Crate Full E-Book
Crate Full E-Book
Editors
Dr. A. Mahamani
Dr. Naveen Kilari
Mr. P. Nageswara Rao
iii
All rights are reserved. No part of this publication which is material protected by this copyright notice
may not be reproduced or transmitted or utilized or stored in any form or by any means now known or
hereinafter invented, electronic, digital or mechanical, including photocopying, scanning, recording or by
any information storage or retrieval system, without prior written permission from Paramount Publishing
House.
Information contained in this book has been published by Paramount Publishing House, Hyderabad and
has been obtained by its Author(s) from sources believed to be reliable and are correct to the best of their
knowledge. However, the Publisher is not liable for any errors, omissions or damages arising out of use
of this information and specifically disclaim any implied warranties or merchantability or fitness for any
particular use. The authors are solely responsible for the contents published in the paper.
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021)
ISBN : 978-93-90631-89-6
Sales Offices :
Hyderabad
A-531, H.No. 4-32-521, Phase-1, Allwyn Colony, Kukatpally, Hyderabad - 500 072.
Ph. : 7799000082.
New Delhi
C/14, SDIDC Work Centre Jhilmil Colony, New Delhi-100095. Phone: 011-2162365.
paramountpublishers@gmail.com | alluriasr2005@yahoo.com
Published by Krishna Prasad Alluri for Paramount Publishing House and printed by him at Sai Thirumala Printers.
iivv
PREFACE
It is a great privilege for us to present the proceedings of"Second National Virtual Conference on Recent
Advances in Technology & Engineering (CRATE-2021)" is being organized by Vemu Institute of Technology, P.
Kothakota, Pakala, Chittoor, Andhra Pradesh on August 13-14, 2021 to the authors and delegates of the event.
We hope that you will find it useful, exciting and inspiring.
Vemu Institute of Technology is one of the emerging Engineering College in India, has achieved the global
identity through the best academics, which situated in Chittoor, Andhra Pradesh, the southern part of India. Vemu
is best destination for engineering aspirant. The college offers the Bachelor of Engineering, Master of Engineering
in all major Discipline. Vemu is an ISO Certified Institute, is known for its rich traditional and high values bestowed
upon it by its founder and Chairman Prof. K. Chandra Sekhar Naidu. VEMU Institute of Technology is one of
the best and finest engineering colleges in Chittoor District, Andhra Pradesh. Beginning its quality inputs in 2008,
it has attained ISO2015:9001 certification for quality management within a short span of time. The institution's
progress and contribution to the field of technical education for over one decade and accredited by NAAC in the
year 2017, Recognized under 2(F) and 12(B) UGC Act, Permanent Affiliation with JNTUA (Anantapuramu)
and accredited by NBA[ECE, CSE, EEE]in the year 2021. It is located in P. Kothakota, near to Tirupati on the
Chittoor Highway in a beautiful 16-acre campus. A diverse, talented community united by a passion for learning
and quest for more, VEMUIT challenges its students to make a difference on its campus, in the region, and in the
companies, wherever they join. With unmatched results in every sphere of education, its commitment to be the
best has grown to transform its departments into Centers of Excellence.
The "CRATE-2021" is a notable event, which brings academia, researchers, engineers, industry experts
and students together. Efforts taken by reviewers contributed to improve the quality of papers are gratefully
appreciated. We are very grateful to all the authors who have contributed their research works to the conference.
We thank our Management for their wholehearted support and encouragement. We thank our Principal for his
continuous guidance. We thank all the members of our organizing Committee and all the faculty members.
v
vi
CHIEF PATRON'S DESK
It is a matter of great pleasure for me to know that Vemu Institute of Technology, Chittoor is organizing the
"Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-
2021)" on August 13-14, 2021. The interaction of engineers, academicians and scholars from national organizations
will go a long way in knowledge sharing in diverse fields for the promotion of research culture in the country.
Providing a platform to people and researchers for the promotion of research will immensely benefit young
scholars participating in the conference. I am convinced that the conference will definitely provide a platform for
the participating delegates to discuss important issues to develop new knowledge in engineering and Technology.
Being patron in chief of the conference, I heartily welcome all the distinguished speakers, research scholars and
researchers presenting papers and the participants to this "Second National Virtual Conference on Recent Advances
in Technology & Engineering (CRATE-2021)". I congratulate the Principal, Teaching Faculty, Students &
Administrative staff for organizing this conference and pray for the successful accomplishment of objectives.
vii
viii
PRINCIPAL'S DESK
On behalf of Vemu institute of Technology, Chittoor, Andhra Pradesh, I extend a very warm welcome to all
the delegates and participants for presenting their research thoughts in the "Second National Virtual Conference
on Recent Advances in Technology & Engineering (CRATE-2021)" on August 13-14, 2021"
Under the able guidance of our management, VEMU continues to march on the way of success with
confidence. The sharp clear-sighted vision and precise decision-making powers of our management has benefited
our college to say competitive.
The dedicated HOD's and staff members and disciplined students of VEMU are the added features of our
college. The role students in building nation cannot be overlooked and students at VIMU are trained in all
aspects to become a successful engineers and good citizens.
CRATE-2021 has been planned to provide a suitable platform for the research community to interact with
each other and to share the knowledge and learning experience to all the participants. Sessions on different
domains, keynote addresses from eminent professors and opportunity to network with the researchers will help
the participants immensely in their research career. This proceeding of the conference has been documented with
utmost care. I believe strongly that, this will stand as a great source of knowledge and researchers. With great
pleasure and pride, I welcome all the participants and convey my best wishes for CRATE-2021.
ix
x
CONVENER MESSAGE
It gives me an immense pleasure to inform that our Department is organizing "Second National Virtual
Conference on Recent Advances in Technology & Engineering (CRATE-2021)" on August 13-14, 2021.
The conference is aimed at providing a platform to all researchers and faculty members to interact, share
their research findings and to discuss their research ideas with the co-researchers from all over the country. It also
provides an opportunity to highlight recent developments and to identify emerging and future areas of growth in
the field of Science, Engineering and Management. I am sure that the deliberations of the conference will promote
the research in the thrust areas of Science, Engineering and Management.
I take this opportunity to thank the Chairman, Principal and the Heads of the Departments for keeping the
trust on me to organize this program. I would also be thankful to all the coordinators, staff members and the
participants, who extended their help and support for the success of this program.
I wish a bright career to all the participants.
xi
xii
CHIEF PATRON
Prof K Chandra Sekhar Naidu, Chairman
PATRON
Dr. Naveen Kilari, Principal
GUEST OF HONOR
Dr. H. Sudarsana Rao, Professor, Department of Civil Engineering,
J.N.T. University Anantapur,Andhra Pradesh
KEYNOTE SPEAKERS
Dhananjay V. Gadre
Founder, Centre for Electronics Design and Technology and TI Centre for Embedded Product Design,
Netaji Subhas University of Technology, New Delhi.
Dr. Jayavardhana G.
Senior Scientist,
Tata Consultancy Services
Bangalore
Prof. Ajith Kumar. V.V
Vice Chancellor, Skyline University, Nigeria
Dr. Savithri S
Senior Principal Scientist,
CSIR-National Institute for Interdisciplinary Science and Technology (NIIST),
Thiruvananthapuram.
Dr. P.Sakthivel,
Department of Physics, Faculty of Engineering,
Karpagam Academy of Higher Education, Coimbatore.
Dr. G.Appa Rao,
Department of Civil Engineering, Indian Institute of Technology Madras,
Chennai.
Prof. Ch. Sai Babu
Professor in Electrical Engineering Department & Director-Foreign University Relations,
JNT University, Kakinada.
xiii
ORGANIZING COMMITTEE
CONVENER
Dr. A.Mahamani, Dean R&D
CO- CONVENER
Mr.P.Nageswara Rao
COORDINATORS
Dr. S.Murali Mohan, ECE
Mr.P.H.ChandraMouli, ECE
Dr.A.Hema Sekhar, EEE
Mr.M.Murali, EEE
Dr. K Venkata Ramana, CSE
Mrs. P Nirupama, CSE
Dr. G Ramesh, ME
Mr. Hema Mahesh Babu, ME
Mr. S. Ramprasath, CE
Ms. K.Sarumathi,CE
Dr. K.R.Sekhar, H&S
Dr. K. Chaitanya Kumar, H&S
Dr.G.Bhaskar, MBA
Dr. C.Bhupati, MBA
xiv
CONTENTS
Preface v
Messages vii
xv
Sl.No. Title of the Paper Page No.
15. Study and Analysis of Various Image Enhancement Method using MATLAB 78
- Y. Mahesh, B.Suresh Babu
16. Railway Track Crack Detection and Alert System using Arduino 84
- B. Sreevalli, D. Hemalatha, Manjusha Chinta
17. IOT Based Air Quality Monitoring System 88
- S. Chenchu Jyoshna, P. Srividya, Manjusha Chinta
18. Detection of Copy-Move Forgery using Keypoint Clustering Algorithm 92
- Mrs. P. Tejaswini, Mr. S. Naveen Kumar
19. Area, Power and Delay Analysis of Approximate Redundant Binary Multiplier 97
- S. Murali Mohan, A. V. Santhosh, K. Devendra
20. A Review on Various Pseudorandom Bit Generators 102
- Ashly George, Varghese A
21. Autometro Train Shuffle Between the Stations Using Raspberry PI 112
- P. V. Kusuma
22. Borrow Select Subtractor for Low Power and Area Efficiency 117
- C. Laxmanasudheer, D. Jayanayudu
23. IOT Based Smart Helmet for Construction Workers 125
- C. Laxmanasudheer, D. Jayanayudu, K. Maheshwari
24. Design of Low Power High Speed SRAM Architecture using SK-LCT Technique 130
- D. Jayanayudu, C. Laxmanasudheer
25. Heart Beat Monitoring and Heart Attack Detection Using IoT 137
- M. Tulasiram
26. Automated EV Wireless Charging Bunk 141
- Anand T, Gagan B K, Swaroop M R, Vishal Nayak
27. A Survey on Image Fire Detection using Learning Techniques 145
- G. Elaiyaraja, N. Kumaratharan
28. Energy Efficient Reconfigurable Approximate Carry Look Ahead Adder 155
- Rizvana K Latheef, Sindhu T V, Ajeesh S
29. Design of Very Fast, High Performance 5:2 and 7:2 Compressors for Rapid Parallel 164
Accumulations
- P. H. Chandra Mouli, K. Munisimha Deepak
30. An AES-Based Privacy Preserving for Secure Image Retrieval and Sharing in Cloud 170
Computing
- Ms.Y.Neha, Ms.N.Reena, Ms.V. Jyoshna Priya, Mr.V. Jayaprakash
31. Synthesis and Simulation of Double Precision Floating Point Arithmetic Unit- CRATE 175
2021
- Ms C. Bhagya, Mr.P.Chandu Prasad Reddy, N.Sirisha
32. High Speed with Reduced Delay Han-Carlson Adder (HC3A) 182
- Ms.V.Bharathi, Ms.S.Mahalakshmi
33. Early-Stage Prediction of Lung Cancer Using Logistic Regression 187
- C. Manikanta
xvi
Sl.No. Title of the Paper Page No.
34. Detection of Kidney Artifacts in Ultrasound Images Using Support Vector Machine 191
Classifier
- P. Vemaiah, Kolla Malleswari
35. Design of Low Power Carry Speculative Block Based Approximate Adder 199
- P. H. Chandra mouli, N. Suma hrudaya
36. An Error Analysis of Discrete Cosine Transfrom Using Algorithm Based Fault 208
Tolerance Technique
- R. Narayana Rao
37. Multiresolution Fusion Techniques for Analysis of Medical Images 216
- Mr. N. Kiran Kumar, Mrs. A .Mounika, V. Nagendra Kumar
38. CNN Technique for Deblurring and Super-Resolution of Image 220
- Ms. K. Deepika, Ms. M. Navya Sree, Mr. E. Kalyan Kumar, Mr. B. Balaji
39. Raspberry Pi Based Vehicle Anti-Theft Face Recognition System 224
- P. Subbarayudu, S. Mohammed Sharif, S. Noor Mohammed
40. AI Vision for Spy 228
- Rachana Veerabommala, S. Murali Mohan, Bhargav Jonnagadla
41. Sharp-Witted Control SystemWith RFID And GSM Using IOT 233
- K. Swapna, Jagadeesh Nandivargam
42. Covid-19 Identification and Alerting System 239
- K. K. Gouse, C. Ahalya, M.Jayalakshmime Surname
43. Smart Card Payment Solution for Campus Using Mifare Card 244
- Mrs. C.Munikantha, Ms.B.Lakshmi Prasanna
44. Automatic Detection of Diabetic Retinopathy in Retinal Images by Using Machine 250
Learning
- Mrs.R.Sindhu, Ms.N.Gayathri
45. Home Automation Using IoT And Security System Using Image Based 254
Authentication
- Mr.B.Malakonda Reddy, SK.Roshni, S.Bhanu Prakash, R.Vani,
P.Venkateswarlu
46. Compact Ultra-wide Band Microstrip Antenna For Iot Application 260
- R.Kalyan, S. Vidyarani, A.Mounika, K.S. Deveswari, P.H.Chandramouli
47. Covid-19 Detection and Safety Measures 266
- K.S.Deveswari, R.Kalyan, S.Vidya Rani, E.Devisri, T.H.Chandramouli
48. Design of High Speed and Efficient Block Based Carry Speculative Approximate 270
Adder
- Dr. Boda Saroja, Dr. Rajesh Gundlapalle
49. GPS and GSM Based Detection and Extraction of Landmines 275
- M. Arun Kumar
50. Road Sign Recognition Using Open CV With Raspberry PI 279
- A. Mahesh Reddy
51. A Review on Solar Power Monitoring Using Internet of Things 284
- Suvidya Arif Patel
xvii
Sl.No. Title of the Paper Page No.
52. A Neoteric Data Hiding and Color Image Sharing Based on Compressed Sensing 291
- Shaik.Shabeera Bee
53. Automatic Em Based Video Deraining and Desnowing Using Temporal Correlation 296
and Low-Rank Matrix Completion
- Allabaksh SK, K.R.Surendra, D.Chaitanya
54. Convolutional Neural Network for Diagnosing Skin Cancer 302
- Mrs. K. Jayasree, Ms.M. Navyasree
55. Design and Development of Silent Sound Integrated Smart Defence Helmet 305
- Srinigha A, Vigashini GP, Vishnupriya J, Yashwanthi V
56. An Efficient Design of Optimized Low Power Dual Mode Logic for Full Adder Design 309
- G. Munirathnam, S.Hema Madhuri, P.Bhaskar Reddy, V. Indhu, S.Mamatha
57. Identification of Bone Fracture using Support Vector Machine Classifier 316
- Dr. S. Muni Rathnam, Ms. Y. Viritha, Ms. G. Mounika, Mr. R. Muni Prathap,
Mr. P. Karthik
58. IoT Based Smart Bot 321
- Debjyoti Roy, Debojyoti Banerjee, Debolina Sett, Epsita Das, Partha Das,
Pushpendu Kanjilal
59. ATMEGA328 Microcontroller Based Air and Noise Pollution Monitoring System Over 324
IoT
- Dr.K.Gopi, Mr.K.M.Hemambaran
60. An Attribute Based Encryption for Data Security in Cloud Storage 328
- Ms. A. N. Hemavathy, Mr. G. Murali, Ms. K. Swarna, Mr. K. Ajith
61. Lossless Hyperspectral Image Compression Based on Reversible Integer of TDLT and 333
KLT
- M. Renu Babu, G. Chenna Keshava Reddy
62. An Application of Red Sandalwood Protection Using Rasberry Pi 339
- Y. Mahesh, Y.Murali
63. Design of Power and Area of Efficient Approximate Multipliers 343
- Mrs.N.Kavya
64. A Novel Method to Detect Alzheimer's Disease Using Image Processing 348
- Mr. B.Praveen Kumar, Ms.C.Yamini, Ms. M. Sravani, Ms. M. Nirmala,
Mr. G. Parthasarathy Reddy
65. Evaluation of Wireless Power Consumption and Energy Efficient in Green 352
Communication
- G. ChennaKesava Reddy, Dr. A.A.Ansari, M. Renu Babu
xviii
Sl.No. Title of the Paper Page No.
xix
Sl.No. Title of the Paper Page No.
18. An Outline on Focal Conception of Machine Learning 455
- Reddamma. K, Bhargavi. T
19. Security Issues: A Case Study 459
- Aswani Podili, N.S.Lohitha
20. Importance of Cloud Computing and Internet of things in Healthcare Systems 465
- Dr. Kamini Solanki, Dr. Abhishek Mehta
21. Smart Glass with Navguide System for Visually Impaired People 471
- Mrs.S.Shanmuga Priya, Mrs.M.Queen Mary Vidya, Rashmi Sai Sree M,
Pavithra M
22. Breast Cancer Histopathology Using CNN 476
- S.Venkata lakshmi, K.Pavithra
xx
Sl.No. Title of the Paper Page No.
xxi
Sl.No. Title of the Paper Page No.
xxii
Sl.No. Title of the Paper Page No.
xxiii
Sl.No. Title of the Paper Page No.
16. A Review on Wire + Arc Additive Manufacturing of AA 7075 Correlation of Arc 718
Mode Microstructure & Mechanical Properties
- P. Koteswara Rao, Dr. K.L. Narayana
17. Behaviour of Artificially Introduced Circular Defect in Glass/Epoxy Composites Under 727
Four Point Bending
- Srikar Gemaraju, Kiran Kumar Yadav A, K.Vengal Rao, K. Ismail,
M.Venkataiah
18. A Review Study on Materials of Earth Air Heat Exchanger 731
- Niraj R. Shingala, Dr. Chetankumar M. Patel
19. Low Cost Portable Biogas Digester for Methane Capturing from Cow Dung 739
- Mohammad Zafar Anwar, Md. Afzal Ali, R. Venumadhav
20. Underwater Renewable Energy (Underwater Windmill) (Renewable Energy) 745
- Navaneethan S,Pradeep R.V,Navaneetha Krishnan P,Mutharasu A,Karthick,
Kumaran Jawahar M
21. Effect of Production Characteristics on Production of Biodiesel from Acacia Seeds 749
- P.Jaya Prakash, Dr.J.M.Babu, A.T.Praveen Kumar
22. Application of Evaporative Cooling on the Condenser of Window-Air-Conditioner 755
- Ch. Sreenivasa Rao
23. Synthesis of Fuel from Waste Plastic 761
- Kiran Kumar Yadav A, Srikar Gemaraju, K.Vengal Rao, M.A. Mateen,
P.Hemalatha
24. Influence of Cerium Oxide Nanoparticles Additive Blended in Palm oil Biodiesel 767
Used as Alternative Fuel in the Diesel Engine
- Dr. Hanchate Suresh Babu Rao, Gopavaram Sudarsana Reddy,
Thudmella Pavan Kumar
25. Computer Aided Design and Analysis of Heat Sinks With Square, Circular and 774
Rectangular Fins of Different Sizes Using ANSYS
- Vennapusa Vijayabhaskar, Dr. Kolla Srinivas
26. Security, Privacy and Reliability Issues in IoT 777
- Renu Bala
27. Bamboo: An Eco-Friendly Material for Structural Applications 780
- Dr. Asheesh Kumar, Mr. V. Vijaya Bhaskar, Dr. P. Badari Narayana
28. Design and Analysis of Horizontal Boring Spindle 784
- Mr. M. Mahesh
29. Development and Performance of Electro-Hydraulic Excavator 789
- Mohanraj K S, A. Arun Negemiya, C. Sangeevi
30. Thermal Performance Investigation for Direction of Twist of Inserted Twisted Tape in 795
Evacuated Tube Solar Water Heater
- Hitendra Damarlal Chaudhary, Dr. Sadanand A. Namjoshi
31. A Review: Composite Materials Used in Medical Field 798
- Komma Hema Mahesh Babu, Dr. K. Prahlada Rao
xxiv
Sl.No. Title of the Paper Page No.
xxv
Sl.No. Title of the Paper Page No.
