Sunteți pe pagina 1din 100

PROCEEDINGS

ICAER - 2014
INTERNATIONAL CONFERENCE ON ADVANCEMENTS
IN ENGINEERING RESEARCH

Sponsored By
INTERNATIONAL ASSOCIATION OF ENGINEERING &
TECHNOLOGY FOR SKILL DEVELOPMENT
((Registered Under Indian Trust Act, 1882)

Technical Program
6 October, 2014
BPS Sports Club, Goa

Organized By
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL
DEVELOPMENT

www.iaetsd.in

Copyright 2014 by IAETSD


All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, without the prior written
consent of the publisher.

ISBN: 378 - 26 - 138420 - 6

http://www.iaetsd.in

Proceedings preparation, editing and printing are sponsored by


INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY
FOR SKILL DEVELOPMENT COMPANY

About IAETSD:
The International Association of Engineering and Technology for Skill
Development (IAETSD) is a Professional and non-profit conference organizing
company devoted to promoting social, economic, and technical advancements
around the world by conducting international academic conferences in various
Engineering fields around the world. IAETSD organizes multidisciplinary
conferences for academics and professionals in the fields of Engineering. In order
to strengthen the skill development of the students IAETSD has established.
IAETSD is a meeting place where Engineering students can share their views,
ideas, can improve their technical knowledge, can develop their skills and for
presenting and discussing recent trends in advanced technologies, new educational
environments and innovative technology learning ideas. The intention of IAETSD
is to expand the knowledge beyond the boundaries by joining the hands with
students, researchers, academics and industrialists etc, to explore the technical
knowledge all over the
world, to publish proceedings. IAETSD offers
opportunities to learning professionals for the exploration of problems from many
disciplines of various Engineering fields to discover innovative solutions to
implement innovative ideas. IAETSD aimed to promote upcoming trends in
Engineering.

About ICAER:
The aim objective of ICCTER is to present the latest research and results of
scientists related to all engineering departments topics. This conference provides
opportunities for the different areas delegates to exchange new ideas and
application experiences face to face, to establish business or research relations and
to find global partners for future collaboration. We hope that the conference results
constituted significant contribution to the knowledge in these up to date scientific
field. The organizing committee of conference is pleased to invite prospective
authors to submit their original manuscripts to ICAER 2014.
All full paper submissions will be peer reviewed and evaluated based on
originality, technical and/or research content/depth, correctness, relevance to
conference, contributions, and readability. The conference will be held every year
to make it an ideal platform for people to share views and experiences in current
trending technologies in the related areas.

Conference Advisory Committee:

Dr. P Paramasivam, NUS, Singapore


Dr. Ganapathy Kumar, Nanometrics, USA
Mr. Vikram Subramanian, Oracle Public cloud
Dr. Michal Wozniak, Wroclaw University of Technology,
Dr. Saqib Saeed, Bahria University,
Mr. Elamurugan Vaiyapuri, tarkaSys, California
Mr. N M Bhaskar, Micron Asia, Singapore
Dr. Mohammed Yeasin, University of Memphis
Dr. Ahmed Zohaa, Brunel university
Kenneth Sundarraj, University of Malaysia
Dr. Heba Ahmed Hassan, Dhofar University,
Dr. Mohammed Atiquzzaman, University of Oklahoma,
Dr. Sattar Aboud, Middle East University,
Dr. S Lakshmi, Oman University

Conference Chairs and Review committee:

Dr. Shanti Swaroop, Professor IIT Madras


Dr. G Bhuvaneshwari, Professor, IIT, Delhi
Dr. Krishna Vasudevan, Professor, IIT Madras
Dr.G.V.Uma, Professor, Anna University
Dr. S Muttan, Professor, Anna University
Dr. R P Kumudini Devi, Professor, Anna University
Dr. M Ramalingam, Director (IRS)
Dr. N K Ambujam, Director (CWR), Anna University
Dr. Bhaskaran, Professor, NIT, Trichy
Dr. Pabitra Mohan Khilar, Associate Prof, NIT, Rourkela
Dr. V Ramalingam, Professor,
Dr.P.Mallikka, Professor, NITTTR, Taramani
Dr. E S M Suresh, Professor, NITTTR, Chennai
Dr. Gomathi Nayagam, Director CWET, Chennai
Prof. S Karthikeyan, VIT, Vellore
Dr. H C Nagaraj, Principal, NIMET, Bengaluru
Dr. K Sivakumar, Associate Director, CTS.
Dr. Tarun Chandroyadulu, Research Associate, NAS

ICAER - 2014 CONTENTS


1

AUTOMATED TOLL COLLECTION SYSTEMUSING RFID

COMPUTER SIMULATION OF COMPRESSION IGNITION ENGINE THROUGH


MATLAB

AUTOMATED DAM MONITERING SYSTEM

18

DESIGN AND ANALYSIS OF A NOVEL LOW ACTUATED VOLTAGE RF MEMS


SHUNT CAPACITIVE SWITCH

22

DESIGN AND ANALYSIS OF LOW-LEAKAGE HIGH-SPEED DOMINO CIRCUIT


FOR WIDE FAN-IN OR GATES

26

DEVELOPMENT OF SENSING DEVICE TO DETECT PERSONS HIDING IN A


CAR

34

EXPLODING SPACE TRAVEL

41

GPS TRACKING SYSTEM WITH LICENSE DETECTOR AND SPEED CONTROL

45

GREEN BUILDING

51

10

EARLY DETECTION OF BREAST CANCER USING CAD SYSTEM EMPLOYING


SVM CLASSIFIER

58

11

MODELING & SIMULATION OF SOLAR PV ARRAY FIELD INCORPORATED


WITH SOLAR IRRADIANCE AND TEMPERATURE VARIATION TO ESTIMATE
OUTPUT POWER OF SOLAR PV FIELD

62

12

RTOS BASED ELECTRONICS INDUSTRIAL TEMPERATURE AND HUMIDITY


MONITORING USING ARM PROCESSOR

69

13

SMART VEHICLE TRACKING SYSTEM USING GSM, GPS AND RC5

73

14

EXPERIMENTAL INVESTIGATION AND PREDICTIVE MODELING FOR


SURFACE ROUGHNESS OF DRILLING ON GFRP COMPOSITES

77

15

WIRELESS AD HOC NETWORKS

85

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

AUTOMATED TOLL COLLECTION SYSTEM


USING RFID
1

Kamichetty Pramodh Kumar, 2Kasturi Sai Ratna Gayatri, 3Reddy Akshay,4Vaduru Tayjo Padmini,
5

Kondaka Jyothirmayi

Department of Information Technology


Gitam University
Vishakapatnam, India
1

pramodhkumar.12@gmail.com, 2gayatrikasturi94@gmail.com, 3reddyakshay.225@gmail.com,


4
tayjovaduru@gmail.com, 5jyothirmayi94@gmail.com

Abstract- ATCSR (Automated Toll Collection System


using RFID) is used for collecting tax automatically. In this we do
the identification with the help of radio frequency. A vehicle will
hold an RFID (Radio Frequency Identification Device) tag. This tag
is nothing but unique identification number assigned to it. The
reader will be strategically placed at toll collection centers.
Whenever the vehicle passes the toll booth, the tax amount will be
deducted from his prepaid balance. New balance will be updated.
As vehicles dont have to stop in a queue, this translates to reduced
Traffic congestion at toll plazas and helps in lower fuel
consumption. This is a very important advantage of this system.

acceleration. Meanwhile, for the toll authorities also get the


benefits mentioned below[4]:

An RFID tag is installed on each vehicle with read/write


memory. A reader device reads this data when the vehicle is near
the toll system, and compares it with the data in the computer
database. This helps us to provide security since vehicles with
RFID can be tracked easily. Apart from that we can conserve fuel
and also reduce the amount of pollution.

5. Lowered toll collection costs

Keywords: ATCSR, RFID Reader, RFID Tag, Toll Collection.

The existing method for collecting toll tax is a time


consuming method. There are more chances of escaping toll
payment. It leads to queuing up of following vehicles. Suppose
the manual toll collection system is very efficient then for one
vehicle to stop and pay taxes total time taken is 50 seconds. And
suppose 200 vehicles cross the toll plaza. Then, time taken by 1
vehicle with 60 second average stop in a month is: 50x30= 1500
seconds[8].

1. Fewer or shorter queues at toll plazas


2. Faster and more efficient service (no exchanging toll fees by
hand)
3. The ability to make payments by keeping a balance on the
card itself
4. The use of postpaid toll statements (no need to request for
receipts)

6. Better audit control by centralized user account


7. Expanded capacity without building more infrastructures.
II.DRAWBACKS OF EXISTING SYSTEM

I.INTRODUCTION
The main idea behind implementing ATCSR is to
automate the toll collection process there by reducing the long
queues at toll booths using the RFID tags installed on the
vehicle. In addition to this, it can not only help in vehicle theft
detection but also can track vehicles crossing the signal and over
speeding vehicles. This system is used by vehicle owners and
the system administrator. Other general advantages for the
motorists include fuel savings and reduced mobile emissions by
reducing or eliminating deceleration, waiting time and

International Conference on Advancements in Engineering Research

Yearly total time taken = 1500x12 = 18000seconds =


5.0 hours
On average each vehicle that passes through the toll
plaza has to wait 5.0 hours in engine start condition yearly. The

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

figure is staggering. If on an average we take 200 vehicles to


pass through the toll plaza each day, then yearly 72000 vehicles
pass through the toll plaza. And each year 72000 vehicles just
stand still for 5.0 hours in engine start condition thereby aiding
pollution and wasting fuel and money. This study is if the
system is very efficient but what if the vehicle has to wait for 5
minutes? This is a figure considering one toll plaza[8]. If
considering 50 toll systems the above figure will drastically
increase and the wastage of fuel and money will increase and
pollution will also increase.

Assuming cost of 1 liter fuel = Rs.75 Total cost of fuel


consumed by 36, 00000 vehicles = 75 x 36, 00,000 = Rs.
270,000,000/- The above is the money wastage under the
consideration that the vehicle stops for 60 second at the toll
system, and 100 vehicles pass through the toll plaza each day
and there are 100 toll plazas. These figures are all in minimum.
III.AUTOMATIC TOLL COLLECTION SYSTEM
To avoid the above drawbacks we can automate the toll
collection system using RFID through his we can overcome the
drawbacks.
A. Overview:
Whenever any person buys a vehicle, one first needs to
get his or her vehicle registered at the RTO office. RTO officials
will not only assign a number plate to it but also will give a
RFID enabled smart card or a tag. This card will have a unique
ID feasible to use with that vehicle only. They will also create
an account for the use of that particular smart card and maintain
transaction history in database [4]. User needs to deposit some
minimum amount to this account. Every time a registered
vehicle approaches the toll booth, first the Infrared sensors will
detect the presence of the vehicle.

Fig 1:Traffic Jam at Tolls


Suppose, If there are 100 manual toll-taxes system and
everyday 100 vehicles cross through each system, then No of
vehicle that pass through one system yearly= 100 x 30 x 12 =
36,000. No of vehicle that pass through 100 system yearly= 100
x 36,000 = 36, 00,000[7].
Vehicle

Days

Tool
booth
1
1
100

100
1
36000
30*12
3600000
30*12
TABLE 1: Vehicles Passed through Toll Booth in 1 year
This figure indicates that in one year each of the 36,
00,000 vehicles just stand still for about 6.0 hours in engine start
condition which causes pollution and increases fuel
consumption. Suppose that in 6.0 hours a vehicle uses 1 liter
fuel, Total fuel used by all the vehicles: 36, 00,000 x 1 = 36,
00,000 liters[7].

Vehicle
1
3600000

Fuel consumption
1 lit
3600000 lit.

Fig.2:Elements of RFID System

It will in turn activate the RFID circuit to read the


RFID enable smart card fixed on the windscreen of the vehicle.
Transaction will begin, depending upon the balance available
toll will be deducted directly or the vehicle will be directed
towards another lane to pay tax manually. The software further
updates the details in the Centralized database server. It also

Amount
75/270,000,000/-

TABLE 2: Fuel Consumption and Amount Vehicle Fuel Consumed Amount

International Conference on Advancements in Engineering Research


2

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

triggers mechanism to generate the bill and will be sent to user


as a text message.

When the vehicle crosses the sensor processing unit,


the tag will be read by the RFID reader. The tag contains the
unique identification number. Then data read by the RFID
reader will be taken by Microcontroller which will process the
data for authentication of authorized user[6].

Fig.3:SMS Gateway
Fig 5:Practical Working

B.Operation:

If the user is a valid user then data will be sent to the


processing unit. Then it checks the respective account of that
user from the database to ensure weather the user has sufficient
amount for toll payment or not. If amount is not sufficient to pay
toll then user must have to recharge its account by paying
manually. If sufficient amount then user is allow to pass by iron
bar which will rise up with the help mechanical assembly after
receiving the permission signal from processing unit. If user is
not valid then iron bar will remain down and appropriate action
will be taken against invalid user.

Start
Detect the RFID tag

NO

Tag??

YES

Stolen
Vehicle?

Access the user account

YES

NO

Deduct the toll from account

Read the RFID

Report tono
owner
Update the Database
and account balance

NO

Had
enough
balance
?

YES

Toll amount
deduction

END

END

Fig6:Toll amount deduction

Fig 4:Working Procedure

International Conference on Advancements in Engineering Research


3

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

passing of any defaulter vehicle is implemented, thus assuring


security on the roadways. This also reduce the fuel consumption
which are now under the threat of exhausting.

Deduct amount
Balance

References:

Vehicles
Information

[1] The Times of India paper April 20, 2012 Now Road toll can be paid
without stopping at Toll Plazas.

Details maintained

ID from RFID
tags

[2] The Times of India paper May 28, 2012 High-Tech number plates for 20
lakh vehicles soon.

Process
Taking
place

[3] ActiveWaveInc. http://www.activewaveinc.com.


[4] D. M. Grimes and T. O. Jones, Automotive radar: A brief review, Proc.
IEEE, vol. 62, no. 6, pp. 804822, Jun. 1974.

Details
retrieved
from
Database

Details displayed
to user

[5] Smart key Access Control System http://www.smartkey-rfid.com.


[6] Wikipedia http://en.wikipedia.org/wiki/electronic_toll_collection.
[7] Automated Toll Collection System Using RFID Pranoti Salunke1, Poonam
Malle2, Kirti Datir3, Jayshree Dukale4.
[8] International Journal of Electrical and Electronics Research ISSN 23486988 (online) Vol. 2, Issue 2, pp: (67-72), Month: April - June 2014.

Fig7:Overall Process

When the user installs an RFID device on his vehicle,


he will be provided with a card. This card will be used to debit
the amount of money required to pay the toll fee when the
vehicle passes through the toll gate. The user needs to keep
topping up the amount on his card every time it reaches a certain
minimum amount. Whenever the vehicle crosses an automated
toll gate, the required fee is automatically debited from the card.
An automatically generated message will be sent instead of a
receipt to the users mobile number.
IV.CONCLUSION
The electronic toll collection system in expressway
based on RFID, a design scheme was put forward. It has
characteristics of low cost, high security, far communication
distance and high efficiency, etc. It not only can improve
technology level of charge, but also improve passage ability of
expressway. Electronic toll collection system is an effective
measure to reduce management costs and fees, at the same time,
greatly reduce noise and pollutant emission of toll station. We
can also save the time.
In the design of the proposed Electronic toll collection
(ETC) system, real time toll collection and anti-theft solution
system have been designed. This reduces the manual labour and
delays that often occur on roads. This system of collecting tolls
is eco-friendly and also results in increased toll lane capacity.
Also an anti-theft solution system module which prevents

International Conference on Advancements in Engineering Research


4

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Computer Simulation of Compression Ignition Engine through


MATLAB
K. Hareesh1*, Rohith Teja. N2, B. Konda Reddy3
1,

rgu.konankihareesh.1820@gmail.com, 2, rohithteja.ps91221@gmail.com, 3, bkondareddy.rkv@rgukt.in


1,2

Students in Bachelor of Technology, 3Asst. Professor in Department of Mechanical Engineering.


1,2,3

Rajiv Gandhi University of Knowledge Technology, RK Valley, Andhra Pradesh 516329.

Abstract:
In the present work, a computer simulation has been developed using MATLAB to determine the performance of
a four stroke Compression Ignition internal combustion (IC) engine. The modeling of this process begins with the
simulation of one cylinder of the four stroke IC engine which is assumed to have an ideal pressure-volume (p-V)
relationship allowing for computation of peak performance. The computer simulation is modeled for Ideal Cycle
System with encryption of thermodynamic laws of heat transfer and then it is also modeled for the prediction of
emissions.
The second phase of the model focuses on fuel cycle system where all the real factors are to be considered
for the prediction of performance parameters and emissions. Along with the thermodynamic model to compute
heat release some standard models like Woschni and Annand models are also used to predict the heat release.
Performance parameters computed include brake power and brake specific fuel consumption for an engine's entire
operating range.
Keywords: Computer simulation, IC engines, Ideal cycle system, Heat release models, Performance parameters,
Specific fuel consumption, MATLAB simulation.

1. Introduction
One of the major polluting contributors to our
environment today is the internal combustion engine,
either in the form of spark ignition (Otto) or Diesel
versions. In parallel to this serious environmental
threat, the main source of fuel for these engines, crude
oil, is being depleted at high rates, so that the
development of less polluting and more efficient
engines is today of extreme importance for engine
manufacturers. Also, to this end, the fact of the
increasing threat posed by the rivals of the internal
combustion engine, for smaller size engines, such as the
electric motors, the hybrid engines, the fuel cells and
the like corroborates the importance [1].
Experimental work aimed at fuel economy and low
pollutants emissions from Diesel and Otto engines
International Conference on Advancements in Engineering Research
5

includes successive changes of each of the many


parameters involved, which is very demanding in
terms of money and time. Today, the development of
powerful digital computers leads to the obvious
alternative of simulation of the engine performance
by a mathematical model. In these models, the effects
of various design and operation changes can be
estimated in a fast and non-expensive way, provided
that the main mechanisms are recognized and
correctly modelled [2, 3].
The process of combustion in a Diesel engine is
inherently very complex due to its transient and
heterogeneous character, controlled mainly by turbulent
mixing of fuel and air in the fuel jets issuing from the
nozzle holes. High speed photography studies and inwww.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

cylinder sampling techniques have revealed some


interesting features of combustion [4]. The first
attempts to simulate the Diesel engine cycle substituted
the internal combustion by external heat
addition. Apparent heat release rates were empirically
correlated to fuel injection rates and eventually used in
a thermodynamic cycle calculation to obtain the
cylinder pressure in a uniform mixture [5]. Models
based on droplet evaporation and combustion, while
still in a mono-zone mixture, can only partially take
into account the heterogeneous character of Diesel
combustion [4].
The need for accurate predictions of exhaust emissions
pollutants forced the researchers to attempt developing
two zone combustion models [14]. Eventually, some
multi-zone combustion models have appeared, carrying
the expected drawbacks of the first attempts, where the
detailed analysis of fuel-air distribution permits
calculation of the exhaust gas composition with
reasonable accuracy [3-6]. However, this happens under
the rising computing time cost when compared to lower
zones Diesel combustion models. At this point, it is
mentioned that multi-dimensional models have proved
useful in examining problems characterized by the need
for detailed spatial information and complex
interactions of many phenomena simultaneously [6, 7].
However, these are limited by the relative inadequacy
of sub-models for turbulence, combustion chemistry
and by computer size and cost of operation to crude
approximations to the real flow and combustion
problems.
Therefore, it is felt that a reasonable choice seems to be
a two zone model, which includes the effects of
changes in engine design and operation on the details of
the combustion process through a phenomenological
model where the geometric details are fairly well
approximated by detailed modelling of the various
mechanisms involved [1, 8]. This is going to have the
advantage of relative simplicity and very reasonable
computer time cost.
Thus, the object of the present work concerns a
comprehensive two zone model, applied to a direct
injection (DI) Diesel engine, similar in broad outline to
others, but with several differences that one must
International Conference on Advancements in Engineering Research
6

expect from an independent research source. The model


contains upgraded jet mixing, heat transfer and
chemistry sub-models, using as simply as possible the
numerical analysis treatment of the governing
differential and algebraic equations, thus leading to
good solution convergence with reduced computer time
cost [9, 10].
Extending that work further, the present paper, after
exposing a rather short description of the model, as a
first step, verifies its validity by using data from a
vast experimental investigation. This data is taken at
the authors laboratory on a fully automated test bed,
four stroke, water cooled, standard Hydra, direct
injection, high speed, Diesel engine. Plots of pressure,
temperatures in the two zones, nitric oxide (NO)
concentration, soot density, efficiency and other
interesting quantities are presented as a function of
crank angle, for various loads and injection timings,
providing insight into the physical mechanisms
governing the combustion and pollutants formation.
After gaining confidence in the predictive
capabilities of the model, the second step follows with
an extensive investigation of the sensitivity of the
model to variation of the constants used in the fuel
preparation and reaction sub-models, which are
proved critical to the model predictions. For this
purpose, the coincident experimental and predicted
points are used as baseline values around which
changes to these constants are effected. As a
feedback, this leads to a better understanding of the
physical mechanisms governed by these constants,
explaining the behavior of the combustion and
pollutants formation for various fuels and conditions
used, as reported in the literature. At the same time,
this analysis paves the way for the construction of a
reliable and relatively simple multi-zone model,
which incorporates in each zone (packet) the
philosophy of the present two zone model, while it
may also be useful for the construction of a
combustion model during transient engine operation
[8,11,12].

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

mt ma m f

2. Thermodynamic Analysis
Two-zone model views the entire combustion in to
burned zone and unburned zone as shown in the
Figure 1.

mb mi mt i

After amount of mass fraction burned inside the


combustion chamber was found out, the next
important parameter to find out is instantaneous
Volume of the cylinder. This volume can be obtained
by the equation in relation with the crank angle as:

D 2
r 1 1 cos 2 sin 2
V Vcl
4

1/ 2

The peculiarity of this process among all other


processes of combustion analysis is, here the total
combustion range is divided into six regions such as
suction, Compression, Combustion, expansion,
constant volume heat rejection and exhaust. All the
processes in the above listed will follow the ideal
relations show in the below Figure 2.

Burned
zone

Unburned
zone

Figure 1: Two Zone Combustion Model


However, the two-zone model recognizes a burned
and unburned zone, thus predicting heat transfer and
emissions more accurately. The construction of two
zone model begins with weibe function to identify
burned and unburned regions.

i
1 exp(6.908
d

b1

The mass fraction profile follows the S. So, thats


why it is called as S-function. The burn profile is
engine-specific.
So, from the mass fraction profile the total amount of
mass burned inside the chamber can be find out as:

ma

Figure 2: Diesel Cycle

Pint Vint
Rg Tint

But, the prediction of performance parameters in


combustion zone is bit complicated and doesnt
follow the ideal relations. Generally in the
combustion region, Volume and Temperature does
not remains constant which leads to the increasing of

m f mass of fuel

International Conference on Advancements in Engineering Research


7

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

pressure as the combustion proceeds. Inorder to find


the pressure the temperature has to be obtained by
using heat equations shown below:

combustion. The following Figure 4a, 4b justify the


above information and also gives an idea of PVDiagram:

Qin mb LHV mu C p (Tnew T )


From the above relation new temperature can be
obtained as

Tnew T

mb LHV
mu C p

Temperature increases rapidly during the combustion


and then decreases due to heat convection by cooling
water. The temperature in the total cycle changes as
show in below Figure 3.

Figure 4(a): Pressure Vs Theta

Figure 3: Variation of Temperature in combustion zone


Now the new pressure can be obtained as

Pnew

mt Rg Tnew
V

In actual combustion process unlike the idea case the


pressure doesnt remain constant at heat addition
process, rather it reaches a maximum value at
maximum heat addition point and then decreases.
This is because that there was no assumption that the
pressure remains constant in the region of
International Conference on Advancements in Engineering Research

Figure 4(b): PV Diagram

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

BTH

Rated Powers and Efficiencies


This section starts with the calculation of total work
done in the cycle from where mean effective pressure
can be calculated which is equal to the Indicated
mean effective pressure when the friction is neglected
[5]. The work output can be obtained from

Then the brake specific fuel consumption is


determined as

BSFC

P3V3 P4V4 PmaxV2 P1V1

1
1
Then the Indicated power is
n
I p W (KW), where n = N/2 for four stroke
60
engine
From the I p mean effective pressure was obtained

LAnK

Heat Release Models


This section starts with the first law of
thermodynamics for the four stroke engine energy
balance [3] is

(Pa)

U Q W

Friction mean effective pressure for direct injection


diesel engine is given [6] as

Where Q the total energy is transferred into the


system, W is the work transferred out of the system,
and U is the change in internal energy within the
system. In differentiating equation the above equation
with respect to d
dU dQ dW
dT

mCv

d d d
d

RPM
2
fmep C 48
0.4 U p
1000
Where C is constant which is equal to 75 Kpa and Up
is the mean piston speed.
Then friction power is,

Fp

Where Cv

Now, the brake Power and brake mean effective


pressure are obtained from the following relations

Where is the specific heat ratio.


The above equations can be used to describe the
formation of work and the net heat input:
dW
dV
P

d
d

B p I p Fp

60000 B p
LAnK

dQn dQin dQloss

d
d
d
Which can be expanded as,
dQn
d dQ
m f LHV loss
d
d
d

Once the all rates powers were obtained calculation of


their efficiencies becomes easy. The brake thermal
efficiency is obtained [4] as

International Conference on Advancements in Engineering Research

is the specific heat of the combustion

chamber gas. Upon dividing the specific heat by the


universal gas constant [9],
Cv
Cv
1

R C p Cv 1

fmep LAnK
60000

bmep

MFVL 3600
Bp

The brake specific fuel consumption varies with the


load, fuel and engine model. It is high at full load
condition where maximum power output is generated
in the form of brake power [4].

from,

60000 I p

MFVL CV

Where MFVL is the fuel in terms of Kg/s

W Pmax V3 V2

imep

Bp

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

If we further implements the heat model to get net


heat with respect to crank angle [3], the equation
becomes:
dQn

dV
1
dP

V
d
1 d 1 d
However, it is also necessary to continue discussion
to get more accuracy for more complex heat release
models. Lastly the change in pressure [6] is defined
by:
dP 1 dQin dQloss
P dV


d
V d
d
V d

w 2.28U p C1

V Tr
P Pm
PrVr

Where C1 the constant is varies with the process. For


combustion process C1 =0.00324, U p is mean piston
speed, V is the instantaneous volume, Tr is the
reference temperature, Pr is the reference pressure, Vr

is the reference volume, P instantaneous pressure


at the combustion period and Pm is the motored
cylinder pressure.

The rate of heat loss can be expressed as


dQloss
1
h A T Tw
d

This can be modelled by two models namely
woschnis heat transfer model and Annands heat
transfer model.

Woschnis Heat Release Model


Woschnis method is a set of empirical equations that
predicts the heat transfer coefficient between incylinder gasses and walls [5]. The convective losses
between in-cylinder gasses and walls can be predicted
using Newtons law of cooling:

T 4 Tw 4
dQht
1

h A T Tw 5.76

d
100
100

h is the instantaneous heat transfer coefficient,

Figure 5: Rate of change of convective heat transfer


coefficient with crank angle

A is the instantaneous heat transfer area, T is the


instantaneous bulk gas temperature, and

Tw is the

cylinder wall temperature. With the heat loss


modelled angularly, the convective heat transfer
coefficient is now defined as:

In compression and expansion processes, Watson and


Janota [6] suggested modelling the motored cylinder
pressure as a polytrophic process:

h 3.26D 0.2 P 0.8T 0.55 w0.8

V
Pm Pr r
V

Where that w denotes the woschnis factor which


also changes with the crank angle and it is expressed
[11] [12] [4] as,

International Conference on Advancements in Engineering Research

With all of these variables previously expressed, the


convective heat transfer coefficient and corresponding
heat loss could then be calculated.

10

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Where a is a constant having a value of 0.26 for a


two-stroke engine and 0.49 for a four stroke engine
[2], and is the instantaneous Reynolds number. The
Reynolds number is expressed as:

The change in convective heat transfer coefficient


with the crank angle during combustion according
woschnis has represented in the Figure 5.

Annands Heat Release Model

Re

Annands and Woschnis heat transfer models


differed in the fact that Annands approach separated
the convective and radiation terms. Annands method
solved for the heat transfer coefficient by assuming
pipe-like fluid dynamics, and using the in-cylinder
density, and Reynolds and Nusselt numbers as
functions of time.

Where gas is the instantaneous cylinder gas density,

U p is the mean piston velocity, and

gas

dQ
1
hc hr A T Tw
d

hc

P
RgasT

Where Rgas is the fluid-specific gas constant, and an


assumed value of 287[

is the convective heat transfer

J
] was used for this
KgK

variable.

coefficient and hr is the radiation heat transfer


coefficient. The convective heat transfer coefficient
can be extracted from the relationship between the
Nusselt number and fluid properties [7] as

hc

gas is the

instantaneous gas viscosity. Since the model assumes


ideal gas behavior, the cylinder gas density can be
found by rearranging the ideal gas law:

Using Annands method, Newtons law of cooling


can be broken into convective and radiation terms [3]
as follows:

Where

gasU p D
gas

As with the thermal conductivity, the cylinder gas


viscosity was modelled using empirical equations.
According to Heywood [2], the cylinder gas viscosity
can be expressed as:

k gas Nu

kg
6
7.457 10.
m*s

gas

4.1547 10

T 7.4793 10

12

Where k gas is the gas thermal conductivity, Nu is the


Nusselt number, and D is the cylinder bore. With an
iterative solver, the thermal conductivity of the
cylinder gas can be modelled using a polynomial
curve-fitting of experimental data. Heywood [2]
suggests using the curve fitted equation:

k gas 6.1944 10 3 7.3814 10 5 T 1.2491 10 8 T

Although the radiative heat transfer coefficient is


small [2], it was decided that radiation should be
included in considering overall heat losses in the
model. The radiative heat transfer coefficient is
defined as [5]:
2

W
, units are

m* K

Where the instantaneous cylinder temperature and


wall temperature must be provided in units of [K].
With known pressure and temperature traces from the
calculations, Annands method could then be used to
calculate heat losses. A comparison of predicted heat

The Nusselt number can be described relative to the


Reynolds number and the type of engine:
Nu a Re 0.7

International Conference on Advancements in Engineering Research

w
9 T Tw
hr 2
4.25 10

m *K
T Tw

11

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

loss rates of both Woishni and Annand model would


be shown in the Figure 6.

