0% found this document useful (0 votes)
11 views58 pages

Editorial: G One S Own Technical Findings. This Issue Is Exclusively Devoted

The PARISHODHANA journal, launched by Geethanjali Institute of Science & Technology, serves as a platform for faculty and students to present original research and discussions in engineering and technology. The first issue includes a variety of papers covering topics from home security systems to concrete studies, aiming to foster a research culture within the institution. The journal encourages contributions from the academic community to enhance technical writing and dissemination of knowledge.

Uploaded by

php11047
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views58 pages

Editorial: G One S Own Technical Findings. This Issue Is Exclusively Devoted

The PARISHODHANA journal, launched by Geethanjali Institute of Science & Technology, serves as a platform for faculty and students to present original research and discussions in engineering and technology. The first issue includes a variety of papers covering topics from home security systems to concrete studies, aiming to foster a research culture within the institution. The journal encourages contributions from the academic community to enhance technical writing and dissemination of knowledge.

Uploaded by

php11047
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

EDITORIAL

The PARISHODHANA, an In-House Journal of Science and Technology, launched from


Geethanjali Institute of Science & Technology, Nellore, aims at providing a forum to the research
community for presentation of original work, reviews and discussion of latest developments in various
fields of engineering. Research culture should form an integral part of an Engineering College and a
Technical Journal with papers and articles exclusively contributed by the faculty members of the
College will go a long way in inculcating the apt research culture in the institution. This In house
Journal of Science and Technology, the first issue of which is being launched, is an attempt in this
direction. The current volume contains research papers as well as perceptive articles by the staff and
students of the college. The papers span a wide range including basic sciences and management
science, apart from the engineering disciplines.

This Journal is a culmination of our efforts in adding a scientific and technological flavor to
the services that are offered from GIST. The scenario of globalization had provoked the theme of
quality and standard blended with high level of competence amongst the industrial sectors. The
present day technological advancements are more rapid and recommend an amalgamated
Engineering curriculum warranting students to equip with creative thoughts and multi level skills.

This Journal shall motivate the young minds to put forward their technical ideas in a lucid
way and develop the art of publishing one‘s own technical findings. This issue is exclusively devoted
for publishing the research/project works carried out experimentally, analytically or both in different
fields of Science, Engineering and Technology. I wish the editorial Board for their strenuous efforts
in making this issue blossom with contents. Indeed such efforts are never possible for us without the
stupendous support of our noble and service minded Management members.

I hope all our readers would be enlightened through this issue, which shall knock the doors of
numerous enthusiastic readers every year. I request all the teachers and students keep writing to us
and send their valuable technical articles for publication.
CONTENTS
Title of the Paper

1. An Integrated Approach for Microwave Home Security System


Dr.Shaik Mahaboob Basha, Dr.Mitta Raja Reddy

2. Optimal Design of Fused Chopper based Standalone Hybrid Wind Solar System
Dr.P.Vinoth Kumar

3. A Security Approach in System Development Life Cycle


Mathan Kumar M, Dr. Anu Bharti

4. Analysis of IA And PSO Algorithms for Siting and Sizing of DG in Primary Distribution
Networks
Thummala Ravi Kumar

5. Survey on Fuzzy-Based Routing Protocols in Magnets


V.Gayathri

6. A Novel Multirate Weighted FIR Filter Design using Vlsi,


K. Mohana Krishna

7. Teaching English: Analysis of Practices


Rajendra Singh Baisthakur

8. A Comparative Study on Concrete Containing E- PlasticWaste and Fly Ash Concrete with
Conventional Concrete
Shaik Nadhim, P.Navya Shree, G.Pranay Kumar

9. Is 5G A New Update for 4G or a New Technology?


K. Pradhyumna Kumar

10. IOVFDT for Concept-Drift Problem in Big Data


Rajeswari P. V. N , Radhika P.

11. Finding a Nearest Node by Circulating Sample Sachet


Thanveer Shaik And Radhika P

12. Investigation on Wireless Charging


R V S Narayana Kumar, T Giridhar Sai

13. Design of Prestressed Concrete Bridge Cross over a Cannol at Gandhi Janasangam
Shaik Nadhim, Vijaya Prathima,Rajeswari Isanakula
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

An Integrated Approach for Microwave Home Security System


Dr.Shaik Mahaboob Basha1, Dr.Mitta Raja Reddy2
Professor1,2 Department of E.C.E
Geethanjali Institute of Science and Technology, Gangavaram, Nellore, India
E-mail: [email protected] , [email protected]

because people far away from their home can feel


ABSTRACT secure. Thus, it leads the consumers to be more
In modern society, the crimes occur frequently deterministic towards their works. The
more high-tech, intelligent trend in recent years. Microcontroller Based Home Security System is a
People have to be more attentive in home low-cost security system, and it is really easy to
security. This paper discusses the development of make a home secure.
a low-cost microwave home security system to 2 System Overview
detect the motion of people accurately in the
required premises. An alert is produced to warn The existing home security systems were very
persons that the space has been violated. The expensive and ineffective and seem to be working
transmitter section which contains microwave on the principles of burglar alarms and ordinary car
sensor continuously transmits Microwave rays alarms. Thus adequate changes in the designing of
which are received by the receiver section. home security systems are required. In the earlier
Microwave sensors utilize electromagnetic fields security systems, if trip happens it caused a loud
and devices internally. The microwave sensor siren to sound. In order to monitor these systems
works on the principle of Doppler Effect which the attendees have to be within hearing distance
will detect the change in frequency. The which is not possible always. Intruders quickly
transmitted signal illuminates the quantity of learned how to defeat these systems making the
interest, and the receiver detects the existence, home security system essentially useless. The old
distance and position of a target, which has better home security systems were triggered by the
application than PIR, IR and other object release of a button fitted into a door or window
detecting sensors. The output of PLL will be the frame [1]. Once the alarm was triggered the
difference between the locked frequency and the intruder could easily silence the alarm by closing
received frequency. Soon after the microwave the entry way used to enter the properties. So the
signal is interrupted, the microcontroller the security system is not good enough to protect the
program burnt into the EPROM and control the resident from the intruder. However in the present
alarm and serially sends a message in SBUF to system, the home security system is more efficient
the GSM module. The operation of whole system and gives a lot of convenience to the homeowners.
is controlled by user’s mobile phone to turn ON This system is silently alert the homeowner about
and OFF the microwave sensor using the DTMF the activities in the home [2]. Combining the
decoder circuit. This paper is implemented using advancement of the technology used to create and
the after-market parts and build an integrated develop home security systems together with the
home security system.. Internet, the home security system will silently
send signals of the intrusion to a call center run by
Keywords: microwave signal; sensor; memory;
the home security company or nearby police
mobile phone; home security.
station. It will also send a message to the
1 Introduction homeowner cell phone to alert if there is possible
break in.
Several microcontroller based home security 2.1 Comparison with Automation Home Security
systems are available in the market. Although System and Digital Home Security System Every
different real time systems designed mainly to security system has strength and weaknesses that
protect homes against theft when the house owners can be observe such as accuracy, speed of
either in home or away, the microcontroller based execution, safety, usability and much more. For
home security system differs from them in multiple both examples, the purpose of this work is same
ways. Because of its versatile nature of the where to produce home security systems that
combination of different security techniques such provide a lot benefit to consumers. In general, the
as Microwave sensors and GSM module, it commonly used automated systems for home
becomes more popular trend of home security security are audio components, HVAC, intercoms,
system in particular. The system can be easily lighting, natural lighting, security, video, and other
programmed, executed, monitored and control by systems [2]. There are advantages and
the user and also have more beneficial effects on disadvantages of home automation security
society. Its social impact will be very important,
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

systems. The most obvious and important


advantage is that a home automation security
system will help to prevent break-ins at the home.
Automation Home Security System gives
convenience to consumers to access many devices
within home remotely, or from a central location.
Another advantage of automation home security
system is the energy efficiency and saving which
will help to manage the energy consumption. In
addition, the system is low cost, less space
required, high security and high speed. Meanwhile, Fig. 1 2N3904 NPN transistor (Q1,Q2), 2SC2498 or 2570
the Digital Home Security System also has strength NPN UHF transistor (Q3), BS170 FET transistor (Q8), LM-324
op-amp (U1)
which the speed of the execution is high. The
usability of the system is very practical where it 3.2 PLL Circuit
can be used not only in the home environment but
also in a business environment too. Besides, it can
be highly customized to suit each one's need and
preference.
3 Component Selection
3.1 Microwave Sensor
In addition to the microcontroller incorporating
the microwave sensors, the system becomes a
sophisticated home security system. The RF
"magic" is combined with Q3 and D1. We know
that Q3 is a free running microwave oscillator and
it operates approximately around 1.0 GHz. The
Fig. 2 PLL Circuit
lead lengths which contains inductance of the
associated oscillator components for determining
the length of the etched strip line are used. An The PLL circuit, which is shown in Fig.3 plays
Omni-directional pattern from the antenna helps a major role in making the proposed system more
the microwave RF energy to be radiated. This effective in frequency synthesizing process. The
radiated energy will fill the surrounding area with microwave c systems where signal integrity is of
radio waves. These waves will be reflected back first importance depends on PLL synthesizers.
toward the antenna. Thus, higher levels of frequency stability and
Now, the role of the Doppler Effect comes in accuracy with phase noise can be achieved
to the scenario. If within that area there is an object optimum levels. Our aim of making the integrated
that is moving, the waves that are reflected will microwave home security system can be designed.
either be higher in frequency if the object is Further these PLL synthesizers can also be used in
moving closer or lower if moving away. The test and measurement, and microwave radios also.
Motion detector doesn't really care which direction;
it is only looking for a frequency difference [3]. The LM567 tone decoder is used in designing
The radiated signal and the redetected signal are process to provide grounding of a saturated
mixed at diode D1. The difference in the two transistor switch during the process, if an input
frequencies provides the input to U1:C pin 10. This signal is present within the pass band. The circuit
frequency (the difference) is in the range of 10 Hz consists of an I and Q detector driven by a voltage
to 40 Hz. U1:C is the amplifier that feeds the controlled oscillator which determines the center
sensitivity potentiometer R8[4]. Transistors Q1 and frequency of the decoder. External components are
Q2 function as a very precise voltage regulator used to independently set center frequency,
providing the proper bias to the amplifiers.U1:D bandwidth and output delay.
functions as a band pass filter and amplifier. Buffer The standard equations for determining the
amplifier U1:A provides the drive to output center frequency of the tone decoder is equal to the
transistor Q8. free running frequency of the VCO and bandwidth
of the filter are expressed in equations (1) and (2)
respectively.

fo= 1/(1.1 R1C1 ) (1)


PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

and 128 x 8-bit Internal RAM. Due to these


(2)
Vi features, the real time characteristics are achieved
BW= 1070 for the design. The low power issues have been
f 0C2
resolved with the salient features of the selected
microcontroller like two 16-bit Timer/Counters and
in % of 𝑓0 f0 low-power Idle and Power-down Modes.
Where: Vi = Input voltage (volts rms), Vi≤ 200mV, 3.5 DTMF Decoder
C2 = Capacitance at Pin 2 (μF)
The whole system is powered up and switched
3.3 GSM Module off by user‘s mobile phone. This uses the principle
The GSM module is used in the process to
connect the system with the authorized person to
detect the intruder‘s entry into the restricted area.
GSM, a wireless modem works with a GSM
wireless network for data transfer. We can use a PC
card. External GSM modems are connected to PC
through a serial cable or USB cable. Like the GSM
phones, a GSM modem requires a SIM card from a
wireless operator to enable it transfer data through
the operator network. GSM modems are controlled
by AT commands obviously.
With the help of these AT commands, the of DTMF. The 8870 DTMF decoding chip
GSM modem can be used for read, write and delete identifies the tone given at its input and gives the
operations effectively.. The Wavecom make of decoded output in binary format at the output
external GSM modem module was used in this pins, using the process explained above.
system for SMS communication. It was interfaced
to the microcontroller as shown in Fig.3.

Fig. 4 DTMF Decoder

The microcontroller is programmed to identify


and energize the respective relay to activate the
particular extension identified by the 8870
decoding chip. Detection of Dial tones are reflected
on the bit TOE, while the output Q4, Q3, Q2, Q1
indicates the dial tone that is being detected on the
telephony system.

Fig. 3 GSM module 4 Testing and verification


3.4 Microcontroller The results for our microwave wireless home
security system were achieved two significant
For the purpose of designing a low cost, is a issues such as design and construction of two
low-power, high-performance CMOS 8-bit motion detectors. The basis for a Master/Slave
microcomputer (The Atmel AT89C51) is network consists of a base station and a transceiver
considered. It is of 4K bytes of Flash module.
programmable and erasable read only memory. It Initially PLL is set to a constant center
consists of 8- bit CPU with Flash on a monolithic frequency of 90 kHz. When an object is detected
chip. The on-chip Flash allows the program by the sensor, the receiver receives the frequency
memory to be reprogrammed in-system or by a shift which is given to the PLL circuit which in
conventional Nonvolatile memory programmer. turn gives a high voltage of 3.5V. The output of
We considered this AT89C51 microcontroller as it PLL is given to microcontroller‘s port A. Upon
is a powerful microcomputer. receiving high voltage, microcontroller turns on
Buzzer and sends message serially to the GSM
module.
It provides a highly-flexible and cost-effective
solution in our design. This microcontroller having 5 Conclusion
additional features like compatibility with MCS-
Finally, a low cost, auto-configurable and
51™ Products, fully static operation with a range
remotely controlled solution for security of homes
of 0 Hz to 24 MHz, 3-level Program Memory Lock
has been introduced. The design approach
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

discussed in this paper is a novel technique and has Multifunctional Devices. IEEE Consumer
achieved the target to control home security Electronics, 51(4),1169-117.
system. Another issue resolved is the remote SMS
[4] Jawarkar, N. P., Ahmed, V., Ladhake, S. A. &
based system satisfying user needs and
Thakare, R. D. (2008). Micro-controller based
requirements. GSM technology capable solution
RemoteMonitoring using Mobile through Spoken
has proved to be controlled remotely, provide home
Commands. Journal Of Networks, 3(2),58-
security and is cost-effective as compared to the
63.University, Prague, 1979
existing systems.
[5] M. Tiuri, ―Microwave Sensor Applications in
References Industry,‖ AltaFrequenza, LVI, No. 10, Dec. 1987,
pp. 393-397.
[1] David Crouse, Michael Dias and
DarkoVudimir, 2004 ―Wireless home security
system‖ University of Connecticut. Acknowledgments

[2] J. Polivka, ―Microwave Radiometry and The authors wish to thank the Principal and the
Applications,‖ International Journal of IR/MM Management of Geethanjali Institute of Science
waves, Vol.16, No.9, Sep. 1995. and Technology, for their support to present this
[3] Alkar, A. Z., &Buhur, U. (2005). An Internet paper.
Based Wireless Home Automation System for
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

Optimal Design of Fused Chopper based Standalone Hybrid


Wind Solar System
Dr.P.Vinoth Kumar
Associate Professor,Department of EEE, Geethanjali Institute of Science and Technology

Abstract converters. To improve reliability and make it a


The target of this paper is to implement an more economical, DC-DC converters are used
economical chopper and electrical converter for between the hybrid energy system and inverter
the hybrid wind-solar system. Methods: a which drains the maximum energy from the wind
replacement topology of a mix of CUK and SEPIC and solar that feeds the DC link capacitor which acts
as an input to the inverter as shown in figure 2. A
convertor is used rather than a private DC/DC
number of hybrid wind, solar systems employ
convertor. The motor load is provided by
individual DC-DC buck and boost converter along
victimization the two diodes that connects each
with the maximum power point tracking (MPPT)
wind and solar energy singly or along depending
control for separate renewable energy resources has
on accessibility. With the improved management in been proposed 1,2,3,4,5.
DC/DC convertor and within the electrical
converter that associated with the auxiliary circuit
in accumulation by the closed-loop system PI
controller a more robust control is achieved.
Findings: The fused chopper replaced the separate
solar and wind choppers and rather than typical
electrical converter the novel pulse width
modulated electrical converter used supplied with
an correct pulse width modulation (PWM) control
using 3 equal reference signals. The closed-loop
system management is achieved with the digital PI
controller and MPPT draws the maximum power
from the solar that improves the response with the
fast raise in load. The system is validated with
MATLAB/Simulink and therefore the output
Figure1. Basic block diagram without controller
voltage of fused chopper for various solar
irradiance and wind speed are tabulated. The
A number of alterations and control approaches have
output voltage of electrical converter and therefore
been developed to eliminate the complexity with the
the motor characteristics are analyzed. available familiar topologies such as diode
Applications / Improvements: For standalone clamped6,7, capacitor clamped8,9 and cascaded H-
applications within the agriculture water pumping bridge inverter10,11. The proposed topology minimize
the requirement will satisfy with the hybrid wind the harmonics and improves the output sinusoidal
solar system. waveform. The single phase inverter generates the
PWM signal required for switches by replacing the
Keywords: Hybrid wind solar system, Fused single reference signal with three reference signals
chopper, Maximum power point tracking, CUK, and exception of counteracting equal to the carrier
Single Ended Primary Inductor (SEPIC). signal12,13 as shown in figure 3 and the output
voltage of the inverter is connected to the single
1. Introduction phase induction motor 14.

The hybrid solar-wind system finds its main 2. Hybrid converter


application in agricultural, residential and remote
areas where there is a lack or far from utility grids. The output of the CUK converter is negative with
When compared to individual renewable resource the respect to the positive input and SEPIC converter
combination of two or more renewable resources has output is positive to the output terminal. The
more merits. Whenever there is a lack of combined CUK and SEPIC converter used in the
photovoltaic energy supplied to load, wind resource hybrid wind, solar system extracts the maximum
can be used to compensate the load. The output energy required to compensate the loa d variations
voltage supplied will be the sum of two voltages with the help of proper utilization or sharing of the
from separate energy resources as shown in two diodes in the each converter by periodic ON and
figure1.The efficient utilization of the hybrid energy OFF15.
system depends on the selection of suitable
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

zero22,23,24. The switching pattern for the seven- level


inverter is shown in Figure.3.

4. MPPT and Control

The ‗maximum power point‘ is the


maximum voltage that solar module can generate.
To extract the maximum power from the solar
modules MPPT algorithm is implemented which is
analog or digital technique that permits the solar
cells to function irrespective of solar irradiance,
ambient temperature or climatic conditions. MPPT
controllers are included along with the solar power
Figure 2. Proposed hybrid system
conditioning system to extract the maximum power
from the solar module that can exploit the required
When the load has to be operated only with the
DC voltage are prorposed in 25,26.The controlling of
available solar energy then diode D1 turns ON and
power withdrawn from the solar module according
when there is absence of solar, the other source wind
to the load demand is done by the PI controller looks
has to be utilized and diode D2 turns ON is making
up the tracking of instant error between the reference
the diode D1 OFF and the total DC input of the
and actual value27,28. The error signal produces the
inverter will be the addition of output of two
reference signals Vref1, Vref2 and Vref3 compared with
converters supplied by the solar and wind16,17. The
the carrier signal to generate the PWM signals for
CUK and SEPIC converter have significant
the inverter 21-24,26.
importance in reducing high inrush of current and
electromagnetic interference are proposed in 18,19,20.
5. Simulation Results
3. Inverter
The MATLAB/ Simulink model of hybrid
system consists of two renewable energy sources
The proposed single-phase seven-level
which are wind and solar. These outputs connect to
inverter topology generates the seven levels of
the fused CUK and SEPIC converter which feeds the
voltages Vpv, Vpv/3, 2Vpv/3, 0, - Vpv/3, -2Vpv/3, -Vpv
inverter and its output voltage drives the single
proposed in 21,22.
phase Induction motor shown in Figure 4.
The output voltage of the motor given as
input to the PI controller that generates the gate
pulses of the inverter and MPPT controller tracks the
maximum power by controlling switch in a CUK
converter as shown in Figure 5.

Figure 4. MATLAB/ Simulink model of hybrid system.

Figure 3.Switching pattern of the Inverter.

The pulses are generated with the


comparison of three reference signals having the
same frequency and amplitude namely Vref1, Vref2,
and Vref3 with the single carrier signal (Vcarrier). If
Vref1 go beyond peak of Vcarrier, Vref2 and Vcarrier
are compared until Vref2 reaches the peak value of
the carrier. Then the comparison between Vref3 and
Figure 5. MPPT and PI control
Carrier was done until Vref3 attains zero. Now Vref2
and Vcarrier were compared till Vref2 attains
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

The auxiliary circuit provided with the switches S5


and S6 is shown in Figure 6 and the wind generator The gate pulses to the switches
model is shown in Figure 7 S1,S2,S3,S4,S5,S6 of the inverter are shown in
Figure.11 and Figure.12 respectively

Figure 6. Auxiliary circuit Figure 11. Gate Pulses of switches S1, S2, S3, S4.

Figure 7. Wind generator


Figure 12. Gate Pulses of switches S5andS6
The propoed system‘s solar model with irradiance The inverter gives an output voltage of
75w/m2 is shown in Figure. 8 300V. This input is fed to the single phase induction
motor .The input voltage of the induction motor is
shown in Figure 13.The motor gives a fast response
to the rated speed of the motor . The speed and
torque are shown in Figure.14 and Figure.15
respectively.

Figure 8.Solar generator

Figure 13.Output voltage from the inverter.

Figure 9. Solar output voltage

Figure 14. Speed of the motor.


Figure 10. Wind system output voltage
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

simultaneously. The proposed combined converter


improves the efficiency of the hybrid system by
supporting wide ranges of solar and wind input,
increases the conversion efficiency using Maximum
Power Point Tracking, eliminates the need of
additional input filters to filter out the high
frequency harmonics, lower input current distortion
and conduction losses.