Department of H&S
Mathematics
1. Applications of Rough Sets in Graphs 873
- R.Aruna Devi, R.Nithya, K.Anitha
2. A Study of Guided or Unknown Game Theory in the Banking Industry using the 876
Brute Force Algorithm
- Dr. Sridevi, Dr.SM.Chithra
3. Model of Flow Network as Linear Programming and its Solution 880
- K. Bharathi
4. Wavelet Based Lifting Schemes for the Numerical Solution of Generalized 885
Burgers-Huxley Equation
- L. M. Angadi
5. Finite -Difference Investigation of Laminar Natural Convection Flow in an 891
Odd-Shaped Enclosure
- Veena Chandanam, C. Venkata Lakshmi, K. Venkatadri
6. ISI Index of Hexagonal Chain 895
- A. Dhanalakshmi
7. A Fuzzy Susceptible-Infected-Removed Model for the Transmission of Covid-19 898
- S. Sweatha, Sindu Devi
8. A Note On mN Disconnectedness 902
- Mrs.N.Raksha Ben, Dr.G. Hari Siva Annam
9. Application of Intuitionistic Fuzzy Soft Matrices in the Field of Medical Diagnosis for 907
Covid-19 Patients
- Dr.J.Sengamalaselvi
10. Mass and Heat Transfer Effect on MHD Flow of a Visco-Elastic Fluid through Porous 911
Nedium with Oscillatory Suction and Heat Source
- Rama Mohan Reddy.L, Veera Sanjeeva Kumar.P
11. A Sectional Survey on Solution of Transportation Problem in Operations Research 919
- M. Chaitanya Sreelakshmi
12. MHD Forced Convective Laminar Boundary Layer Flow from A Convectively Heated 921
Moving Vertical Plate With Soret and Dufour Effects
- B. Nagabhushanam Reddy, Kuppala R Sekhar
13. Heat and Mass Transfer in MHD Tangent Hyperbolic Fluid Over Chemically Reacting 924
Exponentially Shrinking Surface
- Kuppala R Sekhar
xxvi
Sl.No. Title of the Paper Page No.
Physics
1. Impact of Oxidation Number on the Structural and Optical Properties of Sn Doped 931
ZnO Nanoparticles
- Deepannita Chakraborty,Ragavi,Nishanthini,Yamuna,Chaitanya Kumar.K,
S.Kaleemulla
2. Investigation on Physical, Structural and Luminescence Characteristics of Dy3+ - Ions 936
Doped Bismuth Borate Glasses for Photonic Applications
- B Munisudhakar, N.Manohar Reddy, G.Manjula
3. Influence of Plasticizer on (PEO+PVP) Based Blended Solid Polymer Electrolyte 943
Membraneces
- U. Sasikala, P. Naveen Kumar
4. Improved Adhesion and Enhanced Field Emission of Multi-Walled Carbon Nanotubes 949
Based Cold Cathode by Copper Oxide Buffer Layer
- Yawar Alamgeer, Shambhu Kumar Yadav
5. Effect of Annealing on Structural and Optical Properties of Mn: ITO Thin Film 953
- Deepannita Chakraborty, Chaitanya Kumar K, S.Kaleemulla
6. Correlation of Nano Capacitance with Electrical Properties of Advanced Materials 958
- Dr. Alla Srivani, Dr. Charugundla Nagarathnamaiah, Dr. Raghavendra,
Syed Beeban Basha, Praveen kumar Namburu, Dasari Sreedhar
7. Emerging Trend's in Pico Technology for Medical Application's 962
- Dr A Srivani, Gurram Vasanth
ES/ Chemistry
1. Characterization and Therapeutical Study for Leaf Extract of Phyllanthus Niruri 967
(Bhumi Amla), Assessment of Silver Nanoparticles (AgNP) Synthesis and Comparative
in-Vitro Studies of Extract+AgNP
- Debasish Sahoo, Tanushree Chatterjee, Navita Gupta, Bhawna Pandey,
Virendra Kumar Vaishnav, Rajat Kumar Nayak
2. Study of Municipal Sewage Water Treatment from Khan River (Indore, MP) by using 974
Fenton Process Method
- Aditya Narela
3. Natural Synthesis of Nanoparticles and its Applications by Green Synthesis Process 980
- S.D.Mankar, Anjali Arvind Dama
4. Sustainable Development Through Biofuel as Future Energy Resource 985
- Dr. Shalini Jaiswal
English
1. The Prominence of Soft Skills in one's Academic and Professional Enrichment 992
- Madderi Muthuvel Gopi
2. The Importance of English Language and Literature in the Development of Students 996
Language Skills
- Madhu Panse, Hassan Md Jillun Noor, Prajakta Vijaykumar Patil
xxvii
Sl.No. Title of the Paper Page No.
xxviii
Sl.No. Title of the Paper Page No.
Department of MBA
1. Understanding E-Commerce:A Study with Reference to Present Scenario of COVID-19 1019
- Rajwinder Kaur
2. Exploring the Interrelationship between Green Human Resource Management and 1025
Corporate Social Responsibility
- Sapna, Anjali Gupta, Mr. Pardeep Kumar
3. A Study of Relationship Between Celebrity Endorsement and Brand Personality 1030
- Simran Sikka, Jitender Kumar
4. Government Schools: A Sustainable Initiative for Parents With Reference to Post 1034
Covid Financial Situation
- Dr. Shweta Mishra, Dr Sonal Sidana
5. An Evaluative Comparative Study on SBI & ICICI Bank in India 1040
- Dr.K.Karthikeyan, M.Dinesh Kumar
6. Digital Marketing- A Boost to Today's Businesses 1046
- Dr.Balaji.K
7. A Study on the Efficacy of the Public Distribution System in India 1050
- Kiran Sudi
8. A Systematic Application for Public Distribution- Ration Shop 1056
- Sanjeeva Kumara
9. Innovative Marketing Communications 1059
- Dr. Sindhu Varghese
10. Management of Non-Performing Assets in Banking Sector in India 1061
- Dr. P. Raghunadh Reddy, Y. Maheswari
11. Digitalization in India: Opportunities and Challenges 1067
- Dr. P. Subramanyachary, Dr.B.M.Raja Sekhar
12. Sports Marketing-A Pioneering Style of Marketing Management 1072
- Dr.B.M.Raja Sekhar
13. Role of Women in the Entrepreneurship Context: A Brief Literature Study 1077
- Mahanish Panda
14. HR Initiatives in Banks: Need for a Pragmatic Approach 1082
- Dr. Thimmaiah Bayavanda Chinnappa, Dr. Bashir Garba
15. Environmental Accounting and Reporting on Organisation - The Next Generation 1086
Importance and Impact
- Dr. Thimmaiah Bayavanda Chinnappa
16. A Contemporary Issue on Eco -Friendly Consumerism- Post Covid 19 1092
- Dr. Thimmaiah Bayavanda Chinnappa
17. A Study of the Emotional Wellbeing of Service-Sector(Education) Employees Working 1097
from Home During Covid-19
- Mr.Rohan Thomas Jinu, Dr.K.D.Balaji
xxix
xxx
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
connected mobility resulting in a net savings of roughly distributed source of renewable energy growth.Itt has
Rs. 3.9 lakh crore in 2030. advantages for consumers,stakeholders regarding the
electricity grid and for society as a whole.Open
protocols will be crucial for development of charging
infrastructure market.
REFERENCES
1. Overview of e-mobility and future trends of EV by Sanjay
Nibandhe.
2. Conversion of conventional car in to Electric car by Dr. A V.Ravi
Teja.
3. Introduction of Electric vehicles charging and interaction with
grid by Dr.Ritesh Kumar Keshri.
4. Battery charges and management system by Dr. Manoj Rathi.
Fig 13. Flying Electric Vehicle 5. Electric cars Technology by DelftX Ecar
Feature are uses multiple rotors for lifting,BLDC
motor presently used,safety and battery issues will be
next mode of transport
Abstract -The most essential point of this paper in the field of MEMS can be understand using
is to plan a gadget utilizing MEMS based vibration micromachining. Since in micromachining technology
sensor which assists with distinguishing the area the analysis can be done up to micro level or even
of the vehicle and in the event of any tragic mishap beyond that so silicon based micromachining is getting
promptly message ought to be reached to the close
enough interaction from all researchers. [1-3].To
by emergency clinics at ostensible expense with
simple availability. In present existing framework develops any kind of MEMS based device one has to
we don't have an area overall arranging structure. know about the basic steps of MEMS (Micro-Electro-
It is accessible just in exorbitant vehicles like Mechanical-Systems) process [4-5]. In short it has four
BMW. Airbag discharge structure isn't open in major steps which have been shown in fig.-1. Its
standard vehicles. In this paper vibration sensor methodologies and scaled down scale structure based
has been utilized which perceives even slight contraptions can radically impact of the aggregate of
vibrations like speed breakers. In framework our daily routines and the way in which we experience
MEMS sensor has been utilized which sees [6-9].There are lot many designs are possible by
massive combinations along all headings. It is like modifying the MEMS structures and even though by
way includes district overall arranging structure in modifying in geometrical construction as a outcome
which we use GPS module. Embedded designs
there is much impact on sensitivity.MEMS based sensors
outright an amazingly certain task; they can't be
redone to do explicit things. Implanted plans have plays a vital role in almost all the fields [10-14].
particularly kept resources, particularly the
memory. An express action should be done inside
an unequivocal time. In some introduced
structures, called predictable systems, the due
dates are outrageous. Missing a due date may
cause a catastrophe loss of life or mischief to
property. So by utilizing this undertaking practical
data can be dispatched off the closest clinical office
including degree and longitude data and store move
can be made right away.
Keywords-Arduino, Detection, MEMS,
Modeling, Vibration Sensor. Fig.-1: Basic Process of MEMS
only accident detection is possible; thus, through fig.-2 likewise screen the vehicles constantly. There are
vibration detection has been shown using piezoelectric different approaches to follow a vehicle. Bigger
sensor. associations use web administrations to parcel huge
number of vehicles while limited scope ventures can
utilize different versatile applications. To discover careful
area, distance and assessing time to arrive at specific
objective an android application is created [19-21].
Hypothetical it is not difficult to say we can get the
specific area of a vehicle, however basically now and
then it is close to inconceivable. Despite the fact that
we have trend setting innovation it is hard to really
acquire the geological directions right constantly. Use
Kalman channel should be possible, to get a careful
Fig.-2: Detection of Vibration longitude and scope position. MEMS-based
accelerometers are one of the least difficult yet in
Vibration sensor identifies vibrations or unexpected
addition most material miniature electromechanical
regulations and gives a computerized yield high/low
gadgets. They are broadly utilized in expense touchy,
rationale relying upon the module [15-18]. Here utilized
low force, movement and slant detecting applications
a functioning high rationale vibration sensor module. It
like cell phones, gaming frameworks, plate drive
implies at whatever point the vibration sensor will
assurance, picture adjustment and sports and wellbeing
recognize vibration it will give high rationale to the
gadgets. MEMS-based accelerometers are accessible
microcontroller.
with various advances. The most widely recognized
depend on capacitors and gas chambers. In this structure
we use MEMS sensor which recognizes enormous
assortments along all direction. It furthermore involves
zone following structure in which we use GPS module.
Embedded frameworks complete a specific assignment;
they can't be adjusted to do obvious things inserted
structures have incredibly restricted assets, especially
the memory an unequivocal activity should be done
inside an express time. In some introduced structures,
called progressing systems, the due dates are severe.
Fig.-3: Operation of Piezo and Vibration Sensor Missing a due date may cause a catastrophe loss of life
With the help of piezo and vibration sensor in fig.-3 or damage to property. MEMS (Micro-Electro
on and off conditions has been shown depending on its Mechanical System)- based accelerometers are gadgets
connectivity according to its terminals and by altering that measure the legitimate increasing speed. In relativity
the terminals connections. In this work the main purpose hypothesis, appropriate quickening is the actual
is It is utilized for vehicle following and whenever any increasing speed experienced by an item. The psychical
approved individuals offers message to GSM at mishap speeding up is quantifiable by sensors. These sensors
area then it sends back the message of the mishap area are essential for the detecting group of pervasive
long and lat esteems. The vehicle following innovation advancements. Detecting innovations utilize actual
utilizes the GPS frameworks by means of numerous boundaries from the climate, for example, temperature,
applications. These applications are useful as the track pressing factor, power and light. An accelerometer
the vehicles and their accomplice web applications estimates weight for every unit of mass, an amount
otherwise called explicit power, or g-power. Estimating
8 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
g-powers permits clients to for example cooperate with all the gear portions needed for the endeavor execution.
items by methods for signal acknowledgment. The fragment assurance put a critical occupation in this
II. METHODOLOGY outcome. A portion of the assignment sections are
control supply, Arduino UNO, LCD, Relay, GSM and
MEMS based vibration sensor has been used in this GPS Module. The process of working of this model
work. At very initial stage of the work using multiphysics which is shown in fig.-6 is given below:-
software COMSOL 5.2a different MEMS based
structures like microcantilevers (with different shapes)
has been analyzed to understand the concept of
deflection,vibration,displacement,stress,strain and many
more mechanical parameters. At second stage
concentration has been done about interfacing MEMS
based vibration sensor with 8051 microcontroller.
Further for the purpose of location tracking different
concepts of GPS and GSM has been utilized by proper
analysis which has been shown in the fig.-4. The primary Fig.-5: Working Model
Process and method of this work has been shown • Switch on the Power supply.
through this block diagram which is showing below in
figure-4. • Full wave rectifier (FWR) is extensive in nature and
it is very much helpful to understand does the change
of the forced air system. Additionally it supports
transformer.
• Voltage supply of 5v is given to the microcontroller.
• Arduino UNO microcontroller for productive yield.
It goes about as a control unit.
• MEMS sensor will detects the vibrations of mishap
and sends its response to the regulator.
• GPS and GSM modules enact and send area to the
Fig.-4: Block Diagram portable number which is preprogrammed.
The above Fig.-4 shows that in this research MEMS Result has been analyzed and screen short has been
sensor has been utilized which perceives huge taken for the same which has been shown in the figure-
assortments along all headings. It furthermore contains 6, which is given below:-
territory worldwide situating system in which GPS
module has been utilized. Embedded designs all out a
specific undertaking; they can't be modified to do
specific things installed frameworks have incredibly
bound assets, especially the memory. An express activity
done inside an unequivocal time. In some presented
structures, called consistent frameworks, the due dates
are serious. Missing a due date may cause a catastrophe Fig.-6: Screen short of working model result
death toll or underhandedness to property.
After effective plan and execution it has been
III. RESULT ANALYSIS altogether cheeked and yield has checked and it has
As per the goal of the paper it has been implemented been found that some sort of sign issues are present,
and tested which can be seen in fig.-5.This part includes rest of the things are fine.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 9
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Technology can be a better plateform for accedent [13]F. Laermer, A. Urban, "Milestones in deep reactive ion etching",
Digest Tech. Papers Transducers'05 Conference, Seoul, Korea,
detection as well as secure and timely information for June 5-9, 2005.
better cure,specially in the field of biomedical
[14]Artech House Microwave Library, Artech House, Boston, MA,
applications. 1999.
REFERENCES [15]Kovacs, G.T.A., Micro machined Transducers Sourcebook,
McGraw-Hill, New York, NY,1998.
[1] Kang Rao, Huafeng Liu*, Xiaoli Wei, Wenjie Wu, Chenyuan Hu,
Ji Fan, Jinquan Liu and Liang-cheng Tu*:A High-resolution Area- [16]Madou, M., Fundamentals of Micro fabrication, CRC Press,
change-based Capacitive MEMS Accelerometer for Tilt Sensing, Inc., Boca Raton, FL, 1997.
978-1-7281-2983-9/20/$31.00 ©2020 IEEE [17]M. Offenberg, F. Laermer, B. Elsner, H. Muenzel, W.
[2] Corina Covaci, Aurel Gontean, Piezoelectric Energy Harvesting Riethmueller, "Novel Process For A Monolithic Integrated
Solutions: A Review, Sensors 2020, 20, 3512; doi:10.3390/ Accelerometer", in Digest Tech. Papers Transducers'95 and
s20123512 Eurosensors IX Conference, Stockholm, June 25-29, 1995.
[3] A. Sabato, C. Niezrecki and G. Fortino, Wireless MEMS-Based [18]Tilmans, H. A. C. "MEMS components for wireless
Accelerometer Sensor Boards for Structural Vibration Monitoring: communications" (invited paper). In Proceedings of the 16th
A Review, in IEEE Sensors Journal, vol. 17, no. 2, pp. 226-235, European Conference on Solid-State Transducers,Prague, Czech
Jan.15, 15 2017. Republic, September 15-18, 2002, pp. 1-34.
[4] Freescale Semiconductor. MMA8451Q, 3-Axis, 14-bit/8-bit [19]Gibbs1, M. R. J. E. W. Hill and P. J. Wright, Magnetic materials
Digital Accelerometer, Rev. 9.1. 2015. for MEMS applications, Inst. of Physics Publishing, J. of Physics
D: Applied Physics, 37, 2004.
Abstract: Due to the increase in traffic problems, old vehicles do not have RFID tags. So here we are
we see so many cases of red signal breakage every using ultrasonic sensor, so if a vehicle passes by without
day, to solve this problem we have developed a an RFID tag, the sensor detects this and the camera
system called "Automatic Penalty Assortment takes the picture. Hence the system is useful to keep
System for Traffic Light Violation" with IoT. The
track of all vehicles. India is the second most popular
purpose of the project is to properly track traffic
signal violations with the help of cameras using
country in the world and a rapidly growing economy.
RFID tag and infrared sensor. This document shows The number of vehicles is increasing exponentially from
the entire traffic light handling system using the day to day.
latest technologies. The system works with red Increased traffic will bring many problems, such as
light. In the existing system SMS are being sent accidents, various pollution, time loss and health
on the phone, so we use email notifications. us,
problems. The main causes of traffic problems are the
our system would be helpful so that traffic
management officers can successfully track all
increase in the number of cars and violation of traffic
traffic sign issues in the most appropriate and rules. The main purpose of the project is to collect fines
desired manner. for violating traffic lights. The project includes the use
of RFID tags in cars and the use of RFID readers in
Keywords: RFID reader, IR sensor, Node MCU
signals. Responsible for detecting vehicles that violate
camera, Arduino UNO.
traffic rules.
I. INTRODUCTION
Traffic officers
Traffic sign violations often lead to accidents. To
In the traffic module, they have authority over the
solve this problem, police authorities and our traffic
details of the penalties, view photos, send notifications
department have many solutions, as we see surveillance
and also see the list of rule breakers of the day. Penalties
cameras today, through which additional measures are
or not, traffic agents can check all of this through
taken in the event of any type of vehicle breakdown.
applications.
