placement of DG
diagram of test system is shown in Figure 2. of capacity 2560.23kw reduces the actual energy loss
Newtons-Raphson algorithm is used for power flow of 110.1537 kW
calculations. For simulation load model designed
with a uniform power and primary bus voltage at 1.0 TABLE II : Bus voltage magnitudes of 33-Bus
p.u. system
Based totally at the proposed technique, an analytical
software device has been developed in Matlab BUS
Voltage (PU)
surroundings to run the power flow, calculate Number
electricity losses, and become aware of the superior IA Method PSO Method
size and area of DG unit. The iteration settings for 1 1 1
PSO contain 50 maximum numbers of iterations, with 2 0.999018 0.99814
acceleration constant of 2 and 2.5 and highest and 3 0.995566 0.989975
lowest inertia weights at 1 and 0.2 respectively. The 4 0.995977 0.986885
highest and lowest velocity of particles is preset at 5 0.996818 0.984066
0.003 and -0.003 correspondingly. The simulations 6 0.99618 0.975559
are carried out in a computer system having i5 7 0.992466 0.972171
processor cloaking a speed of 2.5 GHz with a RAM 8 0.987695 0.967462
of 4GB.
9 0.981243 0.96137
10 0.975222 0.95572
z 11 0.97436 0.954884
12 0.97285 0.953427
13 0.966276 0.947488
14 0.963653 0.945286
15 0.961964 0.943914
16 0.960377 0.942585
17 0.957995 0.940616
18 0.957416 0.940027
19 0.998491 0.997612
20 0.99492 0.994038
21 0.994217 0.993335
22 0.993581 0.992698
23 0.992027 0.986415
Figure 2. Line diagram of IEEE 33 Bus distribution 24 0.985442 0.979792
system 25 0.982161 0.976492
26 0.995356 0.976033
27 0.994334 0.976834
TABLE I: DG Placement by Various Techniques For 28 0.98877 0.978
33-Bus System 29 0.985011 0.97944
30 0.984178 0.981961
insta 31 0.985087 0.989294
Loss Ti
Tech lled Loca 32 0.985761 0.99203
Case P loss Redu me
nique DG tion 33 0.987175 0.995719
ction (s)
Size
202.
No 0.0
---- ----- 677 0.00 The position of DG additionally brings
DG 2
kW approximately development in voltage profile of the
IA 2560 110. device. The bus voltage magnitudes of 33-bus device
47.95 10.
Meth .230 6 1537 after placement of DG are illustrated in the TABLE II
48 29
with od 0kW kW The plot of voltage profiles for various buses after the
DG 92.4 position of DG the usage of IA technique is printed
1857 45.60 6.7
PSO 7 365 within the Figure 3. The plot of voltage profiles for
.5kw 913 5
kW various buses after the placement of DG using PSO
approach is outlined within the Figure 4
REFERENCES
[1] Duong Quoc Hung and Nadarajah Mithulananthan,
― Multiple Distributed Generator Placement in
Figure 3. Voltage Profile of 33 Bus System After Placement of
Primary Distribution Networks for Loss
DG using IA Metho
Reduction,‖ IEEE Transactions On Industrial
Electronics, VOL. 60, NO. 4, APRIL 2013
[2] Faria, P.; Vale, Z.; Baptista, J. ―Demand response
programs design and use considering intensive
penetration of distributed generation‖. Energies
2015, 8, 6230–6246.
[3] L.L.Lai and T.F.Chan, ― Distributed Generation:
induction and permanent magnet generators
‖,Wiley,2007.
[4] T. Ackermann, G. Andersson and L. So¨der, ―
Distributed generation: a definition ‖, Electric
Power Systems Research,Elsevier, 2001. [19] D.
Singh and K. S. Verma, ― Multiobjective
optimization for DG planning with load models ‖
Figure 4. Voltage Profile of 33 Bus System After Placement of . IEEE Trans. Power Syst., vol. 24, no. 1, pp.
DG using PSO Method 427–436, Feb. 2009.
[5] Vivek Kumar Shrivastava, O.P.Rahi. Vaibhav
Kumar Gupta and Jitendra Singh Kuntal, ―
TABLE III: LOCATION AND MINIMUM VOLTAGE Optimal Placement Methods of Distributed
MAGNITUDE FOR THE SYSTEM Generation:A Review‖, Proc. of the Intl. Conf.
on Advances in Computer, Electronics and
Bus at which Electrical Engg, ISBN: 978-981-07-1847-3.
Voltage
CASE Minimum [6] D. Singh and K. S. Verma, ― Multiobjective
( PU)
Voltage Occurs optimization for DG planning with load models‖,
Base Case ( IEEE Trans. Power Syst., vol. 24, no. 1, pp. 427–
18 0.9052 436, Feb. 2009.
without DG )
[7] L. F. Ochoa, A. Padilha-Feltrin, and G. P.
with DG-IA Harrison, ― Evaluating distributed time-varying
18 0.957416
Method generation through a multiobjective index‖,
with DG - PSO IEEE Trans. Power Del., vol. 23, no. 2, pp.
18 0.940027 1132–1138, Apr. 2008.
Method
[8] N. Acharya, P. Mahat, and N. Mithulananthan, ―
An analytical approach for DG allocation in
IV.CONCLUSION primary distribution network‖, Int. J. Elect.
This paper has provided IA and PSO methods for Power Energy Syst., vol. 28, no. 10, pp. 669–
DG allocation for minimizing power loss and 678, Dec. 2006.
enhancement of voltage profile in distribution [9] H. L. Willis, ― Analytical methods and rules of
thumb for modelling DG distribution
systems while enjoyable the principle objective of interaction‖, in Proc. IEEE Power Eng. Soc.
power injection. In IA method it is observed, it is that Summer Meet., 2000, vol. 3, pp. 1643–1644.
a approach to acquire an foremost or close to highest [10] Y. M. Atwa, E. F. El-Saadany, M. M. A. Salama,
quality power aspect has been also provided for and R. Seethapathy, ― Optimal renewable
resources mix for distribution system energy loss
placing DG unit able to delivering active and reactive minimization‖, IEEE Trans. Power Syst., vol.
power. For DG capable of delivering in real and 25, no. 1, pp. 360–370, Feb. 2010.
reactive energy, power factors to play a critical role [11] C. Wang and M. H. Nehrir, ― Analytical
in loss reduction. Another technique also proposed in approaches for optimal placement of distributed
this paper for ideal placement and capacity for generation sources in power systems‖, IEEE
Trans. Power Syst., vol. 19, no. 4, pp. 2068–
generators was identified using PSO technique and 2076, Nov. 2004.
the best of 50 trails runs have been presented. The [12] Haruna Musa " A Review of Distributed
importance of ideal placement was also suitably Generation Resource Types andtheir
explained in this work. It was noted that incorrect Mathematical Models for Power Flow Analysis
location of DG will not bring in essential progress in ", International Journal of Science, Technology
and Society Doi: 10.11648/j.ijsts.20150304.21,
the losses. It can also be noted from the conversation 2015; 3(4): 204-212
that the ideal placement of DG also improves the [13] M. A. Abido, ― Optimal power flow using
voltage profile of the network as a whole. It can be particle swarm optimization ‖, Electrical power
concluded that the proposed approaches, PSO is best and energy systems, 24(2002)563- 571- 1985.
optimization technique compared to the IA method [14] J. Kennedy and R. Eberhart, ― A Particle Swarm
Optimization ‖, Proceedings of IEEE
because with small size of DG enhancement of International conference on Neural Networks,
voltage profile is more and reduction of loss vol.IV, pp.1942- 1948, Perth, Australia, 1995.
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
VI.CONCLUSION
6.Santosh Kumar Das, Sachin Tripathi,
This paper discusses how Fuzzy Logic theory can be used A.P.Burnwal, ― Fuzzy Based Energy Efficient Multicast
for implementing routing in AdHoc networks. It is Routing for Adhoc Network‖ published in IEEE
important to consider maximum QOS parameters or all transactions, 2015.