Figure 15. Torque of the motor achieved with closed loop Control References
5.1 Design Parameters [1] Kim S.K , Jeon J.H, Cho C.H , Ahn J.B , S.H.
Kwon. Dynamic Modeling and Control of a Grid-
The design parameters of fused CUK and Connected Hybrid Generation System with Versatile
SEPIC converter connected to Induction motor Power Transfer .IEEE Transactions on Industrial
shown in Table 1. The output voltage of solar and Electronics. 2008 April, 55, 1677-1688.
wind from the hybrid wind solar system shown in [2] Das D, Esmaili R, Xu L, Nichols D. An Optimal
Table 2. Design of a Grid Connected Hybrid
Table 1. Design Parameters Wind/Photovoltaic/Fuel Cell System for Distributed
Parameters Symbols Values Energy Production. Proc. IEEE Industrial
Inductance L1,L2,L3 2mH Electronics Conference, 2499-2504.
[3] Ahmed N. A, Miyatake M , Al-Othman A. K.
Inductance C1,Cdc 1000μf Power fluctuations suppression of stand-alone
Capacitance Cb 1000μf hybrid generation combining solar
Capacitance Ca , Cc 3mf photovoltaic/wind turbine and fuel cell systems
Proc. Of Energy Conversion and Management,
Filter Inductance Lf 15mH 2008, 2711-2719.
Filter [4] Jain S, Agarwal V. Integrated Hybrid Power
Cf 1005 μf Supply for Distributed Generation Applications Fed
Capacitance
by Non conventional Energy Sources. IEEE
Switching Transactions on Energy Conversion, 2008 June ,
fs 10 KHZ
Frequency 23(2),622-631.
S1, S2,S3, [5] Chen Y.M, Liu Y.C, Hung S.C, C.S. Cheng.
Switches IGBT
S4, S5,S6 Multi-Input Inverter for Grid-Connected Hybrid
Diodes D1,D2 0.001Ω PV/Wind Power System. IEEE Transactions on
Power Electronics, 2007 May, 22.1070-1077.
Single [6]Pou J, Pindado R, Boroyevich D. Voltage-
0.5HP,300V,50HZ,
phase balance limits in four level diode-clamped
Rating of Single phase
Asynchron converters with passive front ends. IEEE Trans.
Induction motor capacitor start
ous Ind.Electron., 2005 Feb, 52,190–196.
motor
Machine [7] Alepu S, Busquets-Monge S, Bordonau J, Gago
J, Gonzalez D, Balcells J. Interfacing renewable
Table 2. Output voltage from Hybrid System energy sources to the utility grid using a three-level
inverter. IEEE Trans. Ind. Electron, 2006 October,
Solar Plant Wind Plant Voltage 53(5),1504–1511.
across the [8] Kang D W, Lee B K , Jeon J H, Kim T J , Hyun
Solar
Output Wind Output DC link D S. A symmetric carrier technique of CRPWM for
irradia
voltage velocity( voltage Capacitor( voltage balance method of flying capacitor
nce
(v) m/s) (v) Vdc) multilevel inverter. IEEE Trans. Ind. Electron, 2005
(w/m2)
June, 52(3), 879–888.
75 41.43 10 40 80.72 [9] Lin B R, Huang C H.Implementation of a three-
100 58.30 12 50 98.30 phase capacitor clamped active power filter under
unbalanced condition, IEEE Trans.Ind. Electron.
110 69.2 15 60 120 2006 October, 53(5),1621–1630.
[10] Kou X,Corzin K, Wielebski M. Overdistention
6. Conclusion operation of cascaded multilevel inverters. IEEE
This combined chopper based new topologies Trans. Ind. Appl, 2006 June, 42(3), 817–824.
[11] Rodriguez J, Hammon P, Pontt J, Musalem R,
offer permanent power generation possible to meet
Lezana P, Escobar M. Operation of a medium-
the load demand by making available the two energy
voltage drive under faulty conditions. IEEE Trans.
sources to supply the load either individually or
Ind. Electron. 2005 August, 52(4),1080–1085.
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

[12] Carrara G, Gardella S, Marchesoni M, Salutari Trans. Ind. Appl. 2011 April, 47(2),873–881.
R, Sciutto G. A new multilevel PWM method: A [21] Kjaer S B, Pedersen J. K, Blaabjerg F . A
theoretical analysis. IEEE Trans. review of single-phase grid connected inverters for
PowerElectron.1992 July, 7(3), 497–505. photovoltaic modules. IEEE Trans. Ind. Appl. 2005
[13] Kjaer S. B, Pedersen J. K, Blaabjerg F. A September. 41(5), 1292–1306.
review of single-phase grid connected inverters for [22] Rahim N A Chaniago K, Selvaraj J. Single-
photovoltaic modules. IEEE Trans. Ind. Appl, 2005 Phase Seven-Level Grid-Connected Inverter for
September, 41( 5),1292–1306.. Photovoltaic System. IEEE Transactions on
[14] Pandian G, Rama Reddy S.Simulation and Industrial Electronics, 2010 August, 58(6) , 2435 –
Analysis of Multilevel Inverter Fed Induction Motor 2443
Drive. Indian Journal of Science and [23] Hinga P. , Ohnishi T, Suzuki T. A new PWM
Technology.2009 Feb, 2(2), 67-69. inverter for photovoltaic power generation
[15] Sudharsan A, Yohan M, Shrujan R, Gayathri Y. system.Conf. Rec. IEEE Trans. Power Electron.
Hybrid Wind Solar Energy System Using Cuk Fused Spec. Confernce,1994, 391–395.
converter,IJERA, 2013 December,3(6),287-293. [24] Rahim N A Chaniago K, Selvaraj J. Single-
[16] Saha T, Kakkr S, Jha D K. Fused converter Phase Seven-Level Grid-Connected Inverter for
topology for wind-solar hybrid system. Power and Photovoltaic System.IEEE Transactions onIndustrial
Energy Engineering Conference (APPEEC), 2013 Electronics, 2011 June, 58(6), 2435-2443.
December, 1-7. [25]Ghaisari J, Habibi M, Bakhshai A. An MPPT
[17]Jacob T, Arun S. Maximum Power Point Controller Design for Photovoltaic (PV) Systems
Tracking of hybrid PV and wind energy systems Based on the Optimal Voltage Factor
using a new converter topology. International Tracking.Electrical Power Conference, 2007.359-
Conference on Green Technologies (ICGT), 2012 362.
December ,280-287. [26]Noguchi T, Togashi S, Nakamoto R. Short-
[18]. Simonetti S L, Sebastian J,Uceda J. The current pulse-based maximum-power-point tracking
Discontinuous Conduction Mode Sepic and Cuk method for multiple photovoltaic-and-converter
Power Factor Preregulators: Analysis and Design. module system. IEEE Transactions on Industrial
IEEE Trans. On Industrial Electronics, 1997.44(5). Electronics, Feb 2002, 49(1), 217-223.
[19]Abbas A. Fardoun, Esam H. Ismail, Ahmad J. [27] Calais M, Agelidis V. G. Multilevel converters
Sabzali, Mustafa A. Al-Saffar. New Efficient for single-phase grid connected photovoltaic
Bridgeless CUK Rectifiers for PFC systems. Proc. IEEE Int. Symp. Ind. Electron, 1998,
Applications.IEEE Trans. on power electronics, 224 -229
2012 July, 27(7).3292-3301. [28] Selvaraj J, Rahim N A. Multilevel inverter for
[20] Sabzali A, Ismail E. H, Al-Saffar M, Fardoun A. grid connected PV system employing digital PI
New bridgeless DCM sepic and CUK PFC rectifiers controller. IEEE Trans. Ind. Electron. 2009
with low conduction and switching losses. IEEE January, 56(1), 149–158.
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

A Security Approach in System Development Life Cycle


Mathan Kumar M1, Dr. Anu Bharti2
1
Associate Professor , Department of CSE, Geethanjali Institute of Science and Technology,Nellore
2
Associate Professor, Department of CSE Sunrise University , Alwar

ABSTRACT top-down and bottom- up analysis of possible


Many software organizations today are confronted security failures that could cause risk to the
with challenge of building secure software organization as well as define requirements to
systems. Traditional software engineering address vulnerabilities. Fault tree analysis for
principles place little emphasis on security. These security is a top-down approach to identifying
principles tend to tread security as one of a long vulnerabilities. In a fault tree, the attacker‘s goal is
list of quality factors that are expected from all placed at the top of the tree.
professionally developed software. As software Then, the analyst documents possible alternatives
systems of today have a wide reach, security has for achieving that attacker goal. For each
become a more important factor than ever in the alternative, the analyst may recursively add
history of software engineering can no longer be precursor alternatives for achieving the sub goals
treated as Separate Island. There is an imperative that compose the main attacker goal. This process is
necessity to incorporative security into software repeated for each attacker goal. By examining the
engineering. Incorporating security into software lowest level nodes of the resulting attack tree, the
engineering necessitates modification of existing analyst can then identify all possible techniques for
software engineering principles, as these have to violating the system‘s security preventions for these
be tailored to take into account the security aspect. techniques could then be specified as security
All phases of software engineering are likely to be requirements for the system.
impacted. In this paper we tried a novel security
mechanism in system development life cycle. Failure Modes and Effects Analysis is a bottom-
Keyword: Security, Design Phase, SDLC. up approach for analyzing possible security failures.
The consequences of a simultaneous failure of all
1. INTRODUCTION existing or planned security protection mechanisms
are documented, and the impact of each failure on
In the software industry that requirements the system‘s mission and stakeholders is traced.
engineering is critical to the success of any major Other techniques for developing system security
development project. Security requirements are requirements include threat modeling and misuse
identified during the system development lifecycle. and abuse cases. Requirements may also be derived
However, the requirements tend to be general from system security policy models and system
mechanisms such as password protection, spam and security targets that describe the system have
Phishing detection tools. Often the security required protection mechanisms.
requirements are developed independently of the rest
of the requirements engineering activity, and hence The SQUARE process involves the interaction of a
are not integrated into the mainstream of the team of requirements engineers and the stakeholders
requirements activities. As a result, security of project. The requirements engineering team can be
requirements that are specific to the system and that thought of as external consultants, though often the
provide for protection of essential services and assets team is composed of one or more internal developers
are often neglected. The requirements elicitation and of the project. When SQUARE is applied, the user
analysis that is needed to get a better set of security should expect to have identified, documented, and
requirements seldom takes place. inspected relevant security requirements for the
Users may not have aware of the security risks, system or software that is being developed. SQUARE
risks to the mission and vulnerabilities associated may be more suited to a system under development
with their system. To define requirements, systems or one undergoing major modification than one that
engineers may, in conjunction with users, perform a has already been fielded, although it has been used
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

both ways. Software life-cycle models describe phases systems specifications from the System Design step
of the software cycle and the order of execution of are translated into machine readable computer code.
those phases. Many models are being adopted by  Testing
software companies, but most of them have similar As the software is created and added to the
patterns. Typically each phase produces deliverables developing system, testing is performed to ensure
required by the next phase in the life cycle. that it is working correctly and efficiently. This is the
Requirements are translated into design. Code is very big problem in system development in this
produced during the implementation phase and is paper we provide some security methods to enhance
driven by the design. Code is finally tested against the water fall model.
requirements to ensure quality. In this paper we were Security in Design Phase:
implemented some security principles in Waterfall In every phase we have to include the security
method.
enhancement. Even though it‘s very essential for
2. PROPOSED METHOD every phase depth security features needed from the
design phase onwards. In requirement gathering
The Waterfall Model is the old method of structured phase information fetching mostly happen between
system development. It‘s the base for all models
user and developer due to that need of security level
although it has come under attack in recent years for
being too rigid and unrealistic when it comes to will be less. Apart from the user collecting
quickly meeting customer‘s needs and development, information should be trust worthy as well as valid
the Waterfall Model is still widely used because of information should be taken for the system
easy model for developers. It is attributed with development. In analysis phase, the information‘s
providing the theoretical basis for other Process what we obtain from the requirement phase that will
Models, because it most closely resembles a generic give to the analysis phase. Collected information will
model for software development
be analysis used some valid documents materials,
The Procedure of Waterfall Model for software white papers, existing methods, etc.
development:
Information grouped into the structure form from
 System Requirements:
System Requirement refers to the consideration of all the unstructured form. In the analysis phase itself we
aspects of the targeted business function or process, have to estimate what kind of security requirements
need for our system. Security elements and features
with the goals of determining how each of those
should be included in every aspect of the system like
aspects relates with one another, and which aspects
user, data, module, design, testing, etc. Developers
will be incorporated into the system. What is the
need to know secure software design principles and
essential thing needed in developing system.
how they are employed in the design of resilient and
 System Analysis:
trustworthy systems. Two essential concepts of
This step refers to the gathering of system
design include abstraction and decomposition of the
requirements, with the goal of determining how
system using the architecture and constraints to
these requirements will be accommodated in the
achieve the security requirements obtained during the
system. Extensive communication between the
requirements phase. Most of the readers are probably
customer and the developer is essential.
familiar with these concepts.
Developer has to understand the exact
Abstraction is a process for reducing the
requirement of user.
complexity of a system by removing unnecessary
 System Design: details and isolating the most important elements to
Once the requirements have been collected and make the design more manageable. Decomposition is
analyzed, it is necessary to identify in detail how the process of describing the generalizations that
the system will be constructed to perform compose an abstraction. One method, top-down
necessary tasks. More specifically, the System decomposition, involves breaking down a large
Design phase is focused on the data requirements, system into smaller parts. For object-oriented
the software construction and the interface designs, the progression would be application, module,
construction. class, and method. Other secure software design
 Coding: principles are detailed in a multitude of books, white
Allies name is programming, this step involves the papers, web portals, and articles. In this paper we are
creation of the system software. Requirements and providing some techniques to improve the SDLC.
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

inadvertently enter a vulnerable state.


First thing is minimize the no of high  Design for controllability, this practice makes it
consequence targets. Minimizes the number of easier to detect attack paths, and disengage the
actors in the system granted high levels of software from its interactions with attackers.
privilege, and the amount of time any actor holds
 Design for secure failure, Reduces the likelihood
onto its privileges. Ensures that no single entity
that a failure in the software will leave it vulnerable
should have all the privileges required to modify,
to attack.
delete, or destroy the system, components and
resources. Separation of domains makes
In large distributed systems, scale-up problems
separation of roles and privileges easier to
related to security are not linear because there may
implement.
be a large change in complexity. A systems
engineer may not have total control or awareness
DON’T EXPOSE VULNERABLE OR HIGH-
over all systems that make up a distributed system.
CONSEQUENCE COMPONENTS:
This is particularly true when dealing with
concurrency, fault tolerance, and recovery. Problems
 Keep program data, executables, and configuration
in these areas are magnified when dealing with large
data separated. .Reduces the likely hood that an
distributed systems. Controlling the concurrency of
attacker who gains access to program data will
processes presents a security issue in the form of
easily locate and gain access to program executables
potential for denial of service by an attacker who
or control/configuration data.
intentionally exploits the system‘s concurrency
 Segregate trusted entities from un trusted
problems to interfere with or lock up processes that
entities, Reduces the exposure of the software‗s run on behalf of other principals. Concurrency
high- consequence functions from its high-risk design issues may exist at any level of the system,
functions, which can be susceptible to attacks. from hardware to application. Some examples of and
 Assume environment data is not trustworthy, best practices for dealing with specific concurrency
reduces the exposure of the software to potentially problems, includes following.
malicious execution environment components or
attacker- intercepted and modified environment  Processes Using Old Data: Propagating security
data. state changes is a way to address this problem.
 Use only safe interfaces to environment resources;  Conflicting Resource Updates: Locking to
this practice reduces the exposure of the data passed prevent inconsistent updates is a way to address this.
between the software and its environment.
 Minimize the number of entry and exit points; this Order of Update in Transaction-Oriented
practice reduces the attack surface. Systems and Databases: Order of arrival and
update needs to be considered in transaction- oriented
DENY ATTACKERS THE MEANS TO system designs. System Deadlock, in which
COMPROMISE concurrent processes or systems are waiting for each
other to act this, is a complex issue, especially in
 Simplify the design; this practice minimizes the dealing with lock hierarchies across multiple
number of attacker-exploitable vulnerabilities and systems. However, note that there are four necessary
weaknesses in the system. conditions, known as the Coffman conditions.
 Hold all actors accountable, this practice ensures In above passage we provided some of security
that all attacker actions are observed and recorded, enhancement in design phase in future work we will
contributing to the ability to recognize and consider the throughout the development life cycle.
isolate/block the source of attack patterns.
Conclusion :
 Avoid timing, synchronization, and sequencing
issues, this practice reduces the likelihood of race In this paper we started our initiation process of our
conditions, order dependencies, synchronization research and we gave some suggestion to enhance
problems, and deadlocks. the security mechanism to improve the system
 Make secure states easy to enter and vulnerable development life cycle. In our forthcoming papers
states difficult to enter, this practice reduces the we will give security principles throughout the
likelihood that the software will be allowed to lifecycle. It‘s our faith it will give better result than
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

the ordinary development life cycle models. Rational Unified Process, 2005.
Compare with SQUARE and CLASP methods this [3] Kruchten, P. The Rational Unified Process: An
one is different in functionalities. Introduction, 3rd ed. Boston, MA: Addison-Wesley,
2003.
REFERENCES: [4] Mead, N. R., E. Hough, and T. Stehney. Security
Quality Requirements Engineering (SQUARE)
[1] Mead, N.R., Viswanathan, V., Padmanabhan, Methodology. Pittsburgh, PA: Software Engineering
D., and Raveendran, A., Incorporating Security Institute, Carnegie Mellon University, 2005.
Quality Requirements Engineering (SQUARE) into [5] Rational Unified Process: Best
Standard Life-Cycle Models. Pittsburgh, PA: Practices for Software Development Teams.
Software Engineering Institute, Carnegie Mellon Rational Software White Paper TP026B, Rev 11/01,
University, 2008.
2001.
[2] Ambler, S. W. A Manager’s Introduction to
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

Analysis of IA and PSO Algorithms for Siting and sizing of DG in


Primary Distribution Networks

Thummala Ravi kumar


Associate Professor, Department of EEE, Geethanjali Institute of Science and Technology, Nellore

Abstract- In Power Systems, Distributed DGs are certainly changing the greater highly-priced
Generation (DG) has been developing quickly grid electricity. DG can meet all or part of a patron‘s
because of their prospective solutions for power energy wishes. The principle motives for the
quality issues, similar to the deregulation in power increasingly full-size use of DG are it may be more
system, to take care of the shortage of economic than running a transmission lines to remote
transmission capabilities and power demand. locations [5], it gives require power, with the
Inappropriate placement of DG sources in power effectiveness giving back up and supplemental
system would not just prompt to increase power power, it can give support control amid effectiveness
or energy losses but it also collapses voltage profile system blackouts. DG units must be located in
of the system. The ideal location of DG is needed suitable areas with proper capacities to realize system
for improving reliability and stability of a power advantage. It is observable that any loss reduction is
system. This paper investigates the difficulty of important to distribution utilities, those are for the
distributed generator location to obtain an maximum part the substance successful to maintain
unnecessary loss reduction and enhancement of losses at minimum. Losses diminishment is, in this
voltage profile in distribution networks. A stepped manner, the most significant calculate to be regarded
Improved Analytical (IA) technique and Particle because the locating and function of DG [6], [7].
Swarm Optimization (PSO) strategies proposed in As an instance, multi target index for execution
this paper. Improved analytical (IA) method [1] is algorithm of distribution network for single DG size
based on IA expressions to calculate the highest and location has been planned [6] in an radial feeder,
capacity of DG unit and a technique to perceive contingent upon the innovation, DG units can deliver
the pleasant place for DG allocation. The other a section of the total active and moreover reactive
task on this work a multi objective formula is power to loads in order that the feeder current
proposed for premiere location and sizing of the diminishes from the supply to the place of DG
DG is optimized the use of Particle Swarm systems.
Optimization (PSO). The proposed concepts Be that as it is able to, thinks about [8]–[10] have
validated the usage of an IEEE 33 bus network proven that if DG systems are disgracefully scattered
and the consequences display the suitability of the and expected, the reverse power flows from the
proposed strategies in decreasing the losses and capacity DG can stimulate to better active and
enhancing the voltage profile of the network. A reactive power loss. A technique for DG placement
few thrilling outcomes are also mentioned on this utilizing "2/3 rule" that's typically related to capacitor
paper. description in distribution system with consistently
distributed Here
Keywords – Analytical expression, loss reduction, a = (sign) tan (cos-1(PFDG)
improved analytical (IA), Distributed Generation sign = +1 Injecting reactive power by DG
(DG), optimal location and size and IEEE 33 Bus
system 𝑛
𝑋𝑖 = 𝑗 =1 (𝛼𝑖𝑗 𝑃𝑗 − 𝛽𝑖𝑗 𝑄𝑗 ) 𝑎𝑛𝑑 𝑌𝑖 =
𝑗 ≠𝑖
I. Introduction 𝑛
Global temperature gradually increases with the 𝑗 =1 (𝛼𝑖𝑗 𝑄𝑗 + 𝛽𝑖𝑗 𝑃)
𝑗 ≠𝑖
continuous exhaustion of fossil energy, and the
restriction of existing transmission network capability the ideal size of DG for every bus i, can be given
causes rapid development of Distributed Generators by formerly mentioned conditions , for the loss to be
(DGs) [2]. Distributed generation (DG) is associated
least. Any size of DG apart from PDGi positioned at
with the use of small generating unit mounted at
bus i can activate to a higher loss.
planned point of electrical power device or places of
Case 2 DG (i.e., 0 < PFDG < 1) is able up for
load centre's [3].
infusing active power however eating reactive power
Distributed generation is an electric powered power (sign = −1). Like kinds 1 DG, the appropriate size of
source linked immediately to the distribution system sort 2 DG at every bus i for the bottom loss is given
or on the purchaser location of the meter [4]. DG by means of (2) and (3). Simple Distribution system
technology consists of diesel engines, wind
with single DG [1] is shown in Figure 1.
generators, solar cells and fuel cells. Despite their
small length, DG technologies are having a more
potent effect in energy markets. In some markets,
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

without DG unit
n : Number of Buses for given network
m: Number of Branches for given network
w1, w2 and w3 are weights in this suggestion they are
theoretical to be equal. Right here w1+ w2+w3=1