Many systems are available there. Our system works
out of the box, as all vehicles with registered users now Vehicle owners
have RFID tags. Therefore, when the red light is on In the system's user module, users have the right to
and the vehicle passes the line it recognizes this see what kind of penalties the image that the system
automatically and the detection of the rule breaker sends to their license plate assigns all data to them.
becomes easy for the system. The notification of the
criminal details will be sent to this user immediately. II. LITERATURE REVIEW
There is an application through which we can see all Hiasat and Almomani have developed and
the data of the penalties with the details of this user. implemented a system that combines radio frequency
This also allows users to see how the fees were identification (RFID) with the Global System for Mobile
charged. for them and by camera there is also a picture Communications (GSM) to control traffic and identify
of their violations. If there is no RFID tag, because our searched vehicles. This document introduces a system
12 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
that uses adaptive components, including radio based on the number of tags sent in the GPRS mode in
frequency identification (RFID) transponders, which can the saved database. The web server algorithm is derived
be placed anywhere on the road, and then transmits from the two vehicle driving times. Finally, drivers can
real-time collected data from a short time to a server in identify traffic jams on monitored roads through websites
a fixed and static state. Message retention (SMS) to or short message services (SMS). The street selected
the next or police station. Stop offending vehicles via by SMS or email. In another study [4] the author G.
GSM and can choose to notify the driver Violation Vara Prasad proposed a low-cost system that handles
through e-government system (in Jordan) and immediate over speeding through Zigbee. The system in this
payment of fines. document consists of two parts: the sending part or
In another study [1] the author Shruthi KR was unit and the receiving unit. The transmitter module is
proposed a system for detecting car accidents and located in a certain area. The speed limit is programmed
speed limits. Electromechanical system technology in the PIC16F877A microcontroller. The information
(MEMS), radio frequency (RF), global positioning is sent to the receiver module in the car through the
system (GPS) and global system for mobile Zigbee radio protocol (CC2530). The receiver module
communications (GSM). The dashboard also displays is divided into two blocks, one of them is next to the
driver warnings for accidents and speed limits. rear-view mirror, composed of a Zigbee receiver that
receives wireless signals, a 16F877A PIC
In another article [2] the author Sayanti Banerjee microcontroller that receives signals from the Zigbee
has a system was introduced to automatically control receiver, and a CAN controller that receives signals
car brakes using speed limit displays and active RFID from the microcontroller. The baud rate is 125KB/ab.
tags on traffic signs. In his work, he proposed a system The other unit is next to the dashboard of the vehicle.
based on three stages: identifying the RFID transponder The communication between the two CAN controllers
(tag), inputting the vehicle speed sensor into the comes from two sub-units. In the second sub-unit, the
electronic control unit (ECU), and finally controlling the CAN controller receives the vehicle speed from the
vehicle brakes. [2] The system uses an RFID reader speedometer and sends it. [2] The microcontroller then
(30m reading range) to send the reference speed from compares the speed of the car with the maximum speed
an RFID tag connected to a road sign or speed limit and draws conclusions from it.[5]-[7] The speed
sign to the ECU, and the ECU provides an output signal difference is constantly checked and a warning is issued
to control the speed of the vehicle. on the liquid crystal display (LCD). If the speed limit is
In another study [3] the author r. Hedge has exceeded, an audible warning is issued to slow down.
developed a system that can track traffic congestion in If the driver ignores the warning, the violation will be
real time. The controller is updated via short message recorded and recorded. [1] The microcontroller will
service (SMS) or a website using radio frequency save any violations detected by the vehicle and will
identification (RFID) and general packet radio service display a message containing the speed difference and
(GPRS) technology and Google Maps API. [3] The vehicle license plate information.
design of the proposed system is divided into two BACKGROUND
categories: 1. The server, which is usually composed
of a GSM modem and a website or portal, and 2. The In recent years, the digital space has undergone
client is usually composed of a GPRS modem and two tremendous changes, and industry experts believe that
RFID readers (Texas Instruments). In the system, two it will continue to develop. The Internet of Things (IoT)
radio frequency identification readers (RFID) are placed is the latest player in the digital field. The Internet of
at a certain distance on the road, and passive RFID Things can also be defined as the interoperability of
tags are affixed to the car. Essentially, the RFID reader software, telecommunications, and electronic products.
reads passive tags when they pass, and then uses the The hardware industry has brought huge opportunities
web server algorithm to calculate the vehicle speed to many industries.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 13
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Slide
Switch
N ode MCU
Camera
Sensor on
Vehicle
crossing
thezebra VI Conclusion
line
In this way,VI. the CONCLUSION
system is automatically penalized
for violating traffic
In this way, the system rules and, in turn, leads
is automatically to
penalized
disciplined traffic in our country. It will
for violating traffic rules and, in turn, leads to disciplined help
RFID detect minimize many traffic-related prob lems that cause
the vehicle traffic in our country. It will help minimize many traffic-
system-wide disrup tions and red uce the number of
related problems
accidents. that jam
Traffic cause system-wide
that d evours o urdisruptions
precious
and reduce
time. In our system, we only monitor trafficjam
the number of accidents. Traffic that
at the
devours our precious
signposts, but it could time. In useful
also be our system, we only
for mo nitoring
no entry,
monitor trafficone-way streets, etc.
at the signposts, butThe systemalso
it could saves
betime
useful
Camera capture the and is designed fo r fast application. The Automated
vehicle number and
for monitoring no entry, one-way streets, etc. The
Penalty System for Traffic Sign Violatio ns is a very
send to the user and End system saves time and is designed for fast application.
easy to use application that saves time and effort.
also penal ty msg is to The TheAutomated
applicationPenalty System and
works efficiently for helps
Traffic Sign
traffic
send mobile. Violations
system ismanagement
a very easytotoreduceuse application
your manual thatwork
saves
timeandand effort. The application works efficiently and
time.
Features of Proposed System:
helps traffic system management to reduce your manual
The different features in this proposed system are:- work and time.
1. Application Interface
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 15
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- In communication process the signals One type of antenna that radiates energy in all the
are to be transmitted over a long distance to reach directions is an omnidirectional antenna in which the
the distance then they may undergo through the gain of this antenna is small in comparison with
obstacles and signal scattering takes place. In our directional antenna. The longer distance can be covered
paper we hired beamforming antennas which are
by the radio waves radiated by directional antennas.
controlled electronically so that radiation pattern
gets adjusted. The interfering signals are get An antenna is an electrical conductor or system of
suppressed and at the same time the received conductors
signals are maximized. The smart antenna will
decrease the noise by increasing the signal to noise • Transmitter - Radiates electromagnetic energy into
ratio and have better system competence. In space
adaptive beam we can use spacing of several • Receiver - Collects electromagnetic energy from
antennas and phase of the signal of each antenna space
array to control the shape as well as the direction
of the signal beam. In this paper we can observe The IEEE definition of an antenna as given by
the use of smart antennas using an adaptive beam Stutzman and Thiele is, "That part of a transmitting or
method as a better system for the signal receiving system that is designed to radiate or receive
transmission. Comparison for both omnidirectional electromagnetic waves".
antenna system and smart antenna system by
II. LITERATURE REVIEW
simulating them. Advantages of smart antenna
system over omnidirectional antenna is discussed Adaptive beam forming smart antenna can be used
in this paper. In this paper, it was seen that the for indoor positioning systems. The paper "Analysis of
higher the signal frequency (between 3 GHz, 4 GHz, Beamforming Antenna for Practical Indoor Location-
and 5 GHz) had a more limited range of angles it Tracking Application" done by Kim, S.W., and Choi,
could detect due to the beamwidth of the main lobe. D.Y. in 2019 [6] makes use of the beamforming antenna
Keywords- Smart antenna, Beam forming as a single anchor point to receive indoor localization
antenna, Directivity, Elevation angle, Power gain signals. The beamforming antenna used in this paper is
I. INTRODUCTION a 1x4 antenna array connected to a 4x4 Butler matrix.
The function of the Butler matrix is to control the
The devices that are used to send and receive direction of the main lobe. The antenna array inputs the
electromagnetic waves over a long distance are antenna. received signal into the Butler matrix and in turn, the
The transmitting antenna takes physical energy and Butler matrix feeds a signal with varying phases to each
converts into electrical energy and radio waves that element antenna to produce a directed signal. The
travel miles around the earth and back to earth towards indoor positioning system was implemented by setting
from atmosphere. There are different types of antennas up 10 target locations lined up in a perimeter of a half-
used based on requirements. While designing an antenna circle each separated by an angle of 15o. In the
always gain, polarization and direction are the three experimentation, it was seen that the higher the signal
fundamental properties should be considered always. frequency (between 3 GHz, 4 GHz, and 5 GHz) had a
more limited range of angles it could detect due to the
beamwidth of the main lobe.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 17
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
The system can detect targets 2 meters away from square, and sample matrix inversion to prove that a
the anchor point. Additionally, the main lobe of a proposed fast conjugate gradient method was superior
beamforming antenna can be directed in two directions to the existing beamforming algorithms and was most
at the same time, the beamforming antenna in the indoor suitable for high-speed mobile communication.
positioning localization system can also detect multiple Previous studies on adaptive beamforming algorithms
targets at a time. The paper utilizes the steering angle of have also been made. The conference paper
the beamforming antenna to detect the location of a "Performance Analysis of Adaptive Beamforming
target. In high-speed data communications, smart Algorithms" done by P. R. Jeripotula and B. Rajendra
antenna systems are prominently used with various Naik in 2018 analyzed two beamforming algorithms
modulation techniques. The article "CL-SA-OFDM: which are the least mean square and normalized least
Cross-layer and smart antenna based OFDM system mean square algorithms. The paper suggests that the
performance enhancement" done by Shivapan normalized least mean square algorithm converges at a
chakshari, T. G., and Aravinda, H. S. in 2020 makes faster rate than the latter. The simulation of both of these
use of smart antennas with the modulation technique, algorithms was also conducted in MATLAB. The use
orthogonal frequency-division multiplexing (OFDM). of smart antenna systems concerning omnidirectional
With regards to OFDM, adaptive beamforming causes antennas was conducted with regards to mobile ad hoc
problems in the designs of medium access layers which networks. The article "A low energy consumption smart
lead to complications in the adaptive resource allocation antenna adaptive array system for mobile ad hoc
mechanism. Various smart antenna mechanisms were networks" by V. Inzillo, F. De Rangoand, A. A.
used to suit the needs of different users with regards to Quintana in 2017 used adaptive array smart antennas
the quality of service. Smart antenna designs can be in mobile ad hoc networks for the enhancement of
utilized to improve transmission rates. properties such as energy management. The paper
The article "Smart antenna design for high-speed proposed an adaptive array smart antenna which would
moving vehicles with minimum return loss" done by enhance some Ad hoc Distance Vector network
Sarkar, M., Singh, A., Gupta, S., and Hassanien, A. E. protocol features utilizing optimizing the energy
in 2020 makes use of a machine learning technique for consumption. The simulation of the said system used a
the design of a smart antenna that can improve Least Mean Square algorithm and used the MATLAB
transmission rate with a minimized return loss. software.
The experiment suggested a four-element cylindrical III. PROPOSED METHOD
antenna array that was wrapped around a cylindrical Smart antenna proposes a release by transmitting
surface. The bandwidth of the proposed design was or receiving power only to or from the desired user.
set at 200 Mhz with a center frequency of 3.9 GHz
and covered the range of 3-3.9 GHz with a gain of 4.9 Basically, smart antennas are of 2 types.
dBi. The design that was suggested was low profile 1. Phased array: - It consists of either a number of fixed
and was theoretically usable in high-speed avionic beams with one beam turned on towards the desired
applications. The study was made to solve a problem user as shown in Fig 1.
concerning transmission processes in highspeed moving 2. Adaptive array: - It puts a main beam in the direction
vehicles and the growing concern of power of desired user and nulls in the direction of the
consumption. Adaptive Beamforming may also be used interference Omni directional antenna and the
in high-speed mobile communications. The article Adaptive Beam forming Antenna is compared
"Adaptive Beamformers for High-Speed Mobile accordingly and the simulation is recorded.
Communication" done by V. Dakulagi and M.
Alagirisamy in 2020 compared various beamforming
techniques such as least mean square, recursive least
18 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
approach for the distance transmission line. radiates pattern of the antenna array by adding
ADAPTIVE BEAMFORMING ANTENNA: constructively the phases of the signals in the direction
of the targets mobiles desired in the multiplying the
Smart antennas are of two types they are 1) Switched patterns are used in the targets. The sensor array
Beam Antenna 2) Adaptive antenna array. We hired analyser application was used to design and simulate
switched-beam system in order to improve the received the two antennas of the paper.
signals. Incoming signal is get detected to enable the
base station in order to realize the beam which was An alternative application that can be used is the
best aligned in the signal-of-interest direction. Then it antenna designer application in the antenna toolbox. To
switches to that beam to communicate with the user. compare the two antennas, the length of the
omnidirectional array and the radius of the circular planar
In an adaptive array, it contains number of patterns array was kept the same. The signal frequency and
which are adjusted in the real-time adaption of the radio propagation speed of the antennas were also the same
environment. It is an array where multiple antenna values. . switched beam antenna systems form multiple
elements are continuously changing its pattern along with fixed beams with heightened sensitivity in particular
the time through collecting feedback from the directions these antenna systems detect signal strength
surroundings to maintain optimum state. In case they choose from one of several predetermined.
desired angles are continuously changing along with the
time then we need to devise such a scheme then it can The application requires the user to input certain
continuously update the array weights. In short we can parameters to simulate the antenna. For the
say that this is the best technique for tracking the mobile omnidirectional antenna, a linear array geometry was
user without distraction in changing RF environment. selected, the number of elements was 2, the spacing
element was set to 5 m, the chosen antenna element
In smart antenna system, the radiation pattern of an was an isotropic antenna, the propagation speed was
antenna can be controlled by using DSP i.e., Digital set to 3x108 m/s and the signal frequency was set to
Signal Processing. Desired signals, interfering signals, 300 MHz. For the adaptive beamforming smart antenna,
and Gaussian noise are the input signals for antenna the array geometry chosen was a circular plane with
array. Array weights can be controlled and also the the radius set to 5m; the spacing element was set to
output error also can be minimized by adaptive 0.5m. The MATLAB source file was extracted from
algorithms. The errors can be calculated by the the sensor array analyzer.
subtraction of output signals from reference signals. With
the suitable design of adaptive algorithms, the signal- V. EXPERIMENTAL RESULTS
to-interference ratio is maximized or minimized Geometry array:
according to the different optimization parameters like The performance of an array will depend on the
variance, MSE, interference nulling, and the steering of number of elements in the array (generally more
main beam toward the user. The two most important elements yields better performance), the weighting
aspects of the smart antenna are an estimation of vector used, and the geometry of the array. Observing
Direction of Arrival (DOA) and the digital beamforming the Array Factor, you will note that the array's output
(DBF) (or reception pattern) is a strong function of the geometry
WORKING PRINCIPLE: (positions of the antenna elements that make up the
An important toolbox in MATLAB to design and array).
simulate the paper is the Phased Array System Toolbox. For uniformly spaced arrays (either 1D, 2D, or 3D
The phased array system toolbox has built-in commands arrays with a constant spacing between elements), the
and applications that contain the algorithm for sensor maximum spacing is a half-wavelength to avoid grating
array systems. It is the method used to create the lobes. This effect is sometimes called "aliasing", which
is a term that is borrowed from the signal processing BEAM FORMING SMART ANTENNA OUTPUTS:
5. F. Ali, A. Urban, and M. Vossiek, "A high resolution 2D 10. [M. Sarkar, A. Singh, S. Gupta, and A. Hassanien, "Smart antenna
omnidirectional synthetic aperture radar scanner at K band," the design for high-speed moving vehicles with minimum return loss,"
European Microwave Week 2010, EuMW2010: Connecting the International Journal of Communication Systems, vol. 33, no.
World, Conference Proceedings - European Radar Conference, 11, 2020.
EuRAD 2010, pp. 503-506, 2010.
11. V. Dakulagi and M. Alagirisamy, "Adaptive beamformers for
6. A. Innok, P. Uthansakul, and M. Uthansakul, "Angular high-Speed Mobile communication," Wireless Personal
beamforming technique for MIMO beamforming system," 2012 Communications, vol. 113, no. 4, pp. 1691-1707, 2020.
9th International Conference on Electrical Engineering/Electronics,
12. P. Jeripotula and B. Rajendra Naik, "Performance analysis of
Computer, Telecommunications, and Information Technology,
adaptive beamforming algorithms," 2018 International Conference
ECTI-CON, 2012.
on Circuits and Systems in Digital Enterprise Technology,
7. W. Li, Y. Zhao, and Q. Ye, "Semi-virtual antenna array ICCSDET, 2018,
beamforming method," Progress in Electromagnetics Research
13. V. Inzillo, F. De Rango, and A. Quintana, "A low energy
Letters, vol. 68, pp. 33-37, 2017.
consumption smart antenna adaptive array system for mobile ad
8. S. Kim and D. Choi, "Analysis of beamforming antenna for hoc networks," International Journal of Computing, vol. 16, no.
practical indoor location-tracking application," Sensors 3, pp. 124-132, 2017.
(Switzerland), vol. 19, no. 14, 2019.
9. T. Shivapanchakshari and H. Aravinda, "CL-SA-OFDM: Cross-
layer and smart antenna based OFDM system performance
enhancement," International Journal of Electrical and Computer
Engineering, vol. 10, no. 5, pp. 4663-4670, 2020.
Abstract- Arithmetic units are the major blocks Wallace tree multiplication algorithm is beneficial in
of processing units in a processor. Multiplication terms of speed among other multiplication algorithms
is one of the important operation among all [2]. In the operation of Wallace tree multiplier, first we
arithmetic operations. The existing multipliers produce the partial products which is similar to binary
occupy more area and delay. Wallace tree
multiplier. In the second stage we perform addition using
multiplication algorithm is a better one in terms of
half adders and full adders. In the final addition stage
speed among other algorithms. With more
advancements in technology we need to have we use conventional adders to produce the final
circuits which operate with better performance. So, product. Hence the adders play a very important role
in order to decrease the delay in the Wallace tree in generation of final product. The speed of addition is
multiplier without degrading its area, we design new going to affect the operation of multiplication.