QOS parameters to select best possible path in adhoc 7. Santosh Kumar Das, Sachin Tripathi, ― Energy
networks. But as per best of my knowledge ,no existing Efficient Routing protocol for MANET based on Vague Set
protocols are considering all or maximum QOS Measurment Technique‖, published by ELSVIER under
parameters. Most of the authors are using 2 or 3 responsibility of organizing committee of the Second
parameters as routing metrics. The future scope of this International Symposium on Computer Vision and the
work can be enhanced to develop a new Fuzzy Logic Internet(VisionNet‘15).
based routing protocol for MANETs which will take all 8. Nihad I. Abbas, Mustafa Ilkan, Emre Ozen, ―
the important QOS parameters. Fuzzy approach to improving route stability of the AODV
routing protocol‖, EURASIP journal on wireless
REFERENCES communications and networking, a SPRINGER Open
1. Kur Khan, Ru Zaman, AV Reddy, ―An Efficient Journal.
DSDV Routing protocol for mobile ad hoc Networks and 9. Xiaoping Yang, Huaning Zhang, Xin gao, yu Hu, ―
its performance comparison‖ , computer modelling and Research of HS-AODV Routing protocol Based on Fuzzy
simulation, 2008. ems‘08, second uksim symposium on Control theory‖, published in IEEE transactions,
ieee xplore, 2008. 2015.
2. DB Johnson, DA Maltz ,― Dynamic Source 10. Senthilnathan Palaniappan, Kalaiarasan Chellan, ―
Routing in wireless AdHoc networks‖ , Mobile Energy-Efficient stable routing using QOS monitoring
computing, 1996 – Springer. agents in MANET‖, EURASIP journal on wireless
3. MK Marina, SR Das, ―On-demand multipath communications and networking, a SPRINGER Open
distance vector routing in ad hoc networks‖, Network Journal.
Protocols, 2001. Ninth International Conference on IEEE 11. Raed Alsaqour, Maha Abdelhaq, Rashid saeed,
Xplore, 2002. Mueen Uddin, Ola Alsukoue, Mohammed al-Hubaishi,
4. Sujata V. Mallapur , Siddarama R. Patil ―Fuzzy tariq Alahdal, ― Dynamic packet beaconing for GPSR
logic-based stable multipath routing protocol for mobile mobile adhoc position-based routing protocol using fuzzy
ad hoc networks‖, India Conference (INDICON), logic‖, Journal of network and Computer Applications
2014Annual IEEE. 47(2015) 32-46, an ELSVIER Journal.
5. Alandjani Gasim, Johnson Eric E. In: Fuzzy routing
in ad hoc networks, performance, computing, and
communications conference, 2003. IEEE international
volume, issue, and 9–11 April 2003. p. 525–30.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
Abstract: A new class of FIR filtering algorithms and VLSI II. Study Methodology
architectures based on the multirate approach were recently Distributed arithmetic is an important technique to
proposed. They reduce the computational complexity in FIR implement digital signal processing (DSP) functions in
filtering, and also retain attractive implementation related FPGAs. It provides an approach for multiplier-less
properties such as regularity and multiply-and-accumulate
implementation of DSP systems, since it is an algorithm
(MAC) structure. In addition, the multirate feature can be
applied to low-power/high-speed VLSI implementation. These that can perform multiplication with use of lookup table
properties make the multirate FIR filtering very attractive in (LUT) that stores the pre-computed values and can be
many DSP and communication applications. In this paper, we read out easily, which makes DA-based computation
propose a novel adaptive filter based on this new class of well suited for FPGA realization, because the LUT is the
multirate FIR filtering structures. The proposed adaptive filter basic component of FPGA.
inherits the advantages of the multirate structures such as low These blocks have to be efficiently mapped onto
computational complexity and low-power/high-speed FPGA‘s logic resources. The major disadvantage of DA
applications. Moreover, the multirate feature helps to improve technique is that the size of DA- LUT increases
the convergence property of the adaptive filter.
exponentially with the length of input. Several efforts
Keywords: FIR filtering, multiply and accumulate (MAC), have been made to reduce the DA- LUT size for
VLSI. efficient realization of DA-based designs. The use
offset-binary coding is proposed to reduce the DA-LUT
I. INTRODUCTION size by a factor of 2. Recently, a new DA-LUT
A digital filter is a system that performs architecture for high-speed high-order has been
mathematical operations on a sampled or discrete time introduced, where the major disadvantage of the FIR
signal to reduce or enhance certain aspects of that filters is vanished by using carry look ahead adder and
signal. One type of digital filter is FIR filter. It is a the tri-state buffer. On the other side, some structures
stable filter. It gives linear phase response. Pipelining are introduced for efficient realization of FIR filter.
and parallel processing technique is used in FIR filter.
Recently, novel one- and two-dimensional systolic
Pipelining operation takes place in an interleaved structures are designed for computation of circular
manner. Pipelining done by inserting latches (delay convolution using DA, where the structures involve
element) in the system. It increases the overall speed of significantly less area-delay complexity compared with
the architecture but the hardware structure and system the other existing DA-based structures for circular
latency will increases. Hardware structures increases convolution. In the modified DA architecture is used to
due to inserting pipelining latches. For M level obtain an area time- power- efficient implementation of
pipelining M-1 delay elements required. Latency is the FIR filter in FPGA.
difference between the availability of first output in the
sequential system and the pipeline system. At every
clock cycle it will operate multiple inputs and produced
multiple outputs is called parallel processing. It
required extra hardware. Both pipelining and parallel
processing has disadvantages. For FIR filters, output is
a linear convolution of weights and inputs. For an Nth-
order FIR filter, the generation of each output sample
takes N+1 multiply accumulate (MAC) operations.
Multiplication is strongest operation because it is
repeated addition. It require large portion of chip area.
Power consumption is more. Memory-based structures
are more regular compared with the multiply
accumulate structures; and have many other
advantages, e.g., greater potential for high throughput
and reduced-latency implementation and are expected
to have less dynamic power consumption due to less
switching activities for memory-read operations
compared to the conventional multipliers. Memory
based structures are well-suited for many digital signal
processing (DSP) algorithms, which involve
multiplication with a fixed set of coefficients. For this
Distributed Arithmetic architecture used in FIR filter.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
= 3 ' . Note that both the MPU and addition rate can be approximated by where Vt is the
operations per unit sample (abbreviated as APU) are threshold voltage of the device. Assume the Vdd =
about the same in error calculation and weight 3v and Vt = 0.7V in original system (standard
updating operation for all approaches. The LMS).
computational complexity saving comes from the
multirate filtering operations. The overall
computational complexity of the multirate adaptive
algorithm is less than the one of conventional LMS.
Provided that the capacitance due to the
As M of M=3 increases, the saving is more multipliers is dominant in the circuit and is roughly
significant. In addition, the proposed approach still p can adaptive filter as proportional to the number
retains the MAC operations, which is preferable in of multipliers, we estimate the power consumption
programmable DSP implementation
of multi rate adaptive filter as Where Po denotes
the estimated power consumption of the standard
LMS adaptive filter. The required supply voltage
and power consumption for multirate approaches
with Mn=2,3 are listed in the last two rows of Table
1, where C e,ff is the effective capacitance of a
single multiplier. It shows that the power
consumption is greatly reduced compared with the
standard LMS, and the saving is more significant as
M increases
V. APPLICATION TO DELAYED LMS
fluctuations.) The estimated gradient is averaged over M computational complexity and reserve the MAC
sample periods. Hence, the gradient estimation is more structure. It also improves the convergence rate and
accurate. The multi rate approach performs better in steady state error in running delayed LMS.
both convergence
EFERENCES
[l] J. Mou and D. Duhamel, "Fast FIR filtering:
Algorithm and implementations," Signal Processing,
vol. 13, pp. 377 - 384,1987.
[2] J. Mou and P. Duhamel, "Short-length FIR filters
and their use in fast non recursive filtering," IEEE h
n s on Signal Processing, vol. 39, pp. 1322-1332,
June 1991.
[3] A. V. Oppenheim and R. W. Schafer, Discrete-
time Signal Processing. Prentice Hall, 1989.
[4]D. A. Parker and K. K. Parhi, "Low-area/power
parallel FIR digital filter implementations," Signal
Processing, no. 17, pp. 75-92, 1997.
[5]K. J. R. Liu, A.-Y. Wu, A. Raghupathy, and J.
Chen, "Algorithm-based low-power and high-
performance multimedia signal processing,"
Proceedings of the IEEE, Special Issue on
Multimedia Signal Processing, vol. 86, pp. 1155-
1202, June 1998.