PSO is a populace of particles is in the beginning


Figure 1. Simple distribution system with single DG. randomly produced. In PSO, answer for each
optimization problem is measured as a bird in the
identifying space and it is called ―particle‖. Each
Case 3 DG (i.e., PFDG = 1, a = 0) is in a position of
particle having its own fitness value which is
infusing actual electricity best. The proper size of DG
determined by multi objective functions (6) and it has
at every bus i for the least amount loss [1] am given
also a velocity which verifies its objective and
by decreased (4)
1 distance. All particles investigate in the solution
𝑃𝐷𝐺𝑖 = 𝑃𝐷𝑖 − 𝛼 𝑗𝑛=1(𝛼𝑖𝑗 𝑃𝑗 − 𝛽𝑖𝑗 𝑄𝑗 ) space for their ideal positions and the positions of the
𝑖𝑖
𝑗 ≠𝑖
ideal particles in the swarm. Initially PSO configures
(4)
a set of arbitrary particles and then through repeated
investigating finds the ideal solution. In each iteration
Case 4 DG (i.e., PFDG = 0, a = ∞) is in a position of
the ideal position recognized with a particle is called
sending reactive electricity handiest. The best length
pbest ; correspondingly the ideal position recognized
of DG at every bus i for the least quantity loss [1] am
with the entire swarm is called gbest. For each
given through reduced (5)
particle, the velocity and its position are restructured.
1 𝑛
every particle renews its position based upon its own
𝑄𝐷𝐺𝑖 = 𝑄𝐷𝑖 − 𝛼 𝑗 =1 (𝛼𝑖𝑗 𝑄𝑗 + 𝛽𝑖𝑗 𝑃𝑗 ) ideal position, global ideal position along with
𝑖𝑖
𝑗 ≠𝑖
particles and its earlier velocity vector according to
(5) the subsequent equations:
2.1 Particle Swarm Optimization
The major intention of this formulation is to make 𝑣𝑖𝑘 +1 = 𝑤 × 𝑣𝑖𝑘 + 𝑐1 × 𝑟1 𝑝𝑏𝑒𝑠 𝑡 𝑖 − 𝑥𝑖𝑘 + 𝑐2 × 𝑟2 ×
sure ideal placement and estimation of capacity of (𝑔𝑏𝑒𝑠𝑡 𝑖 − 𝑥𝑖𝑘 ) (7)
DG units while allowing for multiple intention of 𝑥𝑖𝑘 +1 = 𝑥𝑖𝑘 + 𝜒 × 𝑣𝑖𝑘 +1
decrease in active power loss, reactive power loss and (8)
improving the voltage profile. These multiple
intentions are collective through weights to generate a Where,
liner equation which is representative of all the
intentions. vi k 1 :i th Particle Velocity at (k  1) iteration
th

In this proposal the primary limits considered as w : Inertia weight of a Particle

1) Power loss when DG introduced in network ≤ vi k : i th Particle Velocity at k th iteration


Power loss before DG introduced in network c1, c2 : Positive constants having values between [0,
2) Voltage limits are V BUS MIN ≤ V BUS ≤ V BUS MAX
The multi objective function is given as 2.5]
𝑀𝑎𝑥 𝐹 = r1 , r2 : Randomly generated numbers between [0, 1]
1
𝑊1{max[0, 𝑛 𝑛𝑖=1(𝑉𝑜𝑙𝑡𝑎𝑔𝑒 % 𝑖 𝑤𝑖𝑡 𝑕 𝐷𝐺 - pbesti : The best position of the i th particle obtained
𝑉𝑜𝑙𝑡𝑎𝑔𝑒 % 𝑖 𝑤𝑖𝑡 𝑕𝑜𝑢𝑡 𝐷𝐺 )] } based upon its own knowledge
1
+𝑊2{max[0, 𝑛 𝑛𝑖=1(𝑃 𝑗 𝑤𝑖𝑡 𝑕 𝐷𝐺 - gbest: Global best position of the particle in the
𝑃 𝑗 𝑤𝑖𝑡 𝑕𝑜𝑢𝑡 𝐷𝐺 )]}+ 𝑊3{max[0, 𝑛
1 𝑛 population
𝑖=1 (𝑄 𝑗 𝑤𝑖𝑡 𝑕 𝐷𝐺 -
xi k 1 : i th Particle position at (k  1)th iteration
𝑄 𝑗 𝑤𝑖𝑡 𝑕𝑜𝑢𝑡 𝐷𝐺 )] }
(6) xi k : i th Particle position at k th iteration
In the above expression,  : Constriction factor. It may assist insure
Voltage % i with DG: voltage percentage in ith bus with convergence.
DG unit
Voltage % i without DG: voltage percentage in ith bus III. Test System Depiction, Re-enactment
without DG unit Results and Examination
P j with DG: Active Power Losses in jth branch P j with DG: The test system design of the network is having a
Active Power Losses in jth branch with DG unit solitary supply point with 33-buses, 3 laterals, 37
P j without DG: Active Power Losses in jth branch without branches, 5 loops or tie switches which are saved
DG unit frequently open and is shut just amid problem
Q j with DG: Reactive Power Losses in jth branch with situation to keep up congruity of deliver or may be
DG unit close to change circuit imperviousness to lower
Q j without DG: Reactive Power Losses in jth branch losses. The overall active and reactive power for test
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

system is 3715 kW, 2300 kvar with a total real power of length 2560.23kw at bus number 6 and there is
loss of 202.6 kW. The upper voltage limit is 1.05 p.u greater decrement in losses. It is able to be discovered
and lower voltage limit is 0.9 p.u. The single line from TABLE I, at the same time as placement of DG
diagram of test system is shown in Figure 2. of capacity 2560.23kw reduces the actual energy loss
Newtons-Raphson algorithm is used for power flow of 110.1537 kW
calculations. For simulation load model designed
with a uniform power and primary bus voltage at 1.0 TABLE II : Bus voltage magnitudes of 33-Bus
p.u. system
Based totally at the proposed technique, an analytical
software device has been developed in Matlab BUS
Voltage (PU)
surroundings to run the power flow, calculate Number
electricity losses, and become aware of the superior IA Method PSO Method
size and area of DG unit. The iteration settings for 1 1 1
PSO contain 50 maximum numbers of iterations, with 2 0.999018 0.99814
acceleration constant of 2 and 2.5 and highest and 3 0.995566 0.989975
lowest inertia weights at 1 and 0.2 respectively. The 4 0.995977 0.986885
highest and lowest velocity of particles is preset at 5 0.996818 0.984066
0.003 and -0.003 correspondingly. The simulations 6 0.99618 0.975559
are carried out in a computer system having i5 7 0.992466 0.972171
processor cloaking a speed of 2.5 GHz with a RAM 8 0.987695 0.967462
of 4GB.
9 0.981243 0.96137
10 0.975222 0.95572
z 11 0.97436 0.954884
12 0.97285 0.953427
13 0.966276 0.947488
14 0.963653 0.945286
15 0.961964 0.943914
16 0.960377 0.942585
17 0.957995 0.940616
18 0.957416 0.940027
19 0.998491 0.997612
20 0.99492 0.994038
21 0.994217 0.993335
22 0.993581 0.992698
23 0.992027 0.986415
Figure 2. Line diagram of IEEE 33 Bus distribution 24 0.985442 0.979792
system 25 0.982161 0.976492
26 0.995356 0.976033
27 0.994334 0.976834
TABLE I: DG Placement by Various Techniques For 28 0.98877 0.978
33-Bus System 29 0.985011 0.97944
30 0.984178 0.981961
insta 31 0.985087 0.989294
Loss Ti
Tech lled Loca 32 0.985761 0.99203
Case P loss Redu me
nique DG tion 33 0.987175 0.995719
ction (s)
Size
202.
No 0.0
---- ----- 677 0.00 The position of DG additionally brings
DG 2
kW approximately development in voltage profile of the
IA 2560 110. device. The bus voltage magnitudes of 33-bus device
47.95 10.
Meth .230 6 1537 after placement of DG are illustrated in the TABLE II
48 29
with od 0kW kW The plot of voltage profiles for various buses after the
DG 92.4 position of DG the usage of IA technique is printed
1857 45.60 6.7
PSO 7 365 within the Figure 3. The plot of voltage profiles for
.5kw 913 5
kW various buses after the placement of DG using PSO
approach is outlined within the Figure 4

The results of measuring capacity and location are


illustrated in the TABLE I. It may be observed from
the IA method identifies suitable area for placing DG
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

percentage also more. Particle swarm optimization is


projected for figuring out the final ability of DG and
the vicinity is decided wherein loss is minimized and
capability and area of DG anticipated for loss
minimization.

REFERENCES
[1] Duong Quoc Hung and Nadarajah Mithulananthan,
― Multiple Distributed Generator Placement in
Figure 3. Voltage Profile of 33 Bus System After Placement of
Primary Distribution Networks for Loss
DG using IA Metho
Reduction,‖ IEEE Transactions On Industrial
Electronics, VOL. 60, NO. 4, APRIL 2013
[2] Faria, P.; Vale, Z.; Baptista, J. ―Demand response
programs design and use considering intensive
penetration of distributed generation‖. Energies
2015, 8, 6230–6246.
[3] L.L.Lai and T.F.Chan, ― Distributed Generation:
induction and permanent magnet generators
‖,Wiley,2007.
[4] T. Ackermann, G. Andersson and L. So¨der, ―
Distributed generation: a definition ‖, Electric
Power Systems Research,Elsevier, 2001. [19] D.
Singh and K. S. Verma, ― Multiobjective
optimization for DG planning with load models ‖
Figure 4. Voltage Profile of 33 Bus System After Placement of . IEEE Trans. Power Syst., vol. 24, no. 1, pp.
DG using PSO Method 427–436, Feb. 2009.
[5] Vivek Kumar Shrivastava, O.P.Rahi. Vaibhav
Kumar Gupta and Jitendra Singh Kuntal, ―
TABLE III: LOCATION AND MINIMUM VOLTAGE Optimal Placement Methods of Distributed
MAGNITUDE FOR THE SYSTEM Generation:A Review‖, Proc. of the Intl. Conf.
on Advances in Computer, Electronics and
Bus at which Electrical Engg, ISBN: 978-981-07-1847-3.
Voltage
CASE Minimum [6] D. Singh and K. S. Verma, ― Multiobjective
( PU)
Voltage Occurs optimization for DG planning with load models‖,
Base Case ( IEEE Trans. Power Syst., vol. 24, no. 1, pp. 427–
18 0.9052 436, Feb. 2009.
without DG )
[7] L. F. Ochoa, A. Padilha-Feltrin, and G. P.
with DG-IA Harrison, ― Evaluating distributed time-varying
18 0.957416
Method generation through a multiobjective index‖,
with DG - PSO IEEE Trans. Power Del., vol. 23, no. 2, pp.
18 0.940027 1132–1138, Apr. 2008.
Method
[8] N. Acharya, P. Mahat, and N. Mithulananthan, ―
An analytical approach for DG allocation in
IV.CONCLUSION primary distribution network‖, Int. J. Elect.
This paper has provided IA and PSO methods for Power Energy Syst., vol. 28, no. 10, pp. 669–
DG allocation for minimizing power loss and 678, Dec. 2006.
enhancement of voltage profile in distribution [9] H. L. Willis, ― Analytical methods and rules of
thumb for modelling DG distribution
systems while enjoyable the principle objective of interaction‖, in Proc. IEEE Power Eng. Soc.
power injection. In IA method it is observed, it is that Summer Meet., 2000, vol. 3, pp. 1643–1644.
a approach to acquire an foremost or close to highest [10] Y. M. Atwa, E. F. El-Saadany, M. M. A. Salama,
quality power aspect has been also provided for and R. Seethapathy, ― Optimal renewable
resources mix for distribution system energy loss
placing DG unit able to delivering active and reactive minimization‖, IEEE Trans. Power Syst., vol.
power. For DG capable of delivering in real and 25, no. 1, pp. 360–370, Feb. 2010.
reactive energy, power factors to play a critical role [11] C. Wang and M. H. Nehrir, ― Analytical
in loss reduction. Another technique also proposed in approaches for optimal placement of distributed
this paper for ideal placement and capacity for generation sources in power systems‖, IEEE
Trans. Power Syst., vol. 19, no. 4, pp. 2068–
generators was identified using PSO technique and 2076, Nov. 2004.
the best of 50 trails runs have been presented. The [12] Haruna Musa " A Review of Distributed
importance of ideal placement was also suitably Generation Resource Types andtheir
explained in this work. It was noted that incorrect Mathematical Models for Power Flow Analysis
location of DG will not bring in essential progress in ", International Journal of Science, Technology
and Society Doi: 10.11648/j.ijsts.20150304.21,
the losses. It can also be noted from the conversation 2015; 3(4): 204-212
that the ideal placement of DG also improves the [13] M. A. Abido, ― Optimal power flow using
voltage profile of the network as a whole. It can be particle swarm optimization ‖, Electrical power
concluded that the proposed approaches, PSO is best and energy systems, 24(2002)563- 571- 1985.
optimization technique compared to the IA method [14] J. Kennedy and R. Eberhart, ― A Particle Swarm
Optimization ‖, Proceedings of IEEE
because with small size of DG enhancement of International conference on Neural Networks,
voltage profile is more and reduction of loss vol.IV, pp.1942- 1948, Perth, Australia, 1995.
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

Survey on Fuzzy-Based Routing protocols in MAGNETS


V.Gayathri
Associate Professor, Department of CSE, Geethanjali Institute of Science and Technolgy,Nellore

Abstract--- MANET is defined as a self configuring MANET


network which consists of wireless nodes that are
interconnected. MANETs use wireless connections to II. ROUTING PROTOCOLS IN MANETS
connect various networks. There are numeral of issues
Routing is process of finding an optimum route among
and challenges in a mobile adhoc network. Routing is
one of challenging issue in MANETs. The execution of
available, in order to transfer packets from source to
mobile AdHoc network can be profoundly enhanced if destination. Routing is considered as a two distinct
the directing convention can be made versatile to the process. Route discovery and Packet forwarding. Routing
present system conditions. Thinks about demonstrate protocols are of two types, namely, Static routing and
that the restriction of conventional routing protocols is Dynamic Routing. In Static Routing, to transfer packets in
the absence of capacity to react instantly to the the network, the administrators manually allot routes
adjustments in movement and portability conditions. between source and destination. These routes are fixed
Mobile nodes capable of switching immediately over whole session. In Dynamic Routing, the router takes
between proactive routing mode and reactive routing
the responsibility of building and exchanging information
mode based on current status of the node can overcome
the above constraint. A fuzzy based route mode selection
regarding routing table according to changes in network
come close to with information from multiple layers can topology. Dynamic Routing Protocols are further
inform direct switchin g capability to the mobile nodes. classified into three types. They are Reactive, Proactive,
This choice system uses the data with respect to the and Hybrid protocols.
quantity of connection breaks, the interface line length
and the application sort (Delay tolerant or Delay
touchy) of every hub. Hence a fuzzy based protocol
could improve the performance of MANETs. This paper
places of interest a relative study of conventional,
modified and fuzzy based routing protocol and proposes
the profit of using fuzzy logic in routing protocol.
I.INTRDUCTION

Mobile Adhoc Networks(MANET)


A MANET is a type of Adhoc network.
Figure 2: MANET routing protocols
MANETs are infra structure less networks that are
self created and self controlled by a collection of
mobile nodes that are interconnected and are able to
dynamically form an autonomous multi-hop network. DSDV [1] (Destination Sequenced Distance Vector Routing)
Because of self-forming environment and the ability is a routing table-driven protocol for adhoc network, the
to handle with quick topology changes MANETs are nodes keep up routing information all over the network, and
having a variety of applications. it can be transmitted without delay when data packets are
essential to sent, which makes it proper for high real-time
necessities in the networking environment. However, there
are various troubles of DSDV such as this protocol is
mainly used for network that the size is not large, as well as
the changes in the network topology is not very frequent.
DSR [2] (Dynamic Source Routing) routing protocol is
source-based routing and on-demand routing, the route will
store records when it communicates with two nodes.
Therefore, it reduces the cost of routing maintenance. In
Figure 1: Mobile Adhoc Network
addition, it reduces the routing requesting information on
channel possession by using the routing cache technology. on
In MANET every node acts as a router, which helps in
the other hand, the packet header length increases linearly and
forwarding packets from source to destination.
it
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018
adds overhead with the increase of hops path,
additionally, RREQ (routing request) packet uses the V. FUZZY BASED ROUTING PROTOCOLS IN
flooding to extend to the whole network, which will MANETS
fallout in a bulky network load. AODV [3] (Adhoc
On-demand Distance Vector) routing protocol is on- Many algorithms have been proposed for routing in
demand routing protocol based on DSDV and DSR MANETs. Among them some are either reactive or
routing protocols. On the other hand, AODV can keep proactive. The most vital issue of all the current
away from routing loops by engrossing hop counting calculations is that they don't fulfill all Quality of
and destination serial number mechanism in DSDV Service(QOS) parameters while finding the "best" way. It
routing protocol, on the other hand, AODV absorbs is critical to concentrate on all or most extreme QOS
routing detection and route preservation mechanism in parameters at time of discovering "best" way in MANETs.
DSR routing protocol. Although AODV routing Therefore, this section provides the outline of the existing
protocol is relatively grown-up, it still flaws such as Fuzzy Logic Based routing algorithms of MANETs.
large routing overhead and network latency. Starting with the case study survey of different published
algorithms like
III. FUZZY LOGICS IN MANETs [A] FBEEMR3 technique [6],
[B] EERP4 for MANET using VSMT5[7],
Fuzzy logic is applied in various areas such as quality [C] FA6 to enhance route stability of AODV routing
of service-based routing, energy-aware routing, protocol [8],
security, and Medium Access Control(MAC) [D] HS-AODV routing protocol based on FCT 7[9],
[E] EESR8 using QOSMA9 in MANET [10],
protocols. Because of the basic features of ad hoc
[F] FLDB10 for GPSR11 mobile PB12 routing
networks like uncertainty due to dynamic topology
and mobility of nodes, limited resources and protocol[11].
unstable links; a precise and accurate model is not
Using [A], with parameters as Hop Count(HC), Packet(P)
possible to implement. In MANETs, fuzzy logic has
and Energy(E), it concludes that Energy is inversely
been used to get better decision-making,
proportional to HC and P will be the best probability for
condense resource consumption and increase
performance. Fuzzy logic is also used to adaptively optimal route. That means, in this protocol the FLC11
optimize protocol parameters more accurately and takes HC, P, E as input parameters and
dynamically. The fuzzy routing protocols discover a RouteLifetime(RL) as output parameter. Each input and
maximal set of disjoint paths from source to output variable are divided into seven linguistic values
such as very low, low, less low, medium, less high, high
destination, and then use a Fuzzy Logic
and very high. Multiple fuzzy rules are inferred on these
Controller(FLC) to find out how to use those paths to
input parameters and for each and every route RL is
hold the traffic. By implementing fuzzy logic
calculated. Optimal path is selected whenever RL is very
techniques in MANET routing protocols then the
high. If HC is very low, P is very low and E is very high
network performance metrics such as network
then RL is very high.Therefore, the relation between
throughput increases, packet delivery ratio increases,
input and output parameter are as in eq (1), eq (2) and
routing overhead load decreases, and end-to-end
eq (3)
delay decreases. Examples of fuzzy routing
approaches are FLWMR1 [4], which uses the
RL ∞ 1/ HC E q (1)
number of hops in a path as its metric, and
RL ∞ 1/P Eq (2)
FLWLAMR2 [5], which uses aggregate packet backlog RL ∞ E E q (3)
along the path as its metric. so the final relation is as
IV. QUALITY OF SERVICE RL ∞ E ∞ 1/P & 1/HC E q (4)
Using [B], with parameters as Energy(E) and Distance(D), it
During transmission of packets from source to concludes that Energy is inversely proportional to Distance
destination, the set of necessities that needs to be met will be the best probability for optimal route. That
by the network which is referred as a Quality of means, in this protocol the FLC takes E and D as input
parameters and Rating of Route(R) as output parameter.
Service(QOS). QOS is considered as an important
Each input and output variable are divided into three and
feature to make use of the network resources such nine linguistic values. Multiple fuzzy rules are inferred on
asbandwidth, jitter, node energy level, queue length, these input parameters and R is calculated for each route.
delay, cost and reliability in an enhanced and well- The route which is having higher energy and shorter
organized manner. These QOS parameters can be distance is selected as optimal route. Therefore, the
given as inputs to fuzzy controller for determining the relation between input and output parameter are as in eq (5)
and eq (6)
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

RSP is calculated in terms of percentage. Therefore ,


R∞E eq (5) the route which is having high percentage will be
R ∞ 1/D eq (6) So the final selected as optimal route,which is constant and
energy capable. Therefore the relation between
relation is as input and output parameter are as in eq (13), eq
R ∞ E ∞ 1/D eq (7) (14), eq (15),eq (16),eq(17) RSP ∞ LET
eq (13)
Using [C], with parameters as Residue Energy(RE),
Node Speed(NS), Hop Count(HC), it concludes that RSP ∞ 1/ PLRT eq (14)
RE is inversely proportional to NS will be the best RSP ∞ 1/LPER eq (15)
probability for optimal route. That means, in this RSP ∞ LRSS eq (16)
protocol the FLC takes RE, NS, HC as input RSP ∞ RBP eq (17)
parameters and Trust Node(T) as output parameter. So the final relation is as
Each input and output variable are divided into three RSP∞LET&LRSS&RBP∞1/LPRT &1/LPER eq (18)
and five linguistic values. Multiple fuzzy rules are Using [F], with parameter as Node Moving Speed(NMS) ,
inferred on these input parameters and the node which Number of Neighboring Nodes(NoNNs), it concludes that
is having high RE, low NS, short HC (or) high RE, NoNNs is inversely proportional to NMS will be the best
low NS, medium HC (or) high RE, low NS, long HC is probability for optimal route. That means, in this protocol,
considered as trusted node (more qualified) to be part FLC takes NMS, NoNNs as input parameters and Beacon
of a stable route. Therefore, the relation between Packet Interval Time(BPIT) as output parameter. Each
input and output parameter are as in eq (8) and eq (9) input and output variable are divided into five linguistic
T ∞ 1/ NS Eq (8) values. Multiple fuzzy rules are inferred on these input
T ∞ RE Eq (9) parameters and this protocol selects the most excellent
So the final relation is as BPIT based on NMS mobility and NoNNs. Therefore the
T ∞ RE ∞ 1/NS Eq (10) route which is having very short BPIT is considered as
Using [D], with parameters as Hop Count(HC), Sent optimal route. The BPIT will be very short if NMS is
Control Packet(P), it concludes that P is directly high, NoNNs is very small (or) if NMS is very high,
proportional to HC will be the best probability for NoNNs is very small. Therefore the relation between
optimal route. That means, in this protocol, FLC input and output parameter are as in eq (19) and eq (20)
takes HC, P as input parameters and Active Route BPIT ∞ 1/ NMS eq (19)
Timeout(ART) as output parameter. Each input and BPIT ∞ NoNNseq (20)
output variable are divided into three linguistic So the final relation is as
values. Multiple fuzzy rules are inferred on these BPIT ∞ NoNNs ∞ 1/NMS eq (21)
input parameters and the route which is having ART Table 1: Comparision of Fuzzy Logic based routing protocols
as high is the considered as best route. ART will
be high if HC and P is low. Therefore, the relation Routing Protocol QOS parameters
between input output parameter are as ineq (10) and
3 Hop Count, Energy Level
eq(11) ART ∞ 1/ P eq (10) FBEEMR technique