Wallace tree multiplier structures using different Hence to improve the performance of multiplication,
Parallel prefix adders in this paper. In the proposed
we opt for a new structure of Wallace tree multiplier in
multipliers, we use Parallel Prefix adders in the
final stage of addition of multiplier in place of this paper which uses fast adders known as Parallel
conventional adders. In this paper, we design four prefix adders (PPA) in the final stage addition in place
32-bit Wallace tree multiplier structures using of conventional adders. The Conventional adders such
Sklansky adder, Kogge Stone adder, Brent Kung as ripple carry adder carry look ahead adder has some
adder, Ladner Fischer adder. These Multiplier major drawbacks which can be eliminated by using
structures are designed using Verilog HDL & are Parallel Prefix adders.
simulated and synthesized using Xilinx ISE 14.7
design suite. The proposed structures are The Parallel prefix adders are designs which are
compared and analyzed in terms of area and delay. originally derived from carry look ahead adder concept
of generating and propagating of carry bits. The carry
Keywords- Wallace tree multiplier, Parallel
generation tree mainly consists of two components-
prefix adders, Sklansky adder, Kogge Stone adder,
black cell and grey cell. The black cell and grey cell are
Brent Kung adder, Ladner Fischer adder.
interconnected to from carry tree network. Kogge stone
I. INTRODUCTION adder, Sklansky adder, Brent-Kung adder, Ladner-
With evolution in the era of technology in very less Fischer adder are some of the Parallel prefix adders
span of time, the need for fast computation of circuits used in the design of proposed Wallace tree multiplier
used in devices has been rapidly increasing. There is a in this paper.
high demand for the circuits being designed with some This research paper is composed as follows, section
billions of components having low area and high speed. II presents the detailed operation of Wallace tree
All modern processors such as microprocessors, digital multiplier. Section III is composed of many sub sections
signal processors contain Arithmetic Logic Unit (ALU) which describes in depth operation of PPA, different
[1]. Multipliers are very essential for designing industrial PPAs used in the design of multiplier and the structure
applications such as Finite Impulse Response, Fast of proposed multiplier using PPAs. The result analysis
Fourier Transform, etc.
24 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
is clearly explained in section IV. Section V is conclusion • Step-1: The addition operation is performed on first
of the proposed paper. three rows of partial products generated in Stage-1
which generates result of two rows having sum terms
II. WALLACE TREE MULTIPLIER in first row and carry terms in second row.
Wallace tree multiplier is a hardware implementation • Step-2: The last row of partial products of Stage-1 is
of binary multiplier which is used to multiply two added with the sum and carry row which again result
integers. Most extensively used multiplier design in many two rows comprising of one sum row and one carry
processors and memory units is Wallace tree structure row.
[3].
Fig. 14. RTL Schematic of WTM using Sklansky adder Fig. 19. Device Utilization summary of WTM using Kogge
Stone adder
17- Fig. 20
Fig. 17. Simulation result of WTM using Kogge Stone adder Fig. 22. RTL Schematic of WTM using Brent Kung adder
Adder and Ladner-Ficher Adder. The Parallel prefix [4] P. M. Kogge and H. S. Stone, "A parallel algorithm for the efficient
solution of a general class of recurrence equations," IEEE
adders are faster because of less delay and area efficient Transactions on Computers, vol. C-22, no. 8, pp. 786-793, 1973.
compared to other basic adders. The work compares
[5] J. Sklansky, "Conditional-sum addition logic," IRE Transactions
the area, delay of parallel prefix adders. Four multiplier on Electronic Computers, vol. EC-9, no. 2, pp. 226-231, 1960.
structures are simulated and synthesize using Xilinx 14.7. [6] R. P. Brent and H. T. Kung, "A regular layout for parallel adders,"
Wallace tree multiplier using Ladner fischer adder can IEEE Transactions on Computers, vol. C-31, no. 3, pp. 260-
be used for application circuits which require less area 264, 1982.
and speed of the circuits will also be in medium. [7] R. E. Ladner and M. J. Fischer, "Parallel prefix computation,"
Whereas for high speed application circuits, Wallace Journal of the AssoclaUon for Computing Machinery, vol. 27,
no. 4, pp. 831-838, 1980.
tree multiplier using Kogge stone adder can be used
[8] Rakesh.S,K.S.Vijula Grace, "A comprehensive review on the VLSI
but costing little bit more area when compared to other design performance of different Parallel Prefix Adders"
proposed structures. The proposed multiplier structures ScienceDirect, Materials Today: Proceedings 11 (2019) 1001-
can be used in high speed and low area application 1009.
circuits basing on requirement. [9] P.Chaitanya kumari, R.Nagendra, "Design of 32-bit Parallel Prefix
Adders", IOSR Journal of Electronics and Communication
REFERENCES Engineering (IOSR-JECE) e-ISSN: 2278-2834, p- ISSN: 2278-
8735. Volume 6, Issue 1 (May. - Jun. 2013), PP 01-06.
[1] B. Neil H. E Weste and David Money Harris, "CMOS VLSI
Design: A circuits and Systems Perspective", 4th Ed: Addition- [10]Shilpa K. C, Shwetha M, Geetha B. C, Lohitha D. M, Navya
Wesley, 2004. and Pramod N. V.," performance analysis of parallel prefix adder
for datapath vlsi design", 2018 Second International Conference
[2] C. S. Wallace, "A Suggestion on Fast Multipliers," IEEE
on Inventive Communication and Computational Technologies
Transactions on Electronic Computers, vol. EC-13, Issue-1, 1964.
(ICICCT), 20-21 April 2018.
[3] Himanshu Bansal, K. G. Sharma, Tripti Sharma," Wallace Tree
Multiplier Designs: A Performance Comparison Review",
Innovative Systems Design and Engineering, Vol.5, No.5, 2014.
model of robot can effectively find fire and extinguish 4. J. S. C. Bose, M. Mehrez, A. S. Badawy, W. Ghribi, H. Bangali,
and A. Basha, "Development and designing of firefighter robotics
the fire with the help of a water sprinkler pump without using cybersecurity," 2017 2nd International Conference on Anti-
running into any obstacles. Cyber Crimes (ICACC), Abha, 2017, pp. 118- 122. doi: 10.1109/
Anti-Cybercrime.2017.7905275
V. REFERENCES
5. B. S. Sampath, "Automatic fire extinguisher robot," 2011 8th
1. K. Altaf, A. Akbar, and B. Ijaz, "Design and Construction of an International Conference on Ubiquitous Robots and Ambient
Autonomous Fire Fighting Robot," 2007 International Conference Intelligence (URAI), Incheon, 2011, pp. 215-218. doi: 10.1109/
on Information and Emerging Technologies, Karachi, 2007, pp. URAI.2011.6145964
1-5. doi: 10.1109/ICIET.2007.4381341
6. S. Dearie, K. Fisher, B. Rajala, and S. Wasson, "Design and
2. J. Suresh, "Fire-fighting robot," 2017 International Conference construction of a fully autonomous fire fighting robot,"
on Computational Intelligence in Data Science(ICCIDS), Chennai, Proceedings: Electrical Insulation Conference and Electrical
2017, pp. 1-4. doi: 10.1109/ICCIDS.2017.8272649 Manufacturing and Coil Winding Conference (Cat.
3. A. Hassanein, M. Elhawary, N. Jaber and M. El- Abd, "An No.01CH37264), Cincinnati, OH, USA, 2001, pp.303-310. doi:
autonomous firefighting robot," 2015 International Conference 10.1109/EEIC.2001.96563.
on Advanced Robotics (ICAR), Istanbul, 2015, pp. 530-535.
doi: 10.1109/ICAR.2015.7251507
Abstract - Crack plays an important role in the Pang-jo Chun, Shota Izumi, Tatsuro Yamane,
field of evaluating the quality of concrete structures. "Automatic detection method of cracks from concrete
For the concrete structures, cracks are frequently surface imagery using two-step light gradient boosting
encountered disease. It affects the safety, machine", 2020.
applicability and durability of the structure. At
present, pavement crack is detected by manual In this paper, they proposed a Light GBM method
method that has some disadvantages is replaced to detect the surface cracks and obtained an accuracy
by the deep learning method. Manual method of 97.6%.
consumes more time and man power. Here, a vision
based method using a deep-architecture of III. EXISTING METHOD
Convolutional Neural Networks for detecting This paper includes a method for detecting cracks
pavement cracks. based on the light gradient boosting machine (Light
Index Terms - Convolutional Neural Networks, GBM) which is a highly efficient gradient boosting
Image processing, GBM method, decision tree. Similar to other supervised machine
I. INTRODUCTION learning methods, the performance of Light GBM
depends on the feature set. In crack detection, the
To overcome the challenges in manual method, target pixel values and geometric features of cracks,
number of Image processing techniques are evolved to such as whether they are connected linearly, should be
manipulate the images. So, the existing methods are considered. In this study, the method for generating
not yet accurate due to the difficulty and complexity of features based on pixel values and geometric shapes in
the problem. Thus, more accurate and practical methods two stages. In the first stage, we propose a new method
should be developed. Here, the presented deep learning for generating features that explain the crack
method uses Discrete Wavelet Transforms to process characteristics using square and non square filters, which
the images. The CNN is mainly based on the 3 layers : could not be obtained in previous studies. Then, in the
input, hidden, output layers. The biggest challenge of second stage, the geometric characteristics of connected
automated crack detection is to consistently achieve components derived in the first stage are used as features
high performance under various complex environments. of Light GBM.
II. LITERATURE REVIEW
N. Hoang and Q. Nguyen, "A novel method for
asphalt pavement crack classification based on image
processing and machine learning," Engineering with
Computers, 2018.
In this they proposed a machine learning based
ANN algorithm for pavement crack detection. This
method has obtained accuracy of 84.25%. Fig. 1: Block Diagram of Existing Method.
Here, the proposed method is Deep learning based Step 5: Find TP, TN, FP, FN.
Convolutional neural networks using Alexnet. The Step 6: Find the performance parameters accuracy,
proposed CNN architecture contains mainly input layer, precision, sensitivity, specificity.
hidden layers and output layer. Table 1: Dataset of Crack and No crack Images
The hidden layers consist of many layers like Dataset Cracked Non-Cracked Total images
Convolutional layers, max-pooling layers, fully Images Images in the dataset
Training 250 100 350
connected layers, Rectified Linear Unit (ReLU) layer. Data
Alexnet consists of 5 Convolutional layers and 3 fully Testing Data 50 50 100
connected layers. Total 300 150 450
Table 2: Confusion Matrix
Abstract: Background and Objective: This around exorbitant. These are for the most part helpful
research article has proposed that to find the in the therapeutic sciences just as beautifying agents.
smuggling activities in the thick forest area. Our Because of huge amount of money involved in selling
life is dependent upon trees. There is a long of such tree woods and lots of incidents are happening
association of man and trees. Since the hoary past
of cutting of tree and their smuggling. This issue isn't
man and trees have been the two major creations
of Nature. In his prehistoric days man turned to
identified with India just, in China, Australia and African
trees and plants to collect the things vitally nations are additionally battling with same issues. Placing
necessary for his existence. Since that time man cost at the top of the priority list, Indian sandalwood
and trees have been interdependent, though man costs 12000 to 13000 INR for every kg though in global
is more indebted to trees. Amongst the variety of market Red Sanders order a high cost of INR 10 center
flora available on the planet, "SANDALWOOD" for every ton. The Indian sandalwood tree has turned
is one of the most costly as well as less available out to be jeopardized as of late, and trying to control
trees. They are useful in medical sciences and its conceivable eradication the Indian government is
cosmetics. From the past few years, we are finding attempting to restrict the exportation of sandalwood.
that the newspapers and news channels are For an individual, most extreme passable buy limit isn't
frequently filled with news regarding the smuggling
to surpass 3.8kg according to Govt. The tree is as of
activities. Since they are costly, smugglers
allegedly cut down many of these trees and
now government controlled, and evacuation is
transport them to their factories for commercial disallowed whether on private or sanctuary grounds
purposes. until the tree is thirty years of age. But even though
some corner of newspaper shows us the same title.
Methodology: Anti-smuggling system is a
measure that has been taken to stop these 2. SYSTEM IMPLEMENTATION
smuggling activities using GSM module and Metal
Embedded system includes mainly two sections, they
Detector sensor, IR Sensor, MEMS Sensor. All
these modules are interfaced with Raspberry pi.
are
Microprocessor
CPU on a chip.
We can attach required amount of ROM, RAM and
I/O ports.
Expensive due to external peripherals.
Microcontroller
Computer on a chip fixed amount of on-chip ROM,
RAM, I/O ports Low cost.
Embedded System Software:
The embedded system software is written to perform
a specific function. It is typically written in a high level
Power Supply format and then compiled down to provide code that
Processor can be lodged within a non-volatile memory within the
hardware. An embedded system software is designed
Memory to keep in view of the three limits:
Timers Availability of system memory
Serial communication ports Availability of processor's speed
Output/Output circuits When the system runs continuously, there is a need
System application specific circuits to limit power dissipation for events like stop, run and
Embedded systems use different processors for its wake up.
desired operation. Some of the processors used are Implementation flow:
Stage 1:
Considering the problems of existing methods and
giving solution to that problem by considering the basic
requirements for our proposed system
Stage 2:
Considering the hardware requirement for the
proposed system
For this we need to select the below components:
1. Microcontroller
2. Inputs for the proposed system (ex: sensors,
drivers etc..,)
3. Outputs (ex: relays, loads)
Stage 3:
Figure 2: Block diagram of embedded system After considering hardware requirements, now we
1. Microprocessor need to check out the software requirements. Based
2. Microcontroller on the microcontroller we select there exists different
software for coding, compiling, debugging. we need to
3. Digital signal processor
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 41
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
4. REFERENCES
[1] Mr.V.Narasimman Asst. Prof, Anand.M, Anandha kumar.C,
Krishnan.T "Design of a WSN node for forest trees against
poaching", 978-93-87793-11-8, ICAETS-2018.
[2] Santhosh Hebbar, Praveenraj Pattar, Rajeshwari Madli,
Varaprasad Golla, "Sandalwood Tree Protection Using Bluetooth
Version 4.0", Conference on Computing and Network
Communications, 978-1-4673-7309- 8/15/$31.00 ©2015 IEEE.
[3] Prof. Mhaske D.A. , Bhabad Vishnu S., PathareSagar A.
"Antismuggling System for Trees in Forest using Flex Sensor
with GSM & Zigbee Network", International Journal of
Advanced Research in Computer and Communication.
Engineering Vol. 5, Issue 4, April 2016.
[4] Mohan Sai.S, Naresh K, RajKumar.S, Mohan Sai Ganesh, LokSai,
Abhinav "An Infrared Image detecting System model to monitor
human with weapon for controlling smuggling of Sandalwood
Trees", International Conference on Inventive Communication
and Computational Technologies.
[5] Prof. P. G. Salunkhe, Poonam U. Chaudhari "Design of WSN
Node For Protection Of Forest Trees Against Poaching Based
MSP430", International Conference On Advances in
Communication and Computing Technology (ICACCT),978-1-
5386-0926-2/18/$31.00 ©2018 IEEE.
Abstract -This study establishes a system home-based, and institution-based care, as well as an
structure of mobile personal health management, integrated healthcare information platform. The general
which is separated into three components, based public could benefit from healthcare teams' health and
on the demand characteristics of distant care. daily life services as a result of this programme. This
network health information management system,
also enables for continued service in the event of a
blood pressure blood glucose pulse machine, radio
frequency identification (RFID) system. Users can model transfer. Telecare is defined as the remote
use the finished mobile personal health delivery of healthcare and social services to clients in
management system to perform physiological their homes, communities, or institutions via
measurements and numerical upload records telecommunication and information technology.
anytime, anyplace, and to simply retrieve a list of Technology for computers .[1] Remote healthcare was
personal health measurement records using a tablet developed in the mid-twentieth century as a response
or smart phone using the wireless network to changes in medical needs and high medical costs
environment. And, when combined with the record among an ageing population, as well as changes in illness
and analysis of network health information type.[2] In current practise, remote healthcare is critical
management, the analysis chart, the measurement for reducing medical personnel needs and realising
data of this system is measured and transmitted,
personalised health management. It's also one of the
can improve the immediacy and accessibility of
long-term and long-distance care, as well as simplify most crucial aspects of the digital health business.
the medical services process. Concalls or remote communication are utilised in
Telecare.promote contact between patients and
Keyword:- Remote care, health management
healthcare providers who are separated by geography
system, radio frequency identification, wireless
.[3] It enhances the healthcare and supportive services
network environment.
for ageing populations or chronic patients in rural or
1. INTRODUCTION underserved locations .[4]
The average lifetime has been growing as a result of The key to building an integrated home care service
recent advances in medical and information technology. using home-based Telecare is to connect medicine, care,
According to data from the Ministry of Interior's and everyday life resources. A technology-based care
Department of Statistics, the old population in Dec 2019 service network is being built for clients in their homes
was 3.34 million (15.1 percent of the overall population), or for care service providers, and a lot of effort is being
and it is continually growing. The Ministry of Health put into developing daily life support services through a
and Welfare has been working on long-term care cross-industry collaboration to bring care services into
regulations and remote healthcare service programmes the home. This enables the general population to use
in recent years. For example, under the Ministry's care services in all aspects of their lives and realises
Telecare Pilot Program .Three models of care were Telecare's technology-based administration.
developed using a combination of healthcare and Meanwhile, due to concerns with information device
information technology, including community-based,
44 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
accessibility, the integrated use of computer networks looked into the use of these small, easy-to-carry mobile
and medical information may result in digital divides .[5] gadgets in the health-care system. For example, they
The competent authorities must therefore devise enable quick access to nutritional information and
solutions such as rapid advancements in wireless calorie intake, as well as calories expended during
networks and communications technology with the activity and automatic calorie computation. Depending
addition of new software, hardware, and network on personal needs, food intake increases or decreases.
equipment, as well as improved information skill training. personal physiological history as the foundation of
The Ministry of Education, for example, has established diagnosis, facilitating personal data input at hospital/clinic
over a hundred digital opportunity centres across the visits, and providing personal health information with
country to increase computer and network skills. reference to diet, exercise, and medication use They're
Accessibility has improved as information equipment also utilised to construct home care need assessment
has improved, as has residents' acceptance of scales, which aid in decision-making in the field. Care
information technology in mountainous or rural places. professionals can record a patient's condition with just
The personal health record (PHR) is a network-based a few taps on the device screen by putting the most
technology that allows members of the public to access often used nursing record sheets into the simulated
and coordinate their health information, as well as remote platform of mobile devices.
designate sections of it to be shared with those who 2. ANALYZE THE SYSTEM
are in need. PHR provides an integrated view of a
patient's health information, including data from the In this study, the mobile personal health management
general public, such as symptoms and prescription use, system includes hardware and software study
as well as data from physicians, such as diagnoses, test instruments. As far as the software goes, it's a
results, and data from pharmacies and insurance management package. Among the devices investigated
companies. Users can access their PHR online at any are: 1.a gadget for measuring blood pressure, blood
time and from anywhere using a system that uses the sugar, and pulse, 2.three. mobile devices The software
most up-to-date security and privacy protection management applications comprise 1. RFID tag; 2. A
technologies, and their family, physician, and nurse can system for identifying and managing mobile devices.3.
view portions of their PHR.PHR can also be used by a PHR management system Information system for
emergency room professionals to get key information health and medicine. The user or care provider uses
at critical times. PHR allows patients to gain a better the mobile personal health management system to
understanding of their sickness and health state, which collect blood pressure, blood glucose, pulse rate, and
enhances patient satisfaction. Participation and other physiological indicators, then verify identity using
adherence Although Radio Frequency Identification the RFID system in the devices. The measurement data
(RFID) was invented in 1969, its application in all can be sent by Bluetooth tethering to mobile device
industries would not be determined for another thirty management systems, and ultimately to an online
years. Mobile gadgets, such as smart phones and database server via a 4G or Wi-Fi wireless network.
tablets, compete in terms of convenience, power The online physiological data management platform
efficiency, and use on the go, with a significantly different saves user data and sends it to patients, their authorised
target audience than desktop PCs (a more traditional family and/or friends, or clinicians as physiological health
source of information). However, high-speed, complex reference data in real time. The health and medical
calculations still necessitate the use of desktop or information site system also provides relevant health
notebook computers. Mobile devices have become suggestions in a timely manner. A sphygmomanometer
more adaptable in areas such as banking, network is a blood pressure measuring instrument. Mercury,
communication, healthcare, bibliographies, eBooks, and electrical, and aneroid devices are the most common
recreation, as well as smaller and lighter to make them types of such devices currently accessible (dial).
easier to carry around .[6] Numerous research have Electronic sphygmomanometers not only measure
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 45
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
blood pressure but also pulse rate and save daily data measurement records are listed below. Account,
to allow for long-term monitoring of these variables. password, access control, tester RFID number, storage
The cuffs of mercury and dial sphygmomanometers are and categorization of test values such as systolic and
wrapped around the arm for this measurement, while diastolic pressure, pulse rate, blood glucose, and test
the cuffs of electronic sphygmomanometers may be time/date are all included in the personal health
wrapped around the arm or wrist. The wrist type is information management system (Fig. 3).
smaller and easier to carry, but it is less accurate than
the arm type. Blood glucose is usually checked using a
glucose strip and a glucose metre. A glucose strip is a
sophisticated glucose bio-detector that is used in
conjunction with a blood glucose analyzer to determine Fig 3 The server flow chart for the health management
network
blood glucose levels using electrochemistry principles.