[6]J. J. Shynk, "Frequency-domain and multirate
adaptive filtering,"IEEE Signal Processing
Magazine, pp. 14-37, Jan.1992.
[7]G. Long, F. Ling, and J. Proakis, "The LMS
algorithm with delayed coefficient adaptation," IEEE
h n s . Acoust. Speech, Signal Processing, vol. 37,
pp. 1397-1405, Sep. 1989
rate and steady state mean-squared error as M [8] H. Herzberg, R. Haimi-Cohen, and Y. Be'ery, "A
increases. It is due to the fact that the delay stage D is systolic array realization of an LMS adaptive filter
smaller than the conventional implementation. The and the effects of delayed adaption," IEEE h n s .
phenomenon becomes clearer in more severe
Signal Processing, vol. 40,pp. 2799-2803, Nov.
environment (larger Eigen value spread).
1992.
VI. CONCLUSION
[9] M. D. Meyer and D. P. Agawal, "A high
sampling rate delayed LMS fitler architecture," IEEE
In this paper, a new adaptive structure based on
h n s . Circuits Syst. II, vol. 40, pp. 727-729, Nov.
the multi rate filter is proposed. By virtue of the 1993.
advantages of multi rate FIR filtering algorithm, the
[l0] S . Haykin, Adaptive Filter Theory. Prentice
proposed scheme can reduce the required
Hall, Englewood Cliffs, N.J., 2nd ed., 1991.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
Abstract: God gave the gift of language and speech only to TOEFL.
human beings. Learning mother tongue is automatic as a But reality is that 75-90% of our Engineering graduates are
child listens to it continuously. Similarly any other without jobs as they lack Communication Skills. In spite of
language of the surroundings is also learnt without effort. this general scenario some of the students speak good
But learning English language in India is not easy as it is English even in their primary classes. Communists see a
not spoken around like the mother tongue. Linguists say division in society as ―Haves‖ and ―Have-nots‖ in terms of
that reasonable ability in English language can be wealth. Similarly we see today a division among our
achieved with vocabulary of 2000 words in about 100-150 students as ―Haves‖ and ―Have-nots‖ in English. A few
hours of study. But 90% of our engineering graduates are students who go to better schools and some whose parents
unemployable as they lack communication skills in English. take good care of their children‘s studies, learn good
This paradox makes it obvious that something is seriously English and grab all the opportunities where as the ―Have-
wrong with our way of teaching-learning English. nots‖ of English are deprived of every opportunity leaving
Indian children, since ages, followed the system of them in despair. A majority of the Have-nots are from rural
memorising texts without any understanding of it. As the areas and Vernacular Medium. When a construction
child grew to a young man in course of time, the meaning worker is taken to another state, he learns the language of
and significance of what he learnt earlier was revealed to the region in 3-6 months without any teaching. Are our
him. In the twentieth century Logic and Psychology helped students worse than him? These paradoxes prove that there
linguists to think of some other ways of teaching-learning is something fundamentally wrong with our teaching-
processes. The Behaviourist School of thought and the learning process and that it needs a thorough investigation.
Cognitive School of thought vied with each other in III. Earlier Practices
propounding theories relating to teaching-learning of a Before attempting to set things right let us ask a
language. Consequently new Grammars developed. Focus fundamental question --- What is language? It may be
moved from Structures to Functional and then on to defined as meaningful communication of feelings and ideas
Communicative and now to Creative aspects of language. through words arranged in a particular order. Language is
Age of learner and his mother tongue too are factors to like a building made of bricks called words and cement
reckon with in learning English language. Liberation from called grammar. Any attempt to teach English without
unsound pedagogy is a necessity. teaching words is a vain attempt. We learn Tamil or Hindi
In the light of these diametrically opposite approaches to from our neighbours by learning words (Pronunciation,
language teaching-learning process a viable method of meaning etc.) and trying to use them. So should be the way
teaching English can be evolved if we keep an open mind. with English. Not concentrating on learning of words is the
I. Introduction fundamental mistake in the teaching-learning of English
The arrangement of lower jaw in human beings is a unique because of which we have graduates who cannot even
gift of God because of which we are able to produce a write a letter in English. Giving summaries of lessons or
variety of sounds which no other being on earth can. Our paragraphs by oral explication, by dictating notes or
efforts to convey our feelings and ideas in a meaningful through PPTs as some language teachers do, is teaching of
way through these sounds led to the development of words content but not teaching of language. Grammar is actually
and language. Language is the foundation for the evolution a bonus while learning mother tongue (L1), but for second
of civilization. language (L2) it has to be taught for ascertaining accuracy.
In this paper my objective is to get familiar with old and That is why we say L1 is acquired but L2 has to be learnt.
modern ways of teaching English based on Philosophical Once, the objective of learning a language was to enjoy
and Psychological theories relating to functioning of literature in that language. Later focus shifted to language
human mind and learning of a language with special with the concept ‗Language through literature‘. Then it has
reference to English as a 2nd language and evolve a way been teaching of Language Skills for communication.
that helps in attaining the goal, ability to use English. Abilasha, R and Dr M Ilankumaran highlight the changes
II. Pedagogy and Present Situation in the later parts of 20th century thus:
Research proved beyond doubt that a reasonable
knowledge of English could be attained in 6 to 9 months In the later years of 1970s, audio lingual method fell into
and that communication skills can be developed in 100 to disregard. During 1980s and 1990s, there was a sweeping
150 hours. As per pedagogy a student who completes 9th change over the existing trends then, and more emphasis
class is expected to possess a vocabulary of 2000 words was laid on authentic and meaningful contextualized
which is enough to display a reasonable ability in the four discourse.1
skills of language. By the time he completes his The Content and Language Integrated Learning (CLIC) is
Intermediate course (+2) he should have acquired a an approach where the English teacher uses cross curricular
vocabulary of 3000 words. He should be able to understand content and so the students learn both the content and
and use English for Specific Purposes (ESP) and face English. But when English teachers are asked to teach
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
lessons like ―Cloud Computing‖ they will have to look at is widely different from strategy for L2. For example
the clouds as they will not be able to teach neither English activity based teaching and language games are useful for
nor Computing with such lessons in the curriculum. A students under 14 as they do not understand as much as
lesson prescribed has not only to be student friendly but adults. These are waste of time for older students who can
also to be teacher friendly for teaching-learning to happen. understand concepts instantly and can spend time more on
With robots round the corner our objective in future is practicing the learnt aspect for consolidation. The point to
likely to be creative use of language. note here is a 5 year old in England has so much of ability
Earlier English teacher used to read the textbook line by in English usage which a 17 year old in India does not
line in the classroom while students noticed the have. Obviously the teaching methods applicable to a five
pronunciation of new words, different forms of a word (for year old Western are not suited to the 17 year old Indian.
example: appear, appeared, appearance, apparent, Ancient teachers while teaching Sanskrit, Greek or Latin
apparently), noted the shade of meaning from the context made the students learn things by heart when they are
and identified the word groups in a sentence which children and when they grew into adolescents they thought
improved their vocabulary and comprehension levels. and understood what they had learnt earlier. Memorizing
When meanings of words are learnt a student develops and analyzing are the two ways of learning at different
interest to read more on his own. Exposure to language in stages of life. Rashmi Pulizala and K Saritha righty said
any form makes him learn the word groups and word order ...recent research in 2nd language acquisition suggests that
or syntax automatically. Though Traditional Grammar was certain traditional practices of Asia, memorization and
taught separately students used to see how those rules were form-focussed learning, which were believed to be
applied while reading a text. Later teaching traditional ineffective, may have an important role to play in teaching
Grammar was discontinued and a veiled approach of and learning.2
indirect teaching of grammatical items without using terms VI. Adolescent Vs Child
of Grammar was used. Repetitive practise of Structures and Psycho-linguists discovered that children up to the age of
patterns was adopted. ten possess an extraordinary and mysterious ability to learn
IV. The Behaviourist School of Learning any number of languages that come their way without any
The Behaviourist School which believes in Inductive Logic effort. After that age their ability starts decreasing till 14.