NOx Model
While nitric oxide (NO) and nitrogen dioxide (NO2)
are usually grouped together as NOx emissions, nitric
oxide is the predominant oxide of nitrogen produced
inside the engine cylinder. The principle source of
NO is the oxidation of atmospheric nitrogen.
However, if the fuel contains significant nitrogen, the
oxidation of the fuel nitrogen-containing compounds
is an additional source of NO.
The mechanism of the formation of NO has been
revised and the principle equations governing the
formation of NO has formulated as
O + N2 = NO + N

(3.1.1)

N + O2 = NO + O

(3.1.2)

N + OH = NO + H

(3.1.3)

The forward rate constant for reaction (3.1.1) and the


reverse rate constants for reactions (3.1.2) and (3.1.3)
have large activation energies which results in a
strong temperature dependence of NO formation. And
the NO formation rate is given as

Figure 6: ROHL with respect to crank angle

Total heat losses other than convective, radiative heat


transfer are accounted in the below Figure 7.

1 NO / K O2 N 2
d NO

2k1 ON 2

dt
1 k1 NO/ k 2 O2 k3 OH
2

Where K = k1 k1 k 2 k 2 .
To introduce the equilibrium assumption it is
convenient to use the notations

R1 k1 Oe N 2 e k1 NOe N e , for (3.1.1)


R2 k 2 N e O2 e k 2 NOe Oe , for (3.1.2)
R3 k 3 N e OH e k 3 NOe H e ,for (3.1.3)
Then the NO formation rate equation becomes

2R1 1 NO/NOe
d NO

dt
1 NO/NOe R1 / R2 R3
The strong temperature dependence of the NO
formation rate makes the formation rate very simple

Figure 7: Energy losses


International Conference on Advancements in Engineering Research

12

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

and depends on the equilibrium concentration of


Oxygen and Nitrogen and it is given as

HC Model
Hydrocarbons, or more appropriately organic
emissions, are the consequence of incomplete
combustion of the hydrocarbon fuel. The level of
unburned hydrocarbons (HC) in the exhaust gases is
generally specified in terms of the total hydrocarbons
concentration expressed in parts per million carbon
atoms.

d NO 6 10
69090
1/ 2

exp
O2 e N 2 e
1
dt
T

T2
16

d NO
on temperature in
dt
the exponential term is evident. High temperatures
and high oxygen concentrations result in high NO
formation rates. The characteristic time for the NO
formation process is
The strong dependence of

NO

A reasonable fit to the experimental data on unburned


HC burn up is the rate expression [9] as

d HC
18735
P
6.7 1015 exp
x HC xO2

dt
T
RT

8 10 T exp58300 / T
P1 / 2
16

Where x HC , xO2 are the mole fraction of HC and mole

By multiplying this time with NOx formation rate we


can get the NOx in to PPM as

fraction of Oxygen respectively.

d NO
1000
6
NOx (PPM) =
NO 10

dt
3600

The main contribution of unburned Hydro Carbons


are depicted in the Figure 9.

The change in NOx emission in PPM with respect to


temperature is shown in the Figure 8.

HC EMISSION
CONTRIBUTIONS
others
25%
Crevices
48%

valves
5%

oil layers
22%

Figure 9: % of factors contributing to HC emissions

CO Emissions
Figure 8: NOx emissions with respect to Temperature.

International Conference on Advancements in Engineering Research

Carbon monoxide is an intermediate species in the


oxidation of hydrocarbon fuels to CO2 and H2O. In
fuel-rich regions of a flame, the CO levels are
13

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

necessarily high since there is insufficient oxygen for


complete combustion. Only if sufficient air is mixed
with such gases at sufficiently high temperature can
the CO be oxidized. Thus, imperfect mixing can
allow carbon monoxide to escape from combustors
that are operated fuel-lean overall. Even in premixed
combustion systems, carbon monoxide levels can be
relatively high due to the high equilibrium
concentrations at the flame temperature, particularly
in internal combustion engines where the gases are
hot prior to ignition due to compression.
As the combustion products are cooled by heat or
work transfer, the equilibrium CO level decreases. If
equilibrium were maintained as the temperature
decreased, carbon monoxide emissions from
automobiles and other well-mixed Combustors would
be very low in fuel-lean operation. The extent to
which CO is actually oxidized, however, depends on
the kinetics of the oxidation reactions and the manner
of cooling. In this section we explore the kinetics of
CO oxidation and the mechanisms that allow CO to
escape oxidation in locally fuel-lean combustion.

Figure 10: % of emissions with respect to Temperature

3. Simulation Model
The thermodynamic simulation model through
MATLAB is developed to validate the experimental
results for a compression ignition engine to reduce the
time consumption in manually computing for
comparison of actual data with experimental data. The
validation of a mathematical model of a structural
dynamic system entails the comparison of predictions
from the model to measured results from experiments.
There are some more numerous, related reasons for
performing validations of mathematical models. For
example:

The predominant reaction leading to carbon


monoxide oxidation in hydrocarbon combustion is

CO OH CO2 H
Where,

k 1 4.4T 1.5 exp372 / T m 3 mol 1 S 1

1. There may be a need or desire to replace


experimentation with model predictions, and, of course,
a corresponding requirement that the model predictions
have some degree of accuracy. The need for a model
may arise from the fact that it is impossible to test
system behavior or survivability in some regimes of
operation.

The rate of carbon monoxide production for the


reaction (4.9.2.1) is given by,

R1 k 1 COe OH e
The speed of the reaction is expressed in terms of the
characteristic reaction time

CO

CO

2. Alternately, the need for validation may arise from a


necessity to prove the reliability of a structure under a
broad range of operating conditions or environments.
Because it may be expensive to simulate the conditions
in the laboratory or realize them in the field, an accurate
model is required.

R1

The proportions of the emissions of NOx, HC and CO


emissions are shown in the Figure 10.

International Conference on Advancements in Engineering Research


14

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

3. Another reason for model validation is that a system


may be undergoing changes in design that require
analyses to assure that the design modifications yield
acceptable system behaviour. A validated model can be
used to assess the system behaviour. In all these
situations it is useful to confirm analysts abilities to
produce accurate models.

between iterations, thus decreasing the overall


computation time. Pre-allocated arrays and matrices
were also used as a means of setting appropriate
properties for the recursion of the program to
compare between the graphs of multiple fuel tests.

In this work, the task of developing the MATLAB


simulation model for compression ignition engine is for
testing different fuels at different conditions to select
the best to have high efficiency and less emissions.

Fuel inputs such as mass of the fuel, Calorific value,


Lower Heat Values and air-fuel ratio were taken as
per the experiment model of the engine.

4. MATLAB Script Procedure

In order to that the main program has divided in to


two sub loops where in the first loop with a
specified index (i=0:720) calculated instantaneous
engine properties discussed in the above section. In
addition to the properties of instantaneous
properties like volume, pressure and temperature it
has also scripted for to calculate work done during
the total range of the cycle, Indicated power,
friction power, brake power, correction factor for
the calculation of brake power and brake specific
fuel function.

In selecting a computer program to execute the


demands of a two-zone model, Matrix Laboratory
(MATLAB) was considered. It was considered as
because of its ease of simulation and speed of
validation. With keeping all constraints in mind total
script was developed in MATLAB for the future use.
The bulk of MATLAB code was set up through the use
of script and the total script is divided in to some sub
sections.the purpose of these sub-sections and the
organization of the MATLAB model will be elucidated
in subsequent sections.
4.1 Engine Geometry and Atmospheric inputs
The MATLAB script began with known engine inputs.
The bore, stroke, connecting rod length, number of
cylinders,
compression
ratio,
and
operating
characteristics has to mentioned to the program as
inputs for the validation of an experimental details.
Based on the inputs script would calculate the area of
the cylinder, clearance volume of the cylinder and
surface area of the piston head. And the atmospheric
conditions were chosen like, the initial inlet
Temperature 300K (room temperature) and pressure as
1 atm.
4.2 Pre-allocation of Arrays

4.4 Instantaneous Engine and Fluid Properties

The second loop with specified index in the range


of combustion, MATLAB script has statements to
cope up with heat release and heat loss model in
Woschni and Annand model.
4.5 Plot statements
Each plot was sized based on the minimum and
maximum variable values, and each plot was given
a title appropriate to the variable being plotted.
MATLAB script was so developed to have a plots
between all the performance parameters as a
function of crank angle, PV diagrams and for the
relation between pressure and temperature. Plots
were modelled for mass-fraction, heat release and
heat loss as a function of crank angle.
4.6 Emission Predictions

Through experimentation, it was found that preallocating arrays and matrices drastically improved
the efficiency of the program. This prevented
MATLAB from having to re-size arrays or matrices
International Conference on Advancements in Engineering Research

4.3 Fuel inputs

The NO prediction model was included in the


MATLAB script, predicted the quantitative fraction
of NO particles. The residence time for NO formation
15

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

was calculated and the integrated amount of NO was


calculated in PPM.

5. Results and Discussion


As the ideal cycle system for four stroke Direct
Injection Diesel Engine starts with the calculation of
mass fraction profile, it was calibrated and a graph
drawn for mass fraction verses crank angle during
combustion zone and it is shown in figure 11.

Figure 12: Volume Vs Crank angle

Figure 11: Weib's Mass Fraction profile

Figure 12 shows the Volume profile for the total


range of four stroke engine as a function of crank
angle and found that it never changes with fuel and
its properties. It is only depends upon the
specifications of the engine.
Figure 13 shows the rate of heat transfer during the
combustion period according to Thermodynamic
analysis.
Figure 13: ROHT Vs Crank angle during Combustion

International Conference on Advancements in Engineering Research


16

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Figure 14 show the difference between the heat


transfer coefficient for both Woschnis and Annand
heat release models and found they follow same trend
as they follow for standard cycles systems.

References
1.

2.

3.
4.
5.
6.

7.

8.

Figure 14: Comparison of Heat transfer Coefficients of


both Woschni's and Annand Heat Release Models
9.

Using the burned-zone temperature, sub-functions


were created to calculate NOx and HC emissions and
graphs were generated as shown in Figure 10.

Conclusion
10.

It was found that the model could be used in


simulating any diesel engine. This could save an
enormous amount of time in tuning an engine,
especially when little is known about the engine. With
an air-fuel ratio and volumetric efficiency map,
Injection-timing could be optimized, thus minimizing
wear-and-tear on the engine and dynamometer
equipment. Much research could be directed towards
refining the model and using it for the improvement
of engine performance and reducing the NOx
emissions by testing different fuels.

International Conference on Advancements in Engineering Research

11.

12.

17

C.D. Rakopoulos, E.G. Giakoumis and D.C.


Kyritsis - Validation and sensitivity analysis of a
two zone Diesel engine model for combustion and
emissions prediction, Energy Conversion and
Management 45 (2004).
Jeremy L. Cuddihy - University of Idaho, A
User-Friendly, Two-Zone Heat Release Model for
Predicting Spark-Ignition Engine Performance
and Emissions, May 2014.
Computer Simulation of Compression Engine
by V. Ganesan 1st edition, 2000.
J. Heywood, Internal Combustion Engine
Fundamentals. Tata Mcgraw Hill Education, 2011.
V. Ganesan, Internal Combustion Engines, 6th
edition, Tata Mcgraw Hill Education, 2002.
Zehra Sahin and Orhan Durgun - Multi-zone
combustion modeling for the prediction of diesel
engine
cycles
and engine
performance
parameters, Applied Thermal Engineering 28
(2008).
G. P. Blair, Design and Simulation of Four Stroke
Engines [R-186]. Society of Automotive
Engineers Inc, 1999.
C.D. Rakopoulos, K.A. Antonopoulos and D.T.
Hountalas -Multi-zone modeling of combustion
and emissions formation in DI diesel engine
operating on ethanoldiesel fuel blends, Energy
Conversion and Management 49 (2008) 625643.
Hsing-Pang Liu, Shannon Strank, MikeWerst,
Robert Hebner and Jude Osara - COMBUSTION
EMISSIONSMODELING AND TESTING OF
CONVENTIONAL DIESEL FUEL, Proceedings
of the ASME 2010, 4th International Conference
on Energy Sustainability (May 17-22, 2010).
A. Sakhrieh, E. Abu-Nada, I. Al-Hinti, A. AlGhandoor and B. Akash - Computational
thermodynamic analysis of compression ignition
engine, International Communications in Heat
and Mass Transfer 37 (2010) 299303 .
D. Descieux, M. Feidt - One zone thermodynamic
model simulation of an ignition compression
engine, Applied Thermal Engineering 27 (2007)
14571466.
Mike Saris, Nicholas Phillips - Computer
Simulated Engine Performance, 2003.

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

AUTOMATED DAM MONITERING SYSTEM


1

Kamichetty Pramodh Kumar, 2Kasturi Sai Ratna Gayatri, 3Reddy Akshay,4Vaduru Tayjo Padmini,
5

Kondaka Jyothirmayi

Department of Information Technology


Gitam Universitys
Vishakapatnam, India
1

pramodhkumar.12@gmail.com, 2gayatrikasturi94@gmail.com, 3reddyakshay.225@gmail.com,


4
tayjovaduru@gmail.com, 5jyothirmayi94@gmail.com

Abstract:

generation using the signal generated from NI 9263 analog


output module.

To develop an automated dam controlling system in order to

II.THE SYSTEM SETUP

1. Measure velocity of the water flowing into the dam.


2. Measure pressure at dam walls.

The entire dam controlling system is divided into


separate dedicated sub-systems which are explained below.

3. Indicate current water level.

A. Velocity Measuring System:

4. Properly channelize the water for irrigation and power


generation.

Pivot tubes can be used to indicate fluid flow


velocity by measuring the difference between the static and total
pressure in fluids.

5. Monitor vibrations of the dam structure to ensure safety.


Our solution helps in improving the ease of
monitoring a dam system, thereby enabling measurement of water
inflow velocity to dam and pressure measurements in dam walls.
During floods the dam is subjected to a heavy volume of water. In
orderto ensure the safety of dam from large volume of water in the
upstream and to prevent flooding in the downstream, proper
channelizing is essential. Our solution provides a scheme in order
to channelize the water in dams effectively.

I.INTRODUCTION
We introduce an automatic monitoring and control
system of dams. This scheme enables easy controlling through
its smart sensing and data acquisition technique using NI
Compact RIO, LABVIEW8.2.1 .

Fig1: Velocity measurment using pivot tube


V = sqrt [2 * {pt -ps} / R]

Firstly data is acquired from various sensors in order


to measure water height in dams, velocity of water , pressure in
dam walls and vibrations. The output from various sensors is
obtained as voltage which is fed into another channel of NI 9201
I/P module. LABVIEW monitors and analyses the data from the
sensors and controls the sluice gates for sustaining the required
level of water, channelizing the water for irrigation and power

Where,
V=velocity of water
Pt=total pressure
Ps=static pressure
R=specific density of water

International Conference on Advancements in Engineering Research


18

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Fig2: Wheatstone bridge circuit to find velocity of water


Fig3:Working of turbines

The strain gauges form the four arms of the


Wheatstone bridge in a full bridge pattern. When resistance of
all the four arms of the bridge is same, the bridge is said to be
balanced and the output of it will be zero. When the fluid flows
along the pitot tube, there comes to picture the static pressure
and the total pressure which exert a force on the diaphragms.

WATER POWER=(W*H)/1000KW
Where ,W=r*g*v
r=water density
g=acceleration due to the gravity

This will lead to change in resistance in the four


arms of the Wheatstone bridge, which make the bridge
unbalanced and produces a corresponding voltage that is
proportional to the pressure exerted as its output. So the bridge
converts the force change information into milli volt output.
This milli volt output voltage is amplified using a voltage
amplifier to 0-10 v which is fed to the DAQ .

v=volume per second


H= net water head
Now, depending upon the volume of water
accumulated inside dam ,the channels of the dams can be
controlled which is simulated in lab view using LEDS.By
allocating 2 different channels we can judiciously make use of
water obtained in flood in generating power ,thereby conserving
power. Mechanically, it can be achieved using motors of 2
different ratings depending upon the water level.

B. Channelizing System For Irrigation And Power Generation:


Now, as our project is concerned about
multipurpose dams, 2 channels are devoted for generating
power from hydro electric plant. We are more concerned about
the input power that is given to the turbine so called water
power.

International Conference on Advancements in Engineering Research


19

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

C. Vibration Measuring System:

Fig5: Mode:2;Frequency:2.61 cycles/sec

Fig4:Basic sketch of an earthen dam


Normally structures of dams should be concrete
enough to withstand the high velocity of water expected during
flood. Vibrations pose a major threat to the dam structure. The
hatched portion shown in the diagrams below represent the
deformation in the embankment at various frequencies of
vibration. Now in our project we can analyze the vibration
spectrum with an aid of vibration sensor for which we use
LIVM(low impedance voltage mode) accelerometer ,model
3035B1 and a high rate data acquisition card connected to the
output display. The power spectrum comprising the frequency
and the amplitude of the vibration is obtained using which the
alarm signalis issued.

Fig6: Mode:3;Frequency:2.93 cycles/sec

Fig4:Mode:1;Frequency:1.75 cycles/sec

International Conference on Advancements in Engineering Research

Fig7: Mode:4;Frequency:3.06 cycles/sec

20

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

IV.BENEFITS
This project will very much prove to be
economical. Though the initial cost of implementing the system
might appear to be a bit high, in the long run, the running cost
will be low. The economic benefits that arise out of this scheme
will be an eye-catcher. Safety is the main aspect of our design.
This project will reduce flooding drastically in the downstream
side thus preventing crop damage and civilian losses and will be
a boon to the agronomy. This system replaces manual control
and as a result human errors are totally eliminated. Moreover
our project aims at producing two different powers generated at
hydroelectric power stations by regulating the water power to
the turbine suitably depending upon the volume of the water
available. Thus, it helps us optimize the use of water according
to the availability of the water.

Fig8: Mode:5;Frequency:3.64 cycles/sec


D. Water Level Indicating System:
A low AC voltage is applied between the probe
electrode and the reference electrode. When the water comes in
contact with the electrode tip, a conductive path is established
between the sense electrode and the reference electrode. This
current is sensed, amplified and made to operate a relay whose
contacts in turn can be used for controlling the sluice gates.

Thus the automated dam controlling system measuring


velocity, pressure, indicating water level, vibration and
channelizing water for irrigation and power generation has been
modeled using lab view .

E. Pressure Measuring System:

References:

To measure the pressure we use LL-V pressure sensor


from Honeywell. The sensor has been designed for complete
submersion in water. The output of the pressure sensor is
compatible with the data acquisition card we use. The data from
the sensor is acquired by the DAQ and when the pressure
increases to dangerous levels, the sluice gates are opened.

1. S K Garg. Irrigation Engineering and Hydraulic Structure. Khanna


publishers,Delhi,India,1996.

V.CONCLUSION

2. A Dhariwal and D G Purohit. Failure of Embankment Dams. IGC 2000 the


Millennium Conference Proceedings 2000, Mumbai, India, p.371-374.
3. S S Bhattacharjee. and P Leger. Application of NLFM Models to Predict
Cracking in Concrete Gravity Dam. J Struct Eng ASCE. 120(4):1255-1271,
1994.

III.THE FRONT PANEL

4. www.ni.com
5. www.honeywell.com
6. Rick Bitter, Taqi Mohiuddin and Matt Nawrocki. LabVIEW: Advanced
Programming Techniques.second edition, CRC publications, 2006.
7. Ian Sinclair. Sensors snd Transducers, third edition, newness publications,
2001.

Fig9:Front panel of dam monitoring system

International Conference on Advancements in Engineering Research


21

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Design and Analysis of a Novel Low Actuated Voltage


RF MEMS Shunt Capacitive Switch
Prashant Kumar Gupta 1, Tejbir Singh2,Garima Jain3 and DV Avasthi4
1

Meerut Institute of Technology, Meerut,250001,India 3DAV PG College Muzaffarnagar


2,4
Subharti Institute of Technology and Engineering, SVSU, Meerut, 250001, India
1
2
er.prashantkumargupta03@gmail.com, tvsp1282@gmail.com
Hence from equation (1) it clears that the pull in voltage VPI
can be reduced by three ways1. By reducing go which results in lower actuation
voltage. But this way can be used at low frequency
applications. Since it will unfavorably affect the high
frequency OFF- State RF MEMS Switch
performance by compromising the switch isolation
(for series switch) or insertion loss (for shunt switch).
2. By reducing the actuation area. But this will not be
useful solution since the compactness is prime issue
and adaption of MEMS technology is to achieve
miniaturization.
3. By reducing the value of spring constant KZ. So
fixed-fixed flexures beam structure is used which
offers lower spring constant without increasing the
size and weight of deceive.
Thus fixed-fixed flexures beam structure is important for low
actuation voltage. The configuration of fixed-fixed flexures
beam structure is shown in Fig 1. The spring constant kZ for
fixed-fixed flexures beam structure is given by [6],

Abstract This Paper presents design, analysis, proposed


fabrication process and simulation of a novel low actuated
voltage shunt capacitive RF MEMS Switch. The Air gap in
between the membrane and CPW signal line is 1.5 m. The
lowest actuation voltage of switch is 3 Volts. The proposed fixedfixed flexures beam structure provides excellent RF
Characteristics (Isolation -43 dB at 28 GHZ and insertion loss 0.12 dB at 28 GHZ).
Index Terms Actuation voltage, Coplanar wave guide, Spring
constant, scattering Parameters.

I.
INTRODUCTION
In the last decade huge amount of work have done on RF
MEMS switches. Which are used as switching devices,
working at radio frequencies. Since they exhibits number of
advantages over PIN diodes or field effect transistor (FET)
switches. For example- Low or near about zero power
consumption, very high isolation, very low insertion loss and
very good linearity [1,2 and 3]. This leads to it an ideal for
wireless equipments working in ground and space for
example- mobile cell phones, Base station and satellites.
However RF MEMS Switches have some downsides for
examples- relatively low switching speed, low power
handling, High-voltage, low long term life, and packaging
problems. Mainly a large electrostatic force produced at very
high voltage 15-60 volts is required for RF MEMS Switches
to have satisfactory operation. Since the actuation voltage or
the pull in voltage (VPI) of RF MEMS Switch is higher than
the standard voltages of CMOS, Which is usually 5 Volts or
less.
It results in that the RF MEMS switches are not compatible
with the control circuits and others. Therefore it is impossible
to integrate them in a single chip [4].
Therefore one most important job of RF MEMS Switch is to
decrease actuation voltage VPI.
The propose of this paper is to design and analyze RF MEMS
switch to attain actuation voltage below 4 Volts. This is
achieved by using fixed-fixed flexures beam structure.
I.
DESIGN OF SWITCH
The pull in voltage (VPI) is given by [5];

VPI

t
kZ 4 Ew
l

(2)
Where, E is Youngs Modulus of membrane and t is thickness
of membrane.

l
Fig. 1. Fixed-fixed flexures Beam Structure

II.

FBRICATION PROCESS

The coplanar wave guide (CPW) structure preferred for RF


MEMS Switch is S/W/S = 84/120/84 m, H = 600 m (50
ohm) above silicon substrate as shown in Fig. 2.
W S

8kZ g o 3
27 A o

(1)
Where, kZ is spring constant of membrane, go is gap between
the movable membrane and CPW signal line and A is the
actuation area.

International Conference on Advancements in Engineering Research

H
Fig. 2. CPW Structure for switch

22

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

The switch is fabricated by using five masks fabrication


Process.
1. A layer of 1 m thick oxide is deposited on the
silicon (Si) substrate as buffer layer as Shown in
Fig. 2(a).
2. A layer of 4 m of gold (Au) is sputtered and
patterned for CPW transmission line as Shown in
Fig. 2(b).
3. A 0.15m thick plasma enhanced chemical vapor
deposition (PECVD) Si3N4 is deposited and patterned
as dielectric layer in between membrane and CPW
signal line as Shown in Fig. 2(c).
4. A layer of photo resist with 4 m thickness is spun
coated and patterned to fill in the CPW slots (for
obtaining flat membrane) as Shown in Fig. 2(d).
5. A 1.5 m thick photo resist sacrificial layer is spun
coated and patterned as Shown in Fig. 2(e).
6. A 0.6 m thick layer of gold (Au) thin film is
evaporated and wet etched to form bridge as Shown
in Fig. 2(f).
7. All the sacrificial photo resist is etched by oxygen
plasma etching to free the metal bridge as Shown in
Fig. 2(g).

Si

(g)
Fig. 3. Fabrication process flow.

The Detailed dimensions of switch are in Table I.


TABLE I
Detailed dimensions

go
(m)

A
(m)

(m)

(m)

t
(m)

L
(m)

1.5

12040

10

184

0.6

508

III.

SIMULATION RESULTS
A. Electrostatic Performance
Simulations are done by using Coventor Ware software and
the 3D structure of RF MEMS Switch is shown in Fig. 4
Displacement Vs. voltage plot shown in Fig. 5. This shows
that the Pull-in voltage of proposed
fixed-fixed flexures
beam structure is 3 volts. Displacement of the membrane at
the desired pull in voltage is shown in Fig. 6.
Fig. 6 shows that at pull in voltage, the membrane and the
pull in CPW signal line create a parallel plate capacitor with
silicon nitride (Si3N4) as dielectric layer in between membrane
and CPW signal line. This referred as down state capacitance
(Cd). Since, in upstate of RF MEMS Switch the thickness of
dielectric is insignificant as compare to air gap, so the up state
capacitance is created by pull in membrane and CPW signal
line with air as a dielectric layer. This capacitance is referred
as up state capacitance (Cu).

SiO2

(a)

Au CPW
(b)

Si3N4 (Dielectric)
(c)

Fill-in layer
(d)

Sacrificial layer
(e)

Au (membrane)
(f)

International Conference on Advancements in Engineering Research

Fig. 4. Three dimensional model of RF MEMS Switch

23

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Insertion loss

HFSSDesign1

ANSOFT

0.00
-0.10
I n s e r ti o n L o s s ( d B )

-0.20
-0.30
-0.40

Curve Info

-0.50

dB(S(PORT_1,PORT_2))
Setup1 : Sweep

-0.60
-0.70
-0.80
-0.90
-1.00

0.00

5.00

10.00

15.00

20.00
Freq [GHz]

25.00

30.00

35.00

40.00

Fig. 7. Insertion Loss (UP State)

Fig. 5. Displacement Vs Voltage plot

Isolation

HFSSDesign1

0.00

ANSOFT

Curve Info
dB(S(PORT_2,PORT_1))
Setup1 : Sweep

Is o l a ti o n ( d B )

-10.00

-20.00
-30.00

-40.00

-50.00

0.00

5.00

10.00

15.00

20.00
25.00
Freq [GHz]

30.00

35.00

40.00

Fig. 6. Displacement Vs Voltage plot

Fig. 8. Isolation Loss (Down State)

B. RF Performance
As we know that S11 and S21 parameters of RF MEMS switch
are only calculated by Cu and Cd respectively. The
relationships in between S11 and Cu and in between S21 and Cd
are expressed as follows [6]-

IV.
CONCLUSION
Simulated results shows that very low actuation voltage of RF
MEMS switch by using fixed-fixed flexure beam structure is
achieved i.e. 3 volts, shown in Fig. 5. Simulated results also
shows excellent RF Characteristics i.e. very low insertion loss
-0.12dB at 28 GHZ shown in Fig. 7 and very high Isolation 43dB at 28 GHZ shown in Fig. 8.
.

2 Cu2 Z o2
S11
4
4
2
S 21 2 2 2
Cd Z o
2

(3)

REFERENCES
[1]

(4)
Simulation of insertion loss S12 and isolation S21 are done by
HFSS Software and the plots for S12 and S21 are shown in
Fig. 7 and Fig. 8 respectively.

[2]

[3]

[4]

International Conference on Advancements in Engineering Research


24

Reines I. C., Goldsmith C. L., Nordquist C. D., Dyck C. W., Kraus


G.M., Plut T. A., Finnegan P. S., Austin F. and Sullivan C. T. A
low loss RF MEMS Ku-band integrated switched filter bank [J].
IEEE Microwave & Wireless Components Letters, vol.15, No.2
(2005), pp.74-76.
Goldsmith C, Lin T H, Powers B. Micromechanical Membrane
Switches for Microwave Applications [C]. In: IEEE MTT-S Int.
Microwave Symp. Dig, 1995, pp. 91-96.
Anil Kumar Sahu and B K Sarkar A Novel Low Actuation
Voltage RF MEMS Shunt Capacitive Switch 978-1-4244-48197/091 2009 IEEE
C. L. Dai, H. J. Peng, M. C. Liu, C. C. Wu and L.J. Yang. Design
and Fabrication of RF MEMS Switch by the CMOS Process [J].

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

[5]

[6]

ISBN NO : 378 - 26 - 138420 - 8

Tamkang Journal of Science and Engineering, Vol. 8, No 3 (2005),


pp. 197- 202
D. Balaraman, S. K. Bhattacharya, F Ayazi, and J.
Papapolymerou, "Low Cost Low actuation Voltage Copper RF
MEMS Switches", lEEE MTT-s Digest 2002, IF-WE-20. Mar.
2006.
G. M. Rebeiz, RF MEMS Theory, Design and Technology, John
Wiley & Sons Inc., New Jersey, 2003.