The sampling volume can be as little as 1.5 litres using Users can access and query about personal health
a sampling technique based on capillary tubes. To begin information and test records via the operating interface
testing, the user does not required to press any buttons; and test data listings, which are built as web sites. The
instead, they must insert the strip. healthcare information website system's key functions
are as follows: 1.Introduces the operation of
3. SOFTWARE FOR THE MANAGEMENT measurement devices used in the mobile personal health
PROGRAM SYSTEM: management system, as well as providing a video
A. Identity management system: A management example of how to use them. Provides the user with
programme app for mobile devices that includes an the suggested ("healthy") basic blood pressure, blood
NFC Reader and an RDIF card to identify the user. It glucose, and pulse rate reference ranges 3. Users can
can receive measurement data from blood pressure, get related medical information and health news.
blood glucose, and pulse rate metres via Bluetooth Provides a mechanism for customers to contact
tethering and then send it to an online personal health healthcare practitioners, such as by e-mail 5.Manages
information management system via 4G or Wi-Fi. the membership. The healthcare information website
Personnel management is at the heart of the system.The system has a about us page, normal ranges of health
user management section allows the user to inquire, add, examination, sitemap, medical information, contact us,
alter, or delete information such as name, date of birth, and member centre, as illustrated in Figure 4. The
sex, and RFID number.To avoid the requirement for website's design and user experience are simple to
future data addition, RFID reading just requires a one- comprehend.
time setting. An RFID identity verification is required 4. CONCLUSION
to upload blood pressure and glucose data to an internet
server ( Fig. 2). Users can utilise mobile devices to The technology allows consumers to undertake
access management system interfaces, the system menu, testing at home or have testing administered by
and personal management. healthcare providers, according to this study. Basic
physiological measures such as blood pressure, blood
The user interface is simple and intuitive.B.System glucose, and pulse rate are among the tests provided.
for managing personal health information: A network The technology verifies user identity using radio
application administration system based on a distant frequency identification (RFID) and permits data transfer
server. Its principal roles are as follows: 1.Data to mobile devices via Bluetooth tethering. Physiological
administration and upkeep for users 2.Management of parameter data from mobile devices, such as blood
user accounts, passwords, and RFID cards 3.Data on pressure and blood glucose, can be uploaded to an
blood pressure, blood glucose, and pulse rate are internet database. with a wireless network of 4G or
recorded and transferred. User physiological WiFi. The online physiological information management
platform saves user data and sends it to patients, their [3] Kovner, R., Hardy Havens, D. M. (1996). Telemedicine: Potential
Applications And Barriers To Continued Expansion. Journal Of
authorised family and/or friends, or clinicians as Pdiatric
physiological health reference data in a timely manner.
[4] Bagayoko, C. O., Muller, H., Geissbuhler, A. (2006). Assessment
5. REFERENCES Of Internet-Based Tele-Medicine In Africa (The RAFT Project).
Computerized Medical Imaging And Graphics Vol. 30, 407-416.
1] Burtt, K. (1997). Nurses use telehealth to address rural health
care needs. prevent hospitalizations. American Nurse, 29(6), 21. [5] Fuchs, C., Horak, E. (2008). Africa and the digital
divide.Telematics and Informatics Vol. 25, 99-116.
[2] Crist, T., Kaufman, S., Crampton, K. (1996). Home
telemedicine:A home health care agency strategy for maximizing
resources.Home Health Care Management & Practice, 8(1), 9.
Abstract: Heart disease, alternatively known as effective in improving the prediction accuracy of
cardiovascular disease, encases various conditions weak classifiers, and exhibit satisfactory
that impact the heart and is the primary basis of performance in identifying risk of heart disease. A
death worldwide over the span of the past few maximum increase of 8% accuracy for weak
decades. It associates many risk factors in heart classifiers was achieved with the help of ensemble
disease and a need of the time to get accurate, classification. The performance of the process was
reliable, and sensible approaches to make an early further enhanced with a feature selection
diagnosis to achieve prompt management of the implementation, and the results showed significant
disease. It is used in solving many problems in data improvement in prediction accuracy.
science. One common application of machine
Keywords: Heart Disease Classification,
learning is the prediction of an outcome based upon
Feature Selection, Disease Diagnosis, Medical
existing data. The machine learns patterns from
Data Analytics.
the existing dataset, and then applies them to an
unknown dataset in order to predict the outcome. I. INTRODUCTION
Classification is a powerful machine learning
One of the prominent diseases that affect many
technique that is commonly used for prediction.
Some classification algorithms like Support vector people during middle or old age is heart disease, and in
machine(SVM), Logistic regression and Random many cases it eventually leads to fatal complications.
forest predict with satisfactory accuracy, whereas Heart diseases are more prevalent in men than in women.
others exhibit a limited accuracy. This paper According to statistics from WHO, it has been estimated
investigates a method termed random forest that 24% of deaths due to non-communicable diseases
classification, which is used for improving the in India are caused by heart ailments. One-third of all
accuracy of weak algorithms by combining multiple global deaths are due to heart diseases. Half of the
classifiers. We also proposed Novel fast conditional deaths in the United States and in other developed
mutual information feature selection algorithm to countries are due to heart ailments. Around 17 million
solve feature selection problems. Experiments with people die due to cardiovascular disease (CVD) every
this tool were performed using a heart disease
year worldwide, and the disease is highly prevalent in
dataset. A comparative analytical approach was
done to determine how the ensemble technique Asia . The Cleveland Heart Disease Database (CHDD)
can be applied for improving prediction accuracy is considered the de facto database for heart disease
in heart disease. The focus of this paper is not only research .
on increasing the accuracy of weak classification Age, sex, cholesterol, high blood pressure, intake
algorithms, but also on the implementation of the are considered to be risk factors for heart disease, and
algorithm with a medical dataset, to show its utility
hereditary risk factors such as high blood pressure and
to predict disease at an early stage. The results of
the study indicate that ensemble techniques, such
diabetes also lead to heart disease. Some risk factors
as random forest and logistic regression are are controllable. Apart from the above factors, lifestyle
habits such as eating habits, physical inactivity, and
48 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
obesity are also considered to be major risk factors. due to the Liver Problem. The healthcare industry
There are different types of heart diseases such as collects a huge amount of data which is not properly
coronary heart disease, angina pectoris, congestive heart mined and not put to the optimum use. Discovery of
failure, cardiomyopathy, congenital heart disease, these hidden patterns and relationships often goes
arrhythmias, and myocarditis. It is difficult to manually unexploited. Our research focuses on this aspect of
determine the odds of getting heart disease based on Medical diagnosis by learning pattern through the
risk factors. However, machine learning techniques are collected data of Liver disorder to develop intelligent
useful to predict the output from existing data. Hence, medical decision support systems to help the physicians.
this paper applies one such machine learning technique In this paper, we propose the use decision trees J48,
called classification for predicting heart disease risk from Naive Bayes, ANN, ZeroR, 1BK and VFI algorithm
the risk factors. It also tries to improve the accuracy of to classify these diseases and compare the effectiveness,
predicting heart disease risk using a strategy termed correction rate among them. Detection of Liver disease
ensemble. in its early stage is the key of its cure. It leads to better
II. LITERATURE SURVEY performance of the classification models in terms of their
predictive or descriptive accuracy, diminishing of
[1]Rohit Murty, Satish Patle, Saurabh Bute, Sneha computing time needed to build models as they learn
Bhilkar, Durga Wanjari "Prediction of heart faster, and better understanding of the models. In this
disease by using machine learning",
paper, a comparative analysis of data classification
International Journal of All Research Writings,
ISSN (O) - 2582-1008, June 2020, Vol. 1 Issue.
accuracy using Liver disorder data in different scenarios
12. is presented. The predictive performances of popular
classifiers are compared quantitatively.
With the rampant increase in the heart stroke rates
at juvenile ages, we need to put a system in place to be [3] Smriti Mukesh Singh1, Dr. Dinesh B.
Hanchate2, "Improving Disease Prediction by
able to detect the symptoms of a heart stroke at an
Machine Learning", International Research
early stage and thus prevent it. It is impractical for a Journal of Engineering and Technology
common man to frequently undergo costly tests like (IRJET), Volume: 05 Issue: 06 | June-2018.
the ECG and thus there needs to be a system in place
which is handy and at the same time reliable, in predicting These days utilization of Big Data is expanding in
the chances of a heart disease. Thus, we propose to biomedical and human services groups, exact
develop an application which can predict the investigation of medicinal information benefits early
vulnerability of a heart disease given basic symptoms malady discovery, quiet care and group administrations.
like age, sex, pulse rate etc. The machine learning Fragmented therapeutic information lessens examination
algorithm neural networks has proven to be the most precision. The machine learning calculations are
accurate and reliable algorithm and hence used in the proposed for successful expectation of ceaseless
proposed system. infection. To beat the trouble of deficient information,
Genetic algorithm will be utilized to remake the missing
[2]Tapas Ranjan Baitharua, Subhendu Kumar information. The dataset comprises of structured data
Panib, "Analysis of Data Mining Techniques For
and unstructured data. To extract features from
Healthcare Decision Support System Using
Liver Disorder Dataset", International
unstructured data RNN algorithm will be utilized.
Conference on Computational Modelling and Framework proposes SVM calculation and Naive
Security (CMS 2016) Procedia Computer Bayesian calculation for sickness expectation utilizing
Science 85 (2016) 862 - 870. unstructured and structured information individually
from hospital information. Community Question
Accuracy in data classification depends on the
Answering (CQA) system is additionally proposed
dataset used for learning. Now-a-days the most
which will foresee the inquiry and answers and will give
important cause of death for both men and women is
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 49
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
proper responses to the clients. For that, two research, particularly in Heart Disease prediction. This
calculations are proposed KNN and SVM. KNN paper has analysed prediction systems for Heart disease
algorithm will perform classification on answers and using a greater number of input attributes. The system
SVM calculation will perform classification on answers. uses medical terms such as sex, blood pressure,
It will help client to discover best inquiries and answers cholesterol like 13 attributes to predict the likelihood
identified with infections. of patient getting a Heart Disease. Until now, 13
[4] Abhishiek Taneja, "Heart Disease Prediction attributes are used for prediction. This research paper
System Using Data Mining Techniques" added two more attributes i.e., obesity and smoking.
IRJCST, ISSN: 0974-6471 Online ISSN: 2320- The data mining classification techniques, namely
8481 - 2015. Decision Trees, Naive Bayes, and Neural Networks
are analyzed on Heart Disease database. The
In today's modern world cardiovascular disease is
performance of these techniques is compared, based
the most lethal one. This disease attacks a person so
on accuracy. As per our results accuracy of Neural
instantly that it hardly gets any time to get treated with.
Networks, Decision Trees, and Naive Bayes are 100%,
So diagnosing patients correctly on timely basis is the
99.62%, and 90.74% respectively. Our analysis shows
most challenging task for the medical fraternity. A wrong
that out of these three classification models Neural
diagnosis by the hospital leads to earn a bad name and
Networks predicts Heart Disease with highest accuracy.
loosing reputation. At the same time treatment of the
said disease is quite high and not affordable by most of III. EXISTING METHODOLOGY
the patients particularly in India. The purpose of this SUPPORT VECTOR MACHINE (SVM)
paper is to develop a cost-effective treatment using data
mining technologies for facilitating data base decision Support vector machine is the one of the machine
support system. Almost all the hospitals use some learning algorithms. The support vector machine is a
hospital management system to manage healthcare in supervised learning algorithm. The SVM is used to
patients. Unfortunately, most of the systems rarely use classify the given data. The algorithm uses a hyper-plane
the huge clinical data where vital information is hidden. to differentiate the different classes. SVM is also used
As these systems create huge amount of data in varied for the regression analysis. SVM classify the both linear
forms but this data is seldom visited and remain and non linear data.
untapped. So, in this direction lots of efforts are required SVM (having a pre- defined target variable) it is
to make intelligent decisions. The diagnosis of this used as a classifier as well as a predictor. For
disease using different features or symptoms is a classification, it finds a hyper-plane in the feature space
complex activity. In this paper using varied data mining that differentiates between the classes. An SVM model
technologies an attempt is made to assist in the diagnosis represents the training data points as points in the feature
of the disease in question. space, mapped in such a way that points belonging to
[5] Chaitrali S. Dangare, Sulabha S. Apte "Improved separate classes are segregated by a margin as wide as
Study of Heart Disease Prediction System using possible. The test data points are then mapped into
Data Mining Classification Techniques", that same space and are classified based on which side
International Journal of Computer Applications, of the margin they fall.
DOI:10.5120/7228-0076 , Corpus ID: 4996681
- 2016.
The Healthcare industry is generally "information
rich", but unfortunately not all the data are mined which
is required for discovering hidden patterns & effective
decision making. Advanced data mining techniques are
used to discover knowledge in database and for medical
50 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Supervised Learning techniques. It is used for predicting Instead of relying on one decision tree, the random
the categorical dependent variable using a given set of forest takes the prediction from each tree and based
variables. Logistic Regression predicts the output of a on the majority votes of predictions, and it predicts the
categorical dependent variable. Therefore, the outcome final output. The greater number of trees in the forest
must have be a categorical or discrete value. It can be leads to higher accuracy and prevents the problem of
either Yes or No, 0 or 1, true or false, etc. but instead over fitting.
of giving the exact value as 0 and 1, it gives the
probabilistic values which lie between 0 and 1.
diagnosis, therefore, the treatment and recovery of 8. Meyer, Alexander, Dina Zverinski, Boris Pfahringer, Jörg
Kempfert, Titus Kuehne, Simon H. Sündermann, Christof
diseases in future also for critical disease such as heart, Stamm, Thomas Hofmann, Volkmar Falk, and Carsten Eickhoff.
breast, Parkinson, diabetes. Further, increase in "Machine learning for real-time prediction of complications in
accuracy helps to predict the heart disease efficiently. critical care: a retrospective study." The Lancet Respiratory
Medicine 6, no. 12 (2018): 905-914.
VIII. REFERENCES 9. Singh, Smriti Mukesh, and Dinesh B. Hanchate. "Improving
1. Khourdifi, Youness, and Mohamed Bahaj. "Heart disease disease prediction by machine learning." Int J Res Eng Technol 5,
prediction and classification using machine learning algorithms no. 6 (2018): 1542-1548.
optimized by particle swarm optimization and ant colony 10. Gavhane, Aditi, Gouthami Kokkula, Isha Pandya, and Kailas
optimization." International Journal of Intelligent Engineering & Devadkar. "Prediction of heart disease using machine learning."
Systems 12, no. 1 (2019): 242-252. In 2018 Second International Conference on Electronics,
2. Beyene, Chala, and Pooja Kamat. "Survey on prediction and Communication and Aerospace Technology (ICECA), pp. 1275-
analysis the occurrence of heart disease using data mining 1278. IEEE, 2018.
techniques." International Journal of Pure and Applied 11. Baitharu, Tapas Ranjan, and Subhendu Kumar Pani. "Analysis
Mathematics 118, no. 8 (2018): 165-174. of data mining techniques for healthcare decision support system
3. Marimuthu, M., M. Abinaya, K. S. Hariesh, K. Madhankumar, using liver disorder dataset." Procedia Computer Science 85
and V. Pavithra. "A review on heart disease prediction using (2016): 862-870.
machine learning and data analytics approach." International 12. Thomas, J., and R. Theresa Princy. "Human heart disease
Journal of Computer Applications 181, no. 18 (2018): 20-25. prediction system using data mining techniques." In 2016
4. Kohli, Pahulpreet Singh, and Shriya Arora. "Application of international conference on circuit, power and computing
machine learning in disease prediction." In 2018 4th International technologies (ICCPCT), pp. 1-5. IEEE, 2016.
conference on computing communication and automation 13. Kaur, Beant, and Williamjeet Singh. "Review on heart disease
(ICCCA), pp. 1-4. IEEE, 2018. prediction system using data mining techniques." International
5. Ramalingam, V. V., Ayantan Dandapath, and M. Karthik Raja. journal on recent and innovation trends in computing and
"Heart disease prediction using machine learning techniques: a communication 2, no. 10 (2014): 3003-3008.
survey." International Journal of Engineering & Technology 7, 14. Taneja, Abhishek. "Heart disease prediction system using data
no. 2.8 (2018): 684-687. mining techniques." Oriental Journal of Computer science and
6. Rajamhoana, S. P., C. Akalya Devi, K. Umamaheswari, R. Kiruba, technology 6, no. 4 (2013): 457-466.
K. Karunya, and R. Deepika. "Analysis of neural networks based 15. Dangare, Chaitrali S., and Sulabha S. Apte. "Improved study of
heart disease prediction system." In 2018 11th International heart disease prediction system using data mining classification
Conference on Human System Interaction (HSI), pp. 233-239. techniques." International Journal of Computer Applications 47,
IEEE, 2018. no. 10 (2012): 44-48.
7. Rajkomar, Alvin, Michaela Hardt, Michael D. Howell, Greg
Corrado, and Marshall H. Chin. "Ensuring fairness in machine
learning to advance health equity." Annals of internal medicine
169, no. 12 (2018): 866-872.