is based on Pavlov‘s experiments with dogs. This led to the The ease of learning vanishes totally after 14 and a student
belief that association of ideas and drilling results in habit has to put in effort to learn a language. In adults knowledge
formation. So they felt that repetition of language results in of L1 helps in learning a second language (L2). Children
learning. B. F. Skinner, Leonard Bloomfield, Harold learn chunks of data where as adults can learn only item by
Palmer, A. S. Hornby, Charles Fries are some of the item. Understanding what is read, relating it to what is
protagonists of this school. They focussed on Structures, already known and tying to apply it are the factors which
accuracy, Speaking and RP. The sum and substance of this help students learn effectively. Word grammar (i.e.
view is that drilling exercises are enough to learn a different forms of words, conjugation), Homonyms,
language. Experimental verification shows that students Synonyms and Antonyms are good means of building
displayed 90 to 95% accuracy through this method of vocabulary. Mimicry, substitutions are useful in teaching
teaching without ever understanding what they wrote by Phonology, Connectives, Vocabulary and Syntax. If we
way of answers. Students from some of the corporate +2 aim for RP we may end up with Indian English. If we aim
institutions who secure high marks in +2 examinations but at Indian English we may end up with Tenglish (Telugu
get very low marks in EMCET are best examples to prove like English) or Hinglish (Hindi like English) etc. We
this point. should concentrate more on Listening and Reading while
V. The Cognitive School of Learning teaching children and on Writing and Speaking while
The Cognitive School which believes in Deductive Logic dealing with adolescents. Ability achieved in one skill
gives importance to understanding of what is read or heard helps in leaning other skills too as they are all inter-related.
and then produce sentences. Noam Chomsky and his VII. Testing: A tool to Learn
militant followers are the exponents of this school. The gist Testing is an important aid in teaching-learning process. It
of the Cognitive approach is -- Language is rational. So gives us feedback to decide the validity of the materials
apply your reason to learn language by understanding the used and the methods employed. More than Entrance or
material for reading. A look at the CBSE question papers Terminal Tests, Diagnostic Tests help us plan Remedial
reveals that less than 30% of the questions relate to the Teaching. There should be a specific objective for each (bit
prescribed texts and all other questions have to be of) question. If copying is allowed in the examinations by
answered with the general ability of a student. So a student ‗kind‘ invigilators that is the end of education and
today cannot depend on memorisation but try to understand consequently the nation.
concepts for his development. VIII. Conclusion
Methods for L1 and L2 Teaching Corporate colleges at +2 neglect English. But without
Age of a learner and the language of his region are major English survival is a problem. So teachers at collegiate
factors in learning a language. We adopt the research level have to put in more effort to bring the students back
findings regarding teaching English from England and on track. English language cannot be learnt without word
USA where English is L1 (mother tongue) and apply them consciousness. Teachers have to sensitize students to
here where English is L2. Clearly the strategy to teach L1 become conscious of spelling, contextual meaning,
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
FLY ASH
as Portland cement, quicklime, or hydrated lime, with the
Even with low water / cement ratio about half of the total presence of water in order to react and produce
water may still remain uncombined after long cementitious compounds. Fly ash produced from the
curingperiod, leading to porosity in the hardened concrete, burning of younger lignite or sub bituminous coal, in
resulting in poor performance. Therefore, it is necessary to addition to having pozzolanic properties, also has some
keep the total water content to a limited level, resulting in self-cementing properties. In the presence of water, Class C
lower workability, requiring better methods of compaction. fly ash will harden and gain strength over time. Class C fly
This can be achieved by using suitable admixtures. ash generally contains more than 20% lime (CaO). Unlike
There are inorganic materials that have pozzolanic Class F, self-cementing Class C fly ash does not require an
or latent hydraulic properties. These very fine-grained activator. Alkali and sulphate contents are generally higher
materials are added to the concrete mix to improve the in Class C fly ashes
properties of concrete (mineral admixtures), or as a E-PLASTIC WASTE: During the past few decades, the
replacement for Portland cement. These are called as phenomenon of premature deterioration of concrete
mineral admixtures. Admixtures are additions to the mix structure is being witnessed .This has become a matter of
used to achieve or improve workability and other concern in many countries bringing of the issue of
properties of concrete. durability of concrete in the fore front .Also the codes of
Fly ash use improves concrete performance, making it practice in many countries including Indian Code IS 456-
stronger, more durable, and more resistant to chemical 2000, have undergone changes Incorporating revised
attack. Its use also creates significant benefits provisions pertaining to durability of concrete. In this
for our environment. Fly ash is a by-product of coal- fired context an attempt has been made to high light the method
electric generating plants; it is used to partially replace of combining certain waste e-products along with the
Portland cement (by up to 60% by mass). The properties of conventional constituents of concrete which meets the
fly ash depend on the type of coal burnt. In general, requirements of special and uniformity that cannot always
siliceous fly ash is pozzolanic, while calcareous fly ash has be achieved using the traditional
latent hydraulic properties. Fly ash is generally methods of manufacturing of concrete.
captured by electrostatic precipitators or other particle The propose work aims at enhancing. The characteristics
filtration equipment before the flue gases reach the such as placement and compaction without segregation. It
chimneys of coal-fired power plants, and together with is aimed in the attempts made in this project to ensure
bottom ash removed from the bottom of the furnace is in long-term mechanical properties, early-age strength,
this case jointly known as coal ash. toughness volume stability or service life in severe
Depending upon the source and makeup of the coal being environments. E- waste describes loosely discarded,
burned, the components of fly ash vary considerably, but surplus, obsolete, broken, electrical or electronic devices.
all fly ash includes substantial amounts of silicon Rapid technology change ,low initial cost have resulted in a
dioxide (SiO2) (both amorphous and crystalline) and fast growing surplus of electronic waste around the globe
calcium oxide (CaO), both being endemic ingredients in .Several tones of E waste need to be disposed per year.
many coal-bearing rock strata. Since the particles solidify Traditional landfill or stockpile method is not an
rapidly while suspended in the exhaust gases, fly ash environmental friendly solution and the disposal process is
particles are generally spherical in shape and range in size also very difficult to meet EPA regulations. How to reuse
from 0.5 µm to 300 µm. Two classes of fly ash are defined the non disposable E waste becomes an important research
by ASTM C618: Class F fly ash and Class C fly ash. The topic. However, technically, electronic waste is only a
difference between these classes is the amount of calcium, subset of WEEE (Waste Electrical and Electronic
silica, alumina, and iron content in the ash. The chemical Equipment). According to the OECD any appliance using
properties of the fly ash are largely influenced by the an electronic power supply that has reached its end of life
chemical content of the coal burned. would come under WEEE. E plastic waste is one of the
The burning of harder, older anthracite and bituminous fastest growing waste streams in the world. In developed
coal typically produces Class F fly ash. This fly ash is countries, previously, it was about 1% of total solid waste
pozzolanic in nature, and contains less than 20% lime generation and currently it grows to 2% by 2010.
(CaO). Other minor constituents include oxides of calcium,
magnesium, titanium, sulphur, sodium and potassium.
Possessing pozzolanic properties, the glassy silica and
alumina of Class F fly ash requires a cementing agent, such
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
20 2 ) %) %) %)
40 1
Water 191.6 182.0 182.0 182.0 182.0
From the above table, for the specified (free) 2 2 2 2
maximum size of aggregate of 20mm, the OP 383 363.8 344.7 325.5 306.4
amount of entrapped air in the wet concrete is 2 Cement 5 5
percent. Taking this into account and applying Fine 546 546 546 546 546
Aggreg
equations: ate
V = [W + C/Se+ 1/p × fa/Sfc] (1/1000) Coarse 1278. 1278. 1278. 1278. 1278.
Aggreg 66 66 66 66 66
0.98=[ 191.6+383/3.15+1/0.315 x fa/2.60] x ate
1/100 2399. 2370. 2351 2332. 2313.
0 26 53 .38 23 08
fa =546Kg/m3, TABLE: 4 Comparison of plain concrete and e-
Ca = (l-p)/p × fa×Sca/Sfa plastic waste concrete (kg/m3)
Ca=(1-0.315)/0.315x546x2.8/2.6 E- E- E- E-
=1278.66Kg/m Ca=1188Kg/m3 Materia Plai plasti plasti plasti plasti
ls n c c c c
Water = 191.6Kg Concr waste waste waste waste
Cement = 383Kg ete concr concr concr concr
Fine ete ete ete ete
aggregate = 546Kg (5%) (10%) (15%) (20%)
Water 191.6 191.6 191.6 191.6 191.6
Coarse (free)
aggregate = 1278.66Kg
OP 383 383 383 383 383
TABLE: 2 the mix proportion then
Cement
becomes:
Fine 546 546 546 546 546
Aggreg
Fine Coarse ate
Water Cement Coarse
aggregate aggregate Aggreg 1278. 1214. 1150. 1086. 1022.