ART ∞ 1/HC eq (11) EERP


4
for MANET
Energy Level,
Distance
Maximum
between intermediate
using
the final relation is as 5
nodes
VSMT
ART ∞ 1/P & 1/HC q (12) Using [E], with 6 Hop count, Energy Level,
FA to enhance route speed, Trust Value,
parameters as Link Expiration Time(LET), stability of AODV
Probabilistic Link Reliable Time(PLRT), Link routing protocol

Packet Error Rate(LPER),Residual Battery HS-AODV routing Hop Count, bandwidth,


7 delay
Power(RBP) and Link Received Signal protocol based on FCT

Strength(LRSS), it concludes that LET, LRSS, RBP


8 9 Link Expiration Time, speed,
are inversely proportional to PLRT, LPER.That EESR using QOSMA
in MANET
delay, energy level,

means, in this protocol, FLC takes LET, PLRT,


LPER, RBP, LRSS as input parameters and Route FLDB
10
for PSR
11 Number of Intermediate
nodes, speed
Selection Probability(RSP) as output parameter. mobile PB
12
routing protocol
Each input and output variable are divided into
three linguistic values. Multiple fuzzy rules are
inferred on these input parameters and for each route
PARISHODHANA _In-house Research Journal of GIST, Volume-6, Isue-1, JANUARY-2018

VI.CONCLUSION
6.Santosh Kumar Das, Sachin Tripathi,
This paper discusses how Fuzzy Logic theory can be used A.P.Burnwal, ― Fuzzy Based Energy Efficient Multicast
for implementing routing in AdHoc networks. It is Routing for Adhoc Network‖ published in IEEE
important to consider maximum QOS parameters or all transactions, 2015.
QOS parameters to select best possible path in adhoc 7. Santosh Kumar Das, Sachin Tripathi, ― Energy
networks. But as per best of my knowledge ,no existing Efficient Routing protocol for MANET based on Vague Set
protocols are considering all or maximum QOS Measurment Technique‖, published by ELSVIER under
parameters. Most of the authors are using 2 or 3 responsibility of organizing committee of the Second
parameters as routing metrics. The future scope of this International Symposium on Computer Vision and the
work can be enhanced to develop a new Fuzzy Logic Internet(VisionNet‘15).
based routing protocol for MANETs which will take all 8. Nihad I. Abbas, Mustafa Ilkan, Emre Ozen, ―
the important QOS parameters. Fuzzy approach to improving route stability of the AODV
routing protocol‖, EURASIP journal on wireless
REFERENCES communications and networking, a SPRINGER Open
1. Kur Khan, Ru Zaman, AV Reddy, ―An Efficient Journal.
DSDV Routing protocol for mobile ad hoc Networks and 9. Xiaoping Yang, Huaning Zhang, Xin gao, yu Hu, ―
its performance comparison‖ , computer modelling and Research of HS-AODV Routing protocol Based on Fuzzy
simulation, 2008. ems‘08, second uksim symposium on Control theory‖, published in IEEE transactions,
ieee xplore, 2008. 2015.
2. DB Johnson, DA Maltz ,― Dynamic Source 10. Senthilnathan Palaniappan, Kalaiarasan Chellan, ―
Routing in wireless AdHoc networks‖ , Mobile Energy-Efficient stable routing using QOS monitoring
computing, 1996 – Springer. agents in MANET‖, EURASIP journal on wireless
3. MK Marina, SR Das, ―On-demand multipath communications and networking, a SPRINGER Open
distance vector routing in ad hoc networks‖, Network Journal.
Protocols, 2001. Ninth International Conference on IEEE 11. Raed Alsaqour, Maha Abdelhaq, Rashid saeed,
Xplore, 2002. Mueen Uddin, Ola Alsukoue, Mohammed al-Hubaishi,
4. Sujata V. Mallapur , Siddarama R. Patil ―Fuzzy tariq Alahdal, ― Dynamic packet beaconing for GPSR
logic-based stable multipath routing protocol for mobile mobile adhoc position-based routing protocol using fuzzy
ad hoc networks‖, India Conference (INDICON), logic‖, Journal of network and Computer Applications
2014Annual IEEE. 47(2015) 32-46, an ELSVIER Journal.
5. Alandjani Gasim, Johnson Eric E. In: Fuzzy routing
in ad hoc networks, performance, computing, and
communications conference, 2003. IEEE international
volume, issue, and 9–11 April 2003. p. 525–30.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

A Novel Multirate Weighted FIR Filter Design using VLSI


K. Mohana Krishna
Assistant Professor,Department of ECE, Geethanjali Institute of Science and Technology, Nellore

Abstract: A new class of FIR filtering algorithms and VLSI II. Study Methodology
architectures based on the multirate approach were recently Distributed arithmetic is an important technique to
proposed. They reduce the computational complexity in FIR implement digital signal processing (DSP) functions in
filtering, and also retain attractive implementation related FPGAs. It provides an approach for multiplier-less
properties such as regularity and multiply-and-accumulate
implementation of DSP systems, since it is an algorithm
(MAC) structure. In addition, the multirate feature can be
applied to low-power/high-speed VLSI implementation. These that can perform multiplication with use of lookup table
properties make the multirate FIR filtering very attractive in (LUT) that stores the pre-computed values and can be
many DSP and communication applications. In this paper, we read out easily, which makes DA-based computation
propose a novel adaptive filter based on this new class of well suited for FPGA realization, because the LUT is the
multirate FIR filtering structures. The proposed adaptive filter basic component of FPGA.
inherits the advantages of the multirate structures such as low These blocks have to be efficiently mapped onto
computational complexity and low-power/high-speed FPGA‘s logic resources. The major disadvantage of DA
applications. Moreover, the multirate feature helps to improve technique is that the size of DA- LUT increases
the convergence property of the adaptive filter.
exponentially with the length of input. Several efforts
Keywords: FIR filtering, multiply and accumulate (MAC), have been made to reduce the DA- LUT size for
VLSI. efficient realization of DA-based designs. The use
offset-binary coding is proposed to reduce the DA-LUT
I. INTRODUCTION size by a factor of 2. Recently, a new DA-LUT
A digital filter is a system that performs architecture for high-speed high-order has been
mathematical operations on a sampled or discrete time introduced, where the major disadvantage of the FIR
signal to reduce or enhance certain aspects of that filters is vanished by using carry look ahead adder and
signal. One type of digital filter is FIR filter. It is a the tri-state buffer. On the other side, some structures
stable filter. It gives linear phase response. Pipelining are introduced for efficient realization of FIR filter.
and parallel processing technique is used in FIR filter.
Recently, novel one- and two-dimensional systolic
Pipelining operation takes place in an interleaved structures are designed for computation of circular
manner. Pipelining done by inserting latches (delay convolution using DA, where the structures involve
element) in the system. It increases the overall speed of significantly less area-delay complexity compared with
the architecture but the hardware structure and system the other existing DA-based structures for circular
latency will increases. Hardware structures increases convolution. In the modified DA architecture is used to
due to inserting pipelining latches. For M level obtain an area time- power- efficient implementation of
pipelining M-1 delay elements required. Latency is the FIR filter in FPGA.
difference between the availability of first output in the
sequential system and the pipeline system. At every
clock cycle it will operate multiple inputs and produced
multiple outputs is called parallel processing. It
required extra hardware. Both pipelining and parallel
processing has disadvantages. For FIR filters, output is
a linear convolution of weights and inputs. For an Nth-
order FIR filter, the generation of each output sample
takes N+1 multiply accumulate (MAC) operations.
Multiplication is strongest operation because it is
repeated addition. It require large portion of chip area.
Power consumption is more. Memory-based structures
are more regular compared with the multiply
accumulate structures; and have many other
advantages, e.g., greater potential for high throughput
and reduced-latency implementation and are expected
to have less dynamic power consumption due to less
switching activities for memory-read operations
compared to the conventional multipliers. Memory
based structures are well-suited for many digital signal
processing (DSP) algorithms, which involve
multiplication with a fixed set of coefficients. For this
Distributed Arithmetic architecture used in FIR filter.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

Due to the vast advantages of the multirate FIR N' -


filtering algorithm and architecture, we are motivated to 1. They can be related to wk(n) as

and the subscripts i , j are used to denote the jth


study a novel adaptive filtering scheme based on the coefficient in the ith decimated sub-filter. Since Eq.
multirate approach. Figure 2 shows our idea. Part (a) is
the block diagram of a conventional LMS-type adaptive
filter, where error signal e(n) is used to update the (2) is a block based update operated at an M-times
coefficients of the FIR filter so as to minimize the lower sampling rate, it will be convenient to define
mean-squared error function, E[ez(n)]. In our approach, a new time index I. Single increment of I
we replace the transversal filter with the multirate FIR corresponds to M increments of the original index
filter. As a result, the new adaptive filter inherits the n. Besides, we also define the decimated signals as
advantages of the multirate FIR structures such as low
computational complexity, regularity, and low-
power/high-speed applications. Also, the multirate
feature can help to improve the convergence properties By applying above definitions and substituting
of the adaptive filters. The detailed algorithm and n = MI into Eq. (2), we can derive the new
architecture are discussed in the following section. weight updating equation for wi.j (n) as
III. UPDATING ALGORITHM AND VLSI
ARCHITECTURE

In this section, we derive the updating equations


and architecture of the proposed multirate adaptive
filter. Mathematically, an N-th order LMS adaptive
FIR filter can be described by the following
equations.
Furthermore, by using the fact of xm-
i(l)= xm- i + M (l- 1) for m -1 a < 0, the new
updating equation of the proposed multirate
adaptive filter can be rewritten as

For and. is defined as


the estimated gradient of jth weight of the ith sub-
filter. A direct implementation of Eq. (4) is depicted
in Fig. 3.It shows a regular realization of the
for k = 0,1,. . . , N - 1, where z(n) is filter input proposed new updating algorithm with example of M
signal, wk(n) is the kth filter coefficient, d(n) is the = 3. By substituting Fig. 3 and Fig. l (b) into Fig.
desired response, and p is the step size.Due to the 2(b), we can have the overall structure (including
characteristics of the proposed multirate adaptive pre-,post-processing networks, multirate filtering
filter, the updating equations in Eq. (1) need to be block, and the weight updating block) of the
modified. First, as can be seen from Fig. 1, we can proposed adaptive filter in Fig 4. As can be shown in
treat the central part of the multirate FIR filter that Fig. 3 and Fig. 4, both weight updating and multirate
operates at the frequency of f/ M as a block- based filtering block can be implemented in a very regular
FIR system. We may then employ the updating way, besides, we can also show that the updating
scheme in block LMS (BLMS) and rewrite Eq. (1) a equation in (4) can be applied for other choices of M
and N.

IV.COMPLEXITY ANALYSIS AND


COMPARISON
Moreover, in the multirate FIR filtering scheme, the
filter weights, wk for 0 5 k 5 M - 1, are decimated Table 1 lists the required computational complexity
and grouped into M sub-filters with tap length equals of the filtering operation, error calculation, and
to N' 2 N/M (assume that N is multiple of M.) The weight updating among the standard LMS and
ith sub-filter, Wi, is composed of wi,j(n), for 0 5 j 5 multirate adaptive filters with M = 2 and M
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

= 3 ' . Note that both the MPU and addition rate can be approximated by where Vt is the
operations per unit sample (abbreviated as APU) are threshold voltage of the device. Assume the Vdd =
about the same in error calculation and weight 3v and Vt = 0.7V in original system (standard
updating operation for all approaches. The LMS).
computational complexity saving comes from the
multirate filtering operations. The overall
computational complexity of the multirate adaptive
algorithm is less than the one of conventional LMS.
Provided that the capacitance due to the
As M of M=3 increases, the saving is more multipliers is dominant in the circuit and is roughly
significant. In addition, the proposed approach still p can adaptive filter as proportional to the number
retains the MAC operations, which is preferable in of multipliers, we estimate the power consumption
programmable DSP implementation
of multi rate adaptive filter as Where Po denotes
the estimated power consumption of the standard
LMS adaptive filter. The required supply voltage
and power consumption for multirate approaches
with Mn=2,3 are listed in the last two rows of Table
1, where C e,ff is the effective capacitance of a
single multiplier. It shows that the power
consumption is greatly reduced compared with the
standard LMS, and the saving is more significant as
M increases
V. APPLICATION TO DELAYED LMS

In the VLSI implementation of Eq. (l), the long


feedback path of the error signal imposes a critical
limitation on its high-speed implementation. In
applications which require high sampling rate or large
number of filter taps, the direct implementation may
not be applicable. To overcome the before mentioned
Figure 3 Direct Implementation of Weight updating speed constraint, the delayed LMS (DLMS) is usually
block (WUB) M=3 adopted [7]. It uses a delayed estimation error to
update the filter weights, i.e., the weight updating
Figure 4.The Overall VLSI structure of the multirate equation in Eq. (1) becomes
adaptive filter with decimation
The extra D can help to relax speed constraint within
the feedback path of e(n). Hence, the transversal filter
can be implemented as a D-stage pipelined FIR filter
so as to handle the high-sampling input signal. One
major disadvantage of the DLMS algorithm is its slow
Table 1: the comparison of computational complexity convergence rate [7]. That is, the optimum step size
and power for standard LMS and multirate adaptive decreases as D increases, so does the convergence rate
filters
In the proposed adaptive filter, the tap length is only
N' = N/M. As a result, for fully-pipelined designs, the
delay stage is reduced from N of the standard DLMS
architecture to N', which leads to improvement in the
convergence rate.

To verify our observations, we compare the ensemble


averaged error between the conventional DLMS and the
proposed multirate adaptive filter in the application of
channel equalization [lo, Chap.91. Figure 5 and 6 show
the learning curves for these two approaches in two
different channels, where the Eigen value spread, x(R),
of the received signal are
Moreover, by following the arguments in and 21.71, respectively. Based on the results resented in
[5], we know that the multirate system is very Fig. 5 and Fig. 6, we can make the following
suitable for low-power/ high-speed applications. It observations: The conventional DLMS behaves worst
can be shown that the lowest possible supply in terms of convergence rate and the steady state mean-
voltage Vdd‘ for a device running at an M-times squared error. The multi rate adaptive filters with M = 2
slower clock and M = 3 have smoother convergence curves (less
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

fluctuations.) The estimated gradient is averaged over M computational complexity and reserve the MAC
sample periods. Hence, the gradient estimation is more structure. It also improves the convergence rate and
accurate. The multi rate approach performs better in steady state error in running delayed LMS.
both convergence

EFERENCES
[l] J. Mou and D. Duhamel, "Fast FIR filtering:
Algorithm and implementations," Signal Processing,
vol. 13, pp. 377 - 384,1987.
[2] J. Mou and P. Duhamel, "Short-length FIR filters
and their use in fast non recursive filtering," IEEE h
n s on Signal Processing, vol. 39, pp. 1322-1332,
June 1991.
[3] A. V. Oppenheim and R. W. Schafer, Discrete-
time Signal Processing. Prentice Hall, 1989.
[4]D. A. Parker and K. K. Parhi, "Low-area/power
parallel FIR digital filter implementations," Signal
Processing, no. 17, pp. 75-92, 1997.
[5]K. J. R. Liu, A.-Y. Wu, A. Raghupathy, and J.
Chen, "Algorithm-based low-power and high-
performance multimedia signal processing,"
Proceedings of the IEEE, Special Issue on
Multimedia Signal Processing, vol. 86, pp. 1155-
1202, June 1998.
[6]J. J. Shynk, "Frequency-domain and multirate
adaptive filtering,"IEEE Signal Processing
Magazine, pp. 14-37, Jan.1992.
[7]G. Long, F. Ling, and J. Proakis, "The LMS
algorithm with delayed coefficient adaptation," IEEE
h n s . Acoust. Speech, Signal Processing, vol. 37,
pp. 1397-1405, Sep. 1989
rate and steady state mean-squared error as M [8] H. Herzberg, R. Haimi-Cohen, and Y. Be'ery, "A
increases. It is due to the fact that the delay stage D is systolic array realization of an LMS adaptive filter
smaller than the conventional implementation. The and the effects of delayed adaption," IEEE h n s .
phenomenon becomes clearer in more severe
Signal Processing, vol. 40,pp. 2799-2803, Nov.
environment (larger Eigen value spread).
1992.
VI. CONCLUSION
[9] M. D. Meyer and D. P. Agawal, "A high
sampling rate delayed LMS fitler architecture," IEEE
In this paper, a new adaptive structure based on
h n s . Circuits Syst. II, vol. 40, pp. 727-729, Nov.
the multi rate filter is proposed. By virtue of the 1993.
advantages of multi rate FIR filtering algorithm, the
[l0] S . Haykin, Adaptive Filter Theory. Prentice
proposed scheme can reduce the required
Hall, Englewood Cliffs, N.J., 2nd ed., 1991.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

Teaching English: Analysis of Practices


Rajendra Singh Baisthakur MPhil, PGDTE
Associate Professor, Soft Skills Trainer, Geethanjali Institute of Science and Technology, Nellore

Abstract: God gave the gift of language and speech only to TOEFL.
human beings. Learning mother tongue is automatic as a But reality is that 75-90% of our Engineering graduates are
child listens to it continuously. Similarly any other without jobs as they lack Communication Skills. In spite of
language of the surroundings is also learnt without effort. this general scenario some of the students speak good
But learning English language in India is not easy as it is English even in their primary classes. Communists see a
not spoken around like the mother tongue. Linguists say division in society as ―Haves‖ and ―Have-nots‖ in terms of
that reasonable ability in English language can be wealth. Similarly we see today a division among our
achieved with vocabulary of 2000 words in about 100-150 students as ―Haves‖ and ―Have-nots‖ in English. A few
hours of study. But 90% of our engineering graduates are students who go to better schools and some whose parents
unemployable as they lack communication skills in English. take good care of their children‘s studies, learn good
This paradox makes it obvious that something is seriously English and grab all the opportunities where as the ―Have-
wrong with our way of teaching-learning English. nots‖ of English are deprived of every opportunity leaving
Indian children, since ages, followed the system of them in despair. A majority of the Have-nots are from rural
memorising texts without any understanding of it. As the areas and Vernacular Medium. When a construction
child grew to a young man in course of time, the meaning worker is taken to another state, he learns the language of
and significance of what he learnt earlier was revealed to the region in 3-6 months without any teaching. Are our
him. In the twentieth century Logic and Psychology helped students worse than him? These paradoxes prove that there
linguists to think of some other ways of teaching-learning is something fundamentally wrong with our teaching-
processes. The Behaviourist School of thought and the learning process and that it needs a thorough investigation.
Cognitive School of thought vied with each other in III. Earlier Practices
propounding theories relating to teaching-learning of a Before attempting to set things right let us ask a
language. Consequently new Grammars developed. Focus fundamental question --- What is language? It may be
moved from Structures to Functional and then on to defined as meaningful communication of feelings and ideas
Communicative and now to Creative aspects of language. through words arranged in a particular order. Language is
Age of learner and his mother tongue too are factors to like a building made of bricks called words and cement
reckon with in learning English language. Liberation from called grammar. Any attempt to teach English without
unsound pedagogy is a necessity. teaching words is a vain attempt. We learn Tamil or Hindi
In the light of these diametrically opposite approaches to from our neighbours by learning words (Pronunciation,
language teaching-learning process a viable method of meaning etc.) and trying to use them. So should be the way
teaching English can be evolved if we keep an open mind. with English. Not concentrating on learning of words is the
I. Introduction fundamental mistake in the teaching-learning of English
The arrangement of lower jaw in human beings is a unique because of which we have graduates who cannot even
gift of God because of which we are able to produce a write a letter in English. Giving summaries of lessons or
variety of sounds which no other being on earth can. Our paragraphs by oral explication, by dictating notes or
efforts to convey our feelings and ideas in a meaningful through PPTs as some language teachers do, is teaching of
way through these sounds led to the development of words content but not teaching of language. Grammar is actually
and language. Language is the foundation for the evolution a bonus while learning mother tongue (L1), but for second
of civilization. language (L2) it has to be taught for ascertaining accuracy.
In this paper my objective is to get familiar with old and That is why we say L1 is acquired but L2 has to be learnt.
modern ways of teaching English based on Philosophical Once, the objective of learning a language was to enjoy
and Psychological theories relating to functioning of literature in that language. Later focus shifted to language
human mind and learning of a language with special with the concept ‗Language through literature‘. Then it has
reference to English as a 2nd language and evolve a way been teaching of Language Skills for communication.
that helps in attaining the goal, ability to use English. Abilasha, R and Dr M Ilankumaran highlight the changes
II. Pedagogy and Present Situation in the later parts of 20th century thus:
Research proved beyond doubt that a reasonable
knowledge of English could be attained in 6 to 9 months In the later years of 1970s, audio lingual method fell into
and that communication skills can be developed in 100 to disregard. During 1980s and 1990s, there was a sweeping
150 hours. As per pedagogy a student who completes 9th change over the existing trends then, and more emphasis
class is expected to possess a vocabulary of 2000 words was laid on authentic and meaningful contextualized
which is enough to display a reasonable ability in the four discourse.1
skills of language. By the time he completes his The Content and Language Integrated Learning (CLIC) is
Intermediate course (+2) he should have acquired a an approach where the English teacher uses cross curricular
vocabulary of 3000 words. He should be able to understand content and so the students learn both the content and
and use English for Specific Purposes (ESP) and face English. But when English teachers are asked to teach
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