International Conference on Advancements in Engineering Research


25

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Design and Analysis of Low-Leakage High-Speed


Domino Circuit for Wide Fan-In OR Gates.
M.Chennakeshavulu1, K.Subramanyam2
Associate Professor, ECE, RGMCET, JNTUA, Nandyal, A.P, India

1Onlinechenna@yahoo.com

M.Tech Student, ECE, RGMCET, JNTUA, Nandyal, A.P, India

2Subbuking987@gmail.com

Abstract--Domino CMOS logic circuit relations finds a


broad variety of applications in microprocessors, digital
signal processors, and dynamic memory owing to their
high speed and low device count. In this paper a new
domino circuit is studied, which has a lower leakage and
higher noise immunity, lacking dramatic speed
degradation for wide fan-in gates. The system which is
utilized in this paper is based on comparison of Power,
Propagation Delay, Energy, and Energy Delay
Propagation. The studied circuit technique decreases
the parasitic capacitance on the dynamic node, yielding
a smaller keeper for wide fan-in gates for the fast and
robust circuits. Thus, the disputation current and
consequently power consumption and delay are
reduced. The leakage current is also decreased by
exploiting the footer transistor in diode configuration,
which results in increased noise immunity. This the
studied technique is applying in 90nm, 130nm, and
180nm technology using TANNER tools.
Index Terms: Domino logic,leakage-tolerant, noise
immunity and wide fan-in.
Fig. 1. Standard Footless Domino circuit.

I.INTRODUCTION
CMOS gates are mostly designed using static logic
and dynamic logic. DYNAMIC logic such as domino

As a result, it is complex to get satisfactory robustness


performance tradeoffs. In this paper comparison-based
domino (CCD) circuits for wide fan-in applications in
ultra deep sub micrometer technologies are studied.
The originality of the studied circuits is concurrently
increases performance and decreases leakage power
consumption. In this paper we are studied High speed
Domino circuits for wide(4,8,16) FAN IN applications.
The most well-liked dynamic logic is the
conventional standard domino circuit as shown in Fig.
1. In this design, a pMOS keeper transistor is working to
stop any undesired discharging at the dynamic node
due to the leakage currents and charge distribution of
the pull-down network in the evaluation phase .Hence

logic is widely used in lots of applications to get high


performance, which cannot be get with static logic
styles [1].But, the major drawback of dynamic logic
families is that they are more sensitive to noise than
static logic families. When the technology scales down,
the supply voltage is reduced for low power, and the
threshold voltage (Vth) is also scaled down to reach
high performance. while reducing the threshold voltage
exponentially increases the subthreshold leakage
current, drop of leakage current and improving noise
immunity are of main concern in robust and highperformance designs in recent technology generations,
especially for wide fan-in dynamic gates [2], robustness
and performance significantly degrade with increasing
leakage current.

improving the robustness by using keeper


transistor. The keeper ratio K is defined as
K =

(1)

Where W and L denote the transistor size, and n and


p are the electron and hole mobilities.Even if the

1
International Conference on Advancements in Engineering Research
26

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

keeper upsizing improves noise immunity it increases


current contention between the keeper transistor and
the evaluation network. Thus, it increases power
consumption and evaluation delay of standard domino
circuits. These problems are graver in wide fan-in
dynamic gates due to the huge number of leaky nMOS
transistors connected to the dynamic node. Hence, there
is a tradeoff between robustness and performance, and
the number of pull-down legs is limited. The existing
techniques try to compromise one feature to gain at the
expense of the other.
Several circuit techniques are studied. These
circuit techniques can be divided into 2 categories.
In the 1st category, circuit techniques to
modify the controlling circuit of the gate voltage of the
keeper such as
1.Standrad Footless Domino(SFLD)[1],
2. Conditional-Keeper Domino (CKD)[3]
3. High-Speed Domino (HSD) [4],,
4. Leakage Current Replica (LCR) Keeper
Domino [5], &
5. Controlled Keeper by Current-Comparison
Domino (CKCCD) [6].
And the 2nd category, designs including the designs to
vary the circuit topology of the footer transistor in the
evaluation network such as
6. Diode Footed Domino (DFD) [2] and
7. Diode-Partitioned Domino (DPD)[7]
These 2 category techniques are explained in given
bellow.

larger keeper. The increase in size of delay element


improves noise immunity but power dissipation and
delay increases.
3. High-Speed Domino (HSD) :
Here delay is introduced in clock by using two inverters
as shown in Fig.3, in arrange to reduce the current
during the PMOS keeper at the initial of evaluation
phase which leads to reduce the power dissipation up to
some extent. This makes it probable to use physically
powerful keeper without performance degradation and
improve the noise margin. Other than the power and
area overhead of clock delay circuit remains. In precharge phase, when clock becomes LOW, transistor Mp1
turns ON and dynamic node is charged to logic HIGH
and in the start of evaluation phase, Mp2 still turns ON
which keeps the keeper transistor Mk to OFF condition.
After delay completion Mp2 turns OFF.

2. Conditional-Keeper Domino (CKD):


It is one of the standard versions of domino logic as
shown in Fig.2. Here 2 keeper transistors are used. At
the commencement of evaluation phase, the minor
keeper K2 charges the dynamic node in case if all the
inputs are LOW. Then after delay end, if dynamic node
still remains charged, the NAND gate turns the better
keeper transistor ON to stay the dynamic node HIGH for
the rest of evaluation phase. If the dynamic node has
discharged, the keeper transistors remain OFF.

Fig.3 High speed Domino (HSD)[3]

In connecting this, the inputs make the logic function


as well as in case if input(s) are logic HIGH then
provides discharge path for dynamic node and output
changes to logic HIGH and Mk is in OFF condition as a
logic high as (VDD-Vtn) voltage, where Vtn is NMOS
threshold voltage, is passed to Mk which does not turn
it into ON state. And if no input is HIGH then dynamic
node is not discharged and output is still LOW. So Mn1
turns ON and pass logic LOW to Mk which turns it ON
and dynamic node is kept at logic HIGH. In this way,
keeper transistor prevents charge leakage in High speed
domino logic. The difficulty with high speed domino
logic (HSD) is that a voltage of VDD - Vtn is accepted
through the NMOS transistor Mn1 which leads to a
small dc current through the keeper transistor and pulldown network and also large noise at input terminals of
PDN causes the dynamic node discharge because of no
footer transistor.
4. Leakage Current Replica (LCR) Keeper Dom
In LCR Keeper domino circuit the transistor size is
varied as shown in Fig.4, the mirror transistor M1 is set
to 7Lmin to reduce channel length modulation and
reduce variation of the threshold voltage. The width of
transistor M2 is same to the sum of the widths of the
nMOS transistors of the PDN. The width of the keeper
transistors of the gates, which are simulated using the
LCR keeper, are varied to get the desired delay.

Fig.2 Conditional Keeper Domino [3]

This circuit has a few drawbacks such as decreasing


delay of the inverters and the NAND gate has a few
restrictions. Robustness can be achieved by using the

2
International Conference on Advancements in Engineering Research
27

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

6. Diode Footed Domino (DFD):


Diode-footed domino [12] is reduced leakage current,
enhanced performance and better strength as shown in
fig.6 . In this circuit,M1 is the diode footer, which is in
sequence with the evaluation network. Leakage current
is reduced by M1 due to the stacking effect. Also M1
increases the switching threshold voltage of the gate
and there by improves noise immunity. The mirror
transistor and current feedback improve the robustness
of the circuit against sub-threshold leakage and input
noise in the deep submicron range.

Fig.4 Leakage Current Replica Domino [5]

5. Controlled Keeper by Current-Comparison


Domino (CKCCD):
The reference circuit [12] of the leakage current
consists of transistors M5, M6, M7 and M8. The
transistor M5 is off inactive mode and will be on in
standby mode to decrease standby power. The size of
the mirror transistor M3 is selected based on the
leakage of the pull down transistors. The mirror current
should be greater than the pull down leakage and minor
than the lowest PDN discharge, current with at least one
in put at the high logic level to make sure correct
operation. Since the reference circuit is a replica circuit
of the PDN, the reference current varied switch
temperature presently similar to the PDN leakage
current. Thus, the design is almost insensitive to
temperature variations.

Fig6. Diode Footed Domino[2]

7. Diode-Partitioned Domino (DPD):


In the DPD according to [7] each partition Consists of 4
legs to get the most excellent results as shown in fig.7.
All inverters and keepers of the partitions are set to
least size and the length of the major keeper transistor
MK . The desired delay is achieved by varying the size
of the precharge and keeper transistors.

Fig.5 Controlled Keeper by Current-Comparison Domino[6]


Fig.7 Diode-Partitioned Domino

3
International Conference on Advancements in Engineering Research
28

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

8.Wide FAN-IN or gate Current comparision comparision Domino:


This circuit is similar to a replica leakage circuit [7], in which a series diode-connection transistor M6 similar to M1 is
added. In fact, as shown in Fig.8,.The circuit has five extra transistors and a shared reference circuit compared to standard
footless domino (SFLD).

MEval are off. Also, the output voltage is raised to the


high level by the output inverter.
B. Evaluation Phase:
In this phase, clock voltage is in the high level [CLK =
1, CLK = 0 in Fig. 8] and input signals can be in the
low level. Therefore, transistors Mpre and MDis are off,
transistor M1, M2, Mk2, and MEval are on, and
transistor Mk1 can become on or off depending on input
voltages. Thus, two states may occur. First, all of the
input signals remain high. Second, at least one input
falls to the low level. In the first state, a little amount of
voltage is established across transistor M1 due to the
leakage current. Even if this leakage current is mirrored
by transistor M2, the keeper transistors of the second
stage (Mk1 and Mk2) compensate this mirrored leakage
current. It is obvious that upsizing the transistor M1 and
increasing the mirror ratio (M) increase the speed due
to higher mirrored current at the expense of noiseimmunity degradation. In the second state, when at
least one conduction path exists, the pull-up current
flow is raised and the voltage of node A is decreased to
nonzero voltage, which is equal to gate-source voltage
of the saturated transistor M1.

Fig 8.Wide FAN-IN or gate Current comparision


comparision Domino

The circuit can be well thought-out as two stages. The


first stage reevaluation network includes the PUN and
transistors MPre,MEval, and M1.The PUN.The second
stage looks like a footless domino with one input [node
A in fig5],without any charge sharing, one transistor M2
regardless of the Boolean function in the PUN,and a
controlled keeper consists of two transistors. Only one
pull-up transistor is connected to the dynamic node
instead of the n-transistor in the n-bit OR gate to
decrease capacitance on the dynamic node, yielding a
higher speed. The input signal of the second stage is
prepared by the first stage. In the evaluation phase,
thus, the dynamic power consumption consists of two
parts: one part for the first stage and the other for the
second stage.
A. Predischarge Phase:
Input signals and clock voltage are in high and low
levels, correspondingly, [CLK = 0, CLK = 1 in Fig.8] in
this phase. Then, the voltages of the dynamic node
(Dyn) and node A have fallen to the low level by
transistor MDis and raised to the high level by
transistor Mpre, in that order. Hence, transistors Mpre,
MDis, Mk1, and Mk2 are on and transistors M1, M2, and

9. SIMULATION RESULTS AND COMPARISONS


These circuits are simulated using TANNER Tools
TSPICE in the high-performance 180 nm, 130nm, and
90nm predictive technology. The supply voltage used in
the simulations is 2 V in the wide fan-in (4, 8, 16, input)

OR-gate,circuit.The simulated dynamic circuits results


of Power,Delay,Energy,Energy Delay Propagation as
shown in given tables

4
International Conference on Advancements in Engineering Research
29

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

TABLE-I
Comparisons of power, delay, energy, E.D.P of SFLD Wide FAN-IN Gates(4,8,16 in puts)

IN
PUTS
4 in

8 in
16in

180nm

130nm
Propaga
tion
Delay

Energy

E.D.P

3.5x
-4
10 w

31ns

10.8x
-13
10

3363.5
x10-22

3.43X
10-4w
3.52X
10-4w

31n

106x
10-13
109x
10-13

3296x
10-22
3382x
10-22

Averag
e

Power

31n

90nm
Propaga
tion
Delay

Energy

E.D.P

A.P

P.D

Ener
gy

E.D.P

4.7x
10-4w

31ns

145.7x
10-13

4516x
10-22

6x
10-4w

30n

36x
10-13

1080x
10-22

4.59x
10-4w
4.6x
10-4w

31n

142.2x
10-13
142.6x
10-13

4410x
10-22
4420x
10-22

6.38x
10-4w
6.69x
10-4w

30n

191x
10-13
207x
10-13

5742x
10-22
6429x
10-22

Averag
e

Power

31n

31n

TABLE-II
Comparisons of power, delay, energy, E.D.P of CKD Wide FAN-IN Gates (4, 8, 16 in puts)

IN
PUT

180nm
Average

4 in

8 in
16
in

Power

1.34X
10-4w
1.3X
10-3w
1.17X
10-3w

130nm
Propag
ation
Delay

Energy

31n

41.5x
10-13
39x
10-12
36.2x
10-12

30n
31n

E.D.P

Average

1287x
10-22
1170x
10-21
1124x
10-21

1.6x
10-3w
1.67x
10-3w
1.53x
10-3w

90nm

power

Propaga
tion
Delay

Energy

E.D.P

A.P

P.D

Energy

E.D.P

31n

49.6x
10-12
50.1x
10-12
47.4x
10-12

1537x
10-21
1503x
10-22
1470x
10-21

9.6x
10-3w
6.38x
10-4w
2.13x
10-3w

30n

288x
10-12
191x
10-13
63.9x
10-12

8640x
10-21
5742x
10-22
1917x
10-21

30n
31n

30n
30n

TABLE-III
Comparisons of power, delay, energy, E.D.P of HSD Wide FAN-IN Gates (4, 8, 16 in puts)

IN
PUT
4in

8in
16in

180nm

130nm

90nm

Average
Power

Propaga
tion
Delay

Energy

E.D.P

Average
power

Propaga
tion
Delay

Energy

E.D.P

A.P

P.D

Energy

E.D.P

3.6x
10-4w
3.59X
10-4w
3.65X
10-4w

31n

111.6x
10-13
111x
10-13
113x
10-13

3459x
10-22
3449x
10-22
3507x
10-22

4.65x
10-4w
4.69x
10-4w
4.73x
10-4w

31n

144x
10-13
145.3x
10-13
146.6x
10-13

4468x
10-22
4507x
10-22
4545x
10-22

6.5x
10-4w
6.5x
10-4w
6.77x
10-4w

30
n
30
n
30
n

195x
10-13
195x
10-13
203x
10-13

5850x
10-22
5850x
10-22
6093x
10-22

31n
31n

31n
31n

5
International Conference on Advancements in Engineering Research
30

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

TABLE-IV
Comparisons of power, delay, energy, E.D.P of LCR Keeper Wide FAN-IN Gates (4, 8, 16 in puts)

IN
PUT

180nm
Propaga
tion
Delay

Energy

3.51x
10-4w
3.52X
10-4w

31n

3.57X
10-4w

31n

Average
4 in

8 in

16 in

130nm

Power

31n

90nm
Propaga
tion
Delay

Energy

E.D.P

A.P

P.D

Energy

E.D.P

4.5x
10-4w
4.60x
10-4w

31n

4309x
10-22
4420x
10-22

6.37x
10-4w
6.37x
10-4w

30
n
30
n

191x
10-13
191x
10-13

5733x
10-22
5733x
10-22

4.64x
10-4w

31n

139x
10-13
142.6
x
10-13
143.8
x
10-13

4459x
10-22

6.62x
10-4w

31
n

205x
10-13

6361x
10-22

E.D.P

Average

108x
10-13
109x
10-13

3373x
10-22
3382x
10-22

110x
10-13

3430x
10-22

Power

31n

TABLE-V
Comparisons of power, delay, energy, E.D.P of CKCCD Wide FAN-IN Gates (4, 8, 16 in puts)

IN
PUT

180nm

130nm
Propag
ation
Delay

Energy

2.3x
10-4w

30n

8 in

2.41X
10-4w

16 in

2.46X
10-4w

Average

4 in

Power

90nm
Propaga
tion
Delay

Energy

E.D.P

A.P

P.D

Energy

E.D.P

3.2x
10-4w

31n

99.2x
10-13

3075x
10-22

6.06x
10-4w

30n

181x
10-13

5454x
10-22

2316x
10-22

3.19x
10-4w

31n

3065x
10-22

114x
10-13

3536x
10-22

3.2x
10-4w

31n

3065
x
10-22
3.7x
10-4w

31n

2364x
10-22

98.89
x
10-13
99.2x
10-13

31n

114x
10-13

3555x
10-22

E.D.P

Average

69x
10-13

2070x
10-22

31n

74.7x
10-13

31n

76.2x
10-13

power

3075x
10-22

TABLE-VI
Comparisons of power, delay, energy, E.D.P of DFD Wide FAN-IN Gates (4, 8, 16 in puts)

IN
PUT

180nm
Average

4 in

8 in
16 in

Power

3.54X
10-4w
3.67X
10-4w
3.71X
10-4w

130nm
Propag
ation
Delay

Energy

30n

106x
10-13
113x
10-13
115x
10-13

31n
31n

E.D.P

Average

3186x
10-22
3526x
10-22
3565x
10-22

4.71x
10-4w
4.79x
10-4w
4.86x
10-4w

power

90nm
Propaga
tion
Delay

Energy

E.D.P

A.P

P.D

Energy

E.D.P

30n

141.1x
10-13
148.4x
10-13
150.5x
10-13

4239x
10-22
4603x
10-22
4670x
10-22

6.07x
10-4w
5.84x
10-4w
6.02x
10-4w

30
n
30
n
30
n

182x
10-13
175x
10-13
180x
10-13

5463x
10-22
5256x
10-22
5400x
10-22

31n
31n

6
International Conference on Advancements in Engineering Research
31

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

TABLE-VII
Comparisons of power, delay, energy, E.D.P of DPD Wide FAN-IN Gates(4,8,16 in puts)

IN
PUT

180nm
Average

4 in

8 in
16 in

Power

3.70X
10-4w
3.67X
10-4w
3.66X
10-4w

130nm
Propag
ation
Delay

Energy

30n

111x
10-13
113x
10-13
113x
10-13

31n
31n

E.D.P

Average

3330x
10-22
3526x
10-22
3517x
10-22

6.12x
10-4w
4.79x
10-4w
6.42x
10-4w

90nm

power

Propaga
tion
Delay

Energy

E.D.P

A.P

P.D

Energy

E.D.P

30n

183.6x
10-13
148.4x
10-13
192.6x
10-13

5508x
10-22
4603x
10-22
5778x
10-22

6.16x
10-4w
5.84x
10-4w
6.0x
10-4w

30
n
30
n
30
n

184x
10-13
175x
10-13
180x
10-13

5544x
10-22
5256x
10-22
5400x
10-22

31n
30n

TABLE-VIII
Comparisons of power, delay, energy, E.D.P of CCD Wide FAN-IN Gates (4,8,16 in puts)

IN
PUT

180nm
Average

4 in

8 in
16 in

Power

1.07X
10-4w
8.34X
10-4w
0.92X
10-4w

130nm
Propag
ation
Delay

Energy

1.53
n
1.29
n
12n

1.63x
10-13
10.7x
10-13
132x
10-22

E.D.P

Average

2.50x
10-22
13.8x
10-22
132x
10-22

2.25x
10-4w
1.39x
10-4w
1.57x
10-4w

90nm

power

Propaga
tion
Delay

Energy

E.D.P

A.P

P.D

Energy

E.D.P

0.9n

20.25x
10-13
1.807x
10-13
1.86x
10-13

18.2x
10-22
2.34x
10-22
2.22x
10-22

4.19x
10-4w
2.3x
10-4w
2.5x
10-4w

0.3
n
0.1
n
83
n

1.25x
10-13
0.23x
10-13
207x
10-13

0.3771x
10-22
0.023x
10-22
1722x
10-22

1.3n
1.19
n

4
3
2
1
0

4 in
8 in
16 in
SFLD

CKD

HSD

LCR keeper

CKCCD

DFD

DPD

CCD

Fig.9. Comparison of power supply with same delay

10. CONCLUSION:
The leakage current of the evaluation network of
dynamic gates was considerably increased with
technology scaling, particularly in wide domino gates,
yielding reduced noise immunity and improved power
consumption. So, new designs were required to get
preferred noise robustness in wide fan-in circuits. Also,
rising the fan-in not only reduced the worst case delay.

The main aim is to make the domino circuits extra


robust and with low leakage without significant
performance degradation or increased power
consumption. This was done by comparing the
evaluation current of the gate with the leakage current.
Keeper size of very high fan-in gates. Using the highperformance 180 nm [3] at a power supply of 2 V, wide

7
International Conference on Advancements in Engineering Research
32

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

fan-in 4 to 16-bit OR gate circuit. The proposed design


plus several existing circuit designs were simulated and
compared, imulation results verified significant
progress in leakage reduction and satisfactory speed for
high-speed applications. moreover, they verified that.
Thus, the CCD was above all suitable for implementing
wide fan-in Boolean logic functions with high noise

immunity, lower area consumption, time delay, Energy,


Energy, Delay Propagation and power consumption.
Moreover, a normalized FOM, previously proposed by
the authors, was modified to include standard deviation
of delay.

REFERENCES:
[1] J. M. Rabaey, A. Chandrakasan, and B. Nicolic, Digital
Integrated Circuits: A Design Perspective, 2nd ed. Upper
Saddle River, NJ:Prentice-Hall, 2003.
[2] H. Mahmoodi and K. Roy, Diode-footed domino: A
leakage-tolerant high fan-in dynamic circuit design
style, IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 51, no.
3, pp. 495503, Mar. 2004.
[3] Sumit Sharma A Novell High-speed low-power
domino logic technique for static output in evaluation
phase for high frequency inputs IJERA march 2014..
[4] M. H. Anis, M. W. Allam, and M. I. Elmasry, Energyefficient noise-tolerant dynamic styles for scaled-down
CMOS and MTCMOS technologies, IEEE Trans. Very
Large Scale (VLSI) Syst., vol. 10, no. 2, pp. 7178, Apr.
2002.
[5] Y. Lih, N. Tzartzanis, and W. W. Walker, A leakage
current replica keeper for dynamic circuits, IEEE J.
Solid-State Circuits, vol. 42, no. 1,pp. 4855, Jan. 2007.
[6] A. Peiravi and M. Asyaei, Robust low leakage
controlled keeper by current-comparison domino for
wide fan-in gates, integration, VLSI J., vol. 45, no. 1, pp.
2232, 2012.
[7] H. Suzuki, C. H. Kim, and K. Roy, Fast tag
comparator using diode partitioned domino for 64-bit
microprocessors, IEEE Trans. Circuits Syst., vol. 54, no.
2, pp. 322328, Feb. 2007.
[8] K. Roy, S. Mukhopadhyay, and H. MahmoodiMeimand, Leakage current mechanisms and leakage
reduction techniques in deep sub micrometer CMOS
circuits, Proc. IEEE, vol. 91, no. 2, pp. 305327,Feb.
2003.
[9] N. Shanbhag, K. Soumyanath, and S. Martin, Reliable
low-power design in the presence of deep submicron
noise, in Proc. ISLPED, 2000, pp. 295302.
[10] M. Alioto, G. Palumbo, and M. Pennisi,
Understanding the effect of process variations on the
delay of static and domino logic, IEEE Trans. Very Large
Scale (VLSI) Syst., vol. 18, no. 5, pp. 697710, May 2010.
[11] H. Mostafa, M. Anis, and M. Elmasry, Novel timing
yield improvement circuits for high-performance lowpower wide fan-in dynamic OR gates, IEEE Trans.
Circuits Syst. I, Reg. Papers, vol. 58, no. 10, pp. 1785
1797, Aug. 2011.
[12] Ali Peiravi , Mohammad Asyaei CurrentComparison-Based Domino: New Low-Leakage HighSpeed Domino Circuit for Wide Fan-In Gates VOL. 21,
NO. 5, MAY 2013

M.CHENNAKESAVALU, He completed
B.Tech in 2003 at JNTUHyderabadand He completed
M.Tech in 2010 at JNTUAnantapur.He got lecturership
in UGCNET-2013.He has 10 years of teaching
experience. He is working as ASSOC.professor in Dept of
ECE, in RGMCET,Nandyal. He published Nearly12
papers in Various publication. His research areas are
low power VLSI design and interconnects in NOC.He has
professional memberships in MIETE. He guided 5
projects at master level.

K.SUBRAMANYAM received the B.E


degree in electronics and communications engineering
from the JNT University of Anantapur in 2008 to 2012.
He is currently pursuing the M.E. degree in digital
systems and computer electronics engineering from the
JNT University of Anantapur. His current research
interests include low-power, high-performance, and
robust circuit design for deep-sub micrometer CMOS
technologies.

8
International Conference on Advancements in Engineering Research
33

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Development of Sensing Device to Detect


Persons Hiding in a Car
1

Mohammed Sanaullah Shareef.M.Y, 2Mohammed Tharique.PM


Department of Electronics and Communication Engineering,
C.Abdul Hakeem College of Engineering and Technology
1
sanaullahshareef786@gmail.com, ,
1
+919944738419.

1,2,3

and places a heavywork load on border ofcers, resulting


in high costs in view ofthe thousands of vehicles that
cross the borders. Alternatives tothis manual method have
been considered, such as the X-rayequipment used to
check vehicles and their cargo [4] and theuse of a mobile
inspection robot [5]. However, these methodsrequire a
high initial cost as well as a large setup area. Moreover,
danger of using the X-ray method for nding illegal
immigrants is indicated because the illegal immigrants
would beexposed to X-ray [6]. A simpler method, which
uses microvibrations to detect a concealed person, has
been proposed [7].We also presented a similar method
that detects heartbeat signals by means of a piezoceramic
device set under the tire of avehicle [8]. These methods,
however, are sensitive not only tohuman micro vibrations
but also to external disturbances such asground vibration
and wind force acting on the vehicle.
This paper describes a novel pneumatic method that uses
silicon air tubes and a low-frequency condenser
microphone asa pressure sensor highly sensitive to the
heartbeat signals of aperson hiding in a vehicle but robust
against external disturbances such as ground vibration and
wind force.

AbstractThis paper describes a novel method for detecting


the presence of a person hiding in a car. One of the
important strategies of homeland security is border control.
In particular, strict and effective monitoring to control
illegal immigration is a key strategy for maintaining public
safety and a healthy local economy, and is essential for
preventing the entry of terrorists. Here, we focused on

developing a method to detect a person trying to


illegally cross the border by hiding in a car. The
proposed method is based on pneumatics. A silicon
tube (inner diameter 4 mm) with one end plugged by a
highly sensitive pressure sensor and the other end
capped is sandwiched between two rigid boards and
placed on the ground at the entrance gate of the
border. When one wheel of the car is on the board and
the engine is stopped, the pressure sensor can detect
human vital signs such as the heartbeat, which cannot
be concealed. Due to the high sensitivity of the
pressure sensor, consideration was given to the effect
of external disturbances such as ground vibration and
wind force acting on the car. Here, we propose a
heartbeat detection lter robust against disturbances
but sensitive to the heartbeat signal and an index to
discriminate between the presence and non-presence
of a person, and we present the experimental results
obtained using the proposed method under various
disturbance conditions.
Index TermsAutomobile, condensermicrophone,
security, silicon tube.

II. DESIGN OF SENSING DEVICE


A. Principle of the Sensing Device Using Silicon Tube
andCondenser Microphone
Fig. 1 shows the principle of the sensing device used to
measure themicro vibrations. The silicon tube is set
between exiblespacers on the base board. At one end of
the tube is the low-frequency condenser microphone used
as the pressure sensor, andthe other end of the tube is
capped. A cover board is placed ontop of the tube and
exible spacers. When one wheel of the caris on the board
and the engine is stopped, and if there is a personhiding
inside the car, the vibration from the persons
heartbeatwill be transmitted through the car chassis,
wheel, tire, coverboard, and nally to the silicon tubes and
spacers. Displacementcaused by the vibrating cover board
compresses the silicon tubesand spacers, which decreases
the crosssection area of the tubeand increases the air
pressure in the tube. The pressure sensordetects the
change in pressure. The pressure change is producednot
only by the heartbeat but also by the resonance
frequencycomponent of the car chassis fromthe dynamic
pressure of windacting against the car and the movement
of a person changingposition.

I. INTRODUCTION
ILLEGAL immigration from neighboring countries is a
serious problem from the viewpoint of homeland security
and crime prevention. In the United States, the number of
illegal immigrants exceeds 1,20,00,000 [1]. In bordering
countries, illegal immigration is frequently attempted via
ground vehicles such as cars and trucks in which one or
more persons are hidden under the seats, in the engine
compartment or in spaces carved out of the dashboard [2].
In one case, an officer of the Arizona State Border Control
found 13 people hiding in a van disguised as a transport
truck [3]. Accurate devices to quickly and easily nd
people hiding in vehicles are necessary to maintain strict
border control as well as make the legal immigration
procedure more effective.
Generally, a border officer checks the inside and/or
outside of a vehicle to determine if anyone is hiding there.
The inspectionis a visual search, which is time-consuming

International Conference on Advancements in Engineering Research


34

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

S[m2]surface upon which the force acts;


K[N/(m2)]spring constant of the silicon tube
ratio of specic heat;
Ththreshold for discriminating between
presenceand non-presence of person;
The total force acting on the surface of the tube is given
by

(1)

Fig. 1. Principle of the microvibration sensing


device using silicon tubes.

Fig. 3. Signal processing ow for extracting fh(t)


andfb(t)components.
As the change in the state of air in the tube is adiabatic,
the relationship between the pressurep(t) and the volume
v(t)is given by Poissons law as follows:
(2)
Total differentiation of (2) forp(t) is given by

Fig. 2. Mathematical model of air tube with


condenser microphone.