191.6Kg 383Kg 546Kg 1188K ate 66 727 794 861 928
g 2399. 2335. 2271. 2207. 2143.
26 325 394 461 528
0.5 1 1.425 3.34 EXPERIMENTAL WORK:
TABLE: 3 Comparison of plain concrete and fly It was proposed to investigate the behavior
ash concrete (kg/m3) of E-plastic as partial replacement of coarse
Materia Plai Fly Fly Fly Fly aggregate in concrete and fly ash replaced cement in
ls n ash ash ash ash concrete it is compared with the conventional
Concr concr concr concr concr concrete mix.
ete ete ete ete ete
(5% (10 (15 (20
TESTS ON CEMENT
The Ordinary Portland (OPC) cement of important properties of this cement have been
43 grade conforming to IS: 8112 1989 was used tested using Vicat apparatus, Le chatelier flask
for the present experimental study. The
TABLE: 5 Consistency of cement 6 90 300 33.3 6
TABLE: 6 Properties of Cement
Weight Weight
of of Depth of Values Standard
(W2/W1) S.N Characteristics
Sl. water cement Penetration obtained values
x 10 O
No in in (mm)
(gms (gms) Normal 33 to 35
1 consistency 34mm mm
) W1 W2
1 75 300 40 6 Not be
2 78 300 38.4 5 Initial setting
2 35 min less than
time
3 81 300 37.03 6 30mins
4 84 300 35.7 6
5 87 300 34.48 5
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
Not be and by considering the average of the test results
3 Final setting time 420 min greater and that are tabulated in table
than
600min
Not more
4 Fineness Test 2%
than 10%
3.12 to
5 Specific gravity 3.15
3.19
TABLE: 7 Characteristics of Sand
COMPRESSIVE STRENGTH
TEST:
These results are obtained by testing the GRAPH: 5 Comparisons of spilt tensile strength for
total 9 specimens for 7 days, 14 days and 28 days 5% replacement of fly ash and e-plastic waste with
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
conventional concrete
GRAPH: 7 Comparisons of spilt tensile strength for GRAPH: 12 Stress-strain curve of 15% of e-plastic waste
15% replacement of fly ash and e-plastic waste with cement concrete
conventional concrete
CONCLUSIONS FOR E-PLASTIC WASTE fly ash. However an increase in the content of fly ash
An analysis was made on the strength characteristics by gradually enhanced 7 days, 14 days and 28 days
conducting the test on e- waste concrete with e plastic compressive, tensile, stress-strain and toughness up
aggregate the results revealed that up to 5% to 15% replacement in the case of conventional
replacement e-waste concrete is giving improvement concrete.
compression, tensile and flexural strength. Graphs 1. Low volumes of fly ash improve the
show the compressive, tensile and flexural strength of compressive strength of concrete.
e plastic concrete with mixing ratio of e-plastic waste 2. Fly ash replacement with 10% produced highest
with coarse aggregate. However an increase in the compressive strength.
content of e plastic aggregates gradually enhanced 7 3. The young‘s modulus value will increases up to
days, 14 days and 28 days compressive, tensile, stress – 10%, after exceeds 10% of fly ash in concrete it will
strain, young‘s modulus and toughness up to 10% be falling down.
replacement in the case of conventional concrete. 4. The toughness value will be increases in up to
This study intended to find the effective ways to 15% of fly ash concrete.
reutilize the hard plastic waste particles as 5. Young's modulus has shown improvement with
concrete aggregate. Analysis of the strength the decrease of fly ash content.
characteristics of concrete containing recycled COMPARISONS OF E-PLASTIC WASTE AND
waste plastic gave the following results. FLY ASH CONCRETE
1. It is identified that e-waste can be From this project I conclude that the mechanical
disposed by using them as properties of the concrete, such as compression,
construction materials. tensile, stress-strain and toughness has been found to
2. The compressive strength and tensile strength of be fly ash concrete will give 5% more strength
concrete containing e plastic aggregate is retained More compare to e-plastic waste concrete for all
percentage of replacement
or less in comparison with controlled concrete specimens.
SCOPE OF FUTURE WORK
However strength noticeably decreased when the e plastic
content was more than 10%. Use of increase in percentage of e-plastic waste as
3. It has been concluded that 10% of E-waste coarse aggregates aggregate replacement up to 5% in
aggregate can be incorporated as coarse concrete mix results in good strength gain
comparative to conventional mix
aggregate Replacement in concrete without any long
Silica fumes and metakaoline may include in fly
term detrimental effects and with acceptable strength
ash concrete to enhance the strength behavior of
Development mechanism.
concrete.
4. The young‘s modulus of e-waste concrete will be
Durability test may also conduct.
increases up to 5% only after increasing e-plastic
Add fibers like glass, steel, polyethylene fiber
waste the young‘s modulus will be falling down.
which may increase the crack resistance.
5. The toughness value will be increases up to 10%.
We can opt M20 grade of concrete for better test
FOR FLY ASH CONCRETE result.
An analysis was made on the strength characteristics REFERANCES
by conducting the test on fly ash concrete with fly [1]. Concrete technology by M.S.SHETTY
ash replaced by the cement. The results revealed that AHAMED SHAYAN, AIMIN XU, ―Value added
up to 10% replacement fly ash concrete is giving utilization of waste glass in and Concrete Research
improvement compression, tensile, stress- strain and vol 34 (2004) pp 8189.
toughness. Graphs show the compressive, tensile, [2]. SECUNGBUM PARK, BONG CHUN LEE,
stress-strain of fly ash concrete with mixing ratio of ―Studies on expansion properties in mortar
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
Over a century after Jagadish Chandra Bose efficient and very high bandwidth. But the most
invented radio communication but saw Italian considerable part is that it consumes very low
inventor Guglielmo Marconi walk away with the power. Although, there is still no traces of 5G in
credit, he is set to get his due. The millimetre practice, but prototypes are being using by most of
wavelength frequency that Bose used in his the developing companies and geek‘s. We up to
experiment in 1895 is the foundation of 5G that now only have a single evaluation board provided
scientists and technologists across the world are by Qualcomm Corporation [3][4]. A lot more than
now trying to re-invent [1]. that follows is the recent technology emerging and
the usage of Internet based Applications and
Every network since from 1G to 4G which has appliances namely IoT & IoE, Lora Wan, etc. are
initiated wirelessly grew upon focusing to provide making a long usage of the data streams and their
various services related to the user priority. While requirements were increasing day by day through
the recent changes of obtaining the 4G LTE the Internet.
technology and the user ratio for the Internet has Of course, technologies related to Big Data and
grew enormously very large. Many applications Cloud are managing them currently but
after the introduction of Unlicensed Band Spectrum continentally it too requires a larger data streams to
of Wirelessly accessible networks issued has transfer the data rapidly through the internet. The
increased a lot giving a chance to produce a lot present emerged 4G LTE networks however are
many applications related to the usage of low able to handle them nicely but are still not
power and lower range Wide area networks like consistent to handle at some times. But the 5G
Lora Wan, Wi-Fi, IEEE 802.11a/b/g/n, etc. networks uses Beam Division Multiple
Access(BDMA) type Access technology that has a
When coming to the technical details regarding the potential to overcome this issue using its Quasi-
4G LTE networks, it is setting up the peak Orthogonal Filter Banks.
requirements of about 100Mbit/sec to 1Gbit/Sec
according to the ITU-T specifications. Since the These Access types raised a possibility of creating
first-release versions of Mobile WiMAX and LTE
support much less than 1 Gbit/s peak bit rate, they
are not fully IMT-Advanced compliant, but are
often branded 4G by service providers. According
to operators, a generation of the network refers to
the deployment of a new non-backward-compatible
technology.