Abstract- The objective of this scheme is to lives. Living in a very tech world that's growing day by
minimize the delay and capturing the vehicle details day with new technologies, we can apply these
which causes the collision to the vehicle. So that techniques in our society and help them overcome such
the ambulance can reach the spot in time and human problems. The Vision of the Internet of Things (IOT)
life can be saved and the accident location is
has embarked to succeed in unexpected bounds of
identified sends the accident location immediately
to the person (doctor or family member).The main
today's computing world. It's an idea that not only can
server finds the nearest ambulance to the accident impact human's life but also how they function. The
zone and sends the exact location to the emergency centre of IOT is sensible sensors without which it might
vehicle. We use, web camera with Arduino to send not have existed. These sensors form an enormous
the accident information to the person via email. network for his or her communication. They capture
By using this data, we can save the accident victim minute details of their surroundings and pass this
and also can catch the person who done the important information to every other. Based on the
accident. The purpose of this project is to introduce received information, relevant actions are performed
a framework using IoT, which helps in detecting accordingly. It's the most recent communication model
car accidents and notifying them immediately. that imagines the proximate future, within which objects
Keywords-Collision Detection, GPS, GSM, of day-to-day life are going to be incorporated with
Internet of Things (IoT), Notifications. microcontrollers for electronic communication with the
I. INTRODUCTION assistance of appropriate protocol stacks which will
make them capable of communication with each
Now-a-days, there's a rise within the number of another. The importance of accident detection and
accidents that happen within the world. The foremost notification system is extremely prominent for our
prominent reason for the loss of a life during an accident society.
is that the unavailability of immediate help that can save
a personality's life by some seconds. The instant an Imagine a situation where an accident happened,
accident has occurred, the lifetime of all passengers it's immediately notified to the emergency services. This
travelling within the vehicle is at stake. It all depends on can lead to the rescue of injured people involved within
response time that may save their lives by some minutes the accident. Because the Internet of Things has
or seconds. Per statistics, reducing accident delay time witnessed fast growth nowadays, it's the ability to bridge
by even 1 minute can save 6 per cent of lives. Hence, these two situations. For the IOT paradigm be effective,
this time it should have the aptitude to trace the situation of the
objects (i.e. cars in our case) which might serve to be
Interval is extremely crucial, and it has to be reduced useful for the ambulances to achieve on time.
or a minimum of either improved to save lots of their
lives. To contribute to our society and reduce the II. LITERATURE SURVEY
quantity of accidents happening in our day-to-day life, The purpose of the project is to search out the vehicle
there are several techniques and mechanisms that may where it is located the vehicle by means of sending a
drop down the speed of accidents and might save lot message using a system which is placed within vehicle
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 55
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
system. Most of the days we might not be able to find the image of number plate of the vehicle which collided
accident location because we don't know where our vehicle are visiting be sent to the authorized person
accident will happen. This project detects the accident via email using Wi-Fi module.
through GPS and designed to avoid such situations. Advantages:
The notification phase, immediately after an accident is
indicated, it's accustomed send detailed information like This system can resolve most of the accidents by
images, video, accident location, etc. to the emergency detecting accidents on time; poor emergency incident
responder for fast recovery. is a major cause of death rate in our country.
III. EXISTING WORK Delay time caused by the medical vehicles can be
resolved
A. Manual Detection System:
BLOCK DIAGRAM:
In this method, accident is detected from
• Motorist report
• Transportation department
• Public crews report
• Close circuit camera surveillance
The downside of this sort of detection system is that
somebody needs to witness the incident.
B. Driver Initiated Detection System:
Driver initiated incident detection system has more HARDWARE REQUIREMENTS:
advantages which has the fast reaction, more incident
1. ARDUINO UNO
information etc. However, with these varieties of the
accident, driver might not be ready to report in any 2. POWER SUPPLY
respect. 3. NODEMCU CAMERA
IV. PROPOSED WORK 4. MEMS SENSOR
Car accidents that happen daily are the key social 5. GSM
problems towards which serious action must be taken. 6. GPS
One altogether the solutions for this domain is that the
Internet of Things which is that the present trend in 7. LCD
technology. For this purpose, many authors have
worked during this domain by applying this technology.
This is often to introduce a framework using IOT, which
helps in detecting car accidents and notifying them
immediately. This might be achieved by integrating smart
sensors with a microcontroller within the car which is
ready to trigger at the time of an accident. The other A. ARDUINO UNO:
modules like GPS and GSM are integrated with the
Arduino could be a single-board microcontroller
system to urge the placement coordinates of the
meant to form the application more accessible which
accidents and sending it to registered numbers and
are interactive objects and its surroundings. The Arduino
nearby ambulance to notify them about the accident
Uno board may be a microcontroller supported the
to obtain immediate help at the situation. This system,
56 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
G. LCD:
A liquid crystal display (LCD) could be a thin, flat
display device made of any number of colour or
F. GSM:
monochrome pixels arrayed ahead of a lightweight
GSM stands for Global System for Mobile source or reflector. Each pixel consists of a column of
Communication. It is a digital cellular technology used liquid molecules suspended between two transparent
for transmitting mobile voice and data services.GSM is electrodes, and two polarizing filters, the axes of polarity
that the most generally accepted standard in of which are perpendicular to each other. Without the
telecommunications and it's implemented globally. GSM liquid crystals between them, light passing through one
operates on the mobile communication bands 900 MHz would be blocked by the opposite. The liquid twists
and 1800 MHz in most parts of the planet. This is often the polarization of sunshine entering one filter to permit
a GSM/GPRS-compatible Quad-band cellular phone, it to suffer the opposite. A program must interact with
which works on a frequency of 850/900/1800/ the skin world using input and output devices that
1900MHz and which might be used not only to access communicate directly with an individual's being. One
the web, but also for language (provided that it is amongst the foremost common devices attached to an
connected to a microphone and a little loud speaker) controller is an LCD display.
and for SMSs. Externally, it's sprt of a big package
(0.94 inches x 0.94 inches x 0.12 inches) with L-shaped
contacts on four sides in order that they'll be soldered
both on the side and at the underside.
The TTL serial interface is accountable not only of
communicating all the information relative to the SMS
already received and people that are available during
TCP/IP sessions in GPRS (the data-rate is decided by
GPRS class 10: max. 85,6 kbps), but also of receiving
the circuit commands (in our case, coming from the
58 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
H. BUZZER
A buzzer or beeper could be a signalling device,
usually electronic, typically employed in automobiles,
household appliances like a microwave, or game shows.
It most typically consists of a number of switches or
sensors connected to an impact unit that determines if
and which button was pushed or a pre-set time has
lapsed, and frequently illuminates a light-weight on the V. CONCLUSION
suitable button or board, and sounds a warning within In this mode, the modernizing supported the
the variety of a nonstop or intermittent buzzing or reduction of road facet accident. Ordinarily it's associate
beeping sound. expertise concerning passing vehicle through the
tollbooth, there it's want to pay a fee then our vehicle
number plate was trying to next step of entry. Around
this idea, modernizing was enhanced by the preceding
session, if the accident arose in association spot there a
Page machine use to create a salve for the delay.
However, here change return by the messaging system
to their relatives and machine by victimization GSM, to
RESULT: grasp the position of the vehicle by victimization GPS.
In proposing system, it enhances this problem by
using messaging and tracking system. First, it's used to
manage the vehicle number plate in a toll booth. If it's
authorized there if capture the quantity plate and store
it in an exceedingly. After that, if the accident was
occurring in-between booths, the message alert is
intimated to the nearby police headquarters and hospital
using GSM, by using GPS location is tracked.
REFERENCES:
[1] Khyati Shah, Vile Parle, Swati Bairagi, Vile Parle "Accident
Detection and Conveyor System using GSM and GPS Module"
International journal of Computer Applications (0975-8887)
Voluma-176-No.2,October 2017.
[2] E. Krishna Priya, P. Manju, V. Mythra, "IoT Based Vehicle
Tracking and Accident Detection System" International journal
of Innovative Research in Computer and Communication
Engineering, (An ISO 3297:2007 Certified organization)
Vol.5,Issue 3, March 2017.
[3] Surekha Pinnapati, Manjunath Kamath K, Carmal Joseph,
"Automatic Accident Detection and Alerting System Based on
IOT" International Journal of Innovative Research in Computer
and Communication Engineering (An ISO 3297:2007 Certified
organization) Vol.5, Issue5, May 2017.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 59
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
[4] Namrata H. Sane Damini S. PatilSnehal D. "Real Time Vehicle [8] Aishwarya S. R., et al., "An IoT Based Accident Prevention and
Accident Detection and Tracking Using GPS and GSM" Tracking System for Night Drivers," International Journal of
International journalon Recent and Innovation Trends in Innovative Research in Computer and Communication
Computing and Communication, Issue-4,Vol.4 April 2016. Engineering, vol/issue: 3(4), Apr 2015.
[5] Vikram singh Kushwaha, Abusayeed Topinkatti, "Car Accident [9] V. K. Pratiksha and Rajesh G., "Proposed Model for the Smart
Detection System Using GPS and GSM", International journal Accident Detection System for Smart Vehicles using Arduino
of Emerging Trend in Engineering and Basic Science (IJEEBS) board, Smart Sensors, GPS and GSM," International Journal of
Vol.2, Feb 2015. Emerging Trends and Technology in Computer Science, 2015.
[6] C.Prabha, R. Sunitha, R.Anitha, "Automatic Vehicle Accident N. H. Sane, et al., "Real Time Vehicle Accident Detection and
Detection and Messaging System Using GSM and GPS Modem", Tracking Using GPS and GSM," International Journal on Recent
International Journal of Advanced Research in Electrical and and Innovation Trends in Computing and Com
Electronic and Instrumentation Engineering (An ISO 3297:2007
Certified organization) Vol.3, Issue 7, July 2014.
[7] Isna K. and S. D. Sawant, "Integration of Cloud Computing and
Internet of Things," International Journal of Advanced Research
in Computer and Communication Engineering, vol/issue: 5(4),
Apr 2016.
Abstract: Communication among deaf-mute and problem. This tool blessings a speech impaired man or
normal people has constantly been a difficult task. woman to speak with a regular man or woman in
The mission pursuits to facilitate human beings with addition to with a listening to impaired man or woman.
the aid of a glove- primarily based on deaf-mute The essential issue of this venture is a glove with
conversation interpreter system. Glove is unmarried MEMS sensors which can be linked to
internally ready with a gesture. For every unique
ARDUINO Uno that's the principle manipulate unit of
gesture, the gesture module produces a
proportional extrude in resistance and
this venture. This tool has a characteristic of person
accelerometer measures the orientation of hand. input. So speech impaired man or woman can
The hand gesture is one of the normal techniques effortlessly use his/her personal selected instructions for
utilized in signal language for non-verbal unique gestures.
conversation. It is typically utilized by human beings It describes a nonspecific individual gesture
who've listening to or speech troubles to speak
reputation device through the use of MEMS
amongst themselves or with other normal human
beings.
accelerometers. The reputation device includes sensor
records collection, segmentation and reputation after
Keywords- ARDUINO Uno, MEMS sensor, receiving acceleration records from the sensing device.
Bluetooth module, LCD display, Voice playback Moreover, different capabilities of the movement
module.
records can be applied for sample classification, i.e.,
I. INTRODUCTION extra reputation techniques may be investigated in our
Speaking is the principle manner of conversation for destiny work.
each regular human being. But consider a gesture who II. LITERATURE REVIEW
cannot capable of speak regularly with a regular with
[1]. Michiko Nishiyama and Kazuhiro Watanabe,
normal people. Because speech impaired humans use
2018, supplied a wearable sensing glove with embedded
signal language for his or her conversation. And
hetero-center fiber-optic nerve, which makes use of
maximum of the humans do not recognize signal
hetero-center fiber optic nerve as sensors that hit upon
language. So it places the speech impaired man or
finger flexion to acquire unconstrained hand movement
woman in a hard situation. In current years, researchers
monitoring. The sensor Heron center encompass a
had been focusing accessible gestures detections and
transmission fibre line whose diameter is 9µm. unmarried
been famous for growing programs with inside the area
mode of transmission is utilized in Hetro center fiber
of robotics and prolonged with inside the vicinity of
sensor e lower back of the hand such that they're now
synthetic or prosthetic arms which could mimic the
no longer laid low with wrinkles with inside the glove
behaviour of a herbal human hand. This venture even
joints .A laser diode of wavelength 1.31µm and an
though makes use of a comparable technique for the
optical energy meter are used to degree the transmission
detection of the motion of fingers, but we've attempted
loss. Splicing gadget is likewise used. The sensor after
to extrapolate the concept in a small but full-size utility
calibration is capable of hit upon the joint angles of the
with inside the area of bioengineering. The essential goal
hands with variations in hand length and the hetero-
of this venture is to layout an digital talking gadget with
center sensing approach lets in the sensing glove to be
inside the shape of a glove to reduce this conversation
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 61
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
built with a minimal wide variety of sensor points. The to carry the message. This entails broadly speaking the
hetro center sensors well-known shows monotonic mixture of shapes, orientation and motion of the hands.
function of optical loss overall performance with
recognize to the flexion perspective of joints. But
irrespective of this a few optical fiber loss may be BLOCK DIAGRAM
located the use of those sensors proposed a grip
Amplified glove. POWER SUPPLY
advanced now no longer handiest to reduce the trouble III.2. VISION BASED APPROACHES
of deaf and dumb humans however additionally to put
Image processing algorithms are utilized in Vision
into effect it in one-of-a-kind fields. Sign language is a
primarily based totally method to locate and music hand
language which as opposed to voice or sound styles
symptoms and symptoms and facial expressions of the
makes use of guide verbal exchange and frame language
signer. This method is less difficult to the signer seeing
62 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
FIG.4.3. XYZ COORDINATES USING HAND FIG.6.2. HAND GLOVE USING MEMS SENSOR AT SIDE
ANGLE
V. HARDWARE REQUIEMENTS
Finally, the gesture code is in comparison with the
1) Power Supply saved standard styles to decide the maximum probably
2) MEMS Sensor gesture. Since the usual gesture styles are generated
3) Bluetooth with the aid of using movement evaluation and are easy
capabilities represented with the aid of using eight
4) LCD numbers for every gesture, the popularity machine does
5) Play back Module now no longer require a large records base and desires
now no longer to accumulate as many gestures made
6.) ARDUINO Uno
with the aid of using different human beings as feasible
VI. RESULT to enhance the popularity accuracy. We note here,
This paper describes a nonspecific individual gesture however, to decorate the overall performance of the
reputation machine with the aid of using the use of popularity machine, we can want to enhance the
MEMS accelerometers. The reputation machine segmentation set of rules to boom its accuracy in locating
includes sensor records collection, segmentation and the terminal factors of gestures. Moreover, different
reputation. After receiving acceleration records from capabilities of the movement records can be applied
the sensing device, a segmentation set of rules is carried for sample classification, i.e., greater reputation
out to decide the beginning and end factors of each strategies may be investigated in our destiny work.
enter gesture automatically. The signal sequence of a VII. CONCLUSION
gesture is extracted because the classifying feature, i.e.,
MEMS sensor has the X, y & z coordinates axis ,
a gesture code.
in which X is the top attitude , Y is the side attitude and
Z is the down attitude. right here we're using movement
sensor while the MEMS sensor positioned the down
attitude then the Z voice will performs from the voice
playback module.
Abstract- Global Positioning System (GPS) can satellites that revolve around the earth and provides
provide a 3-dimensional (3D) position of the position information based on range measurements [2].
unknown object on or above the earth's surface. With a sufficient number of range measurements, GPS
Inherently, in GPS pseudo-range measurements, can provide position estimates to high degree accuracy
several errors are resulting from various error
[3-4]. The accuracy, in turn, is the function of the type
sources. This article implemented three
of equipment, geographic area, uncertainty in
navigational algorithms, namely the Least Square
Estimator (LSE), Kalman Filter (KF), and Cross- measurements, navigation algorithm, etc. In practice,
Correntropy Kalman Filter (CCKF), and the results the measurement uncertainty can never reach zero even
are compared. Results prove that the proposed though the system noise parameters and biases are
CCKF algorithm exhibits significant improvement modelled effectively and hence need a high accuracy
in position estimation compared to the other two navigation algorithm [5] that makes out an optimal
recursive algorithms (i.e., LSE and KF). It is also estimate from these uncertain measurements.
clear from the results that the implemented two
algorithms (LSE and KF) do not give position In the present paper, we develop a new Kalman
accuracy as that of the CCKF algorithm. filter, compactly called the cross Correntropy Kalman
Filter (CCKF), based on the correntropy criterion [6]
Keywords- Cross Correntropy Kalman Filter,
and a fixed-point iterative algorithm. Similar to the
GPS, Kalman Filter, Least Square Estimator,
traditional KF, the CCKF not only retains the state mean
Pseudo-range..
propagation process but also preserves the covariance
INTRODUCTION matrix propagation process. Thus the new filter also
The introduction of Global Positioning System (GPS) has a recursive structure and is suitable for online
has brought a revolution in the field of positioning and implementation. It is worth noting that the correntropy
leads to the development of many sophisticated criterion has been used in hidden state estimation, but it
positioning systems in the fields of defence and civil involves no covariance propagation process and is in
sectors for guiding of troops in the battlefield, navigation the form not a Kalman filter. Unlike the traditional KF
of ships, the landing of aircraft, etc [1]. Even when algorithm, the CCKF uses a fixed-point algorithm [7]
operated to their full capacity, these systems provide to update the posterior estimate of the state. The small
limited accuracy for these applications and hence need positive number ? provides a stop condition (or a
to be improved. The three primary functions on which threshold) for the fixed-point iteration. The kernel
most of today's defence systems work are Navigation, bandwidth ? is a key parameter in CCKF. In general, a
Tracking and Guiding and it is unimaginable to find a smaller kernel bandwidth makes the algorithm more
system that doesn't have any relation with these robust (with respect to outliers) but converges more
functions. These systems require determining the two slowly. The kernel bandwidth has a significant influence
or three dimensional (3D) position information of an on the convergence behavior of CCKF. If the kernel
object of interest and they use GPS receivers for this bandwidth ? is too small, the algorithm will diverge or
purpose. GPS is the constellation of space bodies called converge very slowly. A larger kernel bandwidth ensures
B. Kalman Filter: The main reason for this is that the KF is developed
Kalman filter [8] [9] provides a powerful tool to based on the MMSE criterion [11], which captures only
deal with state estimation of linear systems, which is an the second order statistics of the error signal and is
optimal estimator under linear and Gaussian sensitive to large outliers. To address this problem, in
assumptions. this work we use the cross correntropy criterion to
derive a new Kalman filter named as Cross Correntropy
Consider a linear system described by the following Kalman Filter (CCKF), which may perform much better
state and measurement equations: in non-Gaussian noise environments[6][12], as cross
(10) correntropy contains second and higher order moments
(11)
of the error.
Step 1: Predict:
The prior mean and covariance matrix are given by
(13)
(14) (19)
Where, fi(n) is the ith element of F(n), vi (n) is the ith Eq. (28) can be further expressed as follows
row of V(n), and L = a+b is the dimension of F(n). (29)
Then under cross correntropy, the optimal estimate where,
of s(n) is
(30)
(22)
ei(n) = fi(n)- vi(n)s(n) (23) This section presents the simulation results obtained
after the proposed method was utilized to estimate the
The optimal solution can thus be obtained by solving position of a GPS receiver. The accuracy of the
proposed method is compared against the accuracy of
(24) Least Square Estimator (LSE) and traditional Kalman
filter (KF). The raw GPS data, collected over C/A
It follows easily that
measurements from the dual frequency GPS receiver
located at IISc, Bangalore (Lat/Lon: 13.01o N / 77.56o
(25)
E) are processed for Relativistic error and Satellite
Since ei (n) = fi (n)- vi (n)s(n), the optimal solution Clock biases. The data is sampled at the rate of 30
Eq. (25) is actually a fixed-point equation [7][10] of Seconds. The data received on L1 (1575.42MHz)
s(n) and this can be rewritten as frequency is only used for estimating the receiver
position. The obtained estimated receiver positions are
s(n)=g(s(n) ) (26) compared with the surveyed position to measure the
With position error using the three algorithms, i.e., LSE, KF,
and CCKF. And these results are presented in Table 1
to Table 3, respectively and the given values are the
estimated mean values of 22 hours of data.