lessons like ―Cloud Computing‖ they will have to look at is widely different from strategy for L2. For example
the clouds as they will not be able to teach neither English activity based teaching and language games are useful for
nor Computing with such lessons in the curriculum. A students under 14 as they do not understand as much as
lesson prescribed has not only to be student friendly but adults. These are waste of time for older students who can
also to be teacher friendly for teaching-learning to happen. understand concepts instantly and can spend time more on
With robots round the corner our objective in future is practicing the learnt aspect for consolidation. The point to
likely to be creative use of language. note here is a 5 year old in England has so much of ability
Earlier English teacher used to read the textbook line by in English usage which a 17 year old in India does not
line in the classroom while students noticed the have. Obviously the teaching methods applicable to a five
pronunciation of new words, different forms of a word (for year old Western are not suited to the 17 year old Indian.
example: appear, appeared, appearance, apparent, Ancient teachers while teaching Sanskrit, Greek or Latin
apparently), noted the shade of meaning from the context made the students learn things by heart when they are
and identified the word groups in a sentence which children and when they grew into adolescents they thought
improved their vocabulary and comprehension levels. and understood what they had learnt earlier. Memorizing
When meanings of words are learnt a student develops and analyzing are the two ways of learning at different
interest to read more on his own. Exposure to language in stages of life. Rashmi Pulizala and K Saritha righty said
any form makes him learn the word groups and word order ...recent research in 2nd language acquisition suggests that
or syntax automatically. Though Traditional Grammar was certain traditional practices of Asia, memorization and
taught separately students used to see how those rules were form-focussed learning, which were believed to be
applied while reading a text. Later teaching traditional ineffective, may have an important role to play in teaching
Grammar was discontinued and a veiled approach of and learning.2
indirect teaching of grammatical items without using terms VI. Adolescent Vs Child
of Grammar was used. Repetitive practise of Structures and Psycho-linguists discovered that children up to the age of
patterns was adopted. ten possess an extraordinary and mysterious ability to learn
IV. The Behaviourist School of Learning any number of languages that come their way without any
The Behaviourist School which believes in Inductive Logic effort. After that age their ability starts decreasing till 14.
is based on Pavlov‘s experiments with dogs. This led to the The ease of learning vanishes totally after 14 and a student
belief that association of ideas and drilling results in habit has to put in effort to learn a language. In adults knowledge
formation. So they felt that repetition of language results in of L1 helps in learning a second language (L2). Children
learning. B. F. Skinner, Leonard Bloomfield, Harold learn chunks of data where as adults can learn only item by
Palmer, A. S. Hornby, Charles Fries are some of the item. Understanding what is read, relating it to what is
protagonists of this school. They focussed on Structures, already known and tying to apply it are the factors which
accuracy, Speaking and RP. The sum and substance of this help students learn effectively. Word grammar (i.e.
view is that drilling exercises are enough to learn a different forms of words, conjugation), Homonyms,
language. Experimental verification shows that students Synonyms and Antonyms are good means of building
displayed 90 to 95% accuracy through this method of vocabulary. Mimicry, substitutions are useful in teaching
teaching without ever understanding what they wrote by Phonology, Connectives, Vocabulary and Syntax. If we
way of answers. Students from some of the corporate +2 aim for RP we may end up with Indian English. If we aim
institutions who secure high marks in +2 examinations but at Indian English we may end up with Tenglish (Telugu
get very low marks in EMCET are best examples to prove like English) or Hinglish (Hindi like English) etc. We
this point. should concentrate more on Listening and Reading while
V. The Cognitive School of Learning teaching children and on Writing and Speaking while
The Cognitive School which believes in Deductive Logic dealing with adolescents. Ability achieved in one skill
gives importance to understanding of what is read or heard helps in leaning other skills too as they are all inter-related.
and then produce sentences. Noam Chomsky and his VII. Testing: A tool to Learn
militant followers are the exponents of this school. The gist Testing is an important aid in teaching-learning process. It
of the Cognitive approach is -- Language is rational. So gives us feedback to decide the validity of the materials
apply your reason to learn language by understanding the used and the methods employed. More than Entrance or
material for reading. A look at the CBSE question papers Terminal Tests, Diagnostic Tests help us plan Remedial
reveals that less than 30% of the questions relate to the Teaching. There should be a specific objective for each (bit
prescribed texts and all other questions have to be of) question. If copying is allowed in the examinations by
answered with the general ability of a student. So a student ‗kind‘ invigilators that is the end of education and
today cannot depend on memorisation but try to understand consequently the nation.
concepts for his development. VIII. Conclusion
Methods for L1 and L2 Teaching Corporate colleges at +2 neglect English. But without
Age of a learner and the language of his region are major English survival is a problem. So teachers at collegiate
factors in learning a language. We adopt the research level have to put in more effort to bring the students back
findings regarding teaching English from England and on track. English language cannot be learnt without word
USA where English is L1 (mother tongue) and apply them consciousness. Teachers have to sensitize students to
here where English is L2. Clearly the strategy to teach L1 become conscious of spelling, contextual meaning,
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

pronunciation, form of a word and the way it is used. With


exposure to English an awareness of word groups in a
sentence and word order in a sentence (Syntax) can be
acquired almost without conscious effort. Language spoken
in the region can be treated as L1 though mother tongue is
different. When we force small children to speak English
without L1 environment it results only in Butler English
which has to be unlearnt later to learn the right language.
Learning a language is directly proportional to the amount
of exposure to it.
Methods of teaching English must be different for under 14
students and adolescent learners. Adults learn by
observation and understanding concepts, a cognitive
rational approach, Concepts of Grammar too can be given
directly for understanding and practise. English is to be
learnt for communication, critical thinking and creativity.
Gaming activities for adolescents may be liked by the
playful but will be considered silly or waste of time by
serious learners as in the fast world of today concept has to
be given directly adopting deductive approach.
Having said all this let me finally say that the most
effective tool in teaching is the personality of the teacher
which motivates learners.
References
[1]Abilasha, R., and Dr. M. Ilankumaran. ―Trends in
English Language Teaching: A Novel Perspective‖,
International Journal on Studies in English Language and
Literature (IJSELL) Volume 2, Issue 11, November 2014:
PP 46-52 ISSN 2347-3126 (Print) & ISSN 2347-3134
(Online) www.arcjournals.org ©ARC Page-46.

2[]Pulizala, Rashmi., and Saritha K, ―English Language


Acquisition: Western Theories and Eastern Practices‖, 12th
International ELT@I Conference, Article No.229.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

A Comparative Study On Concrete Containing E- Plastic Waste


And Fly Ash Concrete With Conventional Concrete
Shaik Nadhim1, P.Navya Shree2, G.Pranay Kumar3
Assistant Professor,
1, 2
Department of Civil Engineering, NVR College of engineering and technology, Tenali
3
Assistant Professor, Department of Civil Engineering,
Geethanjali Institute of Science and Technology, Gangavaram , SPSR Nellore
Abstract: process known as hydration. The water reacts with the
Utilization of waste materials is a partial solution to cement, which bonds the other components together,
environment and ecological problems. Use of these eventually creating a robust stone-like material. Concrete is
materials not only helps in getting them utilized in cement, used to make pavements, pipes, architectural structures,
concrete and other construction materials, it helps in foundations, motorways/roads, bridges/overpasses, parking
reducing the cost of cement and concrete manufacturing, structures, brick/block walls and even boats.
but also has numerous indirect benefits such as reduction in The cement industry is one of two primary
landfill cost, saving in energy, and protecting the producers of carbon dioxide (CO2), creating up to 5% of
environment from possible pollution effects. Electronic worldwide man-made emissions of this gas, of which 50%
waste, abbreviated as e –plastic waste, consist of discarded is from the chemical process and 40% from burning fuel.
old computers, TV‘s, refrigerators, radios- basically any The CO2 emission from the concrete production is directly
electrical or electronic appliance that has reached its end of proportional to the cement content used in the concrete
life. mix; 900 kg of CO2 are emitted for the production of every
The waste material or by product from thermal plants such ton of cement.
as fly ash as a partial replacement of cement in concrete It is widely known that water/cement ratio
helps in reduces the possibilities of environmental primarily governs the strength of concrete and lower
pollution. The inclusion of Fly ash affects all aspects of water/cement ratio gives higher strength. Another
concrete. As a part of the composite concrete mass, it can important requirement is that the concrete should have
be used both as a fine aggregate as well as a cementitious adequate workability at the time of casting so that it can be
component. It influences the rheological properties of fresh properly compacted with minimum air voids.
concrete as well as the finished product. It improves the FLY ASH: The inclusion of Fly ash affects all aspects of
strength, finish and durability of the hardened mass. It concrete. As a part of the composite concrete mass, it can
reduces segregation, bleeding and lowers the heat of be used both as a fine aggregate as well as a cementitious
hydration apart from the energy and cost saving aspects. component. It influences the rheological properties of fresh
This investigation covers the comparative study of e- concrete as well as the finished product. It improves the
plastic waste material as coarse aggregate replacement for strength and durability of the hardened mass. It reduces
5%, 10%, 15%, and 20%, fly ash as cement replacement for segregation, bleeding and lowers the heat of hydration
5%, 10%, 15%, 20% is done for M20 grade of concrete. apart from the energy and cost saving aspects.
The compressive strength, split tensile strength and flexural If the cement or fine aggregate is replaced, to improve
strength for different percentage of e-waste material and fly the workability Super plasticizers are required. Super
ash is compared with conventional concrete and plasticizers are materials which when added in small
corresponding results are graphically represented, and the volume to concrete or mortar can produce considerable
optimum dosage of partial replacement is also suggested. improvements in their strength characteristics. It is also
Keywords: e-plastic waste, fly ash, compressive Strength, known that all the water added while mixing concrete is
split tensile strength, flexural strength, different percentage not completely utilized for hydration.
of replacement, optimum dosage, M20 grade of concrete.
ION
Concrete is a composite construction material, composed
of cement (commonly Portland cement) and other
cementitious materials such as fly ash and slag cement,
aggregate (generally a coarse aggregate made of gravel or
crushed rocks such as granite, plus a fine aggregate such as
sand), water and chemical admixtures.
Concrete solidifies and hardens after
mixing with water and placement due to a chemical
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

FLY ASH
as Portland cement, quicklime, or hydrated lime, with the
Even with low water / cement ratio about half of the total presence of water in order to react and produce
water may still remain uncombined after long cementitious compounds. Fly ash produced from the
curingperiod, leading to porosity in the hardened concrete, burning of younger lignite or sub bituminous coal, in
resulting in poor performance. Therefore, it is necessary to addition to having pozzolanic properties, also has some
keep the total water content to a limited level, resulting in self-cementing properties. In the presence of water, Class C
lower workability, requiring better methods of compaction. fly ash will harden and gain strength over time. Class C fly
This can be achieved by using suitable admixtures. ash generally contains more than 20% lime (CaO). Unlike
There are inorganic materials that have pozzolanic Class F, self-cementing Class C fly ash does not require an
or latent hydraulic properties. These very fine-grained activator. Alkali and sulphate contents are generally higher
materials are added to the concrete mix to improve the in Class C fly ashes
properties of concrete (mineral admixtures), or as a E-PLASTIC WASTE: During the past few decades, the
replacement for Portland cement. These are called as phenomenon of premature deterioration of concrete
mineral admixtures. Admixtures are additions to the mix structure is being witnessed .This has become a matter of
used to achieve or improve workability and other concern in many countries bringing of the issue of
properties of concrete. durability of concrete in the fore front .Also the codes of
Fly ash use improves concrete performance, making it practice in many countries including Indian Code IS 456-
stronger, more durable, and more resistant to chemical 2000, have undergone changes Incorporating revised
attack. Its use also creates significant benefits provisions pertaining to durability of concrete. In this
for our environment. Fly ash is a by-product of coal- fired context an attempt has been made to high light the method
electric generating plants; it is used to partially replace of combining certain waste e-products along with the
Portland cement (by up to 60% by mass). The properties of conventional constituents of concrete which meets the
fly ash depend on the type of coal burnt. In general, requirements of special and uniformity that cannot always
siliceous fly ash is pozzolanic, while calcareous fly ash has be achieved using the traditional
latent hydraulic properties. Fly ash is generally methods of manufacturing of concrete.
captured by electrostatic precipitators or other particle The propose work aims at enhancing. The characteristics
filtration equipment before the flue gases reach the such as placement and compaction without segregation. It
chimneys of coal-fired power plants, and together with is aimed in the attempts made in this project to ensure
bottom ash removed from the bottom of the furnace is in long-term mechanical properties, early-age strength,
this case jointly known as coal ash. toughness volume stability or service life in severe
Depending upon the source and makeup of the coal being environments. E- waste describes loosely discarded,
burned, the components of fly ash vary considerably, but surplus, obsolete, broken, electrical or electronic devices.
all fly ash includes substantial amounts of silicon Rapid technology change ,low initial cost have resulted in a
dioxide (SiO2) (both amorphous and crystalline) and fast growing surplus of electronic waste around the globe
calcium oxide (CaO), both being endemic ingredients in .Several tones of E waste need to be disposed per year.
many coal-bearing rock strata. Since the particles solidify Traditional landfill or stockpile method is not an
rapidly while suspended in the exhaust gases, fly ash environmental friendly solution and the disposal process is
particles are generally spherical in shape and range in size also very difficult to meet EPA regulations. How to reuse
from 0.5 µm to 300 µm. Two classes of fly ash are defined the non disposable E waste becomes an important research
by ASTM C618: Class F fly ash and Class C fly ash. The topic. However, technically, electronic waste is only a
difference between these classes is the amount of calcium, subset of WEEE (Waste Electrical and Electronic
silica, alumina, and iron content in the ash. The chemical Equipment). According to the OECD any appliance using
properties of the fly ash are largely influenced by the an electronic power supply that has reached its end of life
chemical content of the coal burned. would come under WEEE. E plastic waste is one of the
The burning of harder, older anthracite and bituminous fastest growing waste streams in the world. In developed
coal typically produces Class F fly ash. This fly ash is countries, previously, it was about 1% of total solid waste
pozzolanic in nature, and contains less than 20% lime generation and currently it grows to 2% by 2010.
(CaO). Other minor constituents include oxides of calcium,
magnesium, titanium, sulphur, sodium and potassium.
Possessing pozzolanic properties, the glassy silica and
alumina of Class F fly ash requires a cementing agent, such
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

developing countries, it ranges 0.01% to 1% of the total


municipal solid waste generation. The e waste inventory
based on this obsolescence rate and installed base in
India for the year 2005 has been estimated to be
146180.00 tones. This is expected to exceed 8, 00,000
tones by 2016. In India, e-waste is mostly generated in
large cities like Delhi, Mumbai and Bangalore. In these
cities a complex e-waste handling infrastructure has
developed mainly based on a long tradition of waste
recycling. Sixty-five cities in India generate more than
E-PLASTIC WASTE 60% of the total e waste generated in India. Ten states
In developing countries, it ranges 0.01% to 1% of the total generate 70% of the total e waste generated in India.
municipal solid waste generation. The waste inventory Maharashtra ranks first followed by Tamil Nadu, Andhra
based on this obsolescence rate and installed base in India Pradesh, Uttar Pradesh, West Bengal, Delhi, Karnataka,
for the year 2005 has been estimated to be 146180.00 Gujarat, Madhya Pradesh and Punjab in the list.
tones. This is expected to exceed 8, 00,000 tones by 2016.
CONCRETE MIX DES IGN (GRADE M20):
In India, e-waste is mostly generated in large cities like
1. Characteristic compressive strength
Delhi, Mumbai and Bangalore. In these cities a complex
required in the field at 28 days.
e-waste handling infrastructure has developed mainly
20Mpa
based on a long tradition of waste recycling. Sixty-five
2. Maximum size of aggregate 20mm
cities in India generate more than 60% of the total e waste
3. Degree of workability 0.90
generated in India. Maharashtra ranks first followed by
4. Degree of quality control Good
Tamil Nadu, Andhra Pradesh, Uttar Pradesh, West Bengal,
5. Type of exposure Mild
Delhi, Karnataka, Gujarat, Madhya Pradesh and Punjab in
the list of e waste generating states in India. There are two 6. Water cement ratio 0.50
B. Test data for materials:
small WEEE/E-waste dismantling facilities are functioning
in Chennai and Bangalore. There is no large scale 1. Specific gravity of cement 3.15
organized e-waste recycling facility in India and the entire 2. Specific gravity of coarse aggregates 2.80
recycling exists in unorganized sector. 3. Specific gravity of fine aggregates 2.60
4. Water absorption:
IMPORTANCE OF THE PRESENT STUDY Coarse aggregate 0.50%
E waste describes loosely discarded,
Fine aggregate 1.0%
surplus, obsolete, broken, electrical or electronic devices.
5. Free (surface) moisture:
Rapid technology change ,low initial cost have resulted in a
Coarse aggregate 0.25%
fast growing surplus of electronic waste around the globe
Fine aggregate 2%
.Several tones of E waste need to be disposed per year.
6. Fly ash: As per I.S.: 3812, specific gravity
Traditional landfill or stockpile method is not an
2.25
environmental friendly solution and the disposal process is
Therefore, required sand content as
also very difficult to meet EPA regulations. How to reuse
percentage of total aggregate by absolute
the non disposable E waste becomes an important research
volume = 35-3.5
topic. However, technically, electronic waste is only a
= 31.5%
subset of WEEE (Waste Electrical and Electronic
Required water content = 186+5.58 =191.61kg/m3
Equipment). According to the OECD any appliance using
Determination of cemen t content:
an electronic power supply that has reached its end of life
Water-cement ratio =
would come under WEEE. E plastic waste is one of the
0.50 Water =191.6 lit
fastest growing waste streams in the world. In developed
Cement =191.6/0.50 =383 kg/m3
countries, previously, it was about 1% of total solid waste
This cement content is adequate for ‗mild‘ exposure
generation and currently it grows to 2% by 2010. In
condition.

TABLE: 1 Determination of coarse and fine Entrapped air, as %


Maximum size
aggregate contents: of Aggregate of volume
(mm) of Concrete
10 3
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

20 2 ) %) %) %)
40 1
Water 191.6 182.0 182.0 182.0 182.0
From the above table, for the specified (free) 2 2 2 2
maximum size of aggregate of 20mm, the OP 383 363.8 344.7 325.5 306.4
amount of entrapped air in the wet concrete is 2 Cement 5 5
percent. Taking this into account and applying Fine 546 546 546 546 546
Aggreg
equations: ate
V = [W + C/Se+ 1/p × fa/Sfc] (1/1000) Coarse 1278. 1278. 1278. 1278. 1278.
Aggreg 66 66 66 66 66
0.98=[ 191.6+383/3.15+1/0.315 x fa/2.60] x ate
1/100 2399. 2370. 2351 2332. 2313.
0 26 53 .38 23 08
fa =546Kg/m3, TABLE: 4 Comparison of plain concrete and e-
Ca = (l-p)/p × fa×Sca/Sfa plastic waste concrete (kg/m3)
Ca=(1-0.315)/0.315x546x2.8/2.6 E- E- E- E-
=1278.66Kg/m Ca=1188Kg/m3 Materia Plai plasti plasti plasti plasti
ls n c c c c
Water = 191.6Kg Concr waste waste waste waste
Cement = 383Kg ete concr concr concr concr
Fine ete ete ete ete
aggregate = 546Kg (5%) (10%) (15%) (20%)
Water 191.6 191.6 191.6 191.6 191.6
Coarse (free)
aggregate = 1278.66Kg
OP 383 383 383 383 383
TABLE: 2 the mix proportion then
Cement
becomes:
Fine 546 546 546 546 546
Aggreg
Fine Coarse ate
Water Cement Coarse
aggregate aggregate Aggreg 1278. 1214. 1150. 1086. 1022.
191.6Kg 383Kg 546Kg 1188K ate 66 727 794 861 928
g 2399. 2335. 2271. 2207. 2143.
26 325 394 461 528
0.5 1 1.425 3.34 EXPERIMENTAL WORK:
TABLE: 3 Comparison of plain concrete and fly It was proposed to investigate the behavior
ash concrete (kg/m3) of E-plastic as partial replacement of coarse
Materia Plai Fly Fly Fly Fly aggregate in concrete and fly ash replaced cement in
ls n ash ash ash ash concrete it is compared with the conventional
Concr concr concr concr concr concrete mix.
ete ete ete ete ete
(5% (10 (15 (20

TESTS ON CEMENT
The Ordinary Portland (OPC) cement of important properties of this cement have been
43 grade conforming to IS: 8112 1989 was used tested using Vicat apparatus, Le chatelier flask
for the present experimental study. The
TABLE: 5 Consistency of cement 6 90 300 33.3 6
TABLE: 6 Properties of Cement
Weight Weight
of of Depth of Values Standard
(W2/W1) S.N Characteristics
Sl. water cement Penetration obtained values
x 10 O
No in in (mm)
(gms (gms) Normal 33 to 35
1 consistency 34mm mm
) W1 W2
1 75 300 40 6 Not be
2 78 300 38.4 5 Initial setting
2 35 min less than
time
3 81 300 37.03 6 30mins
4 84 300 35.7 6
5 87 300 34.48 5
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
Not be and by considering the average of the test results
3 Final setting time 420 min greater and that are tabulated in table
than
600min
Not more
4 Fineness Test 2%
than 10%
3.12 to
5 Specific gravity 3.15
3.19
TABLE: 7 Characteristics of Sand