On December 6, 2010, ITU-R recognized that these
two technologies, as well as other beyond-3G
technologies that do not fulfil the IMT-Advanced
requirements, could nevertheless be considered
"4G", provided they represent forerunners to IMT-
Advanced compliant versions and "a substantial
level of improvement in performance and
capabilities with respect to the initial third
generation systems now deployed‖. [2] Massive MIMO (Multiple Input, Multiple Output)
But we when viewing the opinion of maker‘s, they Technologies(fig2) that can make the accessing of
were very eagerly waiting for the public release of active nodes of users to be participated in the
spectrum bandwidths of 5G networks. communication flow without any sarcastic issues to
So, what actually 5G is? be followed by. The other most integrated issue is
5G is referred to as the 5th Generation Mobile that 5G comes out with IoT which will become a
Wireless Communication network, which provides part of it. This makes the user feel free and
a greater efficiency in calls than ever before with a comfortable to use his appliances and other Things
very high data rates ranging at millimetre to be worked and accessed out throughout the
bandwidths, starting at a frequency of 28GHz. world without any delay. It is due to the low
(fig1- Source: Google Images) latency issues that makes it to become low
Since it is using Millimeter waves, it has an interference by the other network signals from
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
figure out how to make all these systems work together, to its own and also the developers are also striving accordingly
ultrafast 5G service could reach consumers in the nexttofive it.
years. [5] References:
As par Industrial IoT(IIoT) is increasing that requires a [1].very http://timesofindia.indiatimes.com/city/kolkata/jagadish-
highly confidential and totally secured connectivity and onbose-frequency-holds-key-to-5g-
par
a very reliable source so that they can work on it easily. They
tech/articleshow/57696351.cms
all trust that 5G will Sure can make extract all its essence[2]. https://en.wikipedia.org/wiki/4G#cite_note-ITUSeminar-2
related to it. [3]. https://www.qualcomm.com/invention/5g/resources
Thus, I will Conclude my article, that there is a lot to be going
[4].
to have happen by the 5G networks, while some were onhttps://www.qualcomm.com/invention/research/projects/5g
the
par developing with Deep securities and with more [5]. extra
futurates in the name 6G & 7G in some parts of Europeanhttp://spectrum.ieee.org/video/telecom/wireless/everything-
and
Japanese Countries, but the 5G is creating a lot of hype related
you-need-to-know-about-5g
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
DATA STREAMS MINING PROBLEMS authors that balances accuracy, tree size and learning
speed.
To store continuous data stream is a great The results show that iOVFDT has good performance
challenge for storage devices. To generate pattern or for both synthetic and real-world concept-drift data
knowledge from stream data, algorithms with streams. The advantage of the adaptive tie threshold
different techniques are needed. We don‟t have makes iOVFDT suitable for real-world applications.
enough amount of space to store stream data and The paper is organized as follows: Section 1 introduces
problem occurs between accuracy of data pattern and the research topic; Section 2 reviews some related work;
storage. So we can classify into five categories as Section 3 presents the preconditions for the evaluation,
shown in table I. [10]. including the platform, data sources and measurements;
Section 4 analyzes the evaluation results and discusses
Table I. Classification of Challenges via Category the comparison; and Section 5 concludes the paper.
collection of machine learning algorithms three dimensions, the area of this triangle model is
(classification, regression, and clustering) and tools for defined as Φ(TRt) , where TRt is the decision tree
evaluation. Related to the WEKA project, MOA is also structure at timestamp t. The range of Φ(TRt) is within a
written in Java, while scaling to more demanding min-max model that ensures the variances of statistics
problems. In assification part, MOA has simulated mean and true mean isn‘t too big to maintain, where
decision tree algorithms that can be evaluated by built- Min.Φ(TRt)<Φ(TRt*)<Max.Φ(TRt). If Φ(TRt) goes
in measurements. The well defined experimental beyond this constraint, the existing model is not suitable
platform implements in two modes: graphic interface to embrace new data that the algorithm should be
and command line. iOVFDT aims to train a decision updated. Therefore, the nodesplitting condition is
tree with minimum error from big data, even if the data adaptively optimized that: ΔH(Xi)>HB or
contain imperfect quality like noise and bias data. The Φ(TRt)>Max.Φ(TRt) or Φ(TRt)<Min.Φ(TRt).
incremental decision tree algorithm that inherits the
use of Hoeffding bound in VFDT. Besides, four types iOVFDT Package Built-in MOA
of functional tree leaf are proposed in iOVFDT After downloading iOVFDT package
package, improving classifying accuracy. Suppose nijk (iovfdt.jar) and required MOA packages (moa.jar and
is the sufficient statistic that reflects the number of sizeofag.jar), GUI can be run by typing the command
attribute Xi with a value xij belonging to class yk. i ,j ,k in console:
are the index of attribute X, value of attribute Xi and java -cp iovfdt.jar:moa.jar -javaagent:sizeofag.jar
class y respectively. moa.gui.GUI
Majority Class functional leaf: Three new components are included in iovfdt.jar:
• Family of iOVFDT algorithm (four types of
Naïve Bayes functional leaf: optional functional tree leaf)
• Model Evaluation Method (with ROC statistics
and tree structure buffer output)
Weighted Naïve Bayes functional leaf:
• Decision Tree Visualization (by prefuse.jar
open source visualization tool)
Example 1a: evaluate model by GUI mode
1. Configure the task as EvaluateModel_ROC;
Error-adaptive functional leaf: 2. Select iOVFDT as the learning method;
3. Select the training data nursery_train.arff and
testing data nursery_test.arff.
ϜMC, ϜNB and ϜWNB require memory proportional to 4. Select the location to save tree model buffer to
O (N·I·J·K), where N is the number of nodes in tree IOVFDT_SampleTree.txt;
model, I the number of attributes; J is the maximum 5. Output the result to IOVFDT_MOA_2012.txt;
number of values per attribute; K is the number of
6. Press button ―RUN‖.
classes. ϜNB and ϜWNB are converted from that of
ϜMC. So we don‘t require extra memory for ϜEA
The related output results are shown in Fig 1 and Fig 2.
respectively. When required, it can be converted from
ϜM.
4 2
the tests from the 10 to the 10 samples and drift down
th th Third, we assess the accuracy, tree structure and memory
to the samples between the10,000 and the 20,000 data cost when different K values are applied in VFDT and
records. The accuracy clearly fluctuates when concept ADWIN. However, we do not know which value of K is
drift exists in the data streams. Zooming in reveals some the best until all possible values have been tried. This is
details, such as a crossover between the 25% drift and not practical in real-time applications. In this test, we use
50% drift in Figure 7. However, the overall trend shows K = 0.05, 0.10, 0.15,…, 0.95. In addition to accuracy, the
that concept drift gradually reduces the accuracy. Kappa statistic [7] and the structural features of the
decision tree model, such as the number of nodes, number
of leaves and tree depth, are important for evaluating the
models. Each path from the root to a leaf represents a rule
in the decision tree model, thus the number of leaves
reflects the number of patterns in the tree model. In
addition, the amount of memory consumed reflects the
computation cost of a tree-learning algorithm in the MOA
platform. For VFDT and ADWIN, we show the average
result for different K values in Table III. iOVFDT
generally outperforms VFDT and ADWIN in this test. We
use the iOVFDT result as the benchmark, and Table IV
shows the improvement compared to VFDT and ADWIN.
In this table, we find that iOVFDT improves accuracy by
1-2%, and improves the tree size by more than 15% and
Figure 6. Negative Effect of Concept Drift on Accuracy 35% compared to VFDT and ADWIN. In addition,
iOVFDT consumes less memory and thus reduces the
computational cost.
Abstract- Wireless charging is a innovation of Firstly, it enhances the user-friendliness as the hassle
transmitting power through an air gap to loads f with the from connecting cables is expelled
end goal of energy recharging.The current advance in Secondly, diverse brands and distinctive models can
wireless charging procedures and improvement of charged by the same charger.
business items have given a promising option approach to Thirdly, it enhances the flexibility, especially for the
address the energy bottleneck of traditionally convenient devices for which replacing their batteries or
battery-controlled gadgets. However the fuse of wireless connecting cords .
charging into the existing wireless communication system Fourthly, it produces better durability (i.e., water
additionally carry a progression of testing issues with in proof and dust proof) for contact free devices.
regards to execution, scheduling and power Fifthly, the wireless charging can give the asked for
administration.In this article we introduce far reaching control by the charging gadgets on request mold and
diagram of wireless charging procedures, the in this manner more adaptable and effective.
improvements in specialized measures and some system
applications. Actually the system applications of these Nevertheless, normally wireless charging incurs
generally have a place with medical implantation and higher implementation cost contrasted with wired
versatile chargers for any electrical and electronic charging. First, a wireless charger should be introduced as
loads.Furthermore, we examine open difficulties in a substitution of conventional charging cord. Second, a
executing wireless charging innovations. mobile requires implantation of a remote power reciever.