Where ,
with, ,
Table 1. Estimated receiver mean position and error in X- Table 3. Estimated receiver mean position & error in Z-
direction direction
8
4 6070340 6070335 6070329 23 17 12 6
4
5 6070350 6070343 6070335 33 26 18 2
Table 4 lists the most widely used metrics and their Figure 3 depicts the horizontal & vertical position
descriptions of the 3D GPS location accuracy. If we error (X, Y, and Z) scatter plot in a 3D surface along
assume that the distribution of errors along every axis with SEP and SAS values concerning the KF algorithm.
is natural or Gaussian then we can also derive the KF: 3-D SAM
Definition
(meters)
Measure 20
90%
The radius of the sphere centered
SEP 0
50%
at the true position, containing
(Spherical error the position estimate in 3-D with -20
probable) 99%
probability of 50% 60
40
80
60
-- Error in Y- direction --> -- Error in X- direction -->
The radius of the sphere centred (meters) 20 40
(meters)
90% Spherical 0
20
at the true position , containing
accuracy standard
the position estimate in 3-D with Fig.3. Position error scatter plot in 3D surface due to KF
(SAS)
probability of 90%
The radius of the sphere centred Likewise, Figure 3, and Table 5 demonstrate that in
99% Spherical
accuracy standard at the true position , containing a 3D surface, 50% of the estimated position errors lying
the position estimate in 3-D with
(SAS)
probability of 99%
within 13.2m, 90% of the estimated position errors lie
within 21.6m, and 99% of the estimated position errors
Table 5 represents the most commonly used lie within 29.0m for KF.
Statistical position Accuracy Measures (SAM) in a 3D
surface, along with their formulas and probabilities. Figure 4 depicts the horizontal & vertical position
error (X, Y, and Z) scatter plot in a 3D surface along
Table 5. Comparison of Statistical Position Accuracy
Measures with SEP and SAS values concerning the CCKF
(meters) algorithm.
SAM Probability
LSE KF CCKF
CCKF: 3-D SAM
SEP 50% 10.6 13.2 9.0 Error
SEP (9.0m)
15
90%
-- Error in Z- direction -->
5
(meters)
-5
50%
with SEP and SAS values concerning the LSE algorithm. -10
-15
99%
30 50
LSE: 3-D SAM 20 40
Error -- Error in Y- direction --> 30
10 -- Error in X- direction -->
SEP (10.61m) (meters) 20
SAS-90% (17.33m) 0 10 (meters)
SAS-99% (23.34m)
20
90%
10
Figure 4 and Table 5 demonstrates that, in a 3D
(meters)
50%
0
-10
surface, 50% of the estimated position errors lying within
9.0m, 90% of the estimated position errors lie within
50 99%
40
30 50
60 14.7m, and 99% of the estimated position errors lie
-- Error in Y- direction -->
(meters)
20
10
20
30
40
-- Error in X- direction -->
(meters)
within 19.8m, respectively from its mean position.
Fig.2. Position error scatter plot in 3D surface due to LSE Therefore, the overall observations summarize that
From Figure 2 and Table 5, it is worth noting that in the GPS receiver position estimation accuracy is
a 3D surface, 50% of the estimated position errors lying significantly improved when using the proposed
within 10.6m, 90% of the estimated position errors lie algorithm, i.e., CCKF algorithm. Hence, the CCKF
within 17.3m, and 99% of the estimated position errors algorithm can estimate the GPS receiver position in the
lie within 23.3m, respectively from its mean position. Indian subcontinent's southern region.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 71
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
CONCLUSION [4] Sirish Kumar, P., and Srilatha Indira Dutt VBS. "Navigation
solutions for GPS receiver position estimation over the southern
A new Kalman type filtering algorithm, called Cross region of India." Int J Recent Technol Eng (IJRTE), vol. 7, Issue.6,
Correntropy Kalman filter (CCKF), has been proposed 2019.
in this paper. The CCKF is derived by using the [5] Kou, Y., Wu, H. Model and implementation of pseudorange-
bias-free linear channel. GPS Solut 25, 53, https://doi.org/
correntropy criterion as the optimality criterion, instead 10.1007/s10291-021-01093-3, 2021.
of using the well-known minimum mean square error
[6] P. Sirish kumar, V. B. S. Srilatha Indira Dutt, "A sensitivity
(MMSE) criterion. The proposed method was utilized analysis of extended kalman filter for GPS position estimation
to estimate the position of a GPS receiver located at with and without clock offset", Materials Today: Proceedings,
IGS station: IISc, Bangalore (Lat/Lon: 13.010 N/77.56 vol. 33, pp. 3626-3629,2020.
0 E) and its performance was compared against [7] X. Wang and M. Liang, "GPS Positioning Method Based on
Kalman Filtering," 2018 International Conference on Robots &
traditional Kalman filter. The estimated receiver position Intelligent System (ICRIS), Changsha, China, , pp. 77-80, doi:
and error, along with its mean, standard deviation, and 10.1109/ICRIS.2018.00028, 2018.
SAM obtained from the three algorithms i.e. LSE, KF, [8] I. Bilik and J. Tabrikian, "MMSE-based filtering in presence of
and CCKF are assessed. Hence from these results, it non-Gaussian system and measurement noise[J]", IEEE
is concluded that the position estimated with CCKF is Transactions on Aerospace and Electronic Systems, vol. 46, no.
3, pp. 1153-1170, 2010.
more accurate than KF.The results show that the
[9] Liu, Xi, et al. "Extended Kalman filter under maximum correntropy
proposed method (CCKF) outperformed traditional criterion." 2016 International Joint Conference on Neural
Kalman filter and is suitable for real time defense Networks (IJCNN). IEEE, 2016.
applications like navigation of ships, landing of CAT I [10]P. Sirish kumar, V. B. S. Srilatha Indira Dutt, L.Ganesh,
and II aircrafts etc. over the Indian subcontinent. "Implementation of new navigation algorithm based on cross-
correntropy for precise positioning in low latitude regions of
REFERENCES South India", International Journal of Speech Technology (IJST),
https://doi.org/10.1007/s10772-020-09727-6.
[1] Sasibhushana Rao G., Lavanya B. et al., "Satellite Horizon Effects
on Temporal GPS Receiver Position Accuracy over Coastal Area [11]X. Liu, B. Chen, H. Zhao, J. Qin and J. Cao, "Maximum
of South India",. In: Bansal J., Das K., Nagar A., Deep K., Ojha Correntropy Kalman Filter With State Constraints," in IEEE
A. (eds) Soft Computing for Problem Solving. Advances in Access, vol. 5, pp. 25846-25853, 2017 doi: 10.1109/
Intelligent Systems and Computing, vol 817. Springer, Singapore, ACCESS.2017.2769965.
2019.
[12]Chen, et al. "Convergence of a fixed-point algorithm under
[2] Santra, Atanu, et al. "Precision of satellite-based navigation maximum correntropy criterion." IEEE Signal Processing Letters,
position solution: A review using NavIC data." Journal of vol. 22, Issue.10, pp.1723-1727, 2015.
Information and Optimization Sciences, vol.40, Issue.8 ,pp. 1683-
1691, 2019. [13]P. Sirish Kumar, V. B. S. Srilatha Indira Dutt "The Global
Positioning System: Popular Accuracy Measures, Materials
[3] Yang, Y., Yang, Y., Hu, X. et al. BeiDou-3 broadcast clock Today: Proceedings 33 (2020) 4797-4801, https://doi.org/
estimation by integration of observations of regional tracking 10.1016/j.matpr.2020.08.380.
stations and inter-satellite links. GPS Solut 25, 57, https://doi.org/
10.1007/s10291-020-01067-x, 2021.
Abstract - The analysis and modification of a algorithm that will count the figures coming in as well as
smart light and movement regulator is presented. turning the room light ON. The people in the place are
The main purpose of the study was to create a counted using sensors and immediately displayed on 7
controller-based system that would count the segment display at the entrance door. The continuous
amount of guests as well as turning the room light
requirement of automatic home appliances in today's
ON each time a visitor comes in. This system
world is very important because it helps to create safety
calculates how many persons going into a room like
offices and classrooms per time. This function is consciousness and awareness. As a result, the need
implemented using PIR and LDR. Seven-segment developing a device that would ensure that whoever
display unit is placed outside the room to show all comes in and goes out of a place is monitored,
the persons that entered the place. This visitor necessitated this research. This also helps to ensure that
counter indicates an additional person whenever the room is not heavily congested per time. If the counter
someone enters the room and at the same time is entered by someone, the lights in that particular room
turns the lights in the room ON. And in a reverse will be switched ON. The lights would automatically
way, visitors counter will decrease whenever go OFF whenever the room is empty. These tasks are
someone exits the room using LDR sensor. done by the program coded in the microcontroller 8051
Whenever there is nobody inside, the relay
and shown on the 7 segments show unit. The sensors
interface which is smart, turns off the light.
send signals to the microcontroller and these signals
Keywords - Arduino, Sensor, Visitor Counter, are controlled by the software which is stored in ROM.
Bio-Directional, Microprocessor Microcontroller 8051 simultaneously scanning the
INTRODUCTION Passive Infrared Ray receivers, anytime there's a
movement across the passive infrared ray collector, then
The necessity to have a system which will
the Passive Infrared will send a signal to the receiver
spontaneously control the lighting arrangement of an
and be obstructed, this obstacle is sensed by the
area and capable of checking the amount persons in a
Microcontroller. [1] The operation sequence is
room on its own is has over stayed. Fire outbreaks that
controlled by a program which is a set of instructions
occur in various homes originate when the occupants
coded in the microcontroller so that the system can read
are either sleeping or not around the house. The
and interpret them. The light dependent resistor (LDR)
designed system can check every person present in such
sensor does the work of reducing the amount of persons
places like; offices, conference hall, sports venue, etc.
allowed to enter per time. Also, whenever a visitor
The whole circuit has been designed to be user-friendly
passed through the door (where the LDR is installed)
with its operation and the working principle self-
the number of visitors is restricted according to the
explanatory. This project would be useful to both
number of people that left the house or room. The
technology developers and the general public at large.
obstruction is sense and communicated to the
The work which was aimed at using a controller-based
microcontroller through the LDR transmitter. [2] The
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 73
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
V. REFERENCES [8] Y. w. Bai, C. F. J and Y. T. taipei and Ku, "Automatic Room Light
Intensity Detection and Control using a Microprocessor and
[1] G. Smith, "Introduction to Arduino," 2011. Light Sensors," Automatic room light intel, pp. 34-40, 2013.
[2] C. &. A. C. Subhankar, "Bidirectional Visitor Counter System [9] Dr.S.Deepa, Y.R.Saravanakumar, P.Kirubakaran, K.Vijaykumar
with Automatic Room Light Controller and Arduino as the Master and M.Tharun, "Bidirectional Visitor Counter with Automatic
Controller.," International Journal of Scientific and Research, pp. Room Light Controller," International Research Journal of
20-25, 2016. Engineering and Technology (IRJET), vol. 08, no. 04, p. 3, 2021.
[3] G. Waradkar, H. Ramina, V. Maitry, T. Ansurkar and A. r. a. P. [10]C. Thomas, "Automatic Room Controller With Bidirectional
Das, "Automatic Room Light Controller using a Bidirectional Visitor Counter," International journal of current engineering and
Visitor Counter.," Imper j. Interdisc, vol. 4, no. 2, 2016. scientific research (IJCESR), vol. 6, no. 2, p. 5, 2019.
[4] M. Umar, F. Aamna, Shakoor and A. Siddique, "Automated Room [11]P. D. S. P. Rasal, "Implementation of Visiting Counter,"
Light Controller with Visitor Counter Using Arduino," Advances International Journal of Emerging Trends in Electrical and
in science technology and engineering systems, pp. 10-15, 2016. Electronics (IJETEE - ISSN: 2320-9569, vol. 7, no. 2, p. 6, 2013.
[5] S. e. a. A. Dey, "Design of Controllable Bidirectional Visitor [12]Anon, "Solar LED Street Lights using Ultrasonic Sensor," 2017.
Counter," Int. J. Innov. Res. Elct Electro, Instru. Cont. Engg., [Online]. Available: https://www.researchgate.net/publication/
pp. 133-136, 2016. 317649190_Solar_Led_Street_Lights_using_Ultrasonic_Sensor.
[6] K. S. N. A. mathur, "Bidirectional Visitor Counter Electronics [Accessed 06 01 2021].
for you," 2016. [Online]. Available: http://www.scribd.com/doc/ [13]C. P., "PIR Sensor Basics and Applications," 2011. [Online].
49533576/BiDirectional-VisitorCounter. Available: https://www.elprocus.com/pir-sensor-basics-
[7] P. K. Shah and M. P. Savaliya, " Automatic Room Light Controller applications/. [Accessed 4 3 2021].
with Bidirectional Visitor Counter," Int. J. ICT Res. Develop,
2015.
Abstract - The main objective of image which the set of pixel values of one image is transformed
enhancement is to process the input image so that to a new set of pixel values so that the new image formed
the processed image will look much better. Image is visually pleasing and is also more suitable for analysis
enhancement refers to accentuation, or sharpening [8]. Hue, saturation and intensity are the attributes of
of image features such as edges, boundaries, or
color.
contrast to make a graphic display more useful for
display and analysis. It plays a vital role in every Hue is that attribute of a color which decides what
field. This paper covers two parts: first part is based kind of color it is, i.e., a red or an orange. In the
to the study of various types of images and image spectrum, each color is at the maximum purity (or
enhancement and second part is based on analysis strength or richness) that the eye can appreciate, and
of various basic intensity transformation functions the spectrum of colors is described as fully saturated.
in image processing. All these analysis is
If a saturated color is diluted by being mixed with other
performed in MATLAB software. We get various
colors or with white light, its richness or saturation is
results in term of output images and their
histograms respectively. Here we see that each decreased. For the purpose of enhancing a color image,
transformation function is suitable for some it is to be seen that hue should not change for any pixel.
particular applications, not for all. So, According to If hue is changed then the color gets changed, thereby
application requirement, we choose a particular distorting the image [7, 8].
transformation function for image enhancement. We all know that there are various image processing
Keywords -Image processing, Image techniques which we use to process the image. But,
enhancement, Matlab, Hue Transformation, Log one question arise in our mind that what is the need of
transformation, Power Law Transformation. Image Processing techniques and why we process these
I. INTRODUCTION images? So, the answer is motivated by three major
applications [4,7,13]:
Image enhancement refers to accentuation, or
sharpening of image features such as edges, boundaries, Improvement of pictorial information for human
or contrast to make a graphic display more useful for perception. It means whatever image we get, we want
display and analysis. The enhancement process does to enhance the quality of the image. So, that the image
not increase the inherent information content in the data. will have a better look and it will be much better when
But it does increase the dynamic range of the chosen we look at them. Image processing for autonomous
features so that they can be detected easily. Image machine application.
enhancement includes gray level and contrast This has various applications in industries particularly
manipulation, pseudo-coloring, and so on [6]. for quality control, in assembly automation and many
Image enhancement is used to improve the quality such applications.
of an image for visual perception of human beings. It is Efficient storage and transmission. For example, if
also used for low level vision applications. It is a task in we want to store an image on a computer, then this
image needs a certain amount of disk space. Now, we II. CLASSIFICATION OF IMAGES
will look at whether it is possible to process the image An image can be classified by following categories:
using certain image property.
A. Intensity Images:
So that, the disk space required for storing an image
will be less. Not only that, we can also have applications An intensity image is a data matrix whose values
heard we wants to transmit the image, or a video signal have been scaled to represent intensities. When the
over a transmission media and in that case, if the elements of an intensity image are of class unit 8, or
bandwidth of the transmission medium is very low, we class unit 16, they have integer values in the range [0,
will see that how to process the image or the video can 255] and [0, 65535].respectively. If the image is of
be transmitted over low bandwidth communication class double, the values are floating-point numbers.
channel. Values of scaled, class double intensity images are in
the range [0, 1] by convention.
So, let us first look at first major application which
is meant for human perception. Now, these methods 5 6 13 1
9 8 15 11
mainly employ different image processing techniques
3 1 7 6
to enhance the pictorial information for human 15 10 12 14
interpretation and analysis [1, 2, 3]. Figure 1. 4x4 Intesity Images
Typical applications of these kinds of techniques are: B. Indexed Images
Noise Filtering: In some cases, the images we will Array of class logical, unit 8, Unit 16, single, or double
get have some very noisy. So, we have to filter those whose pixel values are directed indices into a color map.
images so that the noise present in the image can be The color map is an m-by-3 array of class double. For
removed and the image appears much better. In some single or double arrays, integer values range from [1,
other kind of applications, we may have to enhance p]. For logical, unit8, or unit 16 arrays, values range
certain characteristics of the image. So the different kind from [0, p-1]. An indexed image consists of an array
of applications, we may have to enhance certain and a color map matrix.
characteristics of the image. There is some other kind
of application under this category is Contrast The pixel values in the array are directed indices
Enhancement. into a color map.
Here f(x,y) is input image and g(x,y) is output or values. The opposite is true of the inverse log
processed image. It can be seen that, see expression transformation. However, the log function has the
(2), every pixel value from the original image is important characteristic that it compresses the dynamic
subtracted from the 255. The resultant image becomes range of images with large variations in pixel values [10,
negative of the original image. Reversing the intensity 11].
levels of an image in this manner produces the equivalent The log transformation maps a narrow range of low
of a photographic negative. input grey level values into a wider range of output
Negative images are useful for enhancing white or values. The inverse log transformation performs the
grey detail embedded in dark regions of an image [5, opposite transformation. Log functions are particularly
14]. useful when the input grey level values may have an
extremely large range of values, see figure 10 and figure
11 [12, 14].
After power law transformation Image Input Image Out Hue Transformation
Function Image
Figure 10. Input Image and output power law transformation
i ma g e Figure 14. Input and hue transformation output image
of degradation. In this paper, the study of various types [8] Berns, R. S., Billmeyer, F. W., and Saltzman, M. (2000), "Billmeyer
and Saltzman's Principles of Color Technology", 3rd ed. New
of images, image enhancement, and their analysis is York: Wiley.
successfully done. This paper analysis is based on some
[9] Yang, C. C. and Kwok, S. H. (2000), "Gamut Clipping in Color
basic intensity transformation function. All these methods Image Processing", IEEE, pp. 824-827.
for greyscale images and color images show good result. [10] Naik and Murthy, C. A. (2003), "Hue-Preserving Color Image
REFERENCES Enhancement Without Gamut Problem" in THE IEEE transactions
on image processing, vol. 12, no. 12, december pp.1591-159.
[1] Toet, A. (1992), "Multiscale color image enhancement," Pattern
[11] Chen, Soong-Der, and Rahman (2004), "Preserving brightness
Recognit. Lett., vol. 13, pp. 167-174.
in histogram equalization based contrast enhancement
[2] Trahanias, P. E. and Venetsanopoulos, A. N. (1992), "Color image techniques," Digital Signal Processing, Vol 12, No.5, pp.413-
enhancement through 3-D histogram equalization," in Proc. 15th 428.
IAPR Int. Conf. Pattern Recognition, vol. 1, pp. 545-548.