(3)
By lettingP(t)=P0,V(t)=V0,dv(t)=Sx(t),f(t)=Sdp(t)then (2)
can be rewritten as

B. Mathematical Model of the Silicon Tube and


CondenserMicrophone
We considered a mathematical model for the sensing
device depicted in Fig. 1, Fig. 2 shows a schematic model
of the device. The variables and constants for themodel
are dened as follows:
t[s]continuous time;
K discrete time by sampling interval ;
T[s]total measurement time;
Po[Pa]steady-state pressure in the tube;
p(t)[Pa]change in pressure
P(t)[Pa]pressure with change in pressure ;
V0[m3]air volume of the tube under steadystatepressure;
v(t)[m3] total air volume in the tube with
change involume
fh(t)[N] force acting on the tube due to human
heartbeat;
fb(t)[N] force acting on the tube due to body
movement;
fc(t)[N]force acting on the tube due to
resonancevibration of the car chassis;
n(t)[N]force acting on the tube due to random
noise
f(t)[N]total force acting on the tube;
x(t)[m]surface displacement due to total force
e(t)[V]output voltage from the pressure
sensor

International Conference on Advancements in Engineering Research

(4)
Equation (4) shows the characteristics of the air spring of
thesilicon tube. On the other hand, the silicon tube itself
has stiffness with spring constant K. Thus, from (3) or (4),
the changein pressure in the tube due to the total force is
given by
(5)
Thus, from (5) above, the coefficient
*
which
corresponds to thecross-sectional area that relates the
external force to the tubeand the internal pressure, is a
function of the contactingarea S. Thecoefficient increases
in proportion to S forthe range
,
whereas for the range
, it
decreases in proportion to S. Thesilicon tube is exible
and thus the spring constant K issmall, smaller than that
of the air spring. Then, the coefficientincreases in
proportion to S the contacting area . Thus, toobtain a
larger coefficient, we must make the contacting area S
wider and reduce the spring constant of the tube and
spacer. Torealize these conditions, the spacer must be as
soft
as
possibleto

35

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

make the contacting area wider; the tube is pressed not


onlyby the upper plate but also by the side spacer, as
shown in thefront view in Fig. 1.

sensor. Sensitivity is 10 mV/Pa withat-gain


characteristics for the frequency range of 0.1 Hz to 10kHz,
allowing the detection of heartbeat and body movement.

C. Signal Processing Flow


The pressure expressed in (5) is detected by the
condensermicrophone acting as a highly sensitive pressure
sensor. Outputvoltage e(t) from the sensor includes various
vibration forces asgiven by (1). Fig. 3 shows how to
extract the force components
fh(t)andfb(t), which are the vital signs of a person hiding
inthe car. The fundamental frequency of the adult human
heartbeat is around 0.7 to 3.0 Hz. However, the frequency
range alsocovers part of the mechanical vibration
component fc(t)of thechassis, which must be distinguished
from the heartbeat. Theheartbeat includes higher harmonic
components of up to severalhundred Hz.We monitored the
higher harmonic components of8 to 12 Hz with a relatively
high spectrumand less noise and discriminated the
components by means of a band pass lter. Thecomponent
is rectied and smoothed using a band pass lterwitha
cutoff frequency of 0.5 and 2.0 Hz, which yields a shift
backto the fundamental frequency range. The other vital
sign,fb(t) for body movement, is much greater than the
heartbeat and thuscan be directly detected. The output
voltage from the pressure sensor is an A-D converted with
the sampling time andexpressed by e(k) for the discrete
time .

Fig. 4.Sensing device for verication experiment.

D. Index for Judging Human Presence


Here, we dene the index for judging whether or not a
personis present in the car. In the ltering process in Fig.
3, the disturbance componentsfc(t) and n(t) are ltered out.
Thus, the standard deviation of the output signal becomes
greater whena person is present compared to when no one
is present. Thus,the simple standard deviation of can serve
as the index:

(6)
The presence of aperson is discriminated by comparing the
index with thethreshold .

Fig. 5. Experimental conditions for Case 1.


The cover board is made of polycarbonate with a thickness
of 5 mm.

III. VERIFICATION EXPERIMENT


A. Measurement System for Verication Experiment
Fig. 4 shows the sensing device used in the verication
experiments. Forty-eight rectangular shaped spacers with
dimensions 400*30*10 mm are set on the base board. The
spacersare made of a soft, sponge-type material. Six
silicon tubes, each
with a pressure sensor, are set among the spacers. The
tubescover the entire area of the board and are compressed
by verticaland horizontal forces, as shown in the front
view in Fig. 1. Sincesilicon tubes are softer and more
exible and durable than vinylchloride tubes, the spring
constant K of the tube and spaceris smaller and the
sensitivity becomes high. A low-frequencymicrophone
(MX-E4758) was selected as thehighly sensitive pressure
. As shown in Fig. 5, we placed a blower 1 m away from a
sedan-type car to blow air at different strengths: strong 132

International Conference on Advancements in Engineering Research

B. Measurement Procedures
In order to verify the validity of the sensing method, we
carried out the experiment for two cases using the sensing
device shown in Fig. 4. We let T=2.56s and t=10ms and
acquired data 40 times and calculated index F for each
experimental condition.
(Case 1) Verication experiment for robustness against
wind and vibration.
In practical case, this system might be used outdoors. In
that case, the chassis is shaken by thewind and itmight
cause a factor of the error for judgment. Hence, we veried
the robustness ofthe system against the wind

36

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

m3/min, medium 102 m3/min, weak 72 m3/min and none.


We compared how index F changed depending on whether
or not a person wasin the car.
(Case 2) Ability to detect a person in a camper with
varioushiding places.

Fig.

6.

Experimental conditions for Case 2.


Fig. 7.Heartbeat vibration from a person in the car
(no wind). (a) Output from the sensing
device. (b) Result of FFT.

As shown inFig. 6, we checked for the presence of


peoplein a camper,where there are various hiding places.
The sensing plate was set under the front left-side wheel.
One or two persons were hiding in the drivers seat and the
assistant drivers seat, rear cabin, or roof.With no one in
the vehicle, we measured the output signal when there
were no people around the car and when there were many
people in the vicinity of the car.

calculated is F=0.81.Fig. 8(a) for the wave whenno one is


in the car, shows a smaller signal level than that of Fig.
7(a). Furthermore, Fig. 8(b) has no conspicuous spectrum
as seen in Fig. 7(b) but a small spectrum extends over a
wide range. The value of index F=0.012 in this wave.
Index Fwhen a person was in the car is 25 times greater
than when no one was in the car.
Fig. 9 shows the histogram for index Funder four different
wind conditions when a person was in the car. Fig. 10
shows the histogram under the same wind conditions but
with no one in the car.

IV. RESULTS OF THE EXPERIMENT


A. Robustness Experiments in Case 1
Fig. 7 shows the output signal e(k) and its Fourier
transform by FFT when a person was in the car and there
was no wind. Fig. 8 shows the resultswhen no one was in
the car and there was no wind. Fig. 7(a) shows the periodic
wave with the same period as the heartbeat of the person.
Fig. 7(b) shows thefundamentaland higher components of
theheartbeat. For the signal in Fig. 7, the index

Fig. 8.Car vibration (no one in the car, no wind).


(a) Output from the sensing device.
(b) Result of FFT.

International Conference on Advancements in Engineering Research


37

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

camper is greater than that for the sedan. Fig. 11(b) shows
the histogram when a person is in the assistantdrivers seat.
The distribution range is almost the same as thatof Fig.
11(a), but the distribution uctuation range is narrower
than in the case of a person sitting in the drivers seat. This
is because the sensing device board is just under the
assistant drivers seat, where the person was sitting. Fig.
11(c) shows the results when two people are sitting in the
rear cabin.

Fig. 9. Histogram of index F when a person was in


the car.
In Fig. 9, when a person was in the car, despite the strength
of wind blowing, index F is distributed in the range from
0.20 to 0.40; whereas in Fig. 10 with no one in the car,
index F is distributed from 0.015 to 0.21. The frequency in
the histogram increases in medium wind of 102 m/min and
strong wind of 132 m /min due to the vibration caused by
the wind. These gures show the clear difference in the
histograms of the index F between the presence and the
absence of persons inthecar, despite the wind blowing at
different strengths. Therefore, we consider that this system
is robust over the wind and can be used outdoors.

Fig.
10. Histogram of index Fwhen no one was in
the car.
B. Results of Case 2
Fig. 11(a)(d) shows the histogram of the index when one
person or two persons are (a) in the drivers seat of the
camper,(b) in the assistant drivers seat, (c) in a seat in the
back cabin, and (d) on the roof. Fig. 11(e) is the histogram
of the index
when no one was in the car and no one was walking near
the car, and when many people were walking in the
vicinity of the car, as shown in the photo in Fig. 11(e). In
the histogram in Fig. 11(a), index F is distributed from
0.02 to 0.40, which are lower values compared to that of
the sedan-type car. This is because the distance between
the sensing device board and the seating position in the

International Conference on Advancements in Engineering Research

Fig.
11.Histogram of index for Case 2.
(a) Drivers seat. (b) Assistant drivers

seat. (c) Seat in rear cabin. (d) On the roof.


(e) No person in the car.

38

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

The histogramdistribution of the index ranges from 0.15


to 0.20, which is lowerthan that in Fig. 11(a) and (b). This
is due to the greater distance between the sensing device
and the seats in the rear cabin. Fig. 11(d) shows the results
when a person is on the roof. The distribution is similar
than that in Fig. 11(c), but more widely spread because
the roof is an unstable location resulting in frequent body
movements. Fig. 11(e) shows the results when no one was
in the car and there were either weak or strong disturbance
vibrations. The distribution is similar to that shown in Fig.
10 when no one was in the sedan-type car. The most
frequent distribution is concentrated around F=0.015.
From the histograms in Fig. 11(a)(e), index F decreases
in proportion to the distance between the persons position
and the sensing device board. This is because the signal
attenuates in proportion to the distance. However, when a
person is in the car, even a slight body movement
provides a greater value of index .Thus, the distribution is
more widely spread than when no one is in the car. Even
with the difference in histogram distribution due to the
different cars and hiding positions, there was still a clear
difference in distribution when people were in the car and
when no one was in the car. Index F can be used to
discriminate between the presence and nonpresence of
people in a car being inspected.

Fig.
12. Cumulative frequency distribution of
index F for Case 1 (presence) and Case 2
(non-presence).
In this system, we used heartbeat signal. Actually, there
are other bio-signals such as breath, but the frequency of
the heartbeat and those of breath are different. As shown
in Fig. 3, we extract only the band width of the heartbeat
frequency by signal processing for the index. In general,
humans cannot stop heartbeat consciously regardless of
the breathing status. Therefore, breathing and other biosignals whose frequencies are different from that of
heartbeat do not affect
the judgments of
thesystem.Furthermore, even if animals are hidden in the
vehicle, this system is capable of detecting their presences
if the forces of the heartbeats or the motions of the
animals are as strong as human heartbeats.
This system can detect if at least one person is hiding or
notin the vehicle. So the system does not detect how many
persons are hiding in the vehicle. In a real scene at border
security, border officers require the drivers and all fellow
passengers to get out of the vehicles. In this condition, if
the system nds at least one person hiding in the vehicle,
the vehicle and the parties including the drivers and all
fellow passengers should be investigated more strictly by
the border ofcers. Hence, we consider that role of this
system is not to nd how many persons are hiding in the
vehicles, but to nd out atleast one person hiding in the
vehicle.
Regarding detection time, the X-ray method requires
shortertime than this system, but [6] indicates the danger
of using the X-ray method for nding illegal immigrants
because of their exposure to X-ray. This system needs
more detection time than X-ray because the system
requires the drivers and all fellow passengers to get out of
the vehicles, but compared with the hands-on searching
by border ofcers, the system can reducethe detection
time without the dangers such as the exposure to
radiation.

V. DISCUSSIONS
From the histograms in Figs. 911, we considered how to
set a threshold Thfor judging the presence or non-presence
of a person hiding in the car. Fig. 12 shows the
cumulative frequency distribution of index F for Case 1
(presence) and Case2 (non-presence). Both the sedan-type
car and the camper show a similar tendency when no one
was in the car even under conditions of blowing wind and
external ground vibration. The distribution when a person
was in the sedan begins to increase fromF=0.12.Here, we
decided the threshold so that the cumulative frequency
distribution for non-presence would be over 90%. Then,
for the camper, the threshold valueTh=0.08,i.e., ifthere
might be people hiding in the vehicle, and forthe sedantype car Th=0.12, i.e., if F>0.12, there might be people
hiding. For both the sedan and camper, if index F is less
than 0.12, there is a 90% probability that no one is hiding
inthe vehicle. The results did not perfectly discriminate
between the presence and non-presence of a person due to
the disturbance from the dynamic pressure of wind and
ground vibration. If the inspection was conducted in a
closed area with less vibration, the judgment accuracy
would be improved. Nonetheless, by identifying the high
probability of a concealed person, a more detailed
inspection could be carried out and vice versa, which
would make the inspection procedure more efficient.

International Conference on Advancements in Engineering Research

VI. CONCLUSION
This paper describes a novel method for detecting the
presence of a person hiding in a car. This pneumatic
method uses silicon tubes and highly sensitive pressure
sensors to monitor the vibrations from human vital signs.
The employment of a low frequency condenser
microphone as the pressure sensor provides sufficient
sensitivity to detect the signals from human vital signs
transmitted to one of the wheels of the car. From the
ltered sensing signal, an index using the standard
deviation of the signal is presented to discriminate

39

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

between the presence and non-presence of a person in


the car. The validity of the proposed method was
examined using a sedan-type car and a camper. For both
vehicles, when no one was in the car, distribution of the
indexwas concentrated in the lowrange. For the sedan,
the index when a person was in the car was clearly
greater than that when no one was in the car. For the
camper with a concealed person, the signal level
decreased in proportion to the distance between the
position of the person and the sensor location.
Furthermore, the body movements of a concealed
person enhanced index.
REFERENCES
[1] M. Zargham, Obama to tackle immigration reform
this year: Report, REUTERS, Sep. 9, 2009. [Online].
Available:
http://www.reuters.com/article/GCABarackObama/idUSTRE5380MU20090409
[2] D. Williams, The immigrants stuffed into car seats
and under bonnets trying to get into Europe, Daily
Mail, Dec. 29, 2007. [Online]. Available:
http://www.dailymail.co.uk/news/article-504994/Theimmigrants-stuffed-car-seats-bonnets-tryingEurope.html
[3] T. Gaynor, U.S. border cops nab migrants in fake
beer truck, REUTERS, Nov. 25, 2008. [Online].
Available:
http://www.reuters.com/article/domesticNews/idUSTR
E4AO9RS20081125
[4] The border security buildup: True border security
requires reforming our broken immigration laws,
National Immigration Forum, 2010. [Online].
Available:
http://www.immigrationforum.org/images/uploads/2010
/Border_Security_Fact_Sheet.pdf
[5] Robotic ferret will detect hidden drugs and
weapons, Engineering and Physical Sciences Research
Council (U.K.) Jun. 12, 2009.
[6] J. Doyle and L. Sorrell, French ban X-ray scans for
illegal immigrants as radiation makes them too
dangerous, Mail Online, May 14, 2010. [Online].
Available:
http://www.dailymail.co.uk/news/article1278565/French-ban-X-ray-scans-illegal-immigrantsradiation-makes-dangerous.html
[7] W. Dress, T. Hickerson, and R. Pack, Enclosed
space detection system, in Proc. IEEE Security
Technol., 30th Annu. Int. Carnahan Conf. 24, Oct.
1996, pp. 2628.
[8] Y. Kurihara et al., Measurement of micro vibration
of car by piezoelectric ceramicsDetection of bioinformations in the car and application for security,
IEEJ Trans. EIS, vol. 130, no. 5, pp. 844851, 2010.

International Conference on Advancements in Engineering Research


40

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

EXPLODING SPACE TRAVEL


A fresh approach to space travel to achieve higher speeds
The energy imparted to one fragment will be
E= 1/2*m*v2
m= mass of the fragment
v=velocity of the fragment
If there are n equally sized particles, the energy is
multiplied by the number of particles
n*E = n*(1/2*m*v2 )
Since the energy is fixed, the velocity of the
fragment and hence the distance traveled by it can
also be determined.
About 75% of the energy of an explosion is
converted to heat or sound and only 25% of useful
energy can be used for generating the kinetic
energy.
An explosion can be controlled by controlling the
causes of explosion.
Factors or causes may be materials used for
creating the explosion, the atmosphere around the
explosion etc.

K.Rohith Sharma
Department of E&I
SRM University
Chennai,India.
rohithstriker@gmail.com
Abstract: Space travel is one of the fields in
which even the byproducts of the inventions made
are very much useful to the world. This concept
strives to approach space travel with a new
perspective that might be contradictory to the
conventional thinking process.
Index terms: physics of explosion,space, concept of
space explosions.

INTRODUCTION
Space travel,from ages has been one of mans
prime areas of interest. His quest to explore the
universe has begun but has not reached his targets
yet. Technology that he gets is limitless but he is
limited by his speed at which he cruises through
the heavenly bodies.The intention of this idea
proposed is to have a fresh look at space travel
which may be contradictory to the conventional
methods. This method may be the answer for
achieving high speeds as well as distances
traveled.

Control over an explosion is needed because :


a.To prevent damage or action that is not
necessary.
b.To control the amount of debris during the
explosion.
c.The debris control is a key feature to this
proposal.
The Munroe effect (classical definition: conical
space at the forward end of a blasting charge to
increase the explosive's effect and thereby save
powder) can be used to obtain shaped charge to
obtain a focused explosion on a fragment and
thereby transferring more energy to focused
fragment.

I.PHYSICS OF EXPLOSIONS
A.Explosion:
An explosion is a rapid increase in
volume and release of energy in an extreme
manner.All this energy released is equally
distributed into nature either by sound or heat or
imparting kinetic or potential energies to particles
associated with the explosion.
B.Energy:
when a bomb explodes, the energy is
distributed as follows
Total energy =heat energy+sound energy+ energy
imparted to the fragments associated with the
explosion.
The energy associated with the fragments is a
very small fraction when compared to the total
energy. This energy is in the form of kinetic
energy.

International Conference on Advancements in Engineering Research


41

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

1: Aerodynamic cover
2: Air-filled cavity
3: Conical liner
4: Detonator
5: Explosive
6: Piezo electric trigger

shuttle).

The above figure is a simulated graphical model


of Munroes model for shaped charged
The explosion preferred for this application is by
nuclear detonation as the energy is very high. Such
high values of energy are needed to provide
sufficient kinetic energies.

II.SPACE
Space is a perfect podium for the demonstration
the Newtons laws of gravitation.
First law:
A body continues to be in a state of rest or of
uniform motion until or unless compelled by an
external force.
Space has the minimum friction and hence a body
continues to move with uniform velocity in a
straight line when a force acts on it.
Second law:
The force exerted on the body is equal to the
product of mass and acceleration gained by the
body.
Third law:
Every action has an equal and opposite
reaction.

On earth or any planetary surface, the


newton's
law
cannot
be
perfectly
demonstrated because of various factors
mainly friction.
Friction occurs due to relative motion
between two objects and hence tends to bring
the relative speed between the objects to zero
On earth, atmosphere and land are the biggest
sources of friction for any moving object
In space, There is no land or atmosphere. It is
mostly vacuum
the only elements of friction in outer space
can be other heavenly objects irrespective of
sizes.
In space,if any object is applied with a force
then it will accelerate to a certain level as per
the Newtons second law which states that
F=m*a.
Now, after it has gained that acceleration,it
will move with a constant velocity forever in
a straight line until another force tries to
change it's course.
Hence no more fuel is required is outer space
in accelerating the object (in this case, a space

International Conference on Advancements in Engineering Research

42

III.CONCEPT OF SPACE EXPLOSION


The whole universe is believed to be formed
by the big bang theory which implies that a
big explosion created the universe.
The energies and thereby the velocities of
heavenly bodies were distributed during the
big bang.
The idea is to reinstall the same big bang
theory but on a smaller scale when compared
to itself.
A controlled explosion can produce not only
debris as per calculation but can also achieve
velocity of the focused part of explosion.
The Idea is simple. By focusing an explosion
in outer space, we can achieve better speeds
for space travel.
Consider an analogy of a hand grenade.
A certain time after the pin is removed from
the hand grenade, it explodes.
The above explosion is not focused.
A few modern grenades have focused
explosion (hollow charge) for maximum
damage.
An explosion that can be shaped by Munroes
effect and can be focused on a specific
fragment which can be a satellite or any space
travel vehicle.

Consider the explosion of a focused grenade.


Rather than considering the damage caused
by the focused fragment, consider the speed
achieved and distance traveled by it.
This can be calculated by using laws of
energy and kinematics.
The fragments from normal grenade can
travel as far as 200m from the site of
explosion with a damage range upto 6m..
Bigger the focused fragment, more will be the
energy gained by it and hence more will be
the acceleration gained and distance traveled
by it.
Consider a space shuttle as a focused part on
a huge grenade i.e. whose explosion is
focused on the space shuttle.

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Consider an explosion to occur in such a way


that proper protection is offered to the shape
shuttle.
The space shuttle along with its protection
gear is arranged as a single fragment.
Hence, the space shuttle fragment will get the
energy out of the explosion.
The source of explosion to be nuclear is
explained as follows:

As told earlier,
E=1/2*m*v2
Let m=1000kg
v= 50,000kmph (say)
Substituting the mand v values
E= 1/2*(103)*(5*104)2
=25/2* 1011
=12.5*1011 Joules
=1.25TJ (TeraJoules)
(1 Joule= 1 N*m2/s2)
(1TJ=1012J)

(2.5 percentage of 88TJ =2.2TJ)

Hence the required velocity is achieved.


Going by the analogy, a focused grenade is to
be built so that it can be exploded by a remote
control.
In our case, a space shuttle is the focused
fragment of the grenade.
The remote control here is a ground station.
The grenade is built entirely in space.

Similarly,
S.No.

Velocity to be attained
(x*10,000kmph)

1
2
3
4
5

6
7
8
9
10

After the explosion:


Enormous amounts of matter gets destroyed
Since all of this is in space, Newton's space
can be applied peacefully.
The unfocused fragment gets its part of
energy and departs from the grenade.
A part of the energy is focused on the focused
fragment and hence is delivered to it.
The energy as per the law will provide a
acceleration to the fragment with which it
will move in a predefined straight line.
Hence the path of shuttle is set.

Energy to be
supplied
(TJ)
1.8
2.25
3.2
4.05
5

The blast yield of the fat-guy nuclear bomb


(That destroyed Nagasaki during the world war-II )
is 88TJ.
From the figure (weapon energy distribution) it can
be seen how the energy is distributed.
Hence the yield energy is distributed into three
parts and energy more than the required (1.25TJ) is
obtained even if the energy usable is 2.5%.
This is for one fragment of the explosion. For n
fragments the total usable energy gets distributed.
The energy used by the remaining fragments =
total energy - energy imparted to the focused
fragment.

Problems faced with this method and possible


solutions:
1.Material:
A. The material to make,not the bomb, but to
construct the shaped charge model can be collected
from the space debris.
B. If space debris is not a viable options,the
resources from the heavenly bodies can be utilized.
2.Survival of the temperatures:
A. Bigger shell which will act as a protective
measure to the space vehicle.
B. Starlite. The product of plastic that can
survive upto 10000 degrees centigrade. Coating
the space vehicle with multiple layers of starlite
should suffice the need.
3.Secure location for the explosion:
A. There are lot of empty spaces between

International Conference on Advancements in Engineering Research


43

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

planets. Detonating a nuclear bomb in these spaces


will do either no damage or no considerable
amount of damage to the planets or other
celestial bodies.
Advantages :
1.Since this entire explosion takes place in
space, minimal damage is done to the planet.
2.Velocities that are greater than that achieved
by the existing propulsion systems can be attained.
3.More number of shuttles can be sent for
space exploration at a single go.
4.The above can be done by increasing the
number of focused parts. (setting up a pipeline
from the source of energy and the shuttle(s))
5.Can be used to travel farther distances in
space.

Acknowledgment:
I would like to thank my University for supporting
me to undertake this project. I would also like to
express my gratitude to my department faculty for
their undenying support when ever asked for.

References :
1.https://www.llnl.gov/str/pdfs/06_98.3.pdf
2. Kissane, Karen (2009-05-22). "Fire power equalled 1500
atomic bombs". The Age (Melbourne).
3. Maurice on Tomorrow's World". YouTube. March 29, 2009
4.George, Rose (Apr 15, 2009). "Starlite, the nuclear
blast-defying plastic that could change the world". The Daily
Telegraph (London). Retrieved June 11, 2011
5.Stull (1977). Fundamentals of fire and explosion
6.wikipedia

International Conference on Advancements in Engineering Research


44

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

GPS TRACKING SYSTEM WITH LICENSE DETECTOR AND


SPEED CONTROL
1.

P.NAVEEN HONEST RAJ

2.

V.VIGNESH

ELECTRICAL AND ELECTRONICS ENGINEERING


KCG COLLEGE OF TECHNOLOGY
CHENNAI
EMAIL : kaushik19011995@gmail.com

ABSTRACT:

INTRODUCTION:
Nowadays transport plays a very
important role in our day to day life.
In transportation, roadways play a
very important role. The vehicles of
private organisation and institution
hold a very important place in the
roadways transportation. The
government points to statistics that
underscore the safety of school
buses, which transport 23 million
children a day. According to the
NHTSA, about 800 school-aged
children are killed in motor vehicle
accidents during normal school
travel hours each year. Only about
20 of those deaths are school-bus
related an average of five school
bus passengers and 15 pedestrians,
often students hit inadvertently by
the school bus, according to the
NHTSA statistics. And also
approximately 17,000 children are
treated in emergency rooms

In this paper we have discussed to


develop a speed controller, license
detector and also a GPS tracking
system in vehicles of any private
transport or institution.
So in this we have used a RFID
reader, a GPS device and a GSM.
We have also discussed about each
devices working in detail and its
advantages.

International Conference on Advancements in Engineering Research


45

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

annually, having been injured in


school buses, with 42 percent of
those injuries involving crashes. So
to make the travel safer and secure
and easier we can fix this device.
COMPONENTS:
The components used in this device
are RFID, GPS and GSM.
1. Radio Frequency
Identification (RFID).
2. Global positioning System
(GPS).
3. Global System for Mobile
communication (GSM).

An Electronic Product Code (EPC)


is one common type of data stored in
a tag. When written into the tag by
an RFID printer, the tag contains a
96-bit string of data. The first eight
bits are a header which identifies the
version of the protocol. The next 28
bits identify the organization that
manages the data for this tag; the
organization number is assigned by
the EPC Global consortium. The
next 24 bits are an object class,
identifying the kind of product; the
last 36 bits are a unique serial
number for a particular tag. These
last two fields are set by the
organization that issued the tag.
Rather like a URL, the total
electronic product code number can
be used as a key into a global
database to uniquely identify a
particular product.

RFID:
The RFID works with the help of
radio waves. The abbreviation RFID
stands for Radio Frequency
Identification. This can be used in
our device to detect license. This
also acts as a key. Only after
detecting the license the driver can
start the vehicle. It can also be used
for security purpose. We can store
some license IDs in RFID so that;
the persons with those licenses can
only start the vehicle. If the person
with wrong unidentified ID tries to
operate the vehicle it will not start. If
he tries more than three times there
will be a buzzer. The image of a
sample RFID tag.

International Conference on Advancements in Engineering Research


46

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

The RFID reader will check the


numbers in each tag. It compares
with the registered numbers by the
owner or organisation. If it matches
only, the driver can start the bus.

At present we have speed limits for


each region. Like we have speed
limit of 60kmpr in city and 80kmpr
in highways. The speed limit varies
according to the area. It is difficult
know the changing speed limit while
driving. So in this we are going to
use GPS to find the area in which
the bus is travelling.

GPS SPEED SENSOR:


The Global Positioning System
(GPS) is a satellite-based navigation
system made up of a network of 24
satellites placed into orbit by the
U.S. Department Defence. GPS was
originally intended for military
applications, but in the 1980s, the
government made the system
available for civilian use. GPS
works in any of weather conditions,
anywhere in the world, 24 hours a
day. There are no subscription fees
or setup charges to use GPS.

The GPS device is used to locate the


exact position of the vehicle with the
help of latitude and longitude. The
latitude and the longitude are
received from the GPS in the form
of (4.4). We have to program the
controller in such a way that if the
vehicle crosses particular latitude or
longitude then the limit should
change. A set of latitude and
longitude represent only a point like
a graph. When we draw a imaginary
line across a road which acts as a
boundary for changing speed limit,
either the latitude or longitude will
the same for all the points drawn on
that line. So we can use that as the
condition for switching the speed
limit. Two LEDs can be used to
represent the city and highway limit.
If the driver crosses the speed limit
there will be buzzer until the driver
slows down the speed below the
limit. If then also he increases the
speed, the GSM will send a message
to the register that can be kept in the

GPS satellites transmit two low


power radio signals, designated L1
and L2. Civilian GPS uses the L1
frequency of 1575.42 MHz in the
UHF band. The signals travel by line
of sight, meaning they will pass
through clouds, glass and plastic but
will not go through most solid
objects such as buildings and
mountains.

International Conference on Advancements in Engineering Research


47

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

organisation or institution. The


register will register it and the
management can action against the
driver and warn him.

the bus. So that the respective driver


can be warned or fined by the
institution or organisation.
GSM:
GSM, which stands for Global
System for Mobile communication,
reigns as the worlds most widely
used cell phone technology. It is
approximated that 80 percent of the
world uses GSM technology when
placing wireless calls, according to
the GSM Association (GSMA),
which represents the interest of the
worldwide mobile communication
industry. This amounts to nearly 3
billion global people.

The above picture is the map of


shollingnallur junction which is
outer to Chennai. The highways start
from this junction. A set of latitude
and longitude present only a single
point. So we have considered the
black line drawn in the map as a
boundary separating city and
highway. In that line any one,
latitude or longitude remains same.
In the above map longitude remains
constant. So we can program in such
a way that if the vehicle crosses the
longitude (e.g.: 8013.9282) then the
speed limit will change from city to
highways.