S.N CHARACTERISTIC VALU


O S E TABLE: 10 Compressive strength of fly ash and e-
1 Specific gravity 2.6 plastic for (5%, 10%, 15% and 20%) replacement in
concrete with conventional concrete:
2 Water absorption 1.85% % of Average Compressive
replace strength2
in
3 Fineness modulus 2.485 men t 7 N/mm
days 14 days 28 days
For fly 5% 14.87 19.19 25.47
TABLE: 8 Characteristics of coarse 10% 15.89 20.14 26.01
ash
S.N CHARACTERISTIC VALUE concr 15% 13.2 18.87 24.59
20% 13.18 17.5 21.57
O S ete
1 Specific gravity 2.8 Grad 5% 13.2 14.75 19.66
2 Water absorption 0.50% e of 10% 10.58 14.45 17.14
For E- 15% 7.91 11.78 11.87
3 Abrasion test 13.7 Mix plastic 20% 4.47 7.9 9.62
M20 concre
te
TABLE: 9 Physical properties of E- Conventi 12.89 14.27 21.2
plastic waste onal
concrete
E-waste Coarse strength values of different proportions
Properties of replacement of fly ash and E-plastic
particle aggregate
wastes in concrete are tabulated and represented
Specific 1.01 2.65 graphically. TABLE: 11 Comparisons of spilt
gravity
tensile strength for fly ash and e-plastic waste with
Absorption (%) <0.2 0.5 conventional concrete
Black & % of Split tensile
Color Dark replacem strength in
Dark N/mm2
en t
Shape Angular Angular 7 days 28 days
For fly 5% 2.8 3.6
Crushing Value <2% 24.20% ash 10% 2.65 3.55
concret 15% 2.35 2.95
Impact value <2% 22.73% e 20% 2.2 2.8
Grade 5% 2.08 2.9
Workability test on concrete: of Mix For E-
Result obtains from compaction factor show that 10% 2.3 2.6
M20 plastic 15% 1.6 2
the workability of concrete
concrete 20% 1.25 1.85
Compaction factor value = 82
Conventio
nal ……. 2.57 3.12
concrete

COMPRESSIVE STRENGTH
TEST:
These results are obtained by testing the GRAPH: 5 Comparisons of spilt tensile strength for
total 9 specimens for 7 days, 14 days and 28 days 5% replacement of fly ash and e-plastic waste with
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018
conventional concrete

GRAPH: 6 Comparisons of spilt tensile strength for


GRAPH: 11 Stress-strain curve of 10% of e-
10% replacement of fly ash and e-plastic waste with
plastic waste cement concrete
conventional concrete

GRAPH: 7 Comparisons of spilt tensile strength for GRAPH: 12 Stress-strain curve of 15% of e-plastic waste
15% replacement of fly ash and e-plastic waste with cement concrete
conventional concrete

GRAPH: 13 Stress-strain curve of 20% of e-plastic


GRAPH: 8 Comparisons of spilt tensile strength
waste cement concrete
for 20% replacement of fly ash and e-plastic
waste with conventional concrete
STRAIN BEHAVIOURS

GRAPH: 14 Stress-strain curve of 5% of fly ash


cement concrete
GRAPH: 9 Stress-strain curve of conventional
cement concrete

GRAPH: 15 Stress-strain curves of 10% of fly ash


GRAPH: 10 Stress-strain curve of 5% of e- cement concrete
plastic waste cement concrete
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

GRAPH: 17 Stress-strain curve of 20% of fly ash


GRAPH: 16 Stress-strain curve of 15% of fly ash cement concrete
cement concrete

CONCLUSIONS FOR E-PLASTIC WASTE fly ash. However an increase in the content of fly ash
An analysis was made on the strength characteristics by gradually enhanced 7 days, 14 days and 28 days
conducting the test on e- waste concrete with e plastic compressive, tensile, stress-strain and toughness up
aggregate the results revealed that up to 5% to 15% replacement in the case of conventional
replacement e-waste concrete is giving improvement concrete.
compression, tensile and flexural strength. Graphs 1. Low volumes of fly ash improve the
show the compressive, tensile and flexural strength of compressive strength of concrete.
e plastic concrete with mixing ratio of e-plastic waste 2. Fly ash replacement with 10% produced highest
with coarse aggregate. However an increase in the compressive strength.
content of e plastic aggregates gradually enhanced 7 3. The young‘s modulus value will increases up to
days, 14 days and 28 days compressive, tensile, stress – 10%, after exceeds 10% of fly ash in concrete it will
strain, young‘s modulus and toughness up to 10% be falling down.
replacement in the case of conventional concrete. 4. The toughness value will be increases in up to
This study intended to find the effective ways to 15% of fly ash concrete.
reutilize the hard plastic waste particles as 5. Young's modulus has shown improvement with
concrete aggregate. Analysis of the strength the decrease of fly ash content.
characteristics of concrete containing recycled COMPARISONS OF E-PLASTIC WASTE AND
waste plastic gave the following results. FLY ASH CONCRETE
1. It is identified that e-waste can be From this project I conclude that the mechanical
disposed by using them as properties of the concrete, such as compression,
construction materials. tensile, stress-strain and toughness has been found to
2. The compressive strength and tensile strength of be fly ash concrete will give 5% more strength
concrete containing e plastic aggregate is retained More compare to e-plastic waste concrete for all
percentage of replacement
or less in comparison with controlled concrete specimens.
SCOPE OF FUTURE WORK
However strength noticeably decreased when the e plastic
content was more than 10%.  Use of increase in percentage of e-plastic waste as
3. It has been concluded that 10% of E-waste coarse aggregates aggregate replacement up to 5% in
aggregate can be incorporated as coarse concrete mix results in good strength gain
comparative to conventional mix
aggregate Replacement in concrete without any long
 Silica fumes and metakaoline may include in fly
term detrimental effects and with acceptable strength
ash concrete to enhance the strength behavior of
Development mechanism.
concrete.
4. The young‘s modulus of e-waste concrete will be
 Durability test may also conduct.
increases up to 5% only after increasing e-plastic
 Add fibers like glass, steel, polyethylene fiber
waste the young‘s modulus will be falling down.
which may increase the crack resistance.
5. The toughness value will be increases up to 10%.
 We can opt M20 grade of concrete for better test
FOR FLY ASH CONCRETE result.
An analysis was made on the strength characteristics REFERANCES
by conducting the test on fly ash concrete with fly [1]. Concrete technology by M.S.SHETTY
ash replaced by the cement. The results revealed that AHAMED SHAYAN, AIMIN XU, ―Value added
up to 10% replacement fly ash concrete is giving utilization of waste glass in and Concrete Research
improvement compression, tensile, stress- strain and vol 34 (2004) pp 8189.
toughness. Graphs show the compressive, tensile, [2]. SECUNGBUM PARK, BONG CHUN LEE,
stress-strain of fly ash concrete with mixing ratio of ―Studies on expansion properties in mortar
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

containing Waste glass &fibering.Cement and [11]. YU Rangang, Zhou Jinshun,LiZhingming ,


Concrete Research, vol 34 (2004) pp 11451152. Influence of Fiber Content and Specimen Size on
[3]. C.H.CHEN, R.HWANG, ―Waste Fracture Property of Polypropylene Fiber Concrete‖
Eglass 2011.
particles used in cementious mixtures‖ Cement and Concrete [12]. Benjamin Rehder,
Research, vol 36 (2006) pp 449456. KingstenBanh, Narayanan Neithalath ―Fracture
[4]. P.M.SUBRAMANIAN, ―Plastic recycling and waste behavior of pervious concretes: the effects of pore
Management in the US‖ Resources, Conservation and structure and fibers‖ 30 January 2014.
Recycling vol (28) pp 253263. [13]. Zdeneˇk P. Bazˇanta, Emilie Becq-Giraudon
[5]. CAIJUN SHI, ―Corrosion of glasses and expansion ―Statistical prediction of fracture parameters of
mechanism of concrete certaining waste Glasses as concrete and implications for choice of testing
aggregates, Journal of Materials in Civil EngineeringASCE, standard‖ 26 October 2001.
October 2009, pp 529533. [14]. S. Pirmohammad, M.R. Ayatollahi ―Fracture
[6]. HAI YONG KANG, ―Electronic waste recycling: A resistance of asphalt concrete under different loading
review of U.S. infrastructure and technology options, modes and temperature conditions‖ 26 November
Resources, Conservation and Recycling vol 45 (2005) 2013.
[7]. A.S.A XU ―Value added utilization of waste glass in [15]. I.M. Nikbin , M.H.A. Beygi, M.T. Kazemi, J.
concrete‖, Cement and Concrete Research, 2004, Vol. 34, aseghiAmiri, E. Rahmani S. Rabbanifar, M. Eslami
pp. 8189 pp 368400.
―Effect of coarse aggregate volume on fracture
[8]. Watcharapong Wongkeo, Pailyn Thongsanitgarn,
behavior of self compacting concrete‖ 12 November
Arnon Chaipanich ―Compressive strength and drying
2013.
shrinkage of fly ash-bottom ash-silica fume multi-blended
cement mortars‖ 20 November 2011. [16]. Sara Korte, VeerleBoel, Wouter De Corte, Geert
[9]. Mehmet Gesog˘lu, ErhanGuneyisi, De Schutter ―Static and fatigue fracture mechanics
RadhwanAlzeebaree, KasımMermerdas ―Effect of silica properties of self- compacting concrete using three-
fume and steel fiber on the mechanical properties of the point bending tests and wedge-splitting tests‖ 20
concretes produced with cold bonded fly ash aggregates‖. 21 January 2014.
November 2012. [17]. Alireza Bagheri, Hamed Zanganeh, Hadi
[10]. M. Šejnoha, M. Broucˇek, E. Novotna, Z. Keršner, D. Alizadeh, Mohammad Shakerinia Mohammad and Ali
Lehky, P. Frantı´k ―Fracture properties of cement and alkali SeifiMarian ―Comparing the performance of fine fly
activated fly ash based concrete with application to ash and silica fume in enhancing the properties of
segmental tunnel lining‖ 16 May 2013. concretes containing fly ash‖ 17 June 2013.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

Is 5G a new Update for 4G or A New Technology?


K. Pradhyumna Kumar,
IVth B. Tech(ECE), Geethanjali Institute of Science & Technology , Nellore

Over a century after Jagadish Chandra Bose efficient and very high bandwidth. But the most
invented radio communication but saw Italian considerable part is that it consumes very low
inventor Guglielmo Marconi walk away with the power. Although, there is still no traces of 5G in
credit, he is set to get his due. The millimetre practice, but prototypes are being using by most of
wavelength frequency that Bose used in his the developing companies and geek‘s. We up to
experiment in 1895 is the foundation of 5G that now only have a single evaluation board provided
scientists and technologists across the world are by Qualcomm Corporation [3][4]. A lot more than
now trying to re-invent [1]. that follows is the recent technology emerging and
the usage of Internet based Applications and
Every network since from 1G to 4G which has appliances namely IoT & IoE, Lora Wan, etc. are
initiated wirelessly grew upon focusing to provide making a long usage of the data streams and their
various services related to the user priority. While requirements were increasing day by day through
the recent changes of obtaining the 4G LTE the Internet.
technology and the user ratio for the Internet has Of course, technologies related to Big Data and
grew enormously very large. Many applications Cloud are managing them currently but
after the introduction of Unlicensed Band Spectrum continentally it too requires a larger data streams to
of Wirelessly accessible networks issued has transfer the data rapidly through the internet. The
increased a lot giving a chance to produce a lot present emerged 4G LTE networks however are
many applications related to the usage of low able to handle them nicely but are still not
power and lower range Wide area networks like consistent to handle at some times. But the 5G
Lora Wan, Wi-Fi, IEEE 802.11a/b/g/n, etc. networks uses Beam Division Multiple
Access(BDMA) type Access technology that has a
When coming to the technical details regarding the potential to overcome this issue using its Quasi-
4G LTE networks, it is setting up the peak Orthogonal Filter Banks.
requirements of about 100Mbit/sec to 1Gbit/Sec
according to the ITU-T specifications. Since the These Access types raised a possibility of creating
first-release versions of Mobile WiMAX and LTE
support much less than 1 Gbit/s peak bit rate, they
are not fully IMT-Advanced compliant, but are
often branded 4G by service providers. According
to operators, a generation of the network refers to
the deployment of a new non-backward-compatible
technology.
On December 6, 2010, ITU-R recognized that these
two technologies, as well as other beyond-3G
technologies that do not fulfil the IMT-Advanced
requirements, could nevertheless be considered
"4G", provided they represent forerunners to IMT-
Advanced compliant versions and "a substantial
level of improvement in performance and
capabilities with respect to the initial third
generation systems now deployed‖. [2] Massive MIMO (Multiple Input, Multiple Output)
But we when viewing the opinion of maker‘s, they Technologies(fig2) that can make the accessing of
were very eagerly waiting for the public release of active nodes of users to be participated in the
spectrum bandwidths of 5G networks. communication flow without any sarcastic issues to
So, what actually 5G is? be followed by. The other most integrated issue is
5G is referred to as the 5th Generation Mobile that 5G comes out with IoT which will become a
Wireless Communication network, which provides part of it. This makes the user feel free and
a greater efficiency in calls than ever before with a comfortable to use his appliances and other Things
very high data rates ranging at millimetre to be worked and accessed out throughout the
bandwidths, starting at a frequency of 28GHz. world without any delay. It is due to the low
(fig1- Source: Google Images) latency issues that makes it to become low
Since it is using Millimeter waves, it has an interference by the other network signals from
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

vivid providers. According to Nokia analytics, it is Fig:4- IEEE Miscellaneous Standards


providing a range of 3 milliseconds of latency
response whereas the 4G LTE fluctuates between The data rate which is the highlighted feature of the
8-10 milliseconds of response. This makes it easy 5G networks i.e. 1Gbit/Sec is also seems to support
to be integrated in the upcoming intelligent devices all the Augmented and Mixed Reality based
so the transmission and reception of the log data applications to go live on internet on the day
and command sets becomes easier to be tomorrow. The Multimedia streaming for the user
communicated. will become a bit higher and everything of videos
The IEEE organisation came up to standardize this would be running at 4K very easily. As well MIT is
technology so that scientists and researchers from making its own Tech analysis and researches based
all over the grounds of the globe can be able to upon the 5G telecom techniques and improving the
access them and utilize them accordingly (fig 3& 4 digital frame algorithms for transferring them in
– Source: https://5g.ieee.org/ ) patterned ways. According to some analysts by
2020 this time in India also we can be able to get
the services of 5G starting as a Partnership project
5G PPP (PPP: Public Private Partnership) (fig5-
Source: https://www.quora.com/ ) and follows.

Fig:3- IEEE Computer Society Standards


assembled silicon transistors that act like high-speed switches
This also makes its way in medical sector and of to halt the backward roll of these waves, enabling them to
very stringent areas also, since the response of the transmit and receive signals on the same frequency at once.
transreciever will be very accurate and are in high One drawback to full duplex is that it also creates more signal
speed and are of Full Duplex so that it will be taken interference, through a pesky echo. When a transmitter emits a
over any types of issue. signal, that signal is much closer to the device‘s antenna and
therefore more powerful than any signal it receives. Expecting
Some militaries already use full duplex technology that relies
an antenna to both speak and listen at the same time is possible
on bulky equipment. To achieve full duplex in personal only with special echo-canceling technology. With these and
devices, researchers must design a circuit that can route other 5G technologies, engineers hope to build the wireless
incoming and outgoing signals so they don‘t collide while network
an that future smartphone users, VR gamers, and
antenna is transmitting and receiving data at the same time.autonomous cars will rely on every day. Already, researchers
This is especially hard because of the tendency of radio waves
and companies have set high expectations for 5G by promising
to travel both forward and backward on the same frequency—aultralow latency and record-breaking data speeds for
principle known as reciprocity. But recently, experts consumers.
have If they can solve the remaining challenges, and
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

figure out how to make all these systems work together, to its own and also the developers are also striving accordingly
ultrafast 5G service could reach consumers in the nexttofive it.
years. [5] References:
As par Industrial IoT(IIoT) is increasing that requires a [1].very http://timesofindia.indiatimes.com/city/kolkata/jagadish-
highly confidential and totally secured connectivity and onbose-frequency-holds-key-to-5g-
par
a very reliable source so that they can work on it easily. They
tech/articleshow/57696351.cms
all trust that 5G will Sure can make extract all its essence[2]. https://en.wikipedia.org/wiki/4G#cite_note-ITUSeminar-2
related to it. [3]. https://www.qualcomm.com/invention/5g/resources
Thus, I will Conclude my article, that there is a lot to be going
[4].
to have happen by the 5G networks, while some were onhttps://www.qualcomm.com/invention/research/projects/5g
the
par developing with Deep securities and with more [5]. extra
futurates in the name 6G & 7G in some parts of Europeanhttp://spectrum.ieee.org/video/telecom/wireless/everything-
and
Japanese Countries, but the 5G is creating a lot of hype related
you-need-to-know-about-5g
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

IOVFDT for Concept-Drift Problem in Big Data


Radhika P.
Dept of CSE, Geethanjali Institute of Science & Technology, Nellore AP – India.

Abstract: mining methods, where the mining process must be


The problem of How to efficiently uncover the efficient and incremental.
knowledge hidden within massive and big data remains Processing big data presents a challenge to existing
an open problem. It is one of the challenges is the issue computation platforms and hardware. However,
of ‘concept drift’ in streaming data flows. Concept drift according to Moore‘s Law, CPU hardware may no
is a wellknown problem in data analytics, in which the longer present a bottleneck in mining big data due to the
statistical properties of the attributes and their target rapid development of integrated circuit industry. A well-
classes shift over time, making the trained model less designed algorithm is crucial in solving problems
accurate. Many methods have been proposed for data associated with big data.
mining in batch mode.
A data stream model is usually defined as a model in
Stream mining represents a new generation of data which data move continuously at high-speed. Most big
mining techniques, in which the model is updated in one data can be considered as data streams, in which new
pass whenever new data arrive. This one-pass data are generated continuously. Data streams contain
mechanism is inherently adaptive and hence potentially very large volumes of data, which cannot be stored in
more robust than its predecessors in handling concept either internal or external memory. A one-pass
drift in data streams. In this paper, we evaluate the algorithm therefore forms the basis of data stream
performance of a family of decision-tree-based data mining, which briefly stores a sufficient statistical
stream mining algorithms. The advantage of matrix when new data passes, but does not require the
incremental decision tree learning is the set of rules that full dataset to be scanned repeatedly.
can be extracted from the induced model.
A data stream also depicts an infinite big data
The extracted rules, in the form of predicate logics, can scenario in which the underlying data distribution of
be used subsequently in many decision-support newly arriving data may differ from older data in the
applications. However, the induced decision tree must real world: the so-called concept-drift problem. For
be both accurate and compact, even in the presence of example, clickstreams of users‘ navigation patterns on
concept drift. We compare the performance of three an ecommerce website may reflect their purchase
typical incremental decision tree algorithms (VFDT [2], preferences as analyzed by the system. However, as
ADWIN [3], iOVFDT [4]) in dealing with concept-drift people‘s preferences for products change over time, the
data. Both synthetic and real-world drift data are used old model is no longer applicable, resulting in concept
in the experiment. iOVFDT is found to produce superior drift.
results.
Keywords:- Decision trees are one of the most important data
Data Stream Mining; Concept Drift; Incremental classification techniques. These techniques are widely
Decision Tree; Classification. used because of their ability to interpret knowledge in
different domains and present it as a tree-like graph.
I. INTRODUCTION Decision trees can be distinguished into two categories
according to their components: single-tree algorithms
and multi-tree algorithms. A single-tree algorithm is
Big data has become a hot research topic, and how to
lightweight and easy to implement and thus favored for
mine valuable information from such huge volumes of
data stream environments, although in some cases, a
data remains an open problem. Many research institutes
multi-tree algorithm may achieve slightly higher
worldwide have dedicated themselves to solving this
accuracy.
problem. The solutions differ from traditional data
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

DATA STREAMS MINING PROBLEMS authors that balances accuracy, tree size and learning
speed.
To store continuous data stream is a great The results show that iOVFDT has good performance
challenge for storage devices. To generate pattern or for both synthetic and real-world concept-drift data
knowledge from stream data, algorithms with streams. The advantage of the adaptive tie threshold
different techniques are needed. We don‟t have makes iOVFDT suitable for real-world applications.
enough amount of space to store stream data and The paper is organized as follows: Section 1 introduces
problem occurs between accuracy of data pattern and the research topic; Section 2 reviews some related work;
storage. So we can classify into five categories as Section 3 presents the preconditions for the evaluation,
shown in table I. [10]. including the platform, data sources and measurements;
Section 4 analyzes the evaluation results and discusses
Table I. Classification of Challenges via Category the comparison; and Section 5 concludes the paper.