In addition, as wireless chargers regularly create more
Index Terms- Wireless charging, Wireless Power heat than that of wired chargers, extra cost on making
Transfer, Magnetic coupling, Resonance coupling, material might be brought about.
Radiative/RF radiation, Acoustic Power transfer,
Ultrasonic Resonance. The development of wireless charging is mainly
going in two directions they are:
1. Radiative wireless charging (RF or radio frequency
I. INTRODUCTION based wireless charging).
Wireless charging is also called as wireless power 2. Non-radiative wireless charging (coupling based
transfer, is a technology that enables the source to wireless charging).
transmit the electromagnetic energy to a electrical load 3. Acoustic wireless charging (ultrasonic resonance
through the air gap without interconnecting cords. This based wireless charging)
innovation is drawing in an extensive variety of
utilizations from a low power tooth brush to high power Radiative wireless charging receives EM waves,
vehicle in view of its comfort and better client precisely RF waves or microwaves for the power
encounter.Presently a-days, this innovation is quickly exchange through the medium as radiation(given in
developing from speculations towards the standard Section4.2). The energy exchanged relies on upon the
component of a business item particularly if there should electric field of the EM wave which is radiative. Because
be an occurrence of keen contraptions. Many driving of the safety issues raised by RF exposure [5] these
organizations like Samsung, Apple, Huwaei, started to charging for the most part works in low power area. On
discharge new era mobiles which are having in-fabricated the other hand, non radiative wireless charging in view of
wireless charging ability.Presently a-days is quickly the coupling of the magnetic field of the two coils inside a
developing from speculations towards the standard separation of curls measurement for energy
component of a business item particularly if there should transmission(given in Section4.1). As the magnetic field
be an occurrence of keen contraptions. Many driving of the EM wave lessens rapidly than the electric field of
organizations like Samsung, Apple, Huwaei, started to the EM wave so in this innovation the power exchange
discharge new era telephones which are having in- distance is especially restricted. Due non radiative nature,
fabricated remote charging ability.IMS look into this innovation has been generally utilized as a part of day
by day charging exercises.
[3] imagined that wireless charging items will be 4.5 Aside from the above advances there is a new
billion market by 2016 and it crossed the farthest point charging innovation that which was developed as of late.
they evaluated. Pike inquire about [4] evaluated that the It is 'Acoustic Power Exchange'. In this really ultrasonics
cordless controlled items will be tripled by 2020 getting to are utilized for the exchange of energy. The guideline
be 20 billion market. required in his innovation was ultrasonic resonance. This
innovation has a decent degree going into the market as it
Comparing to the traditional charging techniques the can be a proficient and eco-friendly(given in Section4.3).
wireless charging has the following benefits:
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
In this article we expect to give an extensive view on generally additionally created and popularized. Beside
developing wireless charging accusing frameworks Tesla, W.C.Brown, who is the practical engineer
along of their principal technologiesand application in invented a component called Rectenna. This component
correspondence systems. This view covers different real is utilized to exchange the microwave power into
wireless charging advances like inductive coupling, electricity[20]. Advance improvements are taken in the
magnetic resonance coupling, RF/microwave radiation, rectenna configuration to get high power. This is the
Acoustic(ultrasonic resonance) . The article arrange is as historical backdrop of wireless charging innovation.
per the following, Right off the bat we will clarify how
the wireless charging appeared i.e., history of it and the
essential required in cordless power exchange wonder. III. BASIC PRINCIPLE OF WIRELESS
Besides, the sorts of wireless charging innovations that CHARGING
appeared till now and there separate block Wireless power transfer is process which is almost
diagrams,system flows, functionality, applications, similar to the basic communication system process.
advantages,disadvantages. Power is needed to be transferred from transmitter to the
reciever by using different technologies or schemes(i.e.,
II. HISTORY coupling method, RF method) which is as similar to that
Electromagnetism is the pioneer point of remote of the message signal transfer from the transmitter to the
power exchange where EM waves convey the energy. reciever in the basic communication system where we
The investigation of electromagnetism was begun use different types of modulation schemes which are
from1819 when H.C. Oersterd found the electric current used to transfer the message signal effectively. In a
createsmagnetic field around it. Later on Ampere's Law, simple way to say the wireless charging technologies are
Biot-Savart's Law and Faraday Law had inferred to give the analogous of modulation schemes in the
some fundamental property of the magnetic field. communication systems
Tailing them, in 1864 J.C. Maxwell acquainted a few
conditions with describe how the electric and magnetic ig.1. Block diagram of basic wireless charging
fields are produced and altered each other. Later in 1873
production of Maxwell book 'A Treatise on Electricity
and Magnetism' which actually unified the electricity
and magnetism[15]. From that point forward the
electricity and magnetism are said to be controlled by a
same force.
Later on Nicolas Tesla,who is the founder of
alternating current electricity, was the first to lead probe
wireless power exchange by utilizing microwaves. He
concentrated on long-distance wireless power transfer
and understood the exchange of microwave signals over
a separation around 48 kilometers in1896. Another e figure1 is the basic block diagram of the basic wireless
significant breakthrough was accomplished in 1899 to charging technology. The primary square speaks to the
transmit 108 volts of high -frequency electric power over power source which is for the most part known for all
a separation of 25 miles to light 200 bulbs and run an which gives the electrical power. The following square
electric motor[16,17]. However, the innovation that is the Power Transmitting Unit (PTU) which is the
Tesla applied must be racked on the grounds that comprises of energy amplifier,matching circuits, A-D
transmitting such high voltages in electric arcs would converters, correspondence module and resonator
make appalling impact to people and electrical hardware (primary) or transmitter. In this square the electrical
in the vicinity.Around the same period, Tesla energy changed over in type of EM waves where the
additionally made an extraordinary commitment to EM waves convey the electrical energy to the following
advance the attractive field progress by presenting the piece through the air gap. This PTU square has a similar
well known "Tesla coil", illustratedin 1901, Tesla functionality of the modulator in the communication
developed the Wardenclyffe Tower, appeared into system.
exchange electrical energy without cords/wires through Alongside PTU ,we have Power Receiving Unit (PRU)
the Ionosphere. In any case, because of innovation which comprises of resonator(secondary) or recipient,
confinement (i.e., low system efficiency because of rectifiers, DC -DC converters, communication module.
large scale electric field), the thought has not been
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
Thickness of top and bottom flange is 800 mm Shear force / meter width = 71.150[2.3-0.755]/2.30
= 47.794 KN
Thickness of web is = 200 mm
Shear force with impact = 1.25×47.794 = 59.7 KN
Dead Load and Bending Moments and Shear Thickness of top and bottom flanges = 350 mm
Forces:
Width of flange = 600 mm
Design B.M including continuous factor MB =
Thickness of web = 200 mm
0.8×4.70 = 3.76 KN m
Section properties of main girders:
ML = 0.8×1.65 = 1.32 KNm Dead load shear force
= 0.5×7.76×2.3 = 8.944 KN Cross sectional area A = 0.58 m²
Total Design Moment and Shear Force: Second moment of area I= 1.516×1011 mm4
=0.1509 m4 yb = yt = (1500/20) = (1.5/2) = 0.75 m
Total MB = (35.35+3.76) = 39.1 KNM
Section modulus = ZB = Zt = (I/fb (or) yt) =
ML = (12.14+1.32) = 13.46 KNM Total shear force
0.201×109 mm³ The main girders are precast and
Vx = 67.674 KN
the deck slab is cast insitu.
Effective Depth:
Loads acting on main girder:
D =√M/QB
The total dead load (g) = 20 + 14.5 + 5 = 39.5 ≈ 40
=√39.11×10 ×10/0.762×1000 KN/m
= 226 mm≈ 230 mm Dead Load Moment and Shear Force:
Adopt effective depth d = 230mm Dead load moment at mid support section MgB =
4500 KNm
Check for shear:
Dead load moment at mid span section MgD =
Nominal shear = Jv = V/bd=0.242 N/mm2
2556 KNm Dead load shear is maximum near
Jc = 0.25 N/mm² for a slab of overall depth 250mm support section and is computed as
read the value of constant k= 1.1 from table 3.10
Vg = 0.62×g×L
The permissible shear stress in concrete slab = kJc
= 744 KN
= 0.275 As ζv < ζc Hence shear is safe.