For practical and everyday purposes,


GSM offers users wider
international roaming capabilities
than other U.S. network
technologies and can enable a cell
phone to be a world phone. More
advanced GSM incorporates the
earlier TDMA standard.
In this we use the GSM device used
to send SMS. The private transport
or institution pickup the passengers
of the bus at the boarding point at a
particular time. The GSM will send
the report of the bus to the
passengers via SMS. When the
vehicle starts it will send SMS to the
phone numbers which had been
already stored. And also when the

If the driver crosses the speed limit


there will be buzzer. If he further
increases the speed it will be
registered through GSM. The details
about the driver are received from
the license detected while starting

International Conference on Advancements in Engineering Research


48

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

vehicle comes nearer to a boarding


point it will send SMS to those
persons in that boarding point that
the the bus will arrive shortly.
This helps the passengers to get the
bus on time and to know the location
of the bus.

Therefore this project will provide a


secure and safety road travel for all
people. This will also make people
to follow traffic rules.
REFERENCE:
1.http://cellphones.about.com/od/ph
oneglossary/g/gsm.htm

DISADVANTAGE:

2. http://abcnews.go.com/blog

The can be used for single route


only. As there will be change in the
latitude and longitude we can use the
device for a particular route. We
have to program it each time to work
in different routes.

3. http://www8.garmin.com/

CONCLUSION:

International Conference on Advancements in Engineering Research


49

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

International Conference on Advancements in Engineering Research

ISBN NO : 378 - 26 - 138420 - 8

50

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

GREEN BUILDING

SUBMITTED BY
R.LOGARAJA,
K.SURESHKANNAN
B.E.CIVIL ENGINEERING FINAL YEAR,
NPRCET.NATHAM
DINDIGUL.DT
TAMILNADU
EMAIL ID:logaraja.npr@gmail.com

ABSTRACT: Adoption of Green Building Technology has become mandatory for ensuring
sustainable development. However, its wide acceptance would require critical examination of
various aspects like energy conservation, cost, strength and durability. Use of modern
electronic controls and smart devices can enhance the functionality and performance of green

1
International Conference on Advancements in Engineering Research
51

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

building. Architects should get equipped with technical know-how for planning and
designing intelligent green buildings to meet the future needs.

INTRODUCTION
Green building (also known as green construction or sustainable building) expands
and complements the building design concerns of economy, utility, durability, and
comfort
A Green Building is one which uses less water, optimizes energy efficiency,
conserves natural resources, generates less waste and provides healthier space for
occupants as compared to conventional buildings.
OBJECTIVES OF GREEN BUILDING

Green Buildings are designed to reduce the overall impact on human health and the
natural environment by the following ways.
Using energy, water and other resources efficiently. By reducing waste, pollution, and
environmental degradation.

FUNDAMENTAL PRINCIPLES
Structure design efficiency
Energy efficiency
Water efficiency
Materials efficiency
Waste and toxic reduction

Need of Green Concept:


Increasing urbanization has given a boost to building industry and number of
bungalows, building complexes and multi storied buildings are being designed by architects
and engineers with innovative concepts and enhanced features. However, it is observed that
in many cases, environmental aspects are ignored leading to uncomfortable habitat and
increased maintenance and energy requirements. Green building concept needs to be realized
by all concerned with building activity and studied in detail by designers and planners for
better built environment. Green or eco-friendly building is often considered as the luxury of
wealthy people which is not correct. In fact, it is the necessity of common middle class man
who cannot afford to provide air conditioning or pay exorbitant electricity bills.

Critical Appraisal of Green Technology:

2
International Conference on Advancements in Engineering Research
52

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Green Technology is mandatory for ensuring sustainable development. However, in


spite of all out awareness campaigns and promotional efforts, the adoption of this technology
has remained marginal and restricted to environmentally conscious or wealthy people with
main motive of value addition rather than economy and energy conservation. In case of
building industry, the green tagging of building enhances the value and supersedes other nongreen competitors in attracting customers. The cost aspect of green building and loss of other
functional requirements like security and durability are often concealed by green builders
leading to a failure in convincing common man to adopt green building design.
The main functions of the building are, to give shelter from environmental factors like Suns
heat, rain, wind and extreme vagaries of nature like flood and hurricanes.
Provide security to life and property.
Provide privacy.

Durability and Strength.


Aesthetic beauty
Comfortable living
Civil engineering considers strength, durability and cost as the main criteria while selecting
materials, planning and construction. Architecture gives more stress on aesthetics and
comfort and pays attention to fulfilling psychological needs of occupants. Green building
techniques seek to conserve and utilize natural resources, emphasize eco-friendly
construction and think of minimum carbon footprint on global scale.

Integration of IT and Green Technology:


Green building is need of tomorrows future and old methods of construction and use
of natural materials though more eco-friendly cannot provide for the needs of tomorrow like
space economy, security, modern gadgets and amenities and flexibility in energy
management. Fortunately advances in IT and automation controls can make the green
building intelligent providing security, energy conservation and weather responsive
automated operations. Use of solar energy, LED lighting, Rainwater harvesting, preservation
of indoor air quality and thermal comfort zone and waste minimization can be made highly
effective and economical through sensor based controls and appliances.

Panorama of smart home appliances:


Numerous smart control devices are available in market which can be deployed easily
for ensuring security, comfort and for energy and water conservation. Restricted access

3
International Conference on Advancements in Engineering Research
53

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

control, intruder alarm, dimmer light controls, Bluetooth, WI-Fi and/or net enabled smart
devices, smoke detector, sensor based plumbing fixtures, automatic controls for opening and
closing of Venetian shutters or blinds etc. Siemens, Tata Honeywell and ABB are some of the
worlds largest producers of such controllers. Coupled with it, there are varieties of
innovative products like wind powered fans, waterless urinals, dual flush latrines, Light
tubes, LED lighting systems which can help in achieving green objectives.

Intelligent Green Buildings of Tomorrow:


Energy, buildings, and the environment are interlinked in a symbiotic relationship,
and the results of this interaction can be optimized for maximum gains by convergence of
Green and Intelligent building concepts. An intelligent building is one in which the building
fabric, space, services and information systems can respond in an efficient manner to the
initial and changing demands of the owner, the occupier and be in harmony with the
environment. Intelligent buildings not only have energy efficiency but also have safety and
telecommunications systems and other required automations propelled by innovations.

Design of Intelligent Green Building:


The ability to perform accurate whole building energy, water, and carbon emission
analysis early during the design phase is essential for green building design. Simulating a
building's energy use is a hard problem, requiring not only a model of the building and the
materials that make it up but also a model of the building's location, with the path of the sun
through the year and weather data that is accurate and detailed, including humidity, wind,
simple daytime-nighttime temperatures, and a host of other location specific parameters.
There are many modeling and simulation tools for design of green building Simplified Whole
Building Energy simulation tools include: ASEAM, Carrier HAP, Energy-10 and TRACE
600. Detailed simulation tools include: BLAST, DOE-2, and ESP-r. Lighting and Day
lighting Simulation - ADELINE, RADIANCE, SUPERLITE

Solar System Simulation - TRNSYS


Ecotect is a whole-building simulator that combines an interactive building design
interface and 3D modeler with a wide range of environmental analysis tools for a detailed
assessment of solar, thermal, lighting, shadows & shading design, energy & building
regulations, acoustics, air flow, and cost & resource performance of buildings at any scale. It
can be used as plug-in in AutoCAD.
A computable Revit design model is a great fit for the analyses needed for
sustainable design even during schematic design. As soon as the layout of a building's
walls, windows, roofs, floors, and interior are established, a Revit model can do whole
building analyses.
Green Building Studio Web service meets ASHRAE Standard 140 and is certified by
the U.S. Department of Energy. Built specifically for architects and using gbXML for data

4
International Conference on Advancements in Engineering Research
54

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

exchange across the Internet, the GBSWeb service can be used for building designs and
sophisticated energy analysis.
Selection of a simulation program should consider the project requirements, time and
cost, availability of computer system and experience of the user. Once the building completed
and people use it, it should be monitored for the actual performance.

Role of Green Architects:


The architects should learn the basic concepts of green and eco-friendly building and
make appropriate changes in methods and materials they are using for the building design. In
order to achieve desired green rating, they should use modeling and simulation tools after
necessary customization to suit clients specific requirements and site constraints.
One Earth can be counted as among the largest green building projects in India.
LEED certified it as PLATINUM and it is built on an area of 10.13acres. Several accolades
continue to shower upon Suzlons global headquarter in Pune One Earth.SUZLON
ENERGY LIMITED,PUNE:
This green building ensures optimal use of natural light and minimal wastage of
electricity or energy consumption. First airport in Asia to be certified with SILVER rating.
Indias first Greenfield airport is undeniably among the top 10 green buildings in India.
RAJIV GANDHI INTERNATIONAL AIRPORTHYDERABAD:
Its smart lighting, heat recovery wheel and high efficiency chillers make this office stand out
from the rest. GOLD rated building by LEED. NOKIA-GURGAON:

Role of Dnyandeep:
Dnyandeep Education & Research Foundation has launched a website www.envis.org
to act as an effective medium for creating awareness about environmental protection and for
popularization of green building/green city concept. The website includes all technical papers
presented in the earlier workshops and seminars on this topic. It is proposed to have
networking of architects and builders for information exchange and transfer of technical
know-how. The foundation is planning to provide all necessary guidance and training to
architect members with the help of experts in Green Building Design, IT, Instrumentation and
Control though this website. Let us hope that with active participation from all concerned we
will be able to usher a new era of intelligent green buildings affordable to all in future.

DIFFERENT FROM OTHER BUILDINGS


The design, maintaince and construction of buildings have tremendous effect on our
environment and natural resources.

5
International Conference on Advancements in Engineering Research
55

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Green Building is different from the other buildings because it use a minimum
amount of nonrenewable energy, produce minimal pollution, increases the comfort,
health and safety of the people who work in them.
It also minimizes the waste in construction by recovering materials and reusing or
recycling them.

AFFECT ON NATURAL RESOURCES


According to surveys conducted in 2006, 107.3 million acres of total land area is
developed, which represents an increase of 24 percent land covering green buildings
over the past 3 years.
In terms of energy, buildings accounted for 39.4 percent of total energy consumption
and 67.9 percent of total electricity consumption.
Reduce operating costs Create, expand, and shape markets for green product and
services Improve occupant productivity.

GREEN BUILDING PROJECT IN INDIA


Suzlon Energy Limited-Pune
Biodiversity Conservation India-Bangalore Olympia Technology Park-Chennai
ITC Green Centre-Gurgaon
The Druk White Lotus School-Ladakh
Doon School-Dehradun
Raintree Hotels-Chennai
Nokia-Gurgaon
Rajiv Gandhi International Airport-Hyderabad
Hiranandini-BG House, Powai
ABN Amro Bank, Chennai
Palais Royale at Worli, Mumbai
Punjab Forest Complex,Mohali

CONCLUSION

6
International Conference on Advancements in Engineering Research
56

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

This research identified the exciting developments taking place on the technology
front and analyzes their implications for intelligent and green buildings, highlighting
examples of best in class buildings employing green and intelligent technologies. These
buildings are dynamic environments that respond to their occupants changing needs and
lifestyles. This research provided documented evidence to educate and influence end-users,
building owners, architects, and contractors that a greener building can be achieved using
intelligent technology and that this greening will provide a tangible and significant return
on investment.

7
International Conference on Advancements in Engineering Research
57

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

This calls in the need to apply engineering principles in the


bio-medical field. Computer aided diagnosis (CAD) systems
are automated systems which are capable of identifying the
tumor cells from the mammograms without the intervention
of radiologists or oncologists. [6] The mammograms are
analyzed for the presence of malignant masses, thickening of
the tissue and deposits of calcium known as microcalcification.[7] The masses often occur in dense areas of the
breast and have different shapes and spotted by the bright
spots in the mammograms. The micro-calcification is
generally identified in the classifier stage as either benign or
malignant. Malignant micro- calcification generally has a
diameter of less than 0.5 mm and is fine and stellar
structured.

EARLY DETECTION OF BREAST CANCER


USING CAD SYSTEM EMPLOYING SVM
CLASSIFIER
Authors
S.DURGALAKSHMI ;nan_naned@yahoo.co.in,
SHREYA REDDY ;shreyareddy.7676@gmail.com,
Fourth year
Panimalar Institute of Technology

ii.

DETECTION USING CAD SYSTEM:

ABSTRACT:
Mammography is a low radiation process used to detect
breast cancer. It is of two types screening mammography
and diagnostic mammography. Screening mammography is
the procedure used to detect cancer in asymptotic population
while diagnostic is used to analyze the patients with abnormal
conditions. Usually diagnostic is used as a follow up to the
screening method in abnormal patients. Interpretation of the
mammography can be difficult due to the poor contrast and
less difference between a healthy and abnormal breast. Due
to which high rate of false positives and false negatives are
seen owing to some women undergoing surgery
unnecessarily. To increase the efficiency and accuracy, image
analysis and classification are done with the help of a CAD
system.[8][9]

Breast cancer is the most common cancer pathology detected


in women. It is the second leading cause for morbidity and
high mortality rates. The cause of the cancer is still unknown
thus early detection of it is very important. This paves way to
the need for early detection systems for breast cancer.
Currently the most prevalent system of detection is
mammogram. But often detection from the mammogram is
not accurate which calls for a second opinion which is a
costly affair. This paper presents a computer aided diagnosis
system for early detection of the cancerous tissue. It employs
an efficient image enhancement system using and
classification using the support vector machine.
KEYWORDS: mammogram, microcalcification,
CADsystem, breast cancer.
i.

The CAD process mainly uses 3 distinct phases which are the
(1) image processing, (2) sedimentation and (3) classification.
The first step is where the mammogram is processed and the
contrast and quality of the image is enhanced for easy
identification. In the second step, the separation of the
suspicious cells from the background parenchyma is done.
While in the third step the classification of the cells as either
benign or malignant is done.

INTRODUCTION:

Breast cancer is the abnormal growth of cancerous cells in


the mammary glands of the woman. It is reported that 1 in 12
woman are affected with breast cancer. The symptoms of
which are formation of lumps, lesions, or abnormal skin
texture or areolar swelling and change in size of the
breasts.[1]The detection of these is often difficult as the
density and shape of the breasts change from woman to
women. This is done with the help of screening using a low
radiation this technique is known as mammography. [2] Most
common diagnosis of the cancerous growth is the biopsy,
which is an invasive procedure by which a piece of tissue or a
sample of cells is removed from your body so that it can be
analyzed. [3]The drawback of such an approach is a high
number of non-productive biopsy examinations with high
economic costs. Statistics show that only 15-34% of breast
biopsies are proved cancerous and that 10-30% of all cases of
breast cancer goes undetected by mammography.[4] [5]

iii. IMAGE PROCESSING:


The image processing phase is further split into steps as
shown in the figure 1. [10][11]

Figure 1.Image processing phases.


The original mammogram is taken as the input image to the
CAD system in which it is passed through the Gaussian

International Conference on Advancements in Engineering Research


58

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

soothing filter. The filter smoothens the image by removing


noise and is used to blur the image to obtain a smooth gray
scale.[12] In the contrast stretching step, which is also
known as the full scale histogram stretching, the image is
stretched over the entire gray scale area. A well distributed is
one which has a good visibility and high contrast. [13] Then
the top hat operation is performed on it. It is a morphological
method using mathematical operations. It divides the image
into two sets the object and the structuring elements. The
top hat performs the difference of the original image and its
opening points which are the collection of the foreground
points. This highlights the bright spots in the image.[14]The
DWT reconstructs the decomposed image back. Thus a
reconstructed image is available at the end of the image
processing by the CAD.

iv. SEGMENTATION:

Figure 5.Process from segmentation to classification


In the segmentation phase in the CAD, the suspect cells are
split from the background image using global and local
thresholding as micro-calcification look brighter than the
surrounding. In global thresholding is a technique in which
the histogram reveals peaks corresponding to the background
and the object. In the case of micro-calcification extra peeks
are raised. Local thresholding is used to refine results
obtained in the previous stage as the pixels need to have an
enhanced intensity values.
This is followed by feature extraction where the
abnormalities are detected and extracted. The selection
process in the CAD involves an optimum set of features from
those available in the image after segmentation. The feature
space can be divided into subspace based on intensity and
texture. The scale space method is used to extract the
abnormalities; it is based on Laplacian scale-space
representation.[15] The possible micro-calcification are
identified by local maxima on a range of scales in the filtered
image. For finding the size, contrast, the response is used.
The finding is demarcated as a micro-calcification if the
contrast exceeds a predefined threshold value.

Figure 2.a)original b)filtered image

v. SUPPORT VECTOR CLASSIFIER:


Support vector machine is a learning model with algorithm
for analyzing data and recognizing patterns in them. It
classifies the inputs given to it based on the pattern
recognized. It is based on a decision plane model. [16]

Figure 3.a)original b)enhanced image

The SVM divides the inputs into two classes and builds a
model which assigns the value to either one of the classes. It
is a mapping of the values as points in space such that they
can be divided into two distinct set by a wide margin between
them. They points are identified to belong to a category based
on which side they fall on. The SVM intakes a test set data
which its interprets and a data set which it categories.[17]
The SVM does linear classification using hyper planes while
non-linear cluster classification using kernel functions.
(1)LINEAR METHOD:
Figure 4 a) reconstructed mammogram b) segmented output

International Conference on Advancements in Engineering Research


59

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

In the linear method, the inputs are clearly spread out in a


linear manner and thus finding a plane that separates them
properly is the only concern.

Figure 8.thehyperplane

The margin on one side is 1 / |w|, thus the total margin is


2*(1/|w|). Thus minimizing this |w| values will increase the
separability.

Figure 6.a hyper plane dividing two data sets


The decision plane separates the assets of different classes.
For proper classification, the margin of the decision plane
from the class objects must be greater. This would allow a
better categorizing of the samples.

The width can be increased by the use of Lagrange


multipliers. Using karush-kush-tucker conditions,

The best hyper plane is thus one with maximum margin from
both the classes.

Applying this in the width equation, the width of the plane


will be the dot product of the data objects.
L= xi .xj where xi and xj are data objects.
(ii) NON LINEAR METHOD:
For the nonlinear data set, the classification cannot be done
using linear SVM. This requires the special kernel function.
In this case, the SVM introduces an extra set of dimension
where the points can be projected on to in a better space.

Figure 7.Twohyper planes with varying margins

This space is calculated using the kernel functions


There are number of kernels that can be
used in SVM models. These include linear
Polynomial, RBF and sigmoid:

xi*xj - linear
(xixj+coeff) - polynomial
Exp (-|xi-xj|2) - RBF
Tanh (xixj+coeff) -sigmoid

The Radial Base Function (RBF) kernel is the most suitable


method with SVM. [18]

International Conference on Advancements in Engineering Research


60

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

For Gaussian radial basis function:


K (x, x) =exp (-|x-x|2/ (22)).

[7] M. Rizzi, M. DAloia and B. Castagnolo, A fully


automatic system for detection of breast microcalcification
clusters, J. Med. Biol. Eng., 30: 181-188, 2010.

vi. RESULT:
[8] L.J.W. Burhenne,potential contribution of computer
aideddetection
to
the
sensitivity
of
screening
mammography,Radiology, vol.215, pp.554-562, 2000.

The proposed method involves the mammogram image


being filtered by a Gaussian filter based on standard
deviations and the resultant image is context stretched. The
unwanted background is removed using top hat approach.
The output is decomposed into two scales which are
reconstructed back using DWT. The image is then segmented
and the features from the selected area are extracted in the
fragment extraction phase and then the tumor classification is
done using the SVM classifier.

[9] T.W.Freer and M.J.Ulissey, Screening mammography


with computer aided detection: prospective study of 2860
patients in a community breast cancer, Radiology, vol.220,
pp.781-786, 2001.
[10]Howard Jay Siegel, Leah.J, PASM: A Partitionable
SIMD/MIMD System for Image Processing and Pattern
Recognition IEEE trans.
[11]SumanThapar, ShevaniGarg, Study and implementation
of various morphology based image constrast enhancement
techniques, International Journal of Computing & Business
Research

vii. CONCLUSION:
The computer aided diagnostic system has tremendously
helped the radiologists as they do not need a second opinion
from doctors. Moreover the hit ratio is comparatively higher.
This reduces the negative reports about the existence of
breast cancer and helps identify cancer in early stages. Thus
the treatment process can be more effective. It is also
reported that the linear method of classification proves more
efficient because of the linearity in the data set. The classifier
was able to vividly demarcate the different cancer cells as
benign or as malignant.

[12]Ahmed Elgammal, Digital Imaging and Multimedia


Filters,Rutgers
[13]Kumar, jagatheswari, Contrast Stretching Recursively
Separated
Histogram
Equalization
for
Brightness
Preservation and Contrast Enhancement,Advances in
Computing, Control, & Telecommunication Technologies,
2009. ACT '09. International Conference
[14]Jiang Duan, Chengdu, Wenpeng Dong, Computational
Intelligence for Multimedia, Signal and Vision Processing
(CIMSIVP), 2011 IEEE Symposium

REFERENCES:

[15] T. Netsch and H. O. Peitgen, Scale-space signatures for


the detection of clustered microcalcifications in digital
mammograms, IEEE Trans.

[1]Mammography[Online]
http://www.radiologyinfo.org/en/pdf/mammo.pdf
[2] American college of radiology, Reston VA, Illustrated
Breast imaging Reporting and Data system (BI-RADSTM) ,
third edition, 1998.

[16] C. Cortes, V. N. Vapnik, Support vector networks,


Machine learning Boston, vol.3, Pg.273-297, September
1995

[3]E.C.Fear, P.M.Meaney, and M.A.Stuchly,Microwaves


forbreast cancer detection, IEEE potentials, vol.22, pp.1218,February-March 2003.

[17]Zhang Xinfeng, ZhaoYan Application of Support


Vector Machine to Reliability, telkomnika ,2014
[18]JooSeuk Kim, Ann Arbor, Performance analysis for L2
kernel classification

[4] Homer MJ. Mammographic Interpretation: A practical


Approach, McGraw hill, Boston, MA, second edition, 1997.
[5]Maria
Rizzi*MatteoDAloiaBeniaminoCastagnolo,
Review: Health Care CAD Systems for Breast
Microcalcification Cluster Detection,Journal of Medical and
Biological Engineering,2012.
[6] S.M.Astley,Computer based detection and prompting of
mammographic abnormalities, Br.J.Radiol, vol.77, pp.S194S200, 2004.

International Conference on Advancements in Engineering Research


61

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Modelling & simulation of solar PV array field


incorporated with solar irradiance and temperature
variation to estimate output power of solar PV field
Vishwesh Kamble#1, Milind Marathe*2 , Rahul Rane#3
1#
2*

Student, Dept. of Electronics, K. J. Somaiya collage of engineering, Vidyavihar, Mumbai, India.


Faculty, Dept. of Electronics, K. J. Somaiya collage of engineering, Vidyavihar, Mumbai, India.
Address
1

vishwesh.k@somaiya.edu
milind.marathe@somaiya.edu

Second Company
Head, Technology centre, E&A, L&T limited, Mahape, Navi Mumbai, India.
rahul.rane@lntebg.com
Abstract Photovoltaic systems are designed to feed either to
grid or direct consumption. Due to global concerns, significant
growth is being observed in Grid connected solar PV Plants.
Since the PV module generates DC power, inverter is needed to
interface it with grid. The power generated by a solar PV module
depends on surrounding such as irradiance and temperature.
This paper presents modelling of solar PV arrays connected to
grid-connected plant incorporated with irradiance and
temperature variation, to design simulator to study and analyse
effect on output power of solar PV arrays with irradiance and
temperature variation, also to estimate the output power
generated by PV arrays. The mathematical model is designed
implemented separately on simulator for each PV components
connected in PV systems, which are PV cell, Module, sting, array
and field of arrays. The results from simulation based on model
are verified by the data collected from power plants and
experiments done on solar PV cell.

To create a model for solar PV system and implement it on


simulation software we made some assumptions regarding
atmospheric conditions effect on PV array. With the model for
simulating PV arrays, we also wanted simulator to implement
graphical representation of Arrays, therefore we used some
basic design models for graphical design of PV system in
simulator. The assumptions we made for simulation are as
follows:

Keywords Photovoltaic, Irradiance, Temperature, array,


model, simulator

I. INTRODUCTION
Photovoltaic power generation is gaining acceptance today
as source of clean and pollution free energy. These power
generators shows significant growth in grid connected as well
as stand-alone applications. Our objective was to create
mathematical model for solar PV array connected across these
generators, incorporated with irradiance and temperature
variation and implement the model using simulation for study
and analyse the effect on output of field of solar PV arrays and
also to estimate the power output of a solar PV arrays
connected across power plants. We implemented our
mathematical model using iVisionMax[1] PC suit to create
simulation. We verified results from simulator based on our
model by comparing it with data collected from power plants
and results from experiment on solar cell.

Fig. 1 Illustration of solar array field


Figure 1 shows the illustration of solar array field which
shows the order in which solar field is designed, we can see
that field of arrays are made by solar array connected together,
array is made up of strings connected in parallel, string is
made up of modules connected in series and module is made
up of cells connected in series. We designed software to
simulate whole field, each array, each string and module
connected in the field separately. We designed dedicated
windows for every level.
A. Assumptions
1) Input
Inputs to simulator are as follows:
Climate conditions= Sunny and Cloudy, Solar irradiance=
0 W/m to 1000 w/m, Module temperature = -5C to 80,
[veu7] Shadow density = 1% to 100%.

II. LOGICAL THINKING

International Conference on Advancements in Engineering Research


62

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

2) Effect of other atmospheric conditions


All other atmospheric conditions such as humidity, wind
speed, edging of sunrays, dust and snow are already imposing
their effect on solar irradiance and module temperature as well.
Therefore,

(1)
Where, b0, b1, b2, b3, b4, b5 are regression coeff. Which
are may vary according to location. It means that module
temperature is already affected by other conditions and its the
same in case of irradiance.
3) Climatic conditions
Climate conditions are depends upon the seasons of particular
locations therefore we are assuming following conditions:
Sunny Conditions: In sunny conditions, we are assuming that
the location where the PV array is set up is free from all kinds
of shadows including cloud shadow as well as other
monumental shadows (clear sky). Solar PV modules are
directly coming across Sun with no shadow effect and output
of PV array is clearly dependent on solar irradiance and
Module temperature. The tilt angle of Solar PV modules
should be equal to latitude and the orientation of the Array
should be always facing South (True south).
Cloudy conditions: In cloudy conditions, we are introducing
shadow over modules which will affect irradiance as well as
module temperature. We are inputting shadow density of a
cloud in simulator which will change the given irradiation and
module temperature as input before and accordingly output
will be changed.to simulate cloudy conditions we are
assuming that cloud shadow is covering all the PV modules in
PV array field with same amount of shadow density and
whole sun is being covered by cloud (for Eg. Rainy day).

Fig. 2

Fig. 3 Change in Irradiance and module Temp. due to shadow


density (based on experiments and observation)
Since the purpose of designing the simulator is to study and
analyse effect of atmospheric conditions on solar PV module
and its fields of arrays therefore we are not considering any
other effect on the output of module. We are just concerned
about how much power required from solar Array field and
how it will get affected by change in atmospheric conditions.
III. MATHEMATICAL MODELLING
1) PV Module mathematical modelling
Assumptions: the following terms we are using in the
programming while designing the simulation software in
iVisionMax.
Voltc = Vmax of a PV cell.
Crin = Imax of a PV cell.
Refchng = change in Vmax due to irradiance.
I0 = Diode saturation current (f (i0) i.e. base value of I0 of a
cell )
Ir = Solar irradiance.
Temperature = Module Temperature in C.
Tambient = Ambient temperature in C.
Chngeintemp = change in ambient temperature.
Equation 2 derives the base value of diode saturation
current which is denoted as i0, it is already present in silicon
solar cell due to its material characteristics. but Base i0s
presence can be neglected till module temperature is 25 C. if
the module temperature is increased than diode saturation

Assumption of cloudy condition for simulator [4]

When shadow comes over PV module or an array, what


happens is that shadow will resist solar insolation and
irradiance. As much as the shadow density (SD)[10], darker
the shadow hence, irradiation reaching to the module is
reduced by amount of shadow present due to cloud as shown
in figure 3(a). Similarly, module temperature also gets
affected due to shadow over module, but it doesnt happen

International Conference on Advancements in Engineering Research

rapidly as irradiance, it will need some time to see reduction


in temperature. Therefore we are considering time for shadow
to remain over PV array, to give the change in Module
temperature. To simulate or mimic change in module
temperature we are using Newtons law of cooling, which we
will enlighten in next sub-topic. From experimenting and
studying we can say that change in irradiation due to shadow
is linear in nature and change in module temperature is
logarithmic and exponential. Studies show that module
temperature is always 20 to 30% [5] more than ambient
temperature. While designing the equations for simulation we
are considering ambient temperature 80 % approx. of a
module temperature. Which is calculated in cloudy condition
after the module temperature is specified. [7][6]

63

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

current will rise and gets added with output current. Equation
3 illustrates the change in diode saturation current.
i0 = (q*A*Dn*ni/(Ln*Na))

[8]

TABLE I
CHANGE IN MODULE TEMPERATURE IN CLOUDY CONDITIONS

Date:
20/05/14

(2)

where,
q = charge in a cell, A = surface area in mm,Dn =
Depletion width, ni= intrinsic concentration, Ln = length if n
region, Na = Doping density
I0 = i0*(exp(0.09672*(temperature-25))) [2]

Time:
10.40
AM
11.20
AM

(3)

12.02 PM

a) Application of Newtons law of cooling for change in


module temperature due to cloud:
Newton's Law makes a statement about an instantaneous rate
of change of the temperature [9].
Newtons law of cooling

Ambient
Temperature
Initial
AT

After
time(t)

Initial
M.Temp
.