S.N Issues Challenges Solution


o approach for II. INCREMENTALLY OPTIMIZED
these issues
DECISION TREE (IOVFDT)
1 Memory Data arrival rate Summarization
management and techniques
variant data For noisy big data, a new decision tree induction
arrival rate proposes to use a multi-objective function to balance
over time are prediction accuracy, tree size and learning speed. New
irregular and
fluctuated methods of functional tree leaf improve accuracy.
2 Data Preprocessing Quality of mining Light-weight Besides, intuitive graph visualizes tree structure
result and pre-processing dynamically for massive data analysis.
automation of technique
preprocessing
3 Data structure Limited memory Incremental A. Introduction
size and large maintaining of
volume of data structure, How to extract meaningful information from big
data stream novel
indexing, data has been a popular open problem. Decision tree,
storage and which has a high degree of knowledge interpretation,
querying
techniques has been favored in many real world applications.
4 Resource Limited resource
However noisy values commonly exist in high-speed
like storage and data streams, e.g. real-time online data feeds that are
computation AOG prone to interference. When processing big data, it is
capabilities
hard to implement pre-processing and sampling in full
5 Visualization of Problem in data Still is a
results analysis research
batches. To solve this trade-off, we propose a new
and quick issue(one of decision tree so called incrementally optimized very fast
decision the proposed decision tree (iOVFDT). Inheriting the use of Hoeffding
making by user approach is:
intelligent bound in VFDT algorithm for node-splitting check, it
monitoring) contains four optional strategies of functional tree leaf,
which improve the classifying accuracy. In addition, a
In this paper, we investigate the multi-objective incremental optimization mechanism
performance of single-tree learning for concept- investigates a balance amongst accuracy, mode size and
drift data streams. Three representative tree learning speed. iOVFDT is extension that can be
inductions are used in this evaluation: VFDT [2], a integrated with the latest version of MOA. Besides,
classic algorithm that pioneered the use of Hoeffding iOVFDT has a high extendibility that is able to combine
bound to build an incremental decision tree; ADWIN with most VFDT-extended algorithms.
[3], a start-of-the-art tree model that uses an adaptive-
window technique to handle concept drift; and iOVFDT B. Implementation Platform
[4,9], a model previously developed by the present Massive Online Analysis (MOA) is a
framework for datastream mining. It includes a
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

collection of machine learning algorithms three dimensions, the area of this triangle model is
(classification, regression, and clustering) and tools for defined as Φ(TRt) , where TRt is the decision tree
evaluation. Related to the WEKA project, MOA is also structure at timestamp t. The range of Φ(TRt) is within a
written in Java, while scaling to more demanding min-max model that ensures the variances of statistics
problems. In assification part, MOA has simulated mean and true mean isn‘t too big to maintain, where
decision tree algorithms that can be evaluated by built- Min.Φ(TRt)<Φ(TRt*)<Max.Φ(TRt). If Φ(TRt) goes
in measurements. The well defined experimental beyond this constraint, the existing model is not suitable
platform implements in two modes: graphic interface to embrace new data that the algorithm should be
and command line. iOVFDT aims to train a decision updated. Therefore, the nodesplitting condition is
tree with minimum error from big data, even if the data adaptively optimized that: ΔH(Xi)>HB or
contain imperfect quality like noise and bias data. The Φ(TRt)>Max.Φ(TRt) or Φ(TRt)<Min.Φ(TRt).
incremental decision tree algorithm that inherits the
use of Hoeffding bound in VFDT. Besides, four types iOVFDT Package Built-in MOA
of functional tree leaf are proposed in iOVFDT After downloading iOVFDT package
package, improving classifying accuracy. Suppose nijk (iovfdt.jar) and required MOA packages (moa.jar and
is the sufficient statistic that reflects the number of sizeofag.jar), GUI can be run by typing the command
attribute Xi with a value xij belonging to class yk. i ,j ,k in console:
are the index of attribute X, value of attribute Xi and java -cp iovfdt.jar:moa.jar -javaagent:sizeofag.jar
class y respectively. moa.gui.GUI

Majority Class functional leaf: Three new components are included in iovfdt.jar:
• Family of iOVFDT algorithm (four types of
Naïve Bayes functional leaf: optional functional tree leaf)
• Model Evaluation Method (with ROC statistics
and tree structure buffer output)
Weighted Naïve Bayes functional leaf:
• Decision Tree Visualization (by prefuse.jar
open source visualization tool)
Example 1a: evaluate model by GUI mode
1. Configure the task as EvaluateModel_ROC;
Error-adaptive functional leaf: 2. Select iOVFDT as the learning method;
3. Select the training data nursery_train.arff and
testing data nursery_test.arff.
ϜMC, ϜNB and ϜWNB require memory proportional to 4. Select the location to save tree model buffer to
O (N·I·J·K), where N is the number of nodes in tree IOVFDT_SampleTree.txt;
model, I the number of attributes; J is the maximum 5. Output the result to IOVFDT_MOA_2012.txt;
number of values per attribute; K is the number of
6. Press button ―RUN‖.
classes. ϜNB and ϜWNB are converted from that of
ϜMC. So we don‘t require extra memory for ϜEA
The related output results are shown in Fig 1 and Fig 2.
respectively. When required, it can be converted from
ϜM.

C Extension of MOA (Massive Online Analysis):


Extension of MOA platform, iOVFDT package
supports both GUI and command-line mode. What‘s
more, this package adds new functions of ROC statistics
and tree visualization to improve the experimental tasks.

iOVFDT applies a multi-objective optimization model


to control the node-splitting. After normalizing those Fig1: Configuration task
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

3. *Optionally: show dotty format converting;


4. Press button ―RUN‖.

Integration With Other VFDT-extended


Algorithms
In source code part, we write comments for each place
of modification based on HoeffdingTree.java.
Generally, seven-part modifications are proposed in
iOVFDT.java. In each of them, it includes some new
class, variables and functions designed for iOVFDT
algorithm. When you want to integrate it to other
extension of decision tree that uses Hoeffding bound as
Fig 2: Classifying process
node-splitting criteria, just add these seven
Example 1b: evaluate model by command-line modifications to appropriate places in source codes. It
mode is very easy.
• java –cp iovfdt.jar:moa.jar – javaagent:sizeofag.jar
moa.DoTask
―EvaluateModel_ROC
• -m (LearnModel -l iOVFDT -s
(ArffFileStream -f
• /Users/data/uci_nursery/nursery_train.arff))-s
(ArffFileStream -f
• /Users/data/uci_nursery/nursery_test.arff) -T
/Users/IOVFDT_SampleTree.txt‖ >
• ―/Users/IOVFDT_MOA_2012.txt‖.
The related output results are shown in Fig 3, Fig
4 and Fig 5
.
:Converted Dotty format
4

Fig 3: Visualization of Decision Tree


Example 2: visualize decision tree

1. Configure the task as VisualizeTree;


2. Select the saved tree buffer Fig 5: Exploring Decision Tree
IOVFDT_SampleTree.txt; III. EVALUATION COMPARISON
WITH OTHER ALGORITHMS model as each new sample arrives. This learning
In this evaluation, we focus on the one-pass approach is suitable for large volumes of data, or even
learning performance of various incremental decision infinite data. We use both synthetic and real-world data
trees, in which the algorithm learns and updates the tree in this evolution. We can configure the level of concept
drift in the synthetic data, while we have known concept
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

drift in the real-world data. The concept drift is


visualized by a feature selection method that shows the The real-world data are from UCI machine
ranked relationship of each attribute in a class. learning. Cover Type data were released in 1999,
comprising forest land inventory data for natural
A. Datasets and Platform ecosystem management. Forty-two categorical attributes
In the real world, big data may comprise and 12 continuous attributes are used in the two
millions of instances that arrive at high speed. To predictive models to predict seven different cover lands.
simulate a big data environment, MOA [1] provides a This is an open dataset for analyzing the concept-drift
platform in which data arrives continuously. The problem.
running environment is a Windows 7 PC with an Intel
2.8 GHz CPU and 8 G RAM. We simulate the B. Evaluated Algorithms
Waveform data using the MOA Data Generator. The Three typical incremental decision-tree
data comprise the records collected from distributed algorithms are tested: VFDT[2], ADWIN[3], and
sensors containing 9 numeric attributes, and three types iOVFDT[4].
of waveforms as the targeted class. The number of VFDT pioneered the use of HB for node splitting, but
instances is 200,000. We configure the drifting has no criteria for handling concept drift. Its improved
percentage as 0% (no attribute drifts), 25% (5 of 9 version, CVFDT [5], uses a fixed sliding-
attributes drift), and 50% (10 of 9 attributes drift).
window technique with a user pre-defined tie-breaking _______________________________________
IV. RESULTS AND DISCUSSION
threshold to deal with concept drift instead of a fixed Measure Specification
window size. A. Synthetic Waveform Concept-drift Data Streams
________________________________________
ADWIN provides an adaptive-window solution for the First, The
Accuracy we examine
accuracy oftheclassification:
negative effect of concept
concept-drift problem. As ADWIN performs as well drift on decision tree learning.Classified
#Correctly VFDT, with the default
/#Total
as or only slightly worse than the best window for value of K, is applied to the waveform data with
InstancesX100%
each rate of change in CVFDT [3], CVFDT was not different percentages of concept drift. Figure 6 shows
compared in this test. Kappa A measure
the test results of classifier
implemented performance
every 10,000 in The
samples.
iOVFDT uses an adaptive tie-breaking threshold and unbalanced class streams
figure clearly [7]. effect of the concept-drift
shows the
an optimized node-splitting condition. It supervises #Node
problem onThe thenumber of internal
accuracy nodes. In Figure 2,
of classification.
#Leaf 4 is a branch
2
the model error using a min-max model that reflects we zoom-in on the tests from the 10rule
The number of leaves. A to the 10
the concept drift when a leaf splits into an internal from the root to a leaf in the expression of a set of if-then-
node. else rules. #Leaf indicates how many rules are included in
a tree mode.
Functional Tree Leaf (FTL) [6] is an improvement for Depth. The number of nodes that exist in the
these algorithms, and it is claimed that the error-adaptive longest path from the root to a leaf.
FTL obtains better performance than the majority class and MemKB The memory(KB) used for tree building.
naïve Bayes algorithms [1,4]. Hence, we only test the tree Time Model training time in seconds. It also
inductions with erroradaptive FTL in this paper. reflects the learning speed of an algorithm.
________________________________________
VFDT and ADWIN require a tie-breaking threshold setup, IV. RESULTS AND DISCUSSION
where K (0,1) . The configurations for VFDT, ADWIN
and iOVFDT are δ = 10-6 and nmin =200 A. Synthetic Waveform Concept-drift Data Streams
First, we examine the negative effect of concept drift on
C. Meansurement decision tree learning. VFDT, with the default value of
To evaluate the performance of the algorithms we use K, is applied to the waveform data with different
some common measurements for decision tree percentages of concept drift. Figure 6 shows the test
learning, as listed in Table II. results implemented every 10,000 samples. The figure
clearly shows the effect of the concept-drift problem on
the accuracy of classification. In Figure 2, we zoom-in on
TABLE II.MEASUREMENTS
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

4 2
the tests from the 10 to the 10 samples and drift down
th th Third, we assess the accuracy, tree structure and memory
to the samples between the10,000 and the 20,000 data cost when different K values are applied in VFDT and
records. The accuracy clearly fluctuates when concept ADWIN. However, we do not know which value of K is
drift exists in the data streams. Zooming in reveals some the best until all possible values have been tried. This is
details, such as a crossover between the 25% drift and not practical in real-time applications. In this test, we use
50% drift in Figure 7. However, the overall trend shows K = 0.05, 0.10, 0.15,…, 0.95. In addition to accuracy, the
that concept drift gradually reduces the accuracy. Kappa statistic [7] and the structural features of the
decision tree model, such as the number of nodes, number
of leaves and tree depth, are important for evaluating the
models. Each path from the root to a leaf represents a rule
in the decision tree model, thus the number of leaves
reflects the number of patterns in the tree model. In
addition, the amount of memory consumed reflects the
computation cost of a tree-learning algorithm in the MOA
platform. For VFDT and ADWIN, we show the average
result for different K values in Table III. iOVFDT
generally outperforms VFDT and ADWIN in this test. We
use the iOVFDT result as the benchmark, and Table IV
shows the improvement compared to VFDT and ADWIN.
In this table, we find that iOVFDT improves accuracy by
1-2%, and improves the tree size by more than 15% and
Figure 6. Negative Effect of Concept Drift on Accuracy 35% compared to VFDT and ADWIN. In addition,
iOVFDT consumes less memory and thus reduces the
computational cost.

TABLE III. COMPARISON OF AVERAGE


PERFORMANCE OF WAVEFORM
Figure 7. Zoom-in on the Negative Effect of Concept Drift on Accuracy.
Second, we illustrate the performance in terms of accuracy TABLE IV. IOVFDT IMPROVEMENT
and changing tree size as new data arrive. The results are SUMMARY
visualized in Figure 5. Due to the page limitation, the
figures are attached at the end of the paper. We use K =
0.05 (a small value and the default setup of MOA), K =
0.50 (the mean value), and K = 0.95 (a large value) in this
test. We can see that in general, iOVFDT obtains better
classification accuracy than ADWIN and VFDT. The tree
size is stable in iOVFDT but varies with different K in
ADWIN and VFDT. When K is configured as a small
value, the tree sizes of ADWIN and VFDT are smaller
than that of iOVFDT, but in the other cases, iOVFDT
produces a more compact tree size.
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

V. CONCLUSION BigMine Workshop of the 18thACM SIGKDD, pp.


Advances in technology have resulted in the 36-44, 2012.
development of new methodologies specifically designed
for handling big data problems. Although improvements 5. G. Hulten, L. Spencer, and P. Domingos, ―Mining
time-changing data streams,‖ in Proc. of the 7th
in computer hardware are fundamental to such
ACM SIGKDD, pp. 97-106, 2001.
developments, a flexible way of solving the hardware
bottleneck lies in the improvement of software algorithms.
6. J. Gama, R. Rocha and P. Medas, ―Accurate decision
Stream mining is intended to tackle high-speed and
trees for mining high-speed data streams,‖ in Proc. of
changing data on the fly. The one-pass process makes it
the 9th ACM SIGKDD, pp.523-528, 2003.
possible to handle massive and big data, and even infinite
data.
7. Jean, ―Assessing agreement on classification tasks:
A decision tree is an important classification model, The kappa statistic." Computational Linguistics,
which turns the output of mining results into useful 22(2), pp. 249–254, 1996.
intelligence in the form of a tree-like graph. In the past
decade, incremental decision trees have become popular 8. Kevin, Pratt and G. Tschapek, ―Visualizing concept
for solving big data problems. There are two major types: drift,‖ in Proc. of the 9th ACM SIGKDD.pp. 735-
single-tree algorithms and multi-tree algorithms. 740, 2003.
In our previous work, we developed iOVFDT [4, 9], a
new incremental tree induction with an optimized node- 9. H. Yang, S. Fong, Incremental Optimization
splitting mechanism for adaptive learning. In this paper, Mechanism for Constructing A Decision Tree in
we investigate the phenomenon of concept drift using three Data Stream Mining, International Journal of
representative single-tree induction algorithms. The Mathematical Problems in Engineering, Hindawi
evaluation results show that iOVFDT obtains good press, 2013, Ready for publishing.
accuracy with a compact model size and less use of DOI:10.1155/2013/580397
memory.
10. Aggarwal, C., Han, J., Wang, J., and Yu, P.S.,
(2004): On Demand Classification of Data Streams.
REFERENCES In Proceedings of 2004 International Conference on
Knowledge Discovery and Data Mining (KDD '04).
1. A. Bifet, G. Holmes, R. Kirkby, and B.Pfahringer, Seattle, WA.
―MOA: Massive Online Analysis,‖ Journal of Machine
Learning Research, 11, pp.1601-1604, 2010. 11. Hang Yang and Simon Fong, Incrementally
Optimized Decision Tree & Tree Explorer, Version
2. P. Domingos and G. Hulten, ―Mining high speed data 1.0.
streams,‖ in Proc. of the 6th ACM SIGKDD, pp. 71-
80, 2000.

3. Bifet and R. Gavalda㸪―Learning from time- changing


data with adaptive windowing,‖ in Proc. of the SIAM
International Conference on Data Mining, pp. 443–
448, 2007.

4. H.Yang and S.Fong, ―Incrementally optimized


decision tree for noisy big data,‖ in Proc. of the
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

Investigation on Wireless Charging


1
R V S Narayana Kumar, 2T Giridhar Sai,
1,2
Department of Electronics and Communication Engineering, IIIrd B.Tech
Geethanjali Institute of Science and Technology, Andhra Pradesh, India

Abstract- Wireless charging is a innovation of  Firstly, it enhances the user-friendliness as the hassle
transmitting power through an air gap to loads f with the from connecting cables is expelled
end goal of energy recharging.The current advance in  Secondly, diverse brands and distinctive models can
wireless charging procedures and improvement of charged by the same charger.
business items have given a promising option approach to  Thirdly, it enhances the flexibility, especially for the
address the energy bottleneck of traditionally convenient devices for which replacing their batteries or
battery-controlled gadgets. However the fuse of wireless connecting cords .
charging into the existing wireless communication system  Fourthly, it produces better durability (i.e., water
additionally carry a progression of testing issues with in proof and dust proof) for contact free devices.
regards to execution, scheduling and power  Fifthly, the wireless charging can give the asked for
administration.In this article we introduce far reaching control by the charging gadgets on request mold and
diagram of wireless charging procedures, the in this manner more adaptable and effective.
improvements in specialized measures and some system
applications. Actually the system applications of these Nevertheless, normally wireless charging incurs
generally have a place with medical implantation and higher implementation cost contrasted with wired
versatile chargers for any electrical and electronic charging. First, a wireless charger should be introduced as
loads.Furthermore, we examine open difficulties in a substitution of conventional charging cord. Second, a
executing wireless charging innovations. mobile requires implantation of a remote power reciever.
In addition, as wireless chargers regularly create more
Index Terms- Wireless charging, Wireless Power heat than that of wired chargers, extra cost on making
Transfer, Magnetic coupling, Resonance coupling, material might be brought about.
Radiative/RF radiation, Acoustic Power transfer,
Ultrasonic Resonance. The development of wireless charging is mainly
going in two directions they are:
1. Radiative wireless charging (RF or radio frequency
I. INTRODUCTION based wireless charging).
Wireless charging is also called as wireless power 2. Non-radiative wireless charging (coupling based
transfer, is a technology that enables the source to wireless charging).
transmit the electromagnetic energy to a electrical load 3. Acoustic wireless charging (ultrasonic resonance
through the air gap without interconnecting cords. This based wireless charging)
innovation is drawing in an extensive variety of
utilizations from a low power tooth brush to high power Radiative wireless charging receives EM waves,
vehicle in view of its comfort and better client precisely RF waves or microwaves for the power
encounter.Presently a-days, this innovation is quickly exchange through the medium as radiation(given in
developing from speculations towards the standard Section4.2). The energy exchanged relies on upon the
component of a business item particularly if there should electric field of the EM wave which is radiative. Because
be an occurrence of keen contraptions. Many driving of the safety issues raised by RF exposure [5] these
organizations like Samsung, Apple, Huwaei, started to charging for the most part works in low power area. On
discharge new era mobiles which are having in-fabricated the other hand, non radiative wireless charging in view of
wireless charging ability.Presently a-days is quickly the coupling of the magnetic field of the two coils inside a
developing from speculations towards the standard separation of curls measurement for energy
component of a business item particularly if there should transmission(given in Section4.1). As the magnetic field
be an occurrence of keen contraptions. Many driving of the EM wave lessens rapidly than the electric field of
organizations like Samsung, Apple, Huwaei, started to the EM wave so in this innovation the power exchange
discharge new era telephones which are having in- distance is especially restricted. Due non radiative nature,
fabricated remote charging ability.IMS look into this innovation has been generally utilized as a part of day
by day charging exercises.
[3] imagined that wireless charging items will be 4.5 Aside from the above advances there is a new
billion market by 2016 and it crossed the farthest point charging innovation that which was developed as of late.
they evaluated. Pike inquire about [4] evaluated that the It is 'Acoustic Power Exchange'. In this really ultrasonics
cordless controlled items will be tripled by 2020 getting to are utilized for the exchange of energy. The guideline
be 20 billion market. required in his innovation was ultrasonic resonance. This
innovation has a decent degree going into the market as it
Comparing to the traditional charging techniques the can be a proficient and eco-friendly(given in Section4.3).
wireless charging has the following benefits:
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

In this article we expect to give an extensive view on generally additionally created and popularized. Beside
developing wireless charging accusing frameworks Tesla, W.C.Brown, who is the practical engineer
along of their principal technologiesand application in invented a component called Rectenna. This component
correspondence systems. This view covers different real is utilized to exchange the microwave power into
wireless charging advances like inductive coupling, electricity[20]. Advance improvements are taken in the
magnetic resonance coupling, RF/microwave radiation, rectenna configuration to get high power. This is the
Acoustic(ultrasonic resonance) . The article arrange is as historical backdrop of wireless charging innovation.
per the following, Right off the bat we will clarify how
the wireless charging appeared i.e., history of it and the
essential required in cordless power exchange wonder. III. BASIC PRINCIPLE OF WIRELESS
Besides, the sorts of wireless charging innovations that CHARGING
appeared till now and there separate block Wireless power transfer is process which is almost
diagrams,system flows, functionality, applications, similar to the basic communication system process.
advantages,disadvantages. Power is needed to be transferred from transmitter to the
reciever by using different technologies or schemes(i.e.,
II. HISTORY coupling method, RF method) which is as similar to that
Electromagnetism is the pioneer point of remote of the message signal transfer from the transmitter to the
power exchange where EM waves convey the energy. reciever in the basic communication system where we
The investigation of electromagnetism was begun use different types of modulation schemes which are
from1819 when H.C. Oersterd found the electric current used to transfer the message signal effectively. In a
createsmagnetic field around it. Later on Ampere's Law, simple way to say the wireless charging technologies are
Biot-Savart's Law and Faraday Law had inferred to give the analogous of modulation schemes in the
some fundamental property of the magnetic field. communication systems
Tailing them, in 1864 J.C. Maxwell acquainted a few
conditions with describe how the electric and magnetic ig.1. Block diagram of basic wireless charging
fields are produced and altered each other. Later in 1873
production of Maxwell book 'A Treatise on Electricity
and Magnetism' which actually unified the electricity
and magnetism[15]. From that point forward the
electricity and magnetism are said to be controlled by a
same force.
Later on Nicolas Tesla,who is the founder of
alternating current electricity, was the first to lead probe
wireless power exchange by utilizing microwaves. He
concentrated on long-distance wireless power transfer
and understood the exchange of microwave signals over
a separation around 48 kilometers in1896. Another e figure1 is the basic block diagram of the basic wireless
significant breakthrough was accomplished in 1899 to charging technology. The primary square speaks to the
transmit 108 volts of high -frequency electric power over power source which is for the most part known for all
a separation of 25 miles to light 200 bulbs and run an which gives the electrical power. The following square
electric motor[16,17]. However, the innovation that is the Power Transmitting Unit (PTU) which is the
Tesla applied must be racked on the grounds that comprises of energy amplifier,matching circuits, A-D
transmitting such high voltages in electric arcs would converters, correspondence module and resonator
make appalling impact to people and electrical hardware (primary) or transmitter. In this square the electrical
in the vicinity.Around the same period, Tesla energy changed over in type of EM waves where the
additionally made an extraordinary commitment to EM waves convey the electrical energy to the following
advance the attractive field progress by presenting the piece through the air gap. This PTU square has a similar
well known "Tesla coil", illustratedin 1901, Tesla functionality of the modulator in the communication
developed the Wardenclyffe Tower, appeared into system.
exchange electrical energy without cords/wires through Alongside PTU ,we have Power Receiving Unit (PRU)
the Ionosphere. In any case, because of innovation which comprises of resonator(secondary) or recipient,
confinement (i.e., low system efficiency because of rectifiers, DC -DC converters, communication module.
large scale electric field), the thought has not been
PARISHODHANA In-house Journal of Science and Technology, VOLUME-6, ISSUE-1, JANUARY-2018