Area Of Steel :
AST = [M/Σst×jd]
= 938 mm²
Use 12mm diameter bars
Spacing s = 1000ast/Ast
= [1000×Π/4×12²]/938
Figure 8. Bridge elevation
= 120.57mm≈ 120mm c/c
Provide 12 mm bars at 120 mm centers
Effective depth along long span using 12 mm
diameter bars
Use 10mm diameter bars at 150mm centers
Table 1.
Figure 14.
= 8258.655 KN
Using Freyssinet system anchorage type 19k -15
(19 standards on of 15.2mm diameter) in 95mm
cable duct. Force in each cable = 19×0.8×260.7 =
39.62 KN
Provide 3 cablescarrying an intial prestressing
force
P = (3×3962) = 11886 KN
Area of each strand of 15.2 mm diameter= 140 According to IRC: 18 – 1985 the ultimate shear
mm² resistance of the support section un cracked in
flexure is given by
Area of 19 strands in each cable = 19×140
Vcw = 742.824KN < 2183KN
= 2660 mm²
Unbalance shear = 2183 – 742.824 =
Total area in 3 cables Ap= 3×2660 = 7980 mm²
1440.176KN
The cables are arranged in a parabolic concordant
Using 16mm diameter 2 legged stirrups at a
profile so that their centroid has an eccentricity of
spacing of 80mm centers near supports gradually
500mm towards top fiber at mid support B are an
increased to 200mm towards the centre of span.
eccentricity of 372 mm towards the bottom at mid
span section D. Design of end blocks:
Solid end blocks of 600mm by 1500mm are
provided for a length of 2m from each of the two
end faces.
Brusting tension Fbst = 0.17×3962 = 673.54KN Use
Fe-415 HYSD bars
Ast= = 1865.50mm²
Figure 15. Provide 16mm diameter bars at 150mm centers in
the horizontal plane distributed in the region from
Center Of Span Section: 0.2yo to 2yo.
(P/A) = (11886×103)/ (0.58×106) = 20.49mm²
(Pe/Z)= (11886×103×372)/0.201×10⁹ = 21.99mm²
(Mg/Z)= 2556×106/0.210×10⁹ = 12.716mm²
(Mq/Z) = 2190.166×106/0.201×10⁹ = 10.896mm²
At the stage of transfer
At top σt = (P/A - Pe/Z Mg/Z) = 11.216mm² At
bottom σb = (P/A + Pe/Z – Mg/Z) = 29.764N/mm²
At the service load state σt = (η(P/A) Figure 16.
η(Pe/Z)(Mg/Z)(Mq/Z)) = 22.412 mm² σb =
(η(P/A) (Pe/Z) –(Mg/Z) – (Mq/Z)) =
10.328N/mm² Maximum and minimum stresses are in table:
Table 3.
Mid Support Section:
(C) DESIGN OF PIER:
P/A = 20.49 N/mm² Pe/Z = 21.99 N/mm²
Mg/Z = (4500×106)/0.201×10⁹ = 22.38 N/mm² Dead load from each pier = 40KN
Mg/Z = (1094.20×106)/0.201×10⁹ = 5.443 N/mm²
Reaction due to live load on one span = 700 KN
At the stage of transfer σt = (20.49 + 21.99 – 22.38
Breaking forces = 140KN
) = 20.1 N/mm² σb = ( 20.49 – 21.99 + 22.38 ) =
20.88 N/mm² Wind pressure on the pier = 2.4KNm²
At the service load stage Materials of pier 1:3:6 cement concrete
σt =( 0.8(20.49+21.99) – 22.38 – 5.443 )= 6.161N/ Density of concert = 25KN/m²
mm²
σb = (0.8(20.49 – 21..99) + 22.38 + 5.443 ) =
26.623 N/mm²
The stresses are within permissible limits.
The ultimate strength is nearly equal to the mid
span.
Aus = (Mbal/0.87fy(d-0.5Df)) = 5336.46 mm²
Provide 9 bars of 25mm dia (As = 5750 mm²)
Check for ultimate shear strength:
Design shear force = Vu = 2183.605 KN
S:NO
STRESSES
TYPE OF
LOAD
Figure 18.
Dead load and self
1. weight 203.13 203.13 Factor of safety = = = 32.94 > 2
Hence the abutment has sufficient factor of safety
2. Buoyancy _ -76.49
against sliding.
(E) ELASTOMETRIC PAD BEARING:
3. Eccentric live 55.56 55.56
Maximum dead load reaction for bearing = 40KN
Maximum live load reaction for bearing = 70KN
4. load 109.8 109.8
Longitudinal frictional force for bearing = 45KN
Breaking force (Assume)
Effective span of the girder = 30m
5. Wind pressure 8.30 8.30 Estimated rotation at bearing of the girder due to
dead and live load = 0.002 radians
Total estimated shear stress due to creep, shrinkage
and temperature = 6×10-4
Concrete for beam and bed block = M20 grade
Allowable contact pressure (σc) =0.25×20× =
7.07N/mm²
Effective bearing area =
= )
σA = 790.5KN/m² σB= 87.83KN/m² Figure 19.
IV. CONCLUSION
The following conclusions are drawn upon: composite beams prestressed by external slipping
Bending moments and Shear force for PSC T-beam cables, taking into account the deformability of the
girder are lesser than RCC T-beam Girder Bridge. interface shear connection.
Which allow designer to have lesser heavier section [5] Analysis of prestressed composite beams
for PSC T-Beam Girder than RCC T-Girder for 60 using both elastic assumptions and approximate
m span ultimate strength methods was also discussed in
Construction of this bridge is reducing the traffic papers by Szilard and Hoadley(1963).
problems at peak hours. [6] Stras (1964) tested three simply-supported,
Moment of resistance of steel for both has been prestressed composite beams, all of them
evaluated and conclusions drawn that PSC T-Beam prestressed along their full length with 10mm
Girder has more capacity for 60 m and more than diameter high-strength tendons at an eccentricity of
60 m of span. 22mm from the tension flange
Shear force resistance of PSC T-Beam Girder is [7] Ng Chee Khoon (1997) tested a series of 18
more compared to RCC T- Girder for 60 m span. beams ranging from 1.5m to 9m using L/dpso ratio
As we go Total Super structure of a Bridge Project between 15 and 30 for their second order effect.
the Quantity of steel and the Cost of concrete for
PSC TBeam Girder is less than RCC T-Beam
Girder as quantity required by T-beam Girder.
Deflection for PSC T-beam Girder is less than
RCC TBeam Girder Bridge.
Durability for PSC T-beam Girder is more than
RCC TBeam Girder Bridge.
V. CODES & STANDARDS
The design of various components of the structure,
in general are based on provisions of IRC/IS
Codes.Wherever IRC code is silent, reference is
made to other Indian/International codes and
standards. The list of IRC Codes (latest revisions)
given below will serve as a guide for the design of
structures.
1) IRC: 5-1998 Standard Specifications and
Code of Practice for Road Bridges, Section I –
General Features of Design.
2) IRC: 6-2000 Standard Specifications and
Code of Practice for Road Bridges, Section-II –
Loads and Stresses.
3) 5.
4) IRC: 21-2000 Standard Specifications and
Code of Practice for Road Bridges, Section-III –
Cement Concrete.
5) IRC: 18-2000 Design Criteria for Pre-
stressed Concrete Road Bridges (Post Tensioned
Concrete) (Third Revision).
6) IRC: 22-1986 Standard Specifications and
Code of Practice for Road Bridges, Section-VI –
Composite Construction..
7) IS: 6006-1983 Indian Standard Specification
For Uncoated Stress Relieved Strand For Pre-
Stressed Concrete.
REFERENCES
[1] Bridge Engineering by V.V.Sastry
[2] Prestressed Concrete by N Krishna Raju
[3] Bridge engineering by N Krishna Raju
[4] Miyamoto proposed in 1997 to study the
effect of prestressing using external tendons to
strengthen the Misaka Bridge in Hyogo Prefecture,
JapanDezi (2002) proposed a model for
analyzing the nonlinear behaviour of steel-oncrete