M.
Temp
after
time(t)

25.5C

27.6 C

60 C

28.2 C

28.0 C

27.2 C

60 C

27.6 C

28.0 C

27.8 C

60 C

28.7 C

Time
(min)
34.21
min
36.47
min
34.47
min

It is seen that module takes approximately 35.05 minutes to


cool down to ambient temperature. We repeated the same
procedure 3 times on same module to see the change in
module temperature with reference to ambient temperature.
To find out change in module temperature due to shadow of a
cloud, we have to find change in ambient temperature due to
shadow, which is illustrated by equation 6 and 7.

Solution,
To apply newtons law of cooling we have to find value of k,
which is the relation between change in temperature of
module with respect to time. To find k, we have to perform
experiment as shown in figure 4. For experiment what we did
is we heated the solar PV cell module up to 60 C in
laboratory with no sunlight spectrum, we can assume that with
no irradiance. We forcefully heated the module and then we
observed and recorded time taken by the module to cool down
to ambient temperature the table below shows us reading of
the experiment, initially module temperature is 26.5 C and
ambient temperature is 25.5 C. We used hair dryer as heating
source from which we heated the module to 60 C and we
measured the temperature on multichannel RTD device as
shown in figure 4. We used multichannel RTD for measuring
ambient temperature as well as module temperature at same
time so that we can measure exact time for cooling down of
module, table 1 shows the results from the experiment:

b) Newton's law of cooling regression coefficient


Now lets see, how to find K? When shadow is over module,
1st we have to measure change in ambient temperature. Since
we are feeding module temperature directly we are using
property of relation between ambient temperature and module
temperature. Ambient temp is always 75% to 80% of module
temperature. [5]
Tambient = (temperature*0.8)

[5]

(6)

chngeintemp=(Tambiant-Tambiant*(exp((time/0.0545))))*
exp(-(shd_dnsity)/100
(7)
In equation 7, we are using heat transfer equation for
calculating change in module temperature due to shadow and
presence of shadow over module. Change in ambient
temperature is function of shadow density in % and time of
presence of shadow over module. Here, equation 8 is derived
from solution of Newtons law of cooling. To find k we
solved the equation and also did experiment on module to
acquire the data for calculation, below equation 8 we can see
the calculation for k using experiment results. We used the
value of k as constant in equation 9.
k = ((log10 ((M.Temp-Tambient)/(changedM.TempTambient))*2.303)/Time(t))

(8)

= 0.08124.

Fig. 4:

From table 1, we took values to solve the equation 8. Change


in module temperature is function of change in ambient
temperature and time required to cool down to ambient
temperature with time and constant k . Equation 9 ,shows the
calculation for changed module temperature based on change
in ambient temperature. Here we are calculating effect of
ambient temperature only not shadow effect because we have

Experiment setup for change in module temp due to


cloud

International Conference on Advancements in Engineering Research


64

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

already calculated ambient temperature over shadow.


Equation 10, shows the changed irradiance due to shadow of a
cloud over module. Figure 3 shows the relation of irradiance
with shadow and module temperature with shadow.

Condition 1- Effect of module temperature on module current


if > 25 C
As we seen earlier in equation 13 and 14 are independently
related to voltage and current respectively. Here, we are
relating module temperature with current. It states that if
module temperature increased over 25 C, Carrier
concentration is changed due to which band gap of PV module
decreases, so I0 (i.e. Diode saturation current) increases, and
eventually module voltage decreases.I0 gets introduced in
Module output current. We are already defining decrease in
voltage from equation 14 and we are also calculating I0 from
equation 3. Therefore we add I0 with module current. As we
can see in figure 5 Isc is slightly increase with decrease in
VOC. Change in output current due to change in module
temperature is shown in equation 16.

Changed module temp. = (chngeintemp) + ((temperaturechngeintemp)*(exp(-k*(temp))))


(9)
Changed. Solar irradiance = ((100-shd_dnsity)/100)*ir (10)
[2]
c) Output Equations
As we explained mathematical modelling of the input side,
now lets see equations and formulations from the output side.
Equation 11, 12 and 11a are representing regression
coefficients or factors which relets the change in input to
change in output, voltc gives voltage of a cell from module
specified by user. Crin is regression coefficient between
current and solar irradiance and refchnge gives the relation
between changes in irradiance to change in voltage.
Voltc = Vmax/No. of cells

(11)

Crin = Imax/1000

(12)

Refchnge (irradiation coeff.)= (11mv-VOC of cell) / ln(1000-ir)


(11a)
Where,
ir = 10 W/m2, VOC = 600mv, 11 mv [ according to real
diode characteristics].[3]
Equation 13 gives the voltage of a module dependent upon
module temperature without effect of irradiance over it, for
this equation we always assume that except change in
temperature other parameters are at ideal state, but we are
compensating effect of other conditions such as irradiance
separately which we will see in the following conditions we
made. The temperature coefficient we took is always specified
in specification sheet provided by manufacturers. Here we are
taking it as constant but it may vary with manufacturer to
manufacturer. Module current equation 14 is based in the
principle states that, current directly proportional to irradiance.
Where, crin is regression coefficient which always gets
changed with module to module.as illustrated in equation 12.
Equation 15 is product of voltage and current obtained from
13 and 14 i.e. power of a module.
Module voltage = (voltc*(1+ (shadw_den1-25)*(- 0.34/100)))* No.
of Cells on module.
(13)

International Conference on Advancements in Engineering Research

Imp = Imp*(1+(M.temp.-25)*(0.1%))-I0

(16)

Condition 2- Effect of solar irradiance on module voltage if


irradiance is < 1000 W/m
As we know that, irradiance is not stable in nature and there
are rapid variations. Solar irradiance does not reach to its
maximum value every time i.e. 1000 W/m throughout the day.
The variations in irradiance not only will affect the current but
also voltage of a module. To simulate change in module
voltage we introduce regression coeff. refchnge () as we
explained earlier in equation 11a. The module voltage will
face exponential or logarithmic change due to change in solar
irradiance. We illustrated this scenario by equation 17. It
states that if solar irradiance is less than 1000 W/m and varies
with time then effect on module voltage will be deduction in
module voltage with product of irradiance regression factor
refchnge and natural log of 1000 - solar irradiance.
Module voltage = module voltage - (ln(1000-ir)*refchng) (17)
2) PV String mathematical modelling

Where,
(-0.34 % is temperature coeff. provided by manufacturer.)
Module current = crin*ir
Module power = Module voltage* Module current

Fig. 5: The effect of temperature on the IV characteristics of


solar cell.[3]

a) Design formulation for string

(14)
(15) String is nothing but No. of PV modules connected in series
connection. The string in PV array decides output voltage of

65

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

PV array field of a power plant. For example, if want to


generate 70 V dc voltage and we are having 50 W PV module
with Vmax of 35V so we have connect two PV module in
series to make a string which will generate 70 V at standard
atmospheric conditions. In case of simulator, to design string
it is important to find No. of modules needed in a string based
on given estimated voltage and module specified. ( for eg.290
w module.)
No. of modules in a string = estimated voltage/ Vmax
Vmax = voltc*no. of cells in a module.
Or
No. of modules in a string = estimated power/Pmax

since it is type of energy harvesting therefore we use the term


PV array field to pronounce solar power plant. Solar array
field is nothing but No. of PV arrays connected together
across solar inverter or to grid inverter to generate the power.
In here Field voltage and Field Current are defined by No. of
modules in a string and total No. of strings in a field
respectively. No. of arrays are in a field are also important
here while designing.

(18) No. of modules in a string = estimated voltage/ Vmax of


module.
(18a)
Total module = (estimated power)/type of module
(19)
Total strings= total module/no of module

(25)
(26)
(27)

b) Simulation formulas for string


No of array = total strings/no of strings
All other simulation formulas used are same as module
simulator except module voltage, module voltage will be
multiplied by total number of modules connected in a string.

(28)

b) Simulation formulas for field

We are already calculating total number of modules and total


String voltage = Module voltage*total module in a String (20) number of strings connected in field of arrays, as we can see it
in equation 26 and 27. Therefore, simulation formulas will
3) PV Array mathematical modelling
remain same for field simulations.
a) Design formulations for Array

5) Calculations for constants

Array is made by connecting strings of PV module in series or


parallel connection to meet our power requirement from PV
array field. Mostly in solar arrays all the strings are always
connected in parallel. Array defines current output required
from PV field. In case of Solar array now there are two factors
are important Array voltage and array current. Array voltage
is equal to String voltage i.e. string decides the voltage of
array as well as field. Array current is defined by no of string
connected in parallel mostly dependent on no. of channels in
array junction box (AJB or SMB).
No. of module = ((estimated power)/(Pmax))/noofstrings (21)
Or
No. of module = estimated voltage/(voltc*noofcell)
(22)

a)

For time constant ()

Changed ambient T = Tambient Tambient*exp(-time/)


Based on experiment:
Tambient = 60 C
Changed ambient T = 59.6C
Time = 3 sec (i.e. 0.05)
Sol:
59.6 = 60 60*exp(-0.05/)
-0.4/-60 = -exp(-0.05/)
ln(0.0066) = -0.05/
= - 0.05/- 5.0206

b) Simulation formulas for array

= 0.00995.

Simulation formulas are same as module and string simulation


except array voltage and array current.

b) For refchng:

Array voltage = String voltage

(23) We observed that for typical (156X156) Poly crystalline solar


cell there is 11mv change in VOC per 10 W/m [3]. Studies
Array Current = String current * total no. of strings of an
show that a cell generates 600 mv against the full sun
array.
(24) spectrum. Using above information we can find refchng coeff.
4) PV Field mathematical modelling

11mv = 600mv (ln(1000 - ir) * refchng)


-589 mv = -ln (1000- 10)* refchang

a) Design formulation for field

Refchng = 0.085776

The term field is not used prominently in the industry because


PV arrays are built for generating power in power plant but

International Conference on Advancements in Engineering Research


66

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

TABLE II
COMAPARISION RESULTS BETWEEN EXPERIMENT RESULTS AND
SIMULATION RESULTS
Actual
Time

Irradiance
(W/m)

M.
temp.

power
(W)

(C)

Simulated
power

Error
(%)

(W)

Cell 1
10:45

310 w/m

42 C

1.19 W

1.26 W

-5.88%

10:59

252 w/m

53 C

0.92 W

0.99W

-7.6%

11:53

296 w/m

55 C

1.02 W

1.06W

-3.7%

12:33

317 w/m

45.2 C

1.14 W

1.19W

-4.3%

12:36

278 w/m

46 C

0.97 W

1.04W

-7.2%

1:02

252 w/m

51.4 C

0.91 W

0.93W

-2.1%

12:50

167 w/m

50.9 C

0.60 W

0.61W

-1.6%

13:18

287 w/m

51 C

0.97W

1.00W

-3%

13:26

266 w/m

54 C

0.92 W

0.92W

0%

13:45

272 w/m

56C

0.88W

0.93W

-1.6%

Cell 2

Fig. 6: PV field simulator using iVisionmax


IV. RESULTS AND VALIDATION
To verify the simulation and mathematical model, we
studied couple of power plants and also we performed
experiment on Solar cells, so that we can validate our model
and simulation results by comparing them with the results
from experiment and data collected from power plant.

Cell 3

a) Experiment done over solar cells


We performed experiment on 3 kinds of solar cells; all three
solar cells are top end polycrystalline solar cells available in
market. They differed from each other based on cell efficiency.
We used 16.10%, 17% and 18% efficiency solar cells and
performed test on them with effect of solar irradiance and
temperature variation. The set up for solar cell experiment is
shown in figure 7.

Structural design:
Type of module: 180W (bp)
Pmax = 160 W
Vmax = 35.2 v
Imax = 4.7 A
No. of cells in module = 60 units.
Total No. of modules in Power plant = 300 units; Inverter
efficiency = 96 %
In a Power Plant, it is observed that there are two types of
Array boxes are used, they are all 5 channel Array boxes
classified as Array junction Box ( AJBs) and Main
junction Box. First small String are made of 4 No. of
modules. 5 strings are connected to each(parallel) array
junction box. And 3 AJBs are connected to Main Junction
Box so eventually 12 modules are making on big string
connected to Main Junction boxs one channel. Therefore,
Total no of small strings: 75 units
Total no of big strings: 25 units
Modules in small string: 4 units
Modules in big string: 12 units
Main array Junction Box: 5 units

Fig 7: setup for solar cell experiment


Specifications:
Cell 1: 4.38 W (cell eff. 18 %) Vmax = 35 V, Imax = 9.01 A
Cell 2: 4.13W (cell eff. 17 %) Vmax = 35 V, Imax = 8.49 A
Cell 3: 3.91W(cell eff. 16.10 %) Vmax = 35 V, Imax = 8.04 A

International Conference on Advancements in Engineering Research

From table II, we can see that, we got error within 10%
which is allowable in case of simulator. Therefore we can say
that our system is near to accurate and within the permissible
range right from solar cell to solar array field, Which validates
our simulator as we compared the simulated results with
actual results from the field.
b) Case study 1- 50 KW Power Plant (L&T)

67

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Table III shows comparison of results from simulator and


L&T power plant, we can see the error of the comparison
result is within the allowable range of error. We compared
power generated by 50KW power plant with our simulated
results for the same weather conditions as we can see it in
table.

these results we can say that our simulation model for


studying the PV solar Array field incorporated with solar
irradiation and temperature variation is near to accurate.
Finally, based on the analyses performed for this work, we can
help to inform one of the most problematic issues of project
acceptance from a commercial perspective that of the
appropriate allowable Error margin to attach to a system
rating result. While a full uncertainty analysis is outside the
scope of this paper, we can point out the largest source of
error in this type of test. They include:
model uncertainty, which we estimate at -7.7 to 4.5%
Solar Irradiance measurement uncertainty, which
ranges between 2-5%
Module temperature measurement uncertainty,
which ranges between 2-4%
Therefore, we estimate that total Error in the comparison
results of power output of Solar array field studied and tests
done on solar module with the simulated results will be -4.95
to 5 %.

TABLE III
COMPARISION RESULTS OF L&T P/W PLANT AND SIMULATION
RESULT
Power
Date &
Solar
Module
Power
Error
(Simulat
time
irradiance
Temp.
(actual)
(%)
or)
10/06/14
198.6
63.2 C
9.49 KW
9.42 KW
0.73%
2.15 PM
W/m
5/08/14
10.52
126 W/ m
31 C
6.687 KW
6.57 KW
1.7%
AM
5/08/14
10.52
147 W/m
31 C
7.449 KW
7.66KW
-2.8%
AM
5/08/14
10.85K
10.53
208 W/m
31 C
10.14 KW
-7.00%
W
AM
5/08/14
10.48K
10.53
201 W/m
31 C
9.792 KW
-7.02%
W
AM
5/08/14
10.59K
10.53
203 W/m
31 C
9.887 KW
-7.1%
W
AM
5/08/14
10.69K
205 W/m
31 C
9.918 KW
-7.7 %
10.53
W

V. CONCLUSIONS
From above study and research we can conclude that, change
in atmospheric conditions such as humidity, wind, dust, wind,
and edging will lend us on showing change in temperature of
array and irradiance of sun. So if we consider effect of
temperature and irradiance parameters, we can obtain power
output solar cell of solar field, we can able to estimate and
predict output power of whole solar field. Our main goal is to
model and simulate the PV solar array field to study and
analyse the output change in the PV Solar array according to
solar irradiance and temperature variation. With solar
irradiance and module temperature we also added shadow
density as another input which will mimic cloudy condition
effect with time of shadow present over module. We hope, we
validated our simulation model by comparing the results from
PV Power plants and results from our PV simulator. Hence we
achieved our objective of modelling and simulation of PV
solar array which can helps us to study and analyse change in
nature of PV array fields output with respect to change in
atmospheric conditions.

c) Case study 2- 1 MW power plant, Enrich energies,


Solapur.
We studied 1MW power plant situated in Solapur, from
Enrich energies LTD. the comparison results of 1mw power
plant and simulation results are shown in table IV. First two
readings from the table are from same day dated 26/5/2014
time 13.43 pm and 16.14 pm respectively. Next three reading
are of same power plant taken earlier dated 26/11/2013 time
16.41 pm, 29/11/2013 time 12.15 pm and time 12.15.33 pm
respectively.
TABLE IV
COMPARISION BETWEEN 1 MW PLANT & SIMULATION RESULT
Irradiance
(w/m)

Ambient

Module

Actual

Simulator

temp.

temp.

Output

Output

(KW)

(KW)

(C)

(C)

Error

REFERENCES

(%)

(Enrich)

[1]

804 W/m

38.04 C

51.49C

703.00KW

704.39KW

-0.2%

190 W/m

38.75 C

51.25C

173 KW

165.11KW

4.5%

142.2W/m

31.50 C

42.00C

117.80KW

126.42KW

-7.3%

464.19W/m

26.14 C

35.00C

395.60KW

422.93KW

-6.9%

469.97W/m

26.24 C

35.20C

419.50KW

427.29KW

-1.1%

[2]
[3]
[4]
[5]
[6]

From table we can see that by comparing results from our


simulator with actual Power plant output results, we achieved
accuracy within 10% error which is within the allowable
margin of error. The error after comaprision between
experiment results, collected data from power plants and
simulated results is varies from 7.7 % to + 4.5 %. From

International Conference on Advancements in Engineering Research

[7]
[8]
[9]
[10]

68

L & T automation, Mahape, iVisionPMSmaxTM Vision A Complete


Power Management System
http://www.lapsys.co.jp/english/
http://pveducation.org/pvcdrom/solar-cell-operation/
http://homeguides.sfgate.com/effects-temperature-solar-panel-powerproduction-79764.html
http://www.earthsolar.co.uk/page9.html
https://www.grc.nasa.gov/www/K12/problems/Jim_Naus/TEMPandALTITUDE_ans.htm
http://mentalfloss.com/article/49786/how-much-does-cloud-weigh
Introduction to semiconductor materials and devices, M.S.Tyagi.
John Wiley & Sons.
http://www.ugrad.math.ubc.ca/coursedoc/math100/notes/diffeqs/cool.h
tml
Vue-7: from the ground up by Ami Chopine and Vladmire Chopine

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

RTOS Based Electronics Industrial


Temperature and Humidity Monitoring using
ARM Processor
A. Prasath

P. Dhakshinamoorthi

PG Scholar
M.E - Embedded System Technologies
Nandha Engineering College
Erode, Tamilnadu, India
sivaprasath15@gmail.com

PG Scholar
M.E - Embedded System Technologies
Nandha Engineering College
Erode, Tamilnadu, India
dhakshinamoorthi08@gmail.com

patching to kernel. So the system updates also possible when it


required.
The ARM Controller is latest one and it support
higher end applications now a days. In here we can choose the
ARM
controller
ported
with
real
timeoperating
system(RTLinux).The system connected through the wireless
sensor network for monitoring remote area. RTLinux is a
preemptive, hard real-time deterministic multitasking kernel for
ARM Controller. RTLinux running with Linux command and
ANSI C source code for system and compilation.RTLinux can
runs on more number of tasks by patching as our requirement.
RTLinux performs inter-process communication (like
semaphores, message queuesand mailbox), timer management
and memory management. It supports for monitoring and
controlling the environment by getting information from sensed
value of electronics manufacturing industriesby guidance of the
Engineers.
The complete architecture of this paper has
beendivided into 3 parts: the system hardwaredetails, software
detail and finally the conclusion.

Abstract--The main of this paper is to monitor the


temperature and humidity values in manufacturing electronic
plants and assembling environment. The temperature and
humidity are the key issues in manufacturing electronics plant
and it leads to loss in production. This paper aims to provide a
solution to this problem by remote monitoring of the temperature
and humidity levels of different area of the plant with the help of
the Wireless Senor Network Module and thesystem implemented
withARM processor with porting of Linux based real time
operating system. Here in addition, thebuzzerfacility is there
tointimationsoundswhen over limit and SD cardfor further
reference and to stores the data instantly and contiguous. These
things make the electronic industries to manufacture the device
ideal.
Keywords--ARM
Processor,RTLinux,
Communication Protocol, Gateway, SD card.

WSN,RTC(DS1307),

I. INTRODUCTION
Recently the electronics industries and others facing
major production fault due to temperature and humidity, thus
temperature cause more defects like improper soldering joints,
extra oxidation of boards and bridging, solder components.
Even though the environment, particularly some machines like
solder paste refrigerator and desiccators for storage of paste and
bare PCB respectively also have to control over these
parameters.
Also some factory looking to control their machines
temperature with certain level to improve the efficiency of the
particular machine, such a case some time lead unexpected
accident, low product quality and more.
Hence now the monitoring and control system
established with LabView tool and interfaces of
microcontroller. But the authors have coming to share their
ideas in this paper, to implement the monitoring and allotment
the temperature and humidity system with ARM with porting
of RTLinux.
The system which is implemented with RTOS is
having multitasking capability to monitor multiple tasks and
controlling it. Also the system can add more applications by

II. HARDWARE DETAILS


Real-Time Module includes support for USB storage
devices, such as thumb drives and external USB hard drives,
for RT targets that have onboard USB hardware refer Fig 1.

Fig 1.Block diagram of industrial monitoring system

International Conference on Advancements in Engineering Research


69

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

The wireless gateway function in here is to receive the task


from sensors and pass the task to ARM Processor.

A.ARM PROCESSOR
ARM designs microprocessor technology that lies at
the heart of advanced digital products, from mobile phones and
digital cameras to games consoles and automotive systems, and
is leading intellectual property (IP) provider of highperformance, low-cost, power-efficient RISC processors,
peripherals, and system-on-chip (SoC) designs through
involvement with organizations such as the Virtual Socket
Interface Alliance (VSIA) and Virtual Component Exchange
(VCX). ARM also offers design and software consulting
services.

E.RTC (DS1307)
The DS1307 Serial Real time clock(RTC) counts
seconds, minutes, hours, day of the week, date, month and
year.The purpose of an RTC or a real time clock is to provide
precise time and date which can be used for various
applications. RTC is an electronic device in the form of an
Integrated Chip (IC) available in various packaging options. It
is powered by an internal lithium battery. As a result of which
even if the power of the system is turned off, the RTC clock
keeps running. It plays a very important role in the real time
systems like digital clock, attendance system, digital camera
etc. In applications where time stamp is needed, RTC is a good
option. Using RTC for designing such application has always
been a good designers choice although the beginning might
be a bit difficult.While designing any real time system which
deals with time, there are two ways of handling the time
factor. One is to generate the time internally which is done by
programming the timers of the controller and the other is to
use an RTC. The RTC is low power, 56 bytes of non-volatile
RAM for data storage, 2 serial interface wire in bi-directional
and 8 pin Dual Inline Package. The battery backup mode is
less than 500nA and it has automatic power switching to
battery when power fails at 2 5 C. The RTC operates in
industrial temperature range from 4 0 C to +85C. It is used
in TV, VCR and phonenumber recall. The DS1307 RTC is
connected to ARM controller using IC bus with time counters
refer Table 1.

ARM7 processor family continues to be used today


for simple 32-bit devices, newer digital designs are
increasingly making use of the newer, more powerful and
feature-rich ARM processors which offer significant technical
enhancements over the ARM7 family. System designers
wishing to upgrade from ARM7 benefit from a robust ARM
processor roadmap providing multiple upgrade options,
including the latest Cortex processors.In most cases migration
is straightforward, and brings significant benefits in PPA,
features and efficiency.
ARM's architecture is compatible with all four major
platform operating systems: Symbian OS, Palm OS, Windows
CE, and Linux. As for software, ARM also works closely with
its partners to provide optimized solutions for existing market
segments.
B. TEMPERATURE SENSOR
The LM35 series are precision integrated-circuit
temperature sensors, whose output voltage is linearly
proportional to the Celsius (Centigrade) temperature. The
LM35 has an advantage over linear temperature sensors
calibrated in Kelvin, as the user is not required to subtract a
large constant voltage from its output to obtain convenient
Centigrade scaling. The LM35 does not required any external
calibration or trimming to provide typical accuracies of C
at room temperature and cover a full -55 to +150C
temperature range. Low cost is assured by trimming and
calibration at the wafer level

COUNTING
CYCLE

CARRY TO
NEXT UNIT

Seconds
Minutes
Hours(24)
Hours(12)

00 to 59
00 to 59
00 to 23
12AM
01 AM to 11
AM
12PM
01 PM to 11 PM

59 to 00
59 to 99
23 to 00
-

Date

C. HUMIDITY SENSOR
Humidity is the presence of water in air. The amount
of water vapor in air can affect human comfort as well as many
manufacturing processes in industries. The presence of water
vapor alsoinfluences various physical, chemical, and biological
processes. Humidity measurement in industries is critical
because it may affect the business cost of the product and the
health and safety of the personnel. Hence, humidity sensing is
very important, especially in the control systems for industrial
processes and human comfort. Controlling or monitoring
humidity is of paramount importance in many industrial &
domestic applications. In semiconductor industry, humidity or
moisture levels needs to be properly controlled & monitored
during wafer processing

Months
Years
Weekdays
Timer

01 to 31
01 to 30
01 to 29
01 to 28
01 to 12
01 to 03
0 to 6
00 to 99

CONTENT OF
THE MONTH
COUNTER
-

11PM to 12AM
31 to 01
30 to 01
29 to 01
28 to 01
12 to 01
6 to 0
No carry

1,3,5,7,8,10,12
4,6,9,11,

Table 1.Cycle length of the time counters, clock modes

F.SD Card
The SD-memory card is non-volatile flash memory,
portable device used in mobile, computer and other consumer
appliances. It gives high security, memory size can vary
depends on cost, used in audio and video recording.
The SD-memory card is a Secure Digital Input
Output (SDIO) card, it support data protection, avoid the
duplication sensed value in same timing and security systems
based on identification cards in International standard ISO7816. An embedded version of MMC is eMMC, according to
the JESD84-A43. The interfacing of SD card with ARM using
Serial Peripheral Interface (SPI) bus and operates in 3.3volts
in Table 2. It offers up to 8-bit wide interface and can be
applied in SD-memory card compatible hardware interfaces.
While the SD-memory card adds an advanced data storage
functions to an application and easily accessible.

D. GATEWAY
The wireless gateways from Comcast provide the
functionality of a Wi-Fi router and voice modem in a single
device. The wireless gateway functions such as firewall, port
forwarding, port blocking, diagnostic tools and WI-FI
Protected Setup. It gives a secure wireless home network and
connects your computers, laptops, and other Wi-Fi electronic
products (such as game systems, tablets, or mobile phones).
International Conference on Advancements in Engineering Research

UNIT

70

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

assembler and linker operation of embedded product in real


time in fig 2.

PIN
NUMBER

NAME

TYPE

DESCRIPTION

NCS

SPI card select (CS)


(negative logic)

DI

SPI serial
(MOSI)

VSS

Ground

VDD

Power

CLK

SPI
serial
(SCLK)

VSS

Ground

DO

SPI serial data out


(MISO)

NC
nIRQ

Unused

Unused

data

in

clock

Fig 2.RTLinux Operating System


Table 2.SPI Interfacing pins for SD memory card

RTLinux design objective is that the system should


be transparent, modular, and extensible. Transparency means
that there are no unopenable black boxes and the cost of any
operation should be determinable. Modularity means that it is
possible to omit functionality and the expense of that
functionality if it is not needed. The base RTLinux system
supports high speed interrupt handling and no more. And
extensibility means that programmers should be able to add
modules and tailor the system to their requirements. It has
simple priority scheduler that can be easily replaced by
schedulers more suited to the needs of some specific
application. When developing RTLinux, it was designed to
maximize the advantage we get from having Linux and its
powerful capabilities available.

G. BUZZER
Buzzer is an audio signaling device and it is
mechanical, electromechanical or piezoelectric. It is used as
alarm device in timing manner and confirmation of user input
from personnel computer or other devices by making sound.
Buzzer is connected to ARM using one wire connecting wire.
H.LED
Light emitting diodes (LEDs) are semiconductor light
sources and it has two terminals. The light emitted from LEDs
varies from visible to infrared and ultraviolet regions. They
operate on low voltage and power. LEDs are one of the most
common electronic components and are mostly used as
indicators of circuit. LED display the monitoring value of
temperature and pressure in real time environment.

RTLinux functions schedule a priority scheduler that


supports both a "lite POSIX" interface described below and
the original V1 RTLinux API, which controls the processor
clocks and exports an abstract interface for connecting
handlers to clocks. It posix IO supports POSIX style
read/write/open interface to device drivers, FIFO connects RT
tasks and interrupt handlers to Linux processes through a
device layer so that Linux processes can read/write to RT
components. RTLinux is a semaphore contributed package by
Jerry Epplin which gives RT tasks blocking semaphores and
POSIX mutex support is planned to be available in the next
minor version update of RTLinux. RTLinuxMemorybuffer is a
contributed package written by Tomasz Motylewski for
providing shared memory between RT components and Linux
processes

III. SOFTWARE DETAIL


It is a written description of a software product, that a
software designer writes in order to give a software
development team overall guidance to the architecture of the
software project. An SDD usually accompanies an architecture
diagram with pointers to detailed feature specifications of
smaller pieces of the design. Practically, a design document is
required to coordinate a large team under a single vision. A
design document needs to be a stable reference, outlining all
parts of the software and how they will work.

A. RTLinux
RTLinuxis open source hard real-time RTOS
microkernel.The function of the RTLinux is mostly depends
on kernel. The programming of RTLinux is written in Linux
command and C coding. It is portable, scalable, preemptive,
high-performance interrupt handling and multitasking kernel.
It is developed for commercial purpose by FSM Lab andWind
River System and it has connectivity with GUI and File
Systems. It is multi-environment real time kernel running in
core environment and supports multiple porting of devices. It
is easy to implement and highly secure real time system. It
supports processors and controllers embedded applications in
real time. RTLinux program coding supports compiler,

International Conference on Advancements in Engineering Research

And the other application supporting codes are can


develop with C and C++ language which are generally used
for development of usual general purpose and special purpose
system.
IV. COMMUNICATIONS PROTOCOL
All communications between devices require that the
devices agree on the format of the data. The set of rules
defining a format is called a protocol. Communication
protocols cover authentication, error detection and correction,
and signaling. They can also describe the syntax, semantics,
and synchronization of analog and digital communications..
There are thousands of communication protocols that are used
71

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

everywhere in analog and digital communications.It supports


both wired and wireless communication.