Design of Prestressed Concrete Bridge Cross Over a Canal


at Gandhi Janasangam
Shaik Nadhim1, Vijaya Prathima2, Rajeswari Isnakula3
Department of Civil Engineering, Geethanjali Institute of Science and Technology1,2,3, Nellore
of providing passage over the obstacle. There are
many different designs that each serve a particular
Abstract- purpose and apply to different situations. Designs
of bridges vary depending on the function of the
The present project is about the design
bridge, the nature of the terrain where the bridge is
Prestressed concrete two lane Road Bridge
constructed and anchored, the material used to
instead of single lane bridge over Kanigiri main
make it, and the funds available to build it.
canal at Gandhi Jana Sangam, which is in a
condition of collapsing state. The bridge is Components of a Bridge:
damaged at several places and cracks appeared.
The bridge was constructed in 1886 ( i.e., 130 The main components of a bridge are: a) Super
years ago). This bridge is the bomby highway structure
bridge it is connected to different places such as b) Bearings, bed blocks
Sangam, Atmakur, Udaygiri, Pamuru, Proddutur,
Badvel, Bellary, Kurnool, Guntakal, c) Substructure
Mantralayam, Hubli. First we went to the site and Components which lie above the level of bearings
observed the bridge. We observed the bridge are grouped as SUPERSTRUCTURE, these parts
thoroughly and found cracks at several places. which lie below the level of bearings are classified
We did surveying to know the specifications of the as SUBSTRUCTURE.
bridge. We took photograhs of the damaged
portion of the bridge. Then we decided to design a Super structure: Comprises of decking consisting
two lane pre-stressed concrete bridge in order to of bridge floor (a slab or a plate or a Grid), girders
meet the traffic requirement as it is a single lane or trusses, cables, etc., supporting the floor, cables
bridge with heavy traffic movement. connected to pylons and the deck as in cable-stayed
bridges, handrails, guard stones etc.
The concept of pre-stressed concrete appeared in
the year 1888. In this present engineering Bearings : The bearings transmit the load received
technology durable and sustainable bridges play from the decking on to the substructure and are
an important role for the socioeconomic provided for distribution of the load evenly over
development of the nation. Owners and designers the substructure material, which may not have
have long recognized the low initial cost, low sufficient bearing strength to bear the super
maintenance needs and long life expectancy of structure load directly. Bearings also facilitate the
pre-stressed concrete bridges. This is reflected in horizontal and angular deformation as per the
the increasing market share of pre-stressed analysis.
concrete, which has grown from zero in 1950 to Sub structure: Piers, Abutments, wing walls,
more than 55 percent today. This growth return walls and foundations for the same. The
continues very rapidly, not only for bridges in the foundations may be of the open type, pile
short span range, but also for long spans in foundations and well or caisson foundations.
excess of length which, here therefore, has been
nearly the exclusive domain of structural steel. River training works like revetment of slopes at
Many bridge designers are surprised to learn that abutments, appprons at bed level. Approaches to
precast, prestressed concrete bridges are usually the bridge to connect it properly to the lead
lower in first cost than all other types of bridges embankments or roads on either side.
coupled with savings in maintenance, precast BRIDGE INVESTIATION
bridges offer maximum economy. The precast
pre-stressed bridge system offered two principal came to know that the bridge over Kanigiri main
advantages: it is economical and it provides canal at Gandhi Jana Sangam, is in a condition of
minimum downtime for construction. Pre- collapsing state. The bridge was constructed in
stressing is the application of an initial load on 1886 ( i.e., 130 years ago). The bridge is damaged
the structure so as to enable the structure to at several places and cracks appeared.
counteract the stresses arising during its service This bridge is the part of bomby highway and it is
period. way for different places such as Sangam, Atmakur,
I. INTRODUCTION Udaygiri, Pamuru, Proddutur, Badvel, Bellary,
Kurnool, Guntakal, Mantralayam, Hubli.
A bridge is a structure built to span physical
obstacles without closing the way underneath such OBSERVATION OF THE BRIDGE:
as a body of water, valley, or road, for the purpose First we went to the site and observed the bridge.
We observed the bridge thoroughly and found
cracks at several places and conducting non  Span length and configuration
distractive test like rebound hammer test. In this  Method of construction
time e observe bridge is near collapse condition  Economics
and it cannot do any repair of this bridge.  Durability/maintenance
Specifications of at present Bridge:  Aesthetics
 Possible future widening
Length of the bridge = 60 m  Type of crossing
Width of Bridge = 6m  Site and foundation conditions
 Clearances (high/wide load route)
Single Lane Bridge No.of Spans = 5
It should be recognised, however, that the above
list is not exhaustive and the items are interrelated
and selection of a bridge type should involve
consideration of all relevant factors.
PRE STRESSED CONCRETE BRIDGE
Bridge is life line of road network, both in urban
and rural areas. With rapid technology growth the
conventional bridge has been replaced by
innovative cost effective structural system. One of
these solutions present a structural PSC system that
Figure 1.
is T-Beam. PSC T-beam, have gained wide
acceptance in freeway and bridge systems due to
their structural efficiency, better stability,
serviceability, economy of construction and
pleasing aesthetics.
PSC beam design is more complicated as structure
is more complex as well as needed sophisticated
from work. In the place of PSC T-beam if we talk
about RCC T- beam geometry is simple and does
not have sophisticated in construction. Bridge
Figure2. design is an important as well as complex approach
of structural engineer. As in case of bridge design,
span length and live load are always important
factor. These factors affect the conceptualization
stage of design. The effect of live load for various
span are varied.
In shorter spans track load govern whereas on
larger span wheel load govern. Selection of
structural system for span is always a scope for
research. Structure systems adopted are influence
Figure 3. by factor like economy and complexity in
construction. The 24 m span as selected for this
study, these two factor are important aspects. In 24
m span, codal provision allows as to choose a
structural system i.e. PSC T- beam. This study
investigates the structural systems for span 24 m
and detail design has been carried out with IRC
loadings and IS code books. The choice of
economical and constructible structural system is
depending on the result.
Figure 4.

II. FACTORS INFLUENCING BRIDGE LOADING STANDARDS


SELECTION Evolution of Bridge Loading Standards:
The following are among the more important The first loading standard (IRC: 6) in India was
factors that should be considered when selecting published by the Indian Roads Congress in 1958
the type of Road Bridge to be constructed at a and subsequently reprinted in 1962 and 1963. The
particular site: Section-II of the code dealing with loads and
 Road geometry stresses was revised in the second revision
published in 1964. The metric version was
 Bridge length introduced in the third revision of 1966. The IRC: 6
Code has been revised to include the combination The main girders are pre cast and the slab
of loads, forces and permissible stresses in the connecting the girder is cast in-situ
Fourth revision published in 2000s
PRE-STRESSED CONCRETE BRIDGES
Pre-stressed concrete is ideally suited for the
construction of medium- and long-span bridges.
Ever since the development of pre-stressed
concrete by Freyssinet in the early 1930s, the
material has found extensive application in the
construction of long-span bridges, gradually
emplacing steel which needs costly maintenance
due to the inherent disadvantages of corrosion Figure 5.
under aggressive atmospheric conditions. Solid
Design of interior slab panel:
slabs are used for the span range of 10 to 20 m.
while T-beam slab decks are suitable for spans in The slab panel 2.5 m by 5 m is supported on all
the range of 20 to 40 m. Single or multi cell box four sides Loads:
girders ac preferred for larger spoils of the order of
30 to 70 m. Pre-stressed concrete is ideally suited Dead load of slab = 1×1×0.25×24 = 6.00 KN/m²
for long -span continuous bridges in which precast Dead load of wearing coat = 0.08×22 = 1.76
box girders of variable depth are used for spans KN/mm²
exceeding 50 m. Pre-stressed concrete has been
widely used throughout the world for simply- Total dead load = 7.76 KN/m² Bending Moment:
supported, continuous, balanced cantilever, Live load is IRC class A-A tracked vehicle alone
suspension, hammer-head and bridle- chord type wheel is placed at the center of panelAs the slab is
bridges in the span range of 20 to 500 m. continuous design B.M = 0.8 Mb and ML.
III. DESIGN OF BRIDGE COMPONENTS: Design the including impact and continuity factor
(A) Design of Post tensioned Pre-stressed is given by
Concrete continuous beam and slab bridge deck Mb (short span) = (1.25×0.8×35.35) = 35.35 KNm
for a highway crossing: ML (long span) = (1.25×0.8×12.14) = 12.14 KNm
Two continuous spans of 30 m each.
Width of road =2 lane (7.5 m).
Kerb on each side = 1 m.
For pre stressed concrete girders adopt M-60 grade
concrete with cube strength transfers as 40 N/mm2.
For cast in-situ deck slab adopt M-20 grade
concrete. Figure 6.
High tensile standards of 15.2 mm diameter
conforming to IS:6006-1983 and FE-415 HYSD
bars are used.
Live load = IRC class A-A tracked vehicles
(A) CROSS SECTION OF DECK:
4 main girders are provided at 2.5 m intervals
Thickness of deck slab = 250 mm Figure 7.
Wearing coat = 70 mm Shear Force:
Dispersion in the direction of span =
Kerb 1000 mm wide by 300 mm deep are provided [0.85+2(0.08+0.25)] = 1.51 m
at each end.The overall depth of main girders is For maximum shear load is kept such that the
assumed at 50 m per meter of span whole dispersion is in span . the load is kept at
Overall depth of girder = 50×430 = 1500 mm (1.51/2) = 0.755 m from the edge of the beam

Thickness of top and bottom flange is 800 mm Shear force / meter width = 71.150[2.3-0.755]/2.30
= 47.794 KN
Thickness of web is = 200 mm
Shear force with impact = 1.25×47.794 = 59.7 KN
Dead Load and Bending Moments and Shear Thickness of top and bottom flanges = 350 mm
Forces:
Width of flange = 600 mm
Design B.M including continuous factor MB =
Thickness of web = 200 mm
0.8×4.70 = 3.76 KN m
Section properties of main girders:
ML = 0.8×1.65 = 1.32 KNm Dead load shear force
= 0.5×7.76×2.3 = 8.944 KN Cross sectional area A = 0.58 m²
Total Design Moment and Shear Force: Second moment of area I= 1.516×1011 mm4
=0.1509 m4 yb = yt = (1500/20) = (1.5/2) = 0.75 m
Total MB = (35.35+3.76) = 39.1 KNM
Section modulus = ZB = Zt = (I/fb (or) yt) =
ML = (12.14+1.32) = 13.46 KNM Total shear force
0.201×109 mm³ The main girders are precast and
Vx = 67.674 KN
the deck slab is cast insitu.
Effective Depth:
Loads acting on main girder:
D =√M/QB
The total dead load (g) = 20 + 14.5 + 5 = 39.5 ≈ 40
=√39.11×10 ×10/0.762×1000 KN/m
= 226 mm≈ 230 mm Dead Load Moment and Shear Force:
Adopt effective depth d = 230mm Dead load moment at mid support section MgB =
4500 KNm
Check for shear:
Dead load moment at mid span section MgD =
Nominal shear = Jv = V/bd=0.242 N/mm2
2556 KNm Dead load shear is maximum near
Jc = 0.25 N/mm² for a slab of overall depth 250mm support section and is computed as
read the value of constant k= 1.1 from table 3.10
Vg = 0.62×g×L
The permissible shear stress in concrete slab = kJc
= 744 KN
= 0.275 As ζv < ζc Hence shear is safe.
Area Of Steel :
AST = [M/Σst×jd]
= 938 mm²
Use 12mm diameter bars
Spacing s = 1000ast/Ast
= [1000×Π/4×12²]/938
Figure 8. Bridge elevation
= 120.57mm≈ 120mm c/c
Provide 12 mm bars at 120 mm centers
Effective depth along long span using 12 mm
diameter bars
Use 10mm diameter bars at 150mm centers

Figure 9. Girder cross section


(B) DESIGN OF GIRDER Live load bending moment in girder:
Cross section of deck: Referring to the influence line for bending moment
Four main girders are provided at 2.5 m intervals at mid span section D.
Thickness of deck slab is 250 mm
Wearing coat = 80 mm
Kerb 1000 mm wide by 300 mm deep is provided
at each end.
Spacing of girders =5 m
The overall depth of main girders is assumed at 50
mm per meter of span.
Figure 10.
Overall depth = 50×30 =1500 mm
Figure 11.

The maximum live load moment at mid span is


computed as MD = (7.5+7.392)/2 ×700
= 5212.2 KNm
Similarly from figure using the influence line for
bending moment at mid support. The live load
bending moment at support B is computed as

Table 1.

Check for minimum section modulus:


Md = (Mg+Mq) = 4500 + 1094.20 =5594.2KNm
fbr = (ŋfct -ftw) = 16N/mm²
Figure 12.
fint )+ == 34.789 N/mm²
MB = 3.72 × 700 = 2604 KNm
The live load bending moment including the
reaction factor and impact factor for the exterior Zb ≥ ( )
girder are Zb ≥ 0.124×10 mm³ < 0.201×109 mm³
9

MqD = 0.382×1.1×5212.2 = 2190.166 KNm Prestressing force:


MqB = 2604×1.1×0.38= 1094.20 KNm Hence the provided section is adequate. For the two
Live load shear forces in girder: continuous spans AB and BC a concordant cable
profile is selected such that the secondary moments
The maximum live load shear develops in the are zero Assume cover is 250 mm
interior girders when the IRC class AA loads
placed near girder.

Figure 14.

Prestressing force is obtained from the relation:


Figure 13.

= 8258.655 KN
Using Freyssinet system anchorage type 19k -15
(19 standards on of 15.2mm diameter) in 95mm
cable duct. Force in each cable = 19×0.8×260.7 =
39.62 KN
Provide 3 cablescarrying an intial prestressing
force
P = (3×3962) = 11886 KN
Area of each strand of 15.2 mm diameter= 140 According to IRC: 18 – 1985 the ultimate shear
mm² resistance of the support section un cracked in
flexure is given by
Area of 19 strands in each cable = 19×140
Vcw = 742.824KN < 2183KN
= 2660 mm²
Unbalance shear = 2183 – 742.824 =
Total area in 3 cables Ap= 3×2660 = 7980 mm²
1440.176KN
The cables are arranged in a parabolic concordant
Using 16mm diameter 2 legged stirrups at a
profile so that their centroid has an eccentricity of
spacing of 80mm centers near supports gradually
500mm towards top fiber at mid support B are an
increased to 200mm towards the centre of span.
eccentricity of 372 mm towards the bottom at mid
span section D. Design of end blocks:
Solid end blocks of 600mm by 1500mm are
provided for a length of 2m from each of the two
end faces.
Brusting tension Fbst = 0.17×3962 = 673.54KN Use
Fe-415 HYSD bars

Ast= = 1865.50mm²
Figure 15. Provide 16mm diameter bars at 150mm centers in
the horizontal plane distributed in the region from
Center Of Span Section: 0.2yo to 2yo.
(P/A) = (11886×103)/ (0.58×106) = 20.49mm²
(Pe/Z)= (11886×103×372)/0.201×10⁹ = 21.99mm²
(Mg/Z)= 2556×106/0.210×10⁹ = 12.716mm²
(Mq/Z) = 2190.166×106/0.201×10⁹ = 10.896mm²
At the stage of transfer
At top σt = (P/A - Pe/Z  Mg/Z) = 11.216mm² At
bottom σb = (P/A + Pe/Z – Mg/Z) = 29.764N/mm²
At the service load state σt = (η(P/A) Figure 16.
η(Pe/Z)(Mg/Z)(Mq/Z)) = 22.412 mm² σb =
(η(P/A) (Pe/Z) –(Mg/Z) – (Mq/Z)) =
10.328N/mm² Maximum and minimum stresses are in table:
Table 3.
Mid Support Section:
(C) DESIGN OF PIER:
P/A = 20.49 N/mm² Pe/Z = 21.99 N/mm²
Mg/Z = (4500×106)/0.201×10⁹ = 22.38 N/mm² Dead load from each pier = 40KN
Mg/Z = (1094.20×106)/0.201×10⁹ = 5.443 N/mm²
Reaction due to live load on one span = 700 KN
At the stage of transfer σt = (20.49 + 21.99 – 22.38
Breaking forces = 140KN
) = 20.1 N/mm² σb = ( 20.49 – 21.99 + 22.38 ) =
20.88 N/mm² Wind pressure on the pier = 2.4KNm²
At the service load stage Materials of pier 1:3:6 cement concrete
σt =( 0.8(20.49+21.99) – 22.38 – 5.443 )= 6.161N/ Density of concert = 25KN/m²
mm²
σb = (0.8(20.49 – 21..99) + 22.38 + 5.443 ) =
26.623 N/mm²
The stresses are within permissible limits.
The ultimate strength is nearly equal to the mid
span.
Aus = (Mbal/0.87fy(d-0.5Df)) = 5336.46 mm²
Provide 9 bars of 25mm dia (As = 5750 mm²)
Check for ultimate shear strength:
Design shear force = Vu = 2183.605 KN
S:NO

STRESSES
TYPE OF
LOAD

Figure 18.
Dead load and self
1. weight 203.13 203.13 Factor of safety = = = 32.94 > 2
Hence the abutment has sufficient factor of safety
2. Buoyancy _ -76.49
against sliding.
(E) ELASTOMETRIC PAD BEARING:
3. Eccentric live 55.56 55.56
Maximum dead load reaction for bearing = 40KN
Maximum live load reaction for bearing = 70KN
4. load 109.8 109.8
Longitudinal frictional force for bearing = 45KN
Breaking force (Assume)
Effective span of the girder = 30m
5. Wind pressure 8.30 8.30 Estimated rotation at bearing of the girder due to
dead and live load = 0.002 radians
Total estimated shear stress due to creep, shrinkage
and temperature = 6×10-4
Concrete for beam and bed block = M20 grade
Allowable contact pressure (σc) =0.25×20× =
7.07N/mm²
Effective bearing area =

Figure 17. = = = 10.46×104< 15×104


Hence it is safe.
Hence it is safe.
Maximum stress 376.79 Bearing stress (αm
=
00.39 = 4.67N/mm²
Refer Table = 15.2 and IRC 83
Minimum stress 258.69 182.29 clause 916.2
Elastomer layer (h i) = 10mm
(D) DESIGN OF ABUTMENT:
Thickness of outer layer (h e) =5mm
Dead and live load of the abutment = 700+40 =
Thickness of steel laminates (h s) =3mm
740KN
Side covering (C) = 6mm
Soil bearing capacity of soil = 150KN/m²
Adopt 3 laminates with 2 internal layer
Vertical load due to earth = 15KN
Therefore, Total thickness of elastometric pad
Coefficient of friction between masonry of soil =
(ho) = (2×he + 2×hi + 3×hs)
0.5
= (2×5 + 2×10 + 3×3) = 39mm
Density of masonry = 25KN/m²
Total shear stress = 0.915+0.53+0.765 = 2.21 <
Horizontal load = 20KN
5N/mm² Shear stress is within permissible limit.
Total vertical forces (W)= W1+W2+W3+W4 =
1317.5KN
Consider the moment of all the forces at A
M = (740×1)+(450×1)+(112.5×2.33)+(15×2.67) –
(20×2) = 1452.18KN

Maximum and minimum stresses = (1

= )
σA = 790.5KN/m² σB= 87.83KN/m² Figure 19.
IV. CONCLUSION
The following conclusions are drawn upon: composite beams prestressed by external slipping
Bending moments and Shear force for PSC T-beam cables, taking into account the deformability of the
girder are lesser than RCC T-beam Girder Bridge. interface shear connection.
Which allow designer to have lesser heavier section [5] Analysis of prestressed composite beams
for PSC T-Beam Girder than RCC T-Girder for 60 using both elastic assumptions and approximate
m span ultimate strength methods was also discussed in
Construction of this bridge is reducing the traffic papers by Szilard and Hoadley(1963).
problems at peak hours. [6] Stras (1964) tested three simply-supported,
Moment of resistance of steel for both has been prestressed composite beams, all of them
evaluated and conclusions drawn that PSC T-Beam prestressed along their full length with 10mm
Girder has more capacity for 60 m and more than diameter high-strength tendons at an eccentricity of
60 m of span. 22mm from the tension flange
Shear force resistance of PSC T-Beam Girder is [7] Ng Chee Khoon (1997) tested a series of 18
more compared to RCC T- Girder for 60 m span. beams ranging from 1.5m to 9m using L/dpso ratio
As we go Total Super structure of a Bridge Project between 15 and 30 for their second order effect.
the Quantity of steel and the Cost of concrete for
PSC TBeam Girder is less than RCC T-Beam
Girder as quantity required by T-beam Girder.
Deflection for PSC T-beam Girder is less than
RCC TBeam Girder Bridge.
Durability for PSC T-beam Girder is more than
RCC TBeam Girder Bridge.
V. CODES & STANDARDS
The design of various components of the structure,
in general are based on provisions of IRC/IS
Codes.Wherever IRC code is silent, reference is
made to other Indian/International codes and
standards. The list of IRC Codes (latest revisions)
given below will serve as a guide for the design of
structures.
1) IRC: 5-1998 Standard Specifications and
Code of Practice for Road Bridges, Section I –
General Features of Design.
2) IRC: 6-2000 Standard Specifications and
Code of Practice for Road Bridges, Section-II –
Loads and Stresses.
3) 5.
4) IRC: 21-2000 Standard Specifications and
Code of Practice for Road Bridges, Section-III –
Cement Concrete.
5) IRC: 18-2000 Design Criteria for Pre-
stressed Concrete Road Bridges (Post Tensioned
Concrete) (Third Revision).
6) IRC: 22-1986 Standard Specifications and
Code of Practice for Road Bridges, Section-VI –
Composite Construction..
7) IS: 6006-1983 Indian Standard Specification
For Uncoated Stress Relieved Strand For Pre-
Stressed Concrete.
REFERENCES
[1] Bridge Engineering by V.V.Sastry
[2] Prestressed Concrete by N Krishna Raju
[3] Bridge engineering by N Krishna Raju
[4] Miyamoto proposed in 1997 to study the
effect of prestressing using external tendons to
strengthen the Misaka Bridge in Hyogo Prefecture,
JapanDezi (2002) proposed a model for
analyzing the nonlinear behaviour of steel-oncrete

You might also like