1-Wire bus. The 8-bit family code, a subset of the 64-bit ID,
identifies the device type and functionality.
Typically, 1-Wire slave devices operate over the
voltage range of 2.8V (min) to 5.25V (max). Most 1-Wire
devices have no pin for power supply; they take their energy
from the 1-Wire bus (parasitic supply). It is a unidirectional
bus and it is connects the LED display to ARM processor.

A. SPI BUS
SPI (Serial Peripheral Interface) bus is a low power,
full duplex, master-slave interfacing bus. It is solid role in
embedded systems whether it is system on chip processors,
both with higher end 32-bit processors such as those
using ARM,
MIC
or Power
PC and
with
other
microcontrollers such as the AVR, PIC etc. These chips
usually include SPI controllers capable of running in either
master or slave mode. In-system programmable AVR
controllers can be programmed using an SPI interface. Chip
or FPGA based designs sometimes use SPI to communicate.
So, SPI is a common technology used nowadays for
communication with peripheral devices where we want to
transfer data speedily and within real time constraints. There
are many serial interfaces right from Morse code telegraphy,
RS232, USB, Fire wire, Ethernet and many more. Each serial
interface offers advantages or disadvantages for many designs,
depending on criteria such as needed data rate, space
availability, and noise considerations. It is simple 4 wire serial
communication bus and it operates on 10MH. In SPI data is
shifted in /out one at a time and transmit data from master
device to/from one or more slave devices over short distances.
It is high speed data transferring bus and no limit upto 8 bit
transfer.The SPI bus is straightforward and versatile, enabling
simple and fast communication with a variety of peripherals.
A high speed multi-IO mode host adapter and some invaluable
tool in debugging as well as adding SPI communication
capabilities to any test system.

V. CONCLUSION
In this paper, the authors are develops the idea to
monitor the temperature and humidity value using wireless
sensor in Real time. In this paper the existing model has to
monitor the temperature and humidity value using
microcontroller. The result of this paper is more secure to keep
the monitoring data in real time RTLinux. In future, ability to
add some more tasks to monitor, such as employee
authentication checking, data logging of cctv camera and etc.
The values of the monitoring data in real time are displayed on
the LED and Buzzer for intimation of warning.
VI. REFERENCES

[1].Prasath.A,PC based Data acquisition system with Interfacing of


I2C RTC (DS1307) & SPI ADC (MCP3201) with 8051, project
done at 2011.
[2].Kollam.M,Zigbee Wireless Sensor Network for
Interactive Industrial Automation published Year 2011.

Better

[3].Agrawal,Complete industrial solution for automation in


temperature and humidity monitoring using labview published
on IEEE conference at year 2012.
[4].Tamilselvan.K,SD card based Data Logging and Data Retrieval
for Microcontrollers to using c/os- II International Journal of
Engineering Research & Technology (IJERT) Vol.2 Issue 11,
November 2013.

B. IC BUS
Two wires: serial data (SDA) and serial clock (SCL).
All I2C master and slave devices are connected with only
those two wires. Each device can be a transmitter, a receiver or
both. Some devices are masters they generate bus clock and
initiate communication on the bus, other devices are slaves
and respond to the commands on the bus. In order to
communicate with specific device, each slave device must
have an address which is unique on the bus. I2C master
devices (usually microcontrollers) dont need an address since
no other (slave) device sends commands to the master .It
supports both Multi-master and Multi-slave, so it can detect
the collision easily. It supports 7 and10-bit addressing and
each device connects to the bus using software with unique
address. The maximum speed of the IC bus is 3.4Mbits/sec
and it varies depends on the modes of application. IC bus is
simple and flexible used in many applications.I2C bus is
transferred in 8-bit packets (bytes). There is no limitation on
the number of bytes, however, each byte must be followed by
an Acknowledge bit. This bit signals whether the device is
ready to proceed with the next byte. For all data bits including
the Acknowledge bit, the master must generate clock pulses. If
the slave device does not acknowledge transfer this means that
there is no more data or the device is not ready for the transfer
yet. The master device must either generate Stop or Repeated
Start condition.

[5].Prasath.A,

Dineshbabu.N,CompleteIndustrialSolution
for
Automation in Temperature andHumidity Monitoring using
Microcontrollerpresented at NCICC-2014,SNS College of
Technology at 2014.

[6].Tamilselvan.K,
Dhakshinamoorthi.P,An
Efficient
Data
Acquisition System for Microcontrollers with RTOS presented at
PCID-2014, BannariammanInstitute of Technology.

C. ONE WIRE BUS


One wire bus is a makes connection to one master
and multiple slaves. 1-Wire technology is a serial protocol
using a single data line plus ground reference for
communication. A 1-Wire master initiates and controls the
communication with one or more 1-Wire slave devices on the
International Conference on Advancements in Engineering Research
72

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

SMART VEHICLE TRACKING SYSTEM USING GSM, GPS AND RC5


Shreya Kaushal1, Kavita Rahega2
IET Bhaddal Technical Campus, Ropar1
Gurukul Vidyapeeth Institute of Engineering and Technology2

Abstract
Currently almost of the public having an own
vehicle, theft is happening on parking and
sometimes driving insecurity places. The safe of
vehicles is extremely essential for public vehicles.
Vehicle tracking and locking system installed in the
vehicle, to track the place and locking engine
motor. The place of the vehicle identified using
Global Positioning system (GPS) and Global
system mobile communication (GSM). These
systems constantly watch a moving Vehicle and
report the status on demand. When the theft
identified, the microcontroller automatically sends
SMS to the authorized person, while as the
microcontroller also stops the engine motor.
Authorized person has nothing to do in such a
smart system. The whole work is done by the
microcontroller itself. Once the Car is locked using
a remote, on theft attempt an automatic message is
sent to the car owner along with the car location.
The GPS/GSM Based System is one of the most
important systems, which integrate both GSM and
GPS technologies. It is necessary due to the many
of applications of both GSM and GPS systems and
the wide usage of them by millions of people
throughout the world.

tracking of the theft vehicle and various other


applications. The system is microcontroller based
that consists of a global positioning system (GPS)
and global system for mobile communication
(GSM). This project uses only one GPS device and
a two way communication process is achieved
using a GSM modem. GSM modem, provided with
a SIM card uses the same communication process
as we are using in regular phone.
This system is user friendly, easily installable,
easily accessible and can be used for various other
purposes. The system allows to track the target
anytime and anywhere in any weather conditions.
The applications include monitoring driving
performance of a parent with a teen driver. Vehicle
tracking systems accepted in consumer vehicles as
a theft prevention and retrieval device. If the theft
identified, the system sends the SMS to the vehicle
owner, once the car has been locked.
2. The two modules of the GPS based navigation
system
The project can be divided into two basic modules:
1. The GPS reception system:
This is the main module. This consists of building
the hardware for reception of data from satellites
through a GPS receiver, synchronizing the receiver
with the satellite through G-monitor software,
extracting appropriate data from GPS receiver once
it has been synchronized, calculating Indian
Standard Time (IST) and displaying the data on a
LCD screen.
2. Tracking of a target location:
This consists of designing the Visual Basic
Interface, extracting relevant positional data from
microcontroller, comparing target location and
current location and tracking by a vehicle as a
result of this comparison.

1. Introduction
GSM and GPS based vehicle location and tracking
system will provide effective, real time vehicle
location, mapping and reporting this information
value and add by improving the level of service
provided. A GPS-based vehicle tracking system
will inform where your vehicle is and where it has
been, how long it has been. The system uses
geographic position and time information from the
Global Positioning Satellites. The system has an
"On- Board Module" which resides in the vehicle
to be tracked and a "Base Station" that monitors
data from the various vehicles. The On-Board
module consists of GPS receiver, a GSM modem
Various problems that we face:
1. In critical condition (when vehicle is stolen), one
is confused what to do,
2. If one has something expensive and he wants to
check it regularly ,
3. To find the shortest path available.

2.1 Requirements of the system


The hardware elements used for the two modules
are: GPS receiver, GPS antenna, UART 16C550,
PIC 16F73, LCD Screen, A toy vehicle.
2.2 The software used is:
1. MPLAB IDE for the assembly language coding
of PIC16F73
2. PicKit programming software
The hardware setup for synchronizing the GPS
receiver is very simple. We have to connect a GPS
antenna to the receiver and interface the receiver to
a computer through a MAX 232 chip. Then we use

This system has Global Positioning System (GPS)


which will receive the coordinates from the
satellites among other critical information.
Tracking system is very important in modern
world. This can be useful in soldier monitoring,

International Conference on Advancements in Engineering Research


73

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

the Gmonitor software to synchronize the GPS


receiver with the satellites.

programmable and erasable read only memory


(PEROM). It has 256 bytes of RAM, 32
input/output (I/O) lines, three 16-bit timers/
counters, a six-vector two-level interrupt
architecture a full-duplex serial port, an on-chip
oscillator and clock circuit. The system clock also
plays a significant role in operation of the
microcontroller. An 10 MHz quartz crystal
connected to pins 18 and 19 provides basic clock to
the microcontroller. Power-on reset is provided by
the combination of electrolytic capacitor C3 and
resistor R1. Port pins P2.0 through P2.7 of the
microcontroller are connected to data port pins D0
through D7 of the LCD, respectively. Port pins
P0.5, P0.6 and P0.7 of the microcontroller are
connected to Register-select (RS), Read / write
(RW) and enable (E) pins of the LCD, respectively.
All the data is sent to the LCD in ASCII format for
display. Only the commands are sent in hex form.
Register-select (RS) signal is used to distinguish
between data (RS=1) and command (RS=0). Preset
RV1 is used to control the contrast of the LCD.
Resistor 10k limits the current through the
backlight of the LCD. Port pins P3.0 (RXD) and
P3.1 (TXD) of the microcontroller are used to
interface with the RFID reader through RS232 and
GSM Modem are used to interface through
Max232. Port pins from P1.0 to P2.7 of the
microcontroller are connected to keyboard. The
GPS and GSM are used to connect through RXD
and TXD pins of the microcontroller for further
processing. Using RC5, the car is locked and GSM
module is used to send SMS if a theft attempt is
detected. If unauthorized person enter into the car,
the microcontroller checks whether the car is still
in locked condition, if yes it senses the theft
attempt and locks the car then the controller issues
the message about the location of the vehicle to car
owner or authorized person.
To open the door or to restart the engine authorized
person needs to unlock the car. In this method,
tracking of vehicle location easy and also engine(s)
are locked automatically thereby thief cannot get
away from the car.

Figure 1. Block Diagram of Transmitting unit

Figure 2. Block Diagram of Receiver unit.


The antenna used for reception of information from
GPS satellites is the GPS Smart Antenna. This
antenna is used to establish contact by the GPS
receiver with the satellites. It has a magnet base
which helps in easy mounting. Once the antenna
has been positioned properly and connected with
the GPS receiver, we can start synchronizing the
GPS receiver with the satellites through Gmonitor
software.
The GPS receiver used is the GPS-MS1E- a fully
self controlled receiver module for Global
Positioning System manufactured by SiRF
technology, Inc.Nowadays, data is relayed
according to NMEA-0183 specification. NMEA
has several data sets. In our application, we make
use of the RMC- Recommended Minimum Specific
data set. RMC data set: the RMC data set contains
information on time, latitude, longitude, height,
system status, speed, course and date. This data set
is relayed by all GPS receivers.Now that the GPS
receiver is receiving valid data, we proceed to
connect
the
GPS
receiver
to
the
PIC18F452microcontroller through UART16C550.
Once this is accomplished, we then proceed to
display the appropriate data on an LCD.
3. Proposed Circuit Diagram
The circuit diagram of the vehicle tracking and
locking embedded system using GPS and GSM
technology is shown in Fig. The compact circuitry
is built around PIC 16F73 Microcontroller. The
PIC16F73 is a low power; high performance
CMOS 8-bit microcomputer with 8 kB of Flash

International Conference on Advancements in Engineering Research

Figure 3. circuit diagram of vehicle tracking and locking


embedded system using GPS and GSM technology

74

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

4. Hardware Design

Incorrect logic or errors in computations can


analyze by stepping through the code in simulation.
Simulators run at speeds 100 to 1000 times slower
than the actual micro controller hardware and, thus,
long time delays should avoid when simulating a
program. Micro controller-based systems usually
have interfaces to various external devices such as
motors, I/O ports, timers, A/D converters, displays,
push buttons, sensors and signal generators, which
are usually difficult to simulate. Some advanced
simulators, such as the Proteus from Lab center
Electronics allow the simulation of various
peripheral devices.
Inputs to the simulator can come from files that
may store complex digital I/O signals and
waveforms. Outputs can be as form of digital data
or waveforms, usually stored in a file, or displayed
on a screen. Some simulators accept only the
assembly language of the target microcontroller. It
has become necessary to simulate a program has
written in a high-level language.
The software program has been written in C or
assembly language and compiled using MPLAB
8.0 software. After compiler operation, the hex
code generated and stored in the computer. The hex
code of the program should be loaded into the
PIC16f73 micro controller by using Top win
Universal programmer.

PIC16F73 microcontroller is the heart of the


project that is used for interfacing. Two pins are
VCC pins and other two pins are at ground. Pin 9 is
reset pin. A crystal oscillator of 10 MHz is
connected to the microcontroller. RS-232 protocol
is used as serial communication between the
microcontroller, GPS and GSM modem. A serial
driver MAX232, 16 pin IC is used for converting
RS-232 voltage levels into TTL voltage levels.
There are four electrolytic capacitors which are
used with MAX232. A 12V battery is used to
power the circuit. A 7805 regulator is used to
convert 12V into 5V. The microcontroller and
MAX232 are powered by 5V. LED indicates the
presence of power supply.

6. Hardware Assembling and Testing:


First step, we need to make single side PCB
layout for the given circuit diagram. After made
the PCB the following process is required to
complete the project:1. Assemble all the components on the PCB based
on circuit diagram.
2. This will Include Power Supply, Controller
circuit, 162 LCD, TSOP 1738, IC L293D, DC
geared motor and the required components like
Chassis, Chester wheel and dummy motor
3. TX and RX pins of the GSM modem to RX and
TX Pins of Micro controller respectively.
4. L293D is 16 pin IC whose pins are connected to
+5V Ground (0V) and different pins of the micro
controller while a few a left behind or not
connected.
5. The various Pins of PiC 16f73 are connected to
power supply, IC L293D, LEDs ( to check the
various responses), TSOP 1738 (used to receive
signals from a Remote control), LCD (162 i.e., 16
characters in 2 lines each) and to the two modules
viz., GSM and GPS modules.
6. Insert a valid SIM in the GSM modem.
7. Connect the GPS module according to circuit
diagram.
8. The power supply consists of three 4V, 1 Amp
rechargeable batteries which provide supply to the
whole circuit and can be recharged by connecting
the output of the batteries to the input of 12V
regulator (7805). Positive output of the battery to

Figure 3.Block diagram of Vehicle tracking and


locking system based on GSM, GPS and RC5
5. Debugging and Testing Process
A microcontroller-based system is a complex
activity that involves hardware and software
interfacing with the external world. Doing well
design of a microcontroller-based system requires
skills to use the variety of debugging and testing
tools available. The debugging and testing of
microcontroller-based systems divided into two
groups: software-only tools and software-hardware
tools. Software-only tools come as monitors and
simulators, which are independent of the hardware
under development. Software-hardware tools are
usually hardware dependent, more expensive and
range from in-circuit emulators and in-circuit
simulators to in-circuit debuggers. In general, the
higher the level of integration with the target
hardware, the greater the benefit of a tool, resulting
in a shorter development time, but the greater the
cost as well. The factors to consider when choosing
a debugging tool are cost, ease of use and the
features offered during the debugging process.
The user program operated in a simulated
environment where the user can insert breakpoints
within the code to stop the code and then analyze
the internal registers and memory, display and
change the values of program variables and so on.

International Conference on Advancements in Engineering Research


75

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

the 12V input of the 7805 regulator and negative


output to the ground of 7805 regulator.
The project is implemented and tested successfully.
This system is very useful and secure for car
owners.

once it is implemented in all vehicles, then it is


possible to track anytime from anywhere. It has
real-time capability, emerges in order to strengthen
the relations among people, vehicle and road by
putting modern information technologies together
and able to forms a real time accurate, effective
comprehensive transportation system.
In this paper, we have proposed a novel method of
vehicle tracking and locking systems used to track
the theft vehicle by using GPS and GSM
technology. When the car is locked using a remote,
engines are automatically locked. In case a theft is
identified by the microcontroller, it sends the exact
location of the vehicle to the owner and also
engines remain in the same condition i.e., Locked.
When the theft identified, the responsible people
does not have to anything as the system is pretty
smart that it automatically sends SMS to the
authorized person, then issue the control signals to
stop the engine motor. After that all the doors
locked. To open the doors or to restart the engine
authorized person needs to unlock the car using the
remote. In this method, one can easily track the
vehicle anytime and anywhere in any weather

Figure 4. Hardware Design of the System

References:1. Asaad M. J. Al-Hindawi, Ibraheem Talib,


Experimentally Evaluation of GPS/GSM Based
System Design, Journal of Electronic Systems
Vol. 2 No- 2 pp-230-233, June 2012.

7. Objective and Future Scope


The objective of the project is to build an additional
feature to the present security system that will warn
the owner of the vehicle by sending SMS when
there has been an intrusion into the vehicle and to
provide a solution to avoid car stolen in the lower
cost than advance security car system. The project
is all about controlling theft of a vehicle. The
system is about making vehicle more secure by the
use of GPS and GSM technology. The other
objectives may include:1. Developing Automatic Vehicle Location system
using GPS for positioning information and
GSM/GPRS or information transmission with
following features.
2. Acquisition of vehicles location information
(latitude longitude) after specified time interval.
3. Transmission of vehicles location and other
information (including ignition status, door
open/close
status)
to
the
monitoring
station/Tracking server after specified interval of
time.
This project can be further enhanced by the use of
camera and by developing a mobile based
application to get the real time view of the vehicle
instead to check it on PC, which would be more
convenient for the user to track the target and to
provide a solution to avoid car stolen in the lower
cost than advance security car system

2. Albert Alexe, R.Ezhilarasie, Cloud Computing


Based Vehicle Tracking Information Systems,
IJCST Vol. 2, Issue 1,pp 432-446 March 2011.
3. Chen Peijiang, Jiang Xuehua, Design and
Implementation of Remote monitoring system
based on GSM, IOSR Journal of Electronics and
Communication Engineering, vol.42, pp.167-175.
2008.
4. Yusnita Rahayu and Fariza N. Mustapa A Secure
Parking Reservation System Using GSM
Technology International Journal of Computer and
Communication Engineering, Vol. 2, No. 4, July
2013.
5. Albert Alexe, R.Ezhilarasie, Cloud Computing
Based Vehicle Tracking Information Systems,
IJCST, ISSN: 2229-4333, Vol. 2, Issue 1, March
2011.
6. Kai-Tai Song, Chih-Chieh Yang, of National
Chiao Tung University, Taiwan, Front Vehicle
Tracking Using Scene Analysis, Proceedings of
the IEEE International Conference on
Mechatronics & Automation 2005.

8. Conclusion
Tracking system is becoming increasingly
important in large cities and it is more secured than
other systems. It is completely integrated so that

International Conference on Advancements in Engineering Research


76

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Experimental Investigation and predictive modelling for Surface Roughness of


drilling on GFRP composites
Prasanna Ragothaman
Department of Mechanical Engineering, Sri Ramakrishna Engineering College, Coimbatore, India
prasse1994@gmail.com
Abstract: Glass Fiber Reinforced Plastics composites have an increased application in recent days, due to its enhanced
structural properties, Mechanical and thermal properties. Drilling of holes in GFRP becomes almost unavoidable in
fabrication. The heterogeneous nature of this kind of materials makes complications during machining operation.
However, drilling is a common machining practice for assembly of components. The quality of holes produced in the
GFRP material is severely affected by surface roughness, Circularity and Delamination . The objective of the study is
to apply the full factorial design, ANOVA and Fuzzy logic model to achieve an improved hole quality considering the
minimum surface roughness through proper selection of drilling parameters. The regression method is employed in the
Experimental investigation and Mathematical modelling of drilling of GFRP material using HSS drill bits and the fuzzy
logic model for the validation of the mathematical model.
Keywords: GFRP, ANOVA, Fuzzy logic, Full factorial Method, Drilling, Surface Roughness.
1. Introduction
Glass fiber Reinforced Plastics (GFRP) are widely being used in the automotive, machine tool industry, aerospace
components, sporting equipments [1] because of their particular mechanical and physical properties such as specific
strength and high specific stiffness. An aircraft fuselage structure around 100,000 holes is required for joining purpose
[2, 3]. About 60% of the rejections are happening in aircraft industry due to the defects in the holes [4]. Many of these
problems are due to the use of non-optimal cutting tool designs, rapid tool wear and cutting parameters [5, 6]. Among
the defects caused by drilling with tool wear, Delamination appears to be the most critical [7].The surface finish of the
work piece is an important attribute of hole quality in any drilling operation. During machining many factors affect the
surface finish. Many theoretical models have concluded that the effect of spindle speed on surface roughness is minimal
[8]. In practice, however spindle speed has been found to be an important factor [9]. The quality of drilling surfaces
depends on the cutting parameters and tool wear, while changing the cutting parameters causes to tool wear
[10].Researchers have attempted to model the surface roughness prediction using multiple regression, mathematical
modeling based on physics of process, fuzzy logic [11].Machining operation being highly nonlinear in nature, soft
computing techniques have been found to be very effective for modeling [12].The influence of process parameters such
as spindle speed, lubrication and feed rate on surface finish were investigated during the experimentation of Metal
matrix composites. The experiments were conducted according to the full factorial design [13] .The percentage of
contribution of highest influential factors can be determined using analysis of variance(ANOVA) a statistical tool, used
in design of experiments[14,15]. Fuzzy logic is a mathematical formalism for representing human knowledge involving
vague concepts and a natural but effective method for systematically formulating cost effective solutions of complex
problems [16]. A model was developed for surface roughness on drilling of GFRP composites using fuzzy logic [17].
The primary objective of this study is to quantify the influence of process input parameters on surface roughness by
formulating a mathematical model and validating using Fuzzy logic model.

2. Design of experiment
Design of experiment is the design of all information -gathering exercises where variation is present, whether under the
full control experimenter or not. The cutting speed, feed rate and thickness of GFRP plate are the three parameters
under investigation in the present study. A full factorial experimental design with a total number of 27 holes drilled into
the GFRP specimen to investigate the hole quality on Surface Roughness. The full factorial design is the most efficient
way of conducting the experiment for that three factors and each factor at three levels of experiments is used. Hence as
per Levelsfactor (factors to power of levels) formula = Levelsfactors ,N = 33 = 27, N- number of experiments.

International Conference on Advancements in Engineering Research


77

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Table 1Assignment levels of process parameters


Factors
Speed, s(rpm)
Feed, f(mm/rev)
GFRP
Plate
thickness, t(mm)

Levels
1
2
280
900
0.18
0.71

3
1800
1.40

15

10

Fig 1: Fabricated GFRP plate


3. Specimen Preparation
The Glass fiber reinforced composite used is fabricated using hand lay-up technique [12]. The composition type is
Glass fibers (fiber length=20-30mm) reinforced with isopathalic resin with 30% reinforcement .The material was
fabricated and then cut into pieces of 22cm x 11cm for all the three thicknesses of plate (Fig.1).
3.1 Methodology

Fig 2.Surface Roughness tester

Fig 3.Experimental setup

Experiments were carried out in high speed radial drilling machine using HSS drill of 10mm diameter. Experiments
were carried out according to full factorial design. It provide a powerful and efficient method for designing processes
that operate consistently and optimally over a variety of conditions. The selected levels of process parameters were
given in Table 1.Fig. 3 shows the photographic view of the experimental setup. Further, the hole quality characteristics
surface roughness measured using roughness tester [Mitutoyo TR-200].Fig. 2 shows the measurement of hole quality
characteristics using roughness tester. Point angle was measured before every drill for 27 experiments using Digital
Profile Projector [OPTOMECH, 10x magnification].
4. Results and Discussion
4.1. ANOVA
The Analysis of variance is extensively used to analyze the experimental results. ANOVA tests the significance of
group difference between two or more groups. The normal probability plot represents that all the points on the normal
plot lie close to the straight line (main line) or not. Versus fits plots represents that how far deviation occur from the
normal distribution. An interaction plot is occurs when the change in response from the one level of a factor to another
level differs from change in response at the same two level second factor. A main effect plot is present when different
levels of an input affect the responses directly.
4.2. ANOVA for Surface Roughness
Fig.4 Represent that all the points lie closer to the regression line, this implies that the data are fairly normal and there is
a no deviation from the normal. Histogram graph shows the skewness. The Equation No. 1 represents that feed has
much effect on Ra. The main effect plot for Surface Roughness has been shown in the Fig 5. The plot shows that Ra
decrease with low cutting speed and low feed rate for 15 mm plate, as well as the initial (without wear in drill bit )
point angle has less effect on Ra. Table 3. Shows that the analysis of variance of second order model with 95%
confidence interval for the Surface roughness experiments. Parameter A gives 44.2% contribution to the Ra.

International Conference on Advancements in Engineering Research


78

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Fig.5 Main Effect Plot for Ra


Fig.4 Residual plot for Ra

Fig.6 Interaction Plot for Ra

4.3 Mathematical model for Surface Roughness


The models were based on the Box-Behnkn design method. The developed second order mathematical model for
surface roughness.
Surface Roughness = 4.87 - 0.00086 (s) + 2.49 (f) + 0.249 (t)
(1)
Table 3Analysis of variance
Predictors
Coef
Constant
4.873
S
8.56e-4
F
2.494
T
0.2487
S = 3.54808 R-Sq = 21.1% R-Sq(adj) = 10.8%
Source
Regression
Residual Error
Total

DF
3
23
26

SE Coef
2.352
1.09e-3
1.367
0.1673

SS
77.44
289.54
366.99

T
2.07
-0.78
1.49
2.07

MS
25.81
12.59

F
2.05

P
0.05
0.442
0.151
0.017

P
0.135

Fig.6 Represent that high feed rate and low speed have less effect on Ra while drilling on 5mm thickness plate. When
drilling on 10mm thickness of plate with cutting parameters of low speed and feed rate shows surface roughness is

International Conference on Advancements in Engineering Research


79

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

minimized. For 15mm plate high speed and high feed rate has less effect on Ra. From Fig.5 shows that when decreasing
the point angle, the effect of surface roughness is increased. Decreasing the point angle is causes tool wear.
Fig.7 shows the predicted and measured hole characteristics at different drilling process parameter conditions. The
result significantly shows that the values relatively follow the similar trend pattern of the measured value and predicted
values from the developed regression model.
4.4 Fuzzy logic model
Fuzzy logic refers to a logical system that generalizes the classical two-value logic for reasoning under uncertainty. It is
a system of computing and approximate reasoning based on a collection of theories and technologies that employ fuzzy
sets, which are classes of objects without sharp boundaries. Fuzzy logic is the best captures the ambiguity in the input.
Fuzzy logic has become popular in the recent years, due to the fact that it is possible to add human expertise to the
process. Nevertheless, in the case where the nonlinear model and all the parameters of a process are known, a fuzzy
system may be used.
4.4.1.Devolopment of fuzzy logic model
The surface roughness in drilling of GFRP is assumed as a function of three input variables viz.plate thickness, spindle
speed, and feed rate. The Fuzzy logic prediction model is developed using Fuzzy Logic Toolbox available in Matlab
version 7.10(R2010a).In this work Mamdani type Fuzzy Inference Systems(FIS) is used for modeling. The steps
followed in developing The fuzzy logic model are described below.
4.4.1.A.Fuzzification of I/O variables:
The input and output variables are fuzzified into different fuzzy sets. The triangular membership function is
used for simplicity yet computationally efficient. It is easy to use and requires only three parameters to define.The input
variables plate thickness [5-15 mm] ,spindle speed [280-1800 rpm] and feed rate [0.18-1.4 mm/rev] are fuzzified into
three fuzzy sets viz.Low (L),Medium(M),and High(H) as shown in the Fig.8 (a,b,c).The output variable i.e. The surface
roughness is divided into nine fuzzy sets as Very Very Low(VVL),Very Low(VL),Low(L),Medium1 (M1),Medium2
(M2), Medium3 (M3),High (H),Very High (VH),Very Very High (VVH) as shown in Fig.8 (d) to increase the
resolution and accuracy of prediction.

Fig.8 Fuzzification of I/O variables


4.4.1.B. Evaluation of IF-THEN rule
The three input variables are fuzzified into three fuzzy sets each, the size of rule base becomes 27(3x3x3).For
generating the Fuzzy rules, the level of the variable having more membership grade on a particular fuzzy set is
considered. With appropriate level of all the input variables representing the corresponding fuzzy set, the surface
roughness values are used for 27 data sets of fuzzy rule base. Since all the parts in the antecedents are compulsory for
getting the response value, the AND (min) operator is used to combine antecedents parts of each rule.
The implication method min is used to correlate the rule consequent with its antecedent. For example, the first
rule of the FIS can be written as

International Conference on Advancements in Engineering Research


80

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Rule 1: if Thickness is Low and Speed is Low and Feed rate is Low then surface roughness is Very Very low
(VVL).
4.4.1.C.Aggregation of Rules
The aggregation of all the rule outputs is implemented using max method, the commonly used method for
combining the effect of all the rules. In this method the output of each rule is combined into single fuzzy set whose
membership function value is used to clip the output membership function. It returns the highest value of the
membership functions of all the rules.
4.4.1.D.Defuzzification
The aggregate output of all the rules which is in the form of fuzzy set is converted into a numerical value (crisp
number) that represents the response variable for the given data sets. In the present work, the centroid defuzzification
method is used for this purpose. It is the most popular method used in most of the fuzzy logic applications. It is based
on the centroid calculation and returns center of area under the curve.
The predicted values of surface roughness are compared with the experimental output, prediction model output
and fuzzy output. The comparison of prediction performance in fuzzy logic output, prediction model output with the
experimental results is given in the Table 4.
Table 4.Surface roughness values for Experimental output, Predicted output and Fuzzy output
Surface Roughness, Ra (m)
Plate
S.
Speed
Feed
Point angle
Experimental
Predicted
thickness
No
s(rpm)
f(mm/rev)
()
output
output
t (mm)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22

Fuzzy
output

280

0.18

10732'07"

3.19

6.3224

2.15

280

0.71

10729'47"

11.98

7.6421

10.00

280

1.40

10725'32"

6.49

9.3602

5.75

900

0.18

10720'44"

4.09

5.7892

3.62

900

0.71

10717'58"

9.16

7.1089

7.87

900

1.40

10715'20"

8.79

8.8270

7.87

1800

0.18

10719'31"

12.96

5.0152

12.1

1800

0.71

10712'25"

7.27

6.3349

5.75

1800

1.40

10708'28"

3.33

8.0530

2.50

10

280

0.18

10702'57"

5.64

7.5674

3.62

10

280

0.71

10647'11"

8.98

8.8871

7.87

10

280

1.40

10639'47"

11.42

10.6052

10.00

10

900

0.18

10630'09"

1.76

7.0342

2.19

10

900

0.71

10628'42"

7.12

8.3539

5.75

10

900

1.40

10624'50"

8.58

10.0720

7.87

10

1800

0.18

10621'20"

7.72

6.2602

5.75

10

1800

0.71

10619'26"

10.07

7.5799

10.00

10

1800

1.40

10616'32"

8.97

9.2980

7.87

15

280

0.18

10632'07"

8.37

8.8124

7.87

15

280

0.71

10558'10"

10.48

10.1321

10.00

15

280

1.40

10552'37"

15.75

11.8502

14.30

15

900

0.18

10544'12"

5.43

8.2792

3.62

International Conference on Advancements in Engineering Research


81

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

S.
No
23
24
25
26
27

ISBN NO : 378 - 26 - 138420 - 8

Plate
thickness
t (mm)

Speed
s(rpm)

Feed
f(mm/rev)

Point angle
()

Surface Roughness, Ra (m)


Experimental
Predicted
output
output

Fuzzy
output

15

900

0.71

10536'04"

18.25

9.5989

16.4

15

900

1.40

10514'39"

11.43

11.3170

10.00

15

1800

0.18

10522'42"

4.74

7.5052

3.62

15

1800

0.71

10508'35"

6.64

8.8249

5.75

15

1800

1.40

10458'49"

8.55

10.5430

7.87

Fig.10 Correlation between Experimental Ra with


predicted Ra and Fuzzified Ra
The variation of surface roughness with different combinations of input variables is studied using the output
surface FIS.Fig.14,Fig.15,Fig 16,and Fig 17 shows the Functional dependence of surface roughness(Ra) with Plate
thickness,feed rate and Spindle speed.It can be observed that the surface roughness increase with increase in plate
thickness or increse in spindle speed or increase in feed rate.And it is also observed that surface roughness is decreases
with small plate thickness, medium spindle speed and small feed rate. Fig.10 indicates that the outputs from the
experiments, Prediction model, Fuzzy are in good correlation with each other.

Fig.11 Rule viewer

International Conference on Advancements in Engineering Research

Fig .12 Surface Viewer

82

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Fig .13 Surface roughness vs Thickness

Fig.14 Surface roughness vs Speed

Fig .15 Surface roughness vs Feed rate

5. Conclusion
This experimental investigation presents the surface roughness characteristics of drilling on GFRP composites. A
simple regression prediction model was developed based on the function of process variables and the following
conclusions were made

Surface Roughness was analyzed as a function of process input variables. Validation was done with a
developed fuzzy rule based model. The results obtained from experiments, Prediction model and the fuzzy
model are in good correlation with each other.

From analysis of variance and from the fuzzy model, the results indicated that low feed rate, high spindle
speed and 5mm thickness of GFRP plate gives better Surface Roughness.

It was observed that the surface roughness increases with the decreasing of point angle.

Further investigations are needed to enhance the hole quality characteristics considering different tool
materials and tool diameters, considering machine vibration, etc during drilling of GFRP composites.

6. References
[1] Park, J. N., Cho, G. J.A Study of the Cutting Characteristics of the Glass Fiber Reinforced Plastics by Drill Tools,
International Journal of Precision Engineering and Manufacturing, vol. 8 (2007) 11-15
[2] VijayanKrishnaraj, Member, IAENG, Effects of Drill Points on Glass Fiber Reinforced Plastic Composite While
Drilling at High Speed, Proceedings of the World Congress on Engineering 2008 Vol II, WCEE 2008, July 2-4(2008)
London, U.K.
[3] Sonbatry El, Khashaba U.A, Machaly T, Factors affecting the machinability of GFRP/epoxy composites, Comp
Structures, 63 (2004) 329-338.
[4] Montgomery, D.C.,. Design and Analysis of Experiments: Response Surface Method and Designs. John Wiley and
Sons. New York, USA, 2005.

International Conference on Advancements in Engineering Research


83

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

[5] Konig W, WulfCh, Gra P and Willercheid H, Machining of fiber reinforced plastics, Annals CIRP, 34 (2) (1985)
537-548.
[6] Komaduri R, Machining of fiber-reinforced Composites, Mechanical Engineering, 115 (4), (1993) 58-66.
[7] A.M. Abrao et.al,. Drilling of fiber reinforced plastics: A review, Journal of Materials Processing Technology 186
(2007) 17.
[8] Abrao A M, Faria PE, Campus Rubio J., C., Reis P, PauloDavim J Drilling of fiber reinforced plastics: A Review. J
Materl. Process Technology 186 (2007) 1-7.
[9] CaprinoG, Tagliaferi V Damage development in drilling glass fiber reinforced plastics. Int J Mach tools Manuf
(6): (1995) 817-829.
[10]Hocheng, H.and H. Puw. On drilling characteristic fiber reinforced Thermoset &Thermoplastics. Int J Mach tools
Manuf ,32 (1992)583-592.
[11]M.Chandrasekaran, M.Muralidhar, C.M.Krishna and U.S.Dixit, Application of soft
computing techniques in machining performance prediction and optimization:a literature
review,Int J Adv Manuf Technol,Vol.46(2010) 445-464.
[12]M.Chandrasekaran and D.Devarasiddappa ,Development of Predictive Model For Surface Roughness in End
Milling of Al-SiC Metal matrix Composites using Fuzzy logic, Engineering and Technology 68 (2012) 1271-1276
[13]Sureshkumar ManickamShanmugasundram et.al, Experimental Investigation of Prediction
of Hole quality Characteristics of Aluminum Matrix Composite (AMC225xe). Advanced
Materials Research Vols.622-623 (2013) 1305-1309.
[14] C.Y.Hsu,C.S.Chen,C.C.Tsao,Free abrasive wire saw machining of ceramics, Int J Adv
Manuf Technology 40 (2009) 503-511.
[15] Bala Murugan Gopalsamy,Biswanath Mondal,Sukamal Ghosh,Optimisation of machining
parameters for hard machining:grey relational theory approach and ANOVA,The International
journal of Advanced Manufacturing Technology 45 (2009) 1068-1086.
[16]Vikram Banerjee et.al,Design space exploration of mamdani and sugeno inference systems
for fuzzy logic based illumination controller, International journal of VLSI and Embedded
system-IJVES (2012) 97-101.
[17]B.latha and B.S.Senthilkumar, Modeling and Analysis of Surface Roughness Parameters
in Drilling GFRP Composites Using Fuzzy Logic, Materials and Manufacturing Processes
25(8) (2010) 817-827.

International Conference on Advancements in Engineering Research


84

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Wireless Ad hoc Networks


C:LATAH SOUNDARYA
E-mail:jesuslvu94@gmail.com

M.SREEKAR PRANAV
E-mail:sreekar.pranav4@gmail.com

Wireless Ad-hoc Networks


Abstract
Deployed in 1990s, Mobile Ad-hoc
networks have been widely researched
for many years. Mobile Ad-hoc
Networks are a collection of two or more
devices
equipped
with
wireless
communications
and
networking
capability.
These
devices
can
communication with othernodes that
immediately within their radio range or
one that is outside their radio range. For
the later, the nodes should deploy an
intermediate node to be the router to
route thepacket from the source toward
the destination. The Wireless Ad-hoc
Networks do not have gateway, every
node can act as the gateway. Although
since 1990s, lotsof research has been
done on this particular field, it has often
been questioned as to whether the
architecture of Mobile Ad-hoc Networks
is a fundamental flawedarchitecture.
The main reason for the argument is
that Mobile Ad-hoc Networks are almost
never used in practice, almost every
wireless network nodes communicate to
base-station and access points instead
ofco-operating to forward packets hopby-hop.We take the position that Mobile
Ad-hoc Networks (MANET) are a
fundamentally flawed architecture. As
argument, we try to clarify the definition,
architecture and the characters of
MANET, as well as the main challenges

International Conference on Advancements in Engineering Research

of constructing the MANET. Although


many works have been done to solve
the problem, we will show in this paper
that it is very difficult to solve these
limitations which made the Mobile Adhoc Networks a flawed architecture.
After giving many evidences and
analysis, we could see that the key
technologies of Wireless
Ad-hoc
Networks were not implemented as well
as we expect. That is to say, many
problems are inherently unsolvable.
Thus, we could explain why we take the
position that Mobile Ad-hocNetworks are
flawed architecture.

Introduction
Research on Wireless Ad Hoc Networks
has been ongoing for decades. The
history of wireless ad hoc networks can
be traced back to the Defense
Advanced Research ProjectAgency
(DAPRPA) packet radio networks
(PRNet), which evolved into the
survivable adaptive radio networks
(SURAD) program [11]. Ad hoc
networks have play an important role in
military
applications
and
related
research efforts, for example, the global
mobile information systems (GloMo)
program [12] and the near-term digital
radio (NTDR) program [13]. Recent
years have seen a new spate of
industrial and commercial applications

85

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

for wireless ad hoc networks, as viable


communication equipment and portable
computers become more compact and
available. Since their emergence in
1970s, wireless networks have become
increasingly
popular
in
the
communication
industry.
These
networks provide mobile users with
ubiquitous computing capability and
information accessregardless of the
users location. There are currently two
variations of mobile wireless networks:
infrastructure and infrastructureless
networks. The infrastructured networks
have fixed and wired gateways or the
fixed
Base-Stations
which
are
connected to other Base-Stations
through wires. Each node is within
the range of a Base-Station. A Handoff occurs as mobile host travels out of
range of one Base-Station and into the
range of another and thus, mobile host
is able tocontinue communication
seamlessly throughout the network.
Example applications of this type
include wireless local area networks and
Mobile Phone.The other type of wireless
network, infrastructurelessnetworks,
is
knows
as
Mobile
Ad-hoc
Networks(MANET). These networks
have no fixed routers, every node could
be router. All nodes are capable of
movement and can be connected
dynamically in arbitrary manner.
The responsibilities for organizing and
controlling the network are distributed
among the terminals themselves. The
entire network is mobile, and the
individual terminalsare allowed to move
freely. In this type of networks, some
pairs of terminals may not be able to
communicate directly with each other
and have to relay on some terminals so
that the messages are delivered to their
destinations. Such networks are often
refereed to as multi-hop or store

International Conference on Advancements in Engineering Research

andforwardnetworks. The nodes of


these networks function as routers,
which discover and maintain routes to
other nodes in the networks. The nodes
may be located in or on airplanes, ships,
trucks, cars, perhaps even on people or
very small devices. Mobile Ad-hoc
Networks are supposed to be used for
disaster
recovery,
battlefield
communications, and rescue operations
when the wired network is not available.
It canprovide a feasible means for
ground communications and
information access.
2. Characters and Fundamental
Challenges of Wireless Ad-hoc
Networks
Since Wireless Ad-hoc Networks are
inherently differen from the well-known
wired networks, it is an absolutely new
architecture. Thus some challenges
raise from the two key aspects: selforganization and wireless transport of
information [4], [5].First of all, since the
nodes in a Wireless Ad-hoc Network are
free to move arbitrarily at any time. So
the networks topology of MANET may
change randomly and rapidly at
unpredictable times. This makes routing
difficult because the topology is
constantly changing and nodes cannot
be assumed to have persistent data
storage. In the worst case, we do not
even know whether the node will still
remain next minute, because the node
will leave the network at any minute.
Bandwidth constrained is also a big
challenge.
Wireless
links
have
significantly lower capacity than their
hardwired counterparts. Also, due to
multiple access,fading, noise, and
interference conditions etc. the wireless
links have low throughput.Energy
constrained operation. Some or all of
the nodes in a MANET may rely on
batteries. In this scenario, the most

86

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

important system design criteria for


optimization
may
beenergy
conservation. Limited physical security:
Mobile networks are generallymore
prone to physical security threats than
are fixed cable networks. There are
increased possibility odeavesdropping,
spoofing and denial-of-service attacksin
these networks.
3. The Argument It is debated in
academic as whether the Mobile Ad hoc
Networks are a fundamentally flawed
architecture. The reason for the debate
is that Mobile Ad hoc networks are
almost never used in practice, the
wireless networks weuse now is still
Base-station or Access Point related. If
we could proof that, technically, the
Mobile Ad-hoc is unrealizable, then we
could say it is a flawed architecture. We
take the position that MANET is a
flawed architectureand will prove our
position in section 5. In section 4, we will
explain the counterclaim argument in
favor that MANET is a novel architecture
which is technical correctand could be
realized and put into practice. Section 5
refutes this argument and explains why
we think MANET is a flawed architecture
using some detail examples. Conclusion
and implication of our position are
presentedin Section 6.
4. Counter Argument
It is claimed that Mobile Ad-hoc
networks is a collection of wireless
mobile hosts forming a temporary
network without the aid of any
established infrastructure or centralized
administration. It is great importance in
situation where it is very difficult to
provide the necessary infrastructure.
Furthermore, ad-hoc networks have
been recognized as an important form of
wireless network.
MANETs are internetworks formed by
mobile wireless routers, with each router

International Conference on Advancements in Engineering Research

having one or more associated host


devices (e.g., computers and sensors).
A MANETsrouter implements routing
protocols
thatunlike
conventional
routing
techniquestolerate
rapid
changes in connectivity among nodes.
MANETs routing algorithms organize
the network by automatically discovering
the topology of the connectivity among
constituent nodes. The collection of
interconnected nodes serves as the
networks
communications
infrastructure.
MANETs
are
nonhierarchical systems, with each
node (mobile router) serving identical
roles as asource, sink, and passthrough for data. Thus, the MANET
is not tied to an existing or static
communications infrastructure (as is a
cellular telephone network). The ability
to independently self-organize and
serve as its own infrastructure makes
MANETs particularly attractive for the
industrial communications requirements
in harshmanufacturing environments.
Many researches have been done on all
aspects of the Mobile Ad-hoc Networks
to make it more suitable for wireless
communications. People develop lots of
routing protocols to fit the mobility of the
Wireless Ad-hoc Networks. The routing
algorithms become more and more
fit the rapid changing network topology
of Wireless Adhoc Networks.The
Wireless Ad-hoc Networks itself is not
hierarchy. In order to manage all the
nodes and make Routing Protocols as
well as Collision Detection mechanism
easier, Peoplebring out the idea of
constructing the Wireless Ad-hoc
Networks into a hierarchic architecture.
Thus we have thedefinition of Cluster.
The networks is divided into clusters,
each cluster has its own cluster head.
The
clusterhead
willcontain
the
information of the other nodes in this

87

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

cluster. This idea is great, by using


cluster, we avoid the flooding
process when doing routing and fault
diagnoses.
And
also
the
selforganization method was explored.
Selforganizationnetworks are improved
Mobile
Ad-hocnetworks.
They
distinguish themselves from traditional
mobile ad-hoc networks, based on the
traditional internet two level hierarchy
routing architecture, by emphasizing
their self-organization peculiarities. Selforganized networks can act in an
independent way from any provider.
Self-organized networks are also
potentially very largeand not regularly
distributed. For example, one single
network can cover the entire world.
Also, self-organized networks are highly
co-operative, the tasks at any layer are
distributed over the nodes and any
operation is the results of the
cooperation of a group of nodes. People
believe that MANET will be the main
architecture of the future wireless
networks where the normal wireless
networks are impossible to build,
especially in
military usage
or
emergency. They think the most
important characteristic which sets
Wireless Ad-hoc networks apart
from cellular networks is the fact that
they do not rely on a fixed infrastructure.
They also think Mobile Ad-hoc networks
are
very
attractive
for
tactical
communication inmilitary and law
enforcement. Again, they believe that
Wireless Ad hoc Networks will play an
important role not only in military and
emergency application, but also can
be applied in civilian forums such as
convention centers, conferences, and
electronic classroom. However, we do
not agree with the above statements.
Ourpoint of view is that when we talk
about the Mobile Adhoc networks, we

International Conference on Advancements in Engineering Research

think they are a flawed architecture,


because first, until now, we havent seen
any practice of the Wireless Ad-hoc
Networks, are the routing protocols, selforganization, security solutions are all
theories based on simulation. Second,
today, almost every wireless network
nodes communicate to base-stations
and accesspoints, instead of cooperating to forward packets hop-byhop.
In the following section, we will discuss
in detail the major technical topics about
the Wireless Ad-hocnetworks. The
results show us that even consider for
the basic technical topics, the Wireless
ad-hoc
networks
arefundamentally
flawed architecture.
5. Wireless Ad-hoc Networks Issues
Even the most zealot supporters of
MANET have to admit that it is a
challenging task to enable fast and
reliable communication within such a
network. The inherent characters of
MANET make it a flawed architecture no
matter what we have done or will do to
improve
theperformance
of
the
networks. Below are the factors that
prevent the mobile ad hoc networks to
be an in-flawedarchitecture.
5.1 Security in Wireless Ad-hoc
Networks
Security is an important thing for all
kinds of networks including the Wireless
Ad Hoc Networks. It is obviously to see
that the security issues for Wireless Ad
HocNetworks are difficult than the ones
for fixed networks. This is due to system
constraints in mobile devices as well as
frequent topology changes in the
Wireless networks. Here, system
constraints include low-power, small
memory and bandwidth, and low battery
power. Mobility of relaying nodes and
the fragility or routes turn Wireless Adhoc Network architecture into highly
hazardous architectures. No entity is

88

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

ensured to be present at every time and


it is then impossible to rely on a
centralized architecture that could
realize network structure or even
authentication. The people who consider
the Mobile Ad hoc Networks are not a
flawed architecture, while we cannot see
it used in practice is only because most
of its applications are in military are
totally wrong. Itis true that Mobile Ad
hoc Networks come from the military.
But perhaps those persons forgot one of
the most important things: the Security!
Everybody knows that the core
requirement for military applications
dealing with trust and security! That is to
say,security is the most important issue
for ad hoc networks, especially for those
security sensitive applications. As we
have mentioned before, in Mobile Adhoc Networks, security is difficult to
implement because of the networks
constrains and the rapidly topology
changes.After investigation, we found
that there are two kinds of security
related problems in the Mobile Ad-hoc
Networks. One is the attacks based on
the networks which are justsimilar to the
Internet, the other is Fault Diagnoses.
Fault Diagnoses algorithm is used to
pick out the faultynodes and at the same
time remove the node from the whole
networks. This process should be realtime as to guarantee the performance of
the whole networks. In order to solve the
fault diagnoses problem, many fault
diagnoses algorithms [6] were bring out.
After carefully surveying the existing
algorithm today, we found that they
cannotcorrectly diagnose faulty node
with the presence of the changing of the
network topology during the process of
diagnosis, and these algorithms are
analyzed with repetitious diagnosis for
all the mobile hosts and cause the great
system
overhead
due
to
the

International Conference on Advancements in Engineering Research

transmission of diagnosis messages by


means of flooding throughout the whole
networks. While the topology of Mobile
Ad-hoc Networks changes from time to
time, then we cannot use this kind of
Fault Diagnoses Algorithm to solve the
questions.Therefore, we can see that
the current fault diagnosis algorithms
cannot solve the fault diagnosis
problem. As for the networks attacks,
there are several factors ofsecurity that
we should consider. First, Availability
ensures the survivability of network
services despitedenial of service
attacks. Confidentiality ensures that
certain information is never disclosed to
unauthorized
entities.
Integrity
guarantees that a message being
transferred
is
never
corrupted.
Authentication enables anode to ensure
the identity of the peer node it is
communicating with. Yet, active attacks
might allow the adversary to delete
massages, to modify messages, and to
impersonate a node, thus violating
availability, integrity, authentication, and
non-repudiation. Although that many
security-related researches have been
done to this problem[7], [8], we could
see that Mobile Ad hoc networks are
inherently vulnerable to security attacks.
While, on the other hand, it is said that
the main applications of MANETare in
military and emergency, all these
applications
are
security-sensitive.
MENAT can not satisfy the security
requirement of the applications, so this
makes that MANET is a flawed
architecture.
5.2 Routing Protocol in Ad-hoc
Networks
Wireless Ad-hoc Networks operates
without a fixed infrastructure. Multi-hop,
mobility, large network size combined
with
device
heterogeneity
and
bandwidth and
battery power

89

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

limitations, all these factors make the


design of routing protocols a major
challenge. Lots of researchers did
tremendous work on the Wireless Adhoc Routing Protocols.
Two main kinds of Routing Protocols are
existed today: one is called table-driven
protocols (including distance vector and
link state), another is on-demand
protocols.In
table
driven
routing
protocols, the protocols consistent and
up-to-date routing information to all
nodes is maintained at each node
whereas in on-demand routing the
routes are created only when desired by
the sourcehost. While for the on
demand Routing protocols, on demand
means that it builds routes between
nodes only as desiredby source nodes.
It maintains these routes as long as they
are needed by the sources.If we look up
the key words Wireless Ad hoc
Networks Routing Protocols in Google,
we could find tons of millions of all kinds
of routing protocols, as LAR (LocationAided Routing), DSDV (DestinationSequenced Distance-Vector Routing),
AODV (Ad-hocOn-Demand Distance
Vector Routing), and DSR (Dynamic
Source Routing Protocol) However,
after survey various types of routing
strategies proposed for wireless ad-hoc
networks, we find the truth is all these
routing protocols are all have inherent
drawbacks and cannot be considered as
good routing protocols for Wireless ad
hoc Networks. Just like Windows
operatingsystems need patch at all the
time, the Wireless Ad hoc networks
routing protocol are all needs patches
too. The main problems about the
routing protocols are as
following:
First of all, consider the rapid passing
pattern. Wedefine the rapid passing
pattern to be one node passing through

International Conference on Advancements in Engineering Research

the whole network very quickly. Such a


rapid passing node will generate the
following affects to the whole network.
First, the topology of the network
changed rapidly, which will lead to the
lost of packets. Second, we have to
modify every nodes routing table that
within the communication distance of
the rapid-passing node, that will greatly
improve the consumption of the
bandwidth and the overhead of the
networks. Third, obviously there will be
tremendous delay of the data
sending to the rapid-moving node.
Transmission between two hosts over
a wireless network does not necessarily
work equally well in both directions.
Thus, some routes determined by some
routing protocols may not work in some
environments.
Many routing protocols may create
redundant routes, which will greatly
increase the routing updates as well as
increase the whole networks overhead.
Periodically sending routing tables will
waste network bandwidth. When the
topology changes slowly, sending
routing messages will greatly waste the
bandwidth of Wireless Ad-hoc Networks.
This will add additional burdens to the
limited
bandwidthof
the
Ad-hoc
Networks.
Periodically sending routing tables
also waste the battery power. Energy
consumption is also a critical factor
which
prevents Wireless
Ad-hoc
Networks
to
be
a
non-flowed
architecture. We will discuss this in 5.3.
We all understand that a stable network
routing protocols is essential for any
kinds of networks. However, for the
Wireless ad hoc Networks, we could not
find a stable routing protocol even after
we have done research on it more than
10 years. Needless to say that it is the

90

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

Wireless Ad hoc Networks itself is


flawed.
5.3 Energy Consumption of Wireless
Ad-hoc
Networks Energy consumption is also
one of the most importantperformance
metrics for wireless ad hoc networks, it
directly relates to the operational lifetime
of the networks. Mobile elements have
to rely on finite source of energy.While
battery technology is improving over
time, the need for power consumption
will not diminish. This point will have a
harmful effect on the operation time as it
will haveon the connection quality and
bandwidth.In the Wireless Ad-hoc
Networks, battery replacement may not
be possible. So as far as energy
consumption concerned, we should try
to preserve energy while maintaining
high connectivity. Each node depends
on small low-capacity batteries as
energy sources, and cannot expect
replacement when operating in hostile
and remote regions. For Wireless Adhoc
Networks,
energy
depletion
and
reduction is the primary factor in
connectivity degradation and length of
operational
lifetime.
Overall
performance becomes highly
dependent on the energy efficiency of
the algorithm. Energy consumption is
one of the most important performance
metrics for wireless ad hoc networks
becauseit directly relates to the
operational lifetime of the network. Most
research efforts are focused on
performance comparisons and trade-off
studies between various lowenergy
routing and self-organization protocols,
whilekeeping other system parameters
fixed. As a result, very little has been
revealed about the relationship between
the aggregate energy consumption and
non-protocol parameters such as node
density, network coverage area,and

International Conference on Advancements in Engineering Research

transceiver power characteristics. We


emphasis energy consumption not only
because that it is the key problem in the
research of Wireless Ad-hoc Networks,
but also, we find that Energy
consumption problem also affects the
routing protocols and the QoS of the
whole networks. Lets assume that each
source randomly selects one of the
possible
routes
and
asks
the
intermediate nodes on the route to relay
traffic. Sinceenergy is a valuable
resource, intermediate nodes may not
wish to consume their energy to carry
the sources traffic. This is called
Selfish of the node. However, if every
node behaves Selfish and refuse to
cooperate, networkthroughput may be
drastically reduced.Also, there are many
works have done to solve the energy
consumption
problem.
However,
unfortunately, little practical information
is
available
about
the
energyconsumption behavior of wireless
ad hoc network interfaces and device
specifications do not provide information
in a form that is helpful to protocol
developersThis, again, prove that the
Wireless Ad Hoc Networks cannot be
put into practice. Further, we can hold
our position that the Wireless Ad Hoc
Networks are a fundamentally flawed
architecture.
6. Conclusion
Mobile Ad hoc Networks are an ideal
technology to establish in an instant
communication infrastructureless
for military application or a flawed
architecture has been bought out in this
position paper. As we have proved
using the three main technical topics of
the Wireless AdhocNetworks, We hold
the position that the Wireless Ad hoc
Networks are a flawed architecture for
the following technical reasons:

91

www.iaetsd.in

INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY

ISBN NO : 378 - 26 - 138420 - 8

The most important thing for the


networks is security. It is even important
for Wireless Ad hoc Networks because
its applications are in military. The
MANET can not appropriately solve the
problem of the security.
Routing is also a big problem. All the
routing protocols for Wireless Ad hoc
Networks are need patches. No suitable
and stable routing protocols until now.
Energy consumption problem still
cannot be solved even much of efforts
have been done to it. All these prove
that the Wireless Ad hoc Networks is a
flawed architecture. Not only because it
is almost never used in practice but also
because there are several
technical difficulty that cannot be
conquered.Besides, all the Wireless Adhoc Networks are expected to be selfconfiguration. Self-configuration are
referring to two aspects, one is during
the first construction of thenetwork, the
self-configuration network is supposed
to be forming the network itself. The
other problem is when one host moves
in or moves out the Wireless Ad-hoc
networks,
the network should have the ability to reconfiguration the topology of the whole
networks. Again we could see that
although many works have been done
on this topic, but unlucky, all the
discussions do not give us a satisfied
answer
to
the
self-configuration
question. The question is never tackled
in systematic way. That again prove out
argument that the Wireless Ad-hoc
Networks is a fundamental flawed
architecture, or else we should find the
appropriated answer to the problems.
However as the wireless and embedded
computing technologies continue to
advance, I do hope later, one day, we
could build our wireless networks rely on

International Conference on Advancements in Engineering Research

some kinds of the Wireless Ad hoc


Networks.
References:
[1] IEEE Std 802.11 1999: Wireless
Medium Access Control (MAC) and
Physical Layer (PHY) specifications,
Inst. Elec. Electron. Eng., New York,
USA, 1999.ISBN 0-7381-1658-0
[2] IPN Progress Report, August 15,
2002, Analysis of Energy Consumption
for Ad Hoc Wireless Sensor Networks
Using a Bit-Meter-Per-Joule Metric,
J.L.Gao
[3]
A
Distributed
Light-Weight
Authentication
Model
for
Ad-hoc
Networks
[4] M. Satyanarayanan. Fundamental
challenges
in
mobile
computing.submitted paper.
[5] M. Haardt W. Mohr R. Becher, M.
Dillinger. Broadband wireless access
and
futurecommunication
networks.Proceedings of the IEEE,
89(1), 2001.
[6] S.Chessa, P.Santi, Comparison
Based System-Level Fault Diagnosis in
Ad-Hoc Networks, Proc. IEEE20th
Symp. on Reliable Distributed Systems
(SRDS), New Orleans, pp. 257-266,
October 2001
[7] Erik Skow, Jiejun Kong, Thomas
Phan, Fred Cheng, Richard Guy,
RajiveBagrodia, Mario Gerla, and
Songwu Lu, A Security Architecture for
Application Session Handoff
[8] Lidong Zhou, Zygmunt J. Haas,
Securing Ad Hoc Networks
[9] David B. Johnson, Routing in Ad
Hoc Networks of Mobile Hosts,
Proceedings of the IEEE Workshop on
Mobile
Computing
Systems
and
Applications, December 1994.
[10] LjubicaBlazevic, LeventeButtyan,
SrdanCapkun, Silvia Giordano, JeanPierre, Hubaux and Jean-Yves Le
Boudec, Self-Organization in Mobile

92

www.iaetsd.in

S-ar putea să vă placă și