[12] Sun, C. C. , Ruan, S. J., Shie, M. C., Pai, T. W. (2005), "Dynamic
[3] Mlsna, P. A. and Rodriguez, J. J. (1995), "A multivariate contrast Contrast Enhancement based on Histogram Specification," IEEE
enhancement technique for multispectral images," IEEE Trans. Transactions on Consumer Electronics, Vol. 51,No.4, pp.1300-
Geosci. Remote Sensing, vol. 33, no. 1, pp. 212-216. 1305.
[4] Yang, C. C. and Rodriguez, J. J. (1995), "Efficient luminance and [13] Murtaza, Mashhood, Ahmad, Jahanzeb, and Usman (2006),
saturation processing techniques for bypassing color coordinate "Efficient Generalized Colored image Enhancement", IEEE, CIS.
transformations," in Proc. IEEE Int. Conf. on Systems, Man,
[14] Zhiming, WANG, and Jianhua, TAO (2007) "A Fast
and Cybernetics, vol. 1, pp. 667-672.
Implementation of Adaptive Histogram Equalization" 8th
[5] Mlsna, P. A., Zhang, Q., and Rodriguez, J. J. (1996), "3-D International Conference on Signal Processing.
histogram modification of color images," Proc. IEEE Intl. Conf.
[15] Taguchi, Akira (2008), "Enhancement of MPEG/JPEG Images
Image Processing, vol. III, pp. 1015-1018.
Based onHistogram Equalization Without Gamut Problem", 2008
[6] Zhang, Q., Mlsna, P. A., and Rodriguez, J. J. (1996), "A recursive IEEE Conference on Soft Computing in Industrial Applications
technique for 3-D histogram enhancement of color images," Proc. (SMCia/08), June 25-27, Muroran, JAPAN.
IEEE Southwest Symp. On Image Analysis and Interpretation,
[16] Kyung, Wang et. al. (2011), "Hue Preservation using Enhanced
pp. 218-223.
Integrated Multi-scale Retinex for Improved Color Correction",
[7] Thomas, B. A., Strickland, R. N., and Rodriguez, J. J. (1997), Journal of Imaging Science and Technology, 55(1): 010504-
"Color image enhancement using spatially adaptive saturation 010504- 10.
feedback," in Proc. IEEE Int. Conf. on Image Processing.
Abstract: In India, rail is quite possibly the most resolve this issue of crack detection in railway tracks
every now and again utilized methods for transport, with the most extreme consideration because of the
the fourth biggest railway assemblage on the planet. recurrence of the utilization of railway lines. Because of
Albeit the Indian railways are going through an
the manual railway line checking and sporadic support,
excellent blast, a portion of the fundamental issues,
there is a high possibility that these cracks are by and
for example, the issue at the door crossing, the
fire fiascos and the issue out and about that stays large ignored. Henceforth, there is a requirement for
unattended and causes derailment, stay beset. computerized frameworks to investigate and recognize
Because of changes in the season the inclines the cracks in the railway lines. A large portion of the
contract and expand. Therefore, cracks on the track current frameworks are outfitted with Light Dependent
can create. This proposed framework identifies the Resistor (LDR) and Light Emitting Diode (LED), the
cracks and obstructions on the track by means of disadvantages with these sorts of frameworks are the
sensors and utilizations a GSM and GPS module to sensors need to be adjusted inverse to one another to
alarm the control room through a SMS. The recognize the cracks. In our work, we have utilized a
primary goal is to recognize the cracks on the solitary module ultrasonic sensor, which has both
railway track to keep away from train mishaps
transmitter and beneficiary addressing arrangement
because of derailment. This model proposes a
issues.
financially savvy answer for the issue of railway
track crack detection using ultrasonic sensor get The fundamental issue is that there is no solid and
together which tracks the specific area of flawed reasonable hardware to analyze train track issues and
track, then, at that point illuminate to close control the absence of legitimate support. The appropriate
room through SMS, so numerous lives will be working and upkeep of transport framework, in any
saved. case, fundamentally affects the economy. This model
Keywords: Arduino Uno, Ultrasonic sensors, talks about a proposed test train plan for distinguishing
GSM Module, GPS Module, DC Gear Motors. impediments and cracks, like the line following the test
I. INTRODUCTION train. To overcome this issue multiple techniques have
been proposed which involve graphical inspections,
The Indian Railway network is the fourth biggest in Non-destructive testing (NDT) technologies such as
the world with a course length of 67,368 Kilometers magnetic field methods, radiography, fiber optic sensors
(41,861 mi), a absolute track length of 121,407- of various kinds, use of LDR[1] etc. Another composite
kilometer (75,439 mi) and 7,349 Railway stations. In detection framework is proposed which comprises of
contrast with the worldwide guidelines, the Indian laser source, an advanced preparing CCD camera and
railway networks do not have the wellbeing framework an oversight framework. These current frameworks for
causing incessant derailment bringing about extreme loss detection of crack are either not extremely exact or a
of human lives. In the year 2016-17, India has seen the bit of unwieldy interaction. The essential target of the
most elevated demise cost in the decade because of proposed work is to foster a minimal expense breakage
derailments and out of which 90% were because of detection arrangement of railway tracks utilizing
cracks in the railway tracks. Hence, there is a need to
84 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ultrasonic sensors and send the area data to the In this task we presented the incorporation of
approved faculty for additional activity. ultrasonic and absolute station for railway track
II. LITERATURESURVEY calculation looking over framework. this venture
comprise of GPS module, GSM modem, IR sensor,
Shailesh D. Kuthe, Sharadchandra A. Amale, Vinod PIR sensor for utilization of correspondence reason,
G. Barbuddhye "Modern Method for Detecting Cracks crack detection and finding of individual present in the
In Railway Tracks By The Efficient Utilization Of railway track. The GPS module and GSM modem assist
Ultrasonic Sensor System" us with finding and sending railway mathematical
In the proposed design, the LED will be attached to boundary of crack detection to closest railway station.
one side of the crack sand the LDR to the opposite III. PROPOSED SYSTEM
side. During typical activity, when there are no cracks,
the LED light doesn't fall on the LDR and consequently We use Arduino UNO board in this proposed
the LDR obstruction is high. Accordingly, when the LED system. Arduino is an integrated open source
light falls on the LDR, the obstruction of the LDR gets development environment, which simplifies coding
diminished and the measure of decrease will blare considerably. The system proposed is consisting of an
generally relative to the power of the episode light. As ultrasonic sensor designed to detect cracks and IR
an outcome, when light from the LED veers off from its sensors used to detect obstacles. The motor controller
way because of the presence of a crack or a break, an L293D helps to power the DC motors. The Arduino
unexpected reduction in the opposition worth of the controller is primarily used for controlling the sensor
LDR results. This adjustment of opposition outputs and is used for the transmission of information
demonstrates the presence of a crack or some other through GSM module, the purpose of which is to send
comparative underlying deformity in the rails. To the signal to the base station whenever a crack or
recognize the Existing area of the gadget if there should obstacle is detected via an SMS. Using the GPS
be an occurrence of detection of a crack, a GPS module, the exact latitude and longitudinal direction of
recipient whose capacity is to get the Existing scope the faulty track is obtained.
and longitude information is utilized. To convey the got A. BLOCK DIAGRAM:
data, a GSM modem has been used.
V.Muralidharan, V.Dinesh, P.Manikandan "An
Enhanced Railway Track Crack Detection System",
This strategy is utilized for outside of base station.
Estimating distance between two rail tracks IR sensors
are utilized to recognize the crack in the track. In the
event that anybody seeking after on the track implies
they stop the studying work IR sensors used to
distinguish the crack in railway track. Two IR sensors
are fixed before the train is utilized to discover the crack
on the rail. Every sensor will create the sign related Fig. Block diagram
VII. REFERENCES
[1] Shailesh D. Kuthe, Sharadchandra A. Amale, Vinod G. Barbuddhye
"Modern Method for Detecting Cracks In Railway Tracks By
The Efficient Utilization Of LDR And LED System" Advance
Research in Electrical and Electronic Engineering, Volume 2,
Number 5; April - June, 2015
[2] V.Muralidharan, V.Dinesh, P.Manikandan "An Enhanced Crack
Detection System for Railway Track", International Journal of
Engineering Trends and Technology Volume 21, Number 6 - March
2015.
[3] Prof. P.Navaraja, "Crack Detection System for Railway Track
by ultrasonic and PIR sensor", IJAICT Volume -1, Issue1, May
2014.
[4] Ravi Shankar Shekhar, Purushottam Shekhar, Ganesan P,
"Automatic Detection of Squats in Railway Track", IEEE
Sponsored 2 nd International Conference on Innovations in
Information Embedded and Communication Systems. vol.3, issue.
6, December 2015
[5] Selvamraju Somalraju, Vigneshwar Murali, Gourav Saha,
Dr.V.Vaidehi, "Robust Railway Crack Detection Scheme
(RRCDS) Using LDR Assembly," IEEE Int. Conf. on Networking,
Sensing and Control,vol. 6, issue. 3, May2012.
Abstract: The level of pollution has increased The living things on earth and under water are
with times by lot of factors like the increase in suffering many problems like change in life due to lack
population, increased vehicle use, industrialization of proper facilities of life.
and urbanization which results in harmful effects
on human wellbeing by directly affecting health of 1.1 Embedded system implementation
population exposed to it. In order to monitor air An embedded system is one kind of a computer
quality, we developed an IOT Based Air Pollution
system mainly designed to perform several tasks like
Monitoring System in which Air trigger a alarm i.e.,
message will be sent when the air quality Quality
to access, process, and store and also control the data
is monitored over a web server using internet and in various electronics-based systems. Embedded
will goes down or above beyond a certain level, systems are a combination of hardware and software
means when there are sufficient amount of harmful where software is usually known as firmware that is
gases are present in the air like CO2, smoke, embedded into the hardware. One of its most important
alcohol, benzene and NH3. It will show the air characteristics of these systems is, it gives the o/p within
quality on the LCD as well as on webpage so that the time limits. Embedded systems support to make
we can monitor it very easily. In this IOT project, the work more perfect and convenient. So, we
you can monitor the pollution level from anywhere frequently use embedded systems in simple and complex
using your computer or mobile. devices too. The applications of embedded systems
Keywords: IoT, MQ135, MQ3, MQ5, mainly involve in our real life for several devices like
MQ7,Thingspeak microwave, calculators, TV remote control, home
1. INTRODUCTION security and neighborhood traffic controlsystems, etc.
Air pollution is the biggest problem of every nation, 1.2 Embedded system:
whether it is developed or developing. Health problems Embedded system includes mainly two sections, they
have been growing at faster rate especially in urban are
areas of developing countries where industrialization and
1. Hardware
growing number of vehicles leads to release of lot of
gaseous pollutants. Harmful effects of pollution include 2. Software
mild allergic reactions such as irritation of the throat,
eyes and nose as well as some serious problems like
bronchitis, heart diseases, pneumonia, lung and
aggravated asthma. According to a survey, due to air
pollution 50,000 to 100,000 premature deaths per year
occur in the U.S. alone whereas in EU number reaches
to 300,000 and over 3,000,000 worldwide. The main
reason for the climate change and people health is air
pollution. It has brought changes in climate like global
warming, global dimming, over raining, drought, storms,
Fig:1.1- Overview of embedded system
acid rain, foggy weather etc.
1.2.1 Embedded System Hardware: circuit finally displays the PPM values as well as Air
As with any electronic system, an embedded system Quality level of gases on an Android application which
requires a hardware platform on which it performs the fetches data from ThingSpeak. The current model is
operation. Embedded system hardware is built with a implemented successfully and can be deployed for real
microprocessor or microcontroller. The embedded system implementations.
system hardware has elements like input output (I/O) IEEE Transaction(2020), Design and Analysis of IoT
interfaces, user interface, memory and the display. based Air Quality Monitoring System, Ajitesh Kumar,
Usually, an embedded system consists of: The system can measure local area air contamination
• Power Supply and generate analyzed data based on which it alerts the
people through a buzzer device integrated into the
• Processor system. The user-friendly and easy handling of the
• Memory system technology is such that it can be installed in
houses and in small places.
• Timers
III. EXISTING SYSTEM
• Serial communication ports
The existing system is Zigbee based wireless air
• Output/Output circuits
quality monitoring device. The communication between
• System application specific circuits nodes and host is based (Zigbee protocol) using the
1.2.2 Embedded System Software: Zigbee module and the communication between host
and PC is performed through an USB interface.
The embedded system software is written to perform
a specific function. It is typically written in a high level 3.1 Drawbacks of existing method:
format and then compiled down to provide code that • Zigbee is only for limited distance
can be lodged within a non-volatile memory within the
• Due to this we cannot monitor the air quality from
hardware. An embedded system software is designed long distances
to keep in view of the three limits:
• It requires PC to monitor the values, we cannot carry
• Availability of system memory PC and Zigbee receiver all the time.
• Availability of processor's speed So we moved to proposed system.
• When the system runs continuously, there is a need IV. PROPOSED SYSTEM
to limit power dissipation for events like stop, run and
wake up. The proposed IoT based Air Pollution Monitoring
System is as the block diagram as shown. The data of
II. LITERATURE REVIEW
air is recognized by MQ135,MQ3, MQ5, MQ7 gas
IEEE Transaction(2019), Air Quality Arduino Based sensors. The sensor can sense NH3, NOx, alcohol,
MonitoringSystem, Abdullah J. Alabdullah. This paper Benzene, smoke, CO2. So it is dynamic gas sensored
presents a design for a system that aims to notify the for our Air pollution Monitoring system. When it is
residents of VOC's concentration level in both indoor connected to Arduino, then it will sense all gases, and it
and outdoor environments. The system is Arduino- will give the Pollution level in PPM (parts per
based, it will monitor and detect total volatile organic million).Gas sensor will give the output in the form of
compounds (TVOC) and then inform the user via voltage levels and we have to convert it into PPM.
wireless communication system of its levels to take
actions.
IEEE Transaction (2020), Air Quality Sensing and
Reporting System Using IoT, Rohan Kumar Jha. The
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 89
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Arduino IDE:
MQ5 Sensor
LCD
Arduino IDE where IDE stands for Integrated
Development Environment - An official software
MQ7 Sensor
introduced byArduino.cc, that is mainly used for writing,
compiling and uploading the code in the Arduino Device.
MQ135 Sensor
Almost all Arduino modules are compatible with this
software that is an open source and is readily available
Fig:4.1- block diagram of proposed method to install and start compiling the code on the go.
4.2 Flow Chart for Proposed Method VI. RESULTS
The graphical analysis of the collected values with [5] WORLD HEALTH ORGANIZATION, AIR POLLUTION
AND CHILD HEALTH-PRESCRIBING CLEAN AIR, WHO,
time on X axis and AirQuality PPM on Y axis.We see GENEVA, SWITZERLAND, 2018, SEPTEMBER 2018,
the output on LCD screen also. H TT P S : / / WW W. W H O . I N T / C E H / P U B L I C AT I O N S /
ADVANCE-COPY-OCT24_18150_AIR-POLLUTION-AND-
VII. CONCLUSION CHILD-HEALTH-MERGED-COMPRESSED.PDF.
This system includes the sensors that detect the [6] G. ROUT, S. KARUTURI, AND T. N. PADMINI,
parameters causing pollution. The sensors are NH3, "POLLUTION MONITORING SYSTEM USING IOT," ARPN
JOURNAL OF ENGINEERING AND APPLIED SCIENCES,
NOx, alcohol, Benzene, smoke, CO 2 sensors. VOL. 13, PP. 2116-2123, 2018.VIEW AT: GOOGLE SCHOLAR
Whenever there is an increase in the level of these [7] .N.KAMARUZZAMAN AND N. A. SABRANI, "THE
parameters the sensor senses thesituation and an alarm EFFECT OF INDOOR AIR QUALITY ( IAQ ) TOWARDS
or indication is given. The message is displayed in the OCCUPANTS ' PSYCHOLOGICAL PERFORMANCE IN
OFFICE BUILDINGS," JOURNAL OF DESIGN AND THE
LCD display. BUILT ENVIRONMENT, VOL. 4, NO. 2001, PP. 49-61, 2011.
The system to monitor the air of environment using [8] E. P. AGENCY, "AN OFFICE BUILDING OCCUPANTS
Arduino microcontroller proposed to improve quality GUIDE TO INDOOR AIR QUALITY," 1997. [ONLINE].
AVAILABLE: HTTP://WWW.EPA.GOV/IAQ/PUBS/
of air. Here the using of MQ3, MQ5, MQ7 and OCCUPGD.HTML.
MQ135 gas sensor gives the sense of different type of
[9] M. G. APTE, W. J. FISK, AND J. M. DAISEY, "INDOOR
dangerous gas and Arduino is the heart of this project CARBON DIOXID CONCENTRATIONS AND SBS IN
which controls the entire process and LCD is used for OFFICE WORKERS," HEALTHY BUILDINGS, VOL. 1, PP.
the visual Output. 133-138, 2000.
[10]C. A. ERDMANN, K. C. STEINER, AND M. G. APTE,
VIII. REFERENCES "INDOOR CARBON DIOXIDE CONCENTRATIONS AND
[1] GSMA, AIR QUALITY MONITORING USING IOT AND SICK BUILDING SYNDROME SYMPTOMS IN THE BASE
BIG DATA: A VALUE GENERATION GUIDE FOR MOBILE STUDY REVISITED: ANALYSES OF THE 100 BUILDING
OPERATORS, 2018, SEPTEMBE,2018, HTTPS:// DATASET," INDOOR AIR, PP. 443-448, 2002.
WWW.GSMA.COM/IOT/WPCONTENT/UPLOADS/2018/ [11]S. DE VITO, G. FATTORUSO, R. LIGUORO, A. OLIVIERO,
02/IOT_CLEAN_AIR_02_18.PDF. E. MASSERA, C. SANSONE, V. CASOLA, AND G. DI
[2] MINISTRY OF ENVIRONMENT, INVESTIGATION FRANCIA, "COOPERATIVE 3D AIR QUALITY
RESULTS OF MINISTRY OF ENVIRONMENT, MARCH ASSESSMENT WITH WIRELESS CHEMICAL SENSING
2019, HTTP://WWW.ME.GO.KR/HOME/WEB/BOARD/ NETWORKS," PROCEDIA ENGINEERING, VOL. 25, PP. 84-
READ.DO?BOARDMASTERID=1&BOARDID=727840&MENUID=286. 87, JAN. 2011.
Abstract - Key point based detection is Since in practical forensics applications, figuring out
recognized as effective in copy-move forgery the tampered regions compared to forgery detections
detection(CMFD).This project proposes an is more important and necessary.
efficient CMFD method via clustering SIFT key
points and searching the similar neighborhoods to In this project, an improved CMFD method is
locate tampered regions. In the proposed method, proposed, which includes clustering the key points
the key points are clustered based on scale and before matching and locating the tampered regions at
color, grouped into several smaller clusters and pixel level.
matched separately , which reduce the high time
complexity caused in matching caused by the high II. LITERATURE REVIEW
dimensionality of SIFT. E. Ardizzone , A. Bruno, and G. Mazzola, ''Copy-
In order to locate the tampered regions Move forgery detection by matching triangles of key
accurately at pixel level finally, a novel localization points,'' IEEE Trans. Inf. Forensics Security, vol. 10,
algorithm is designed to compare the similar no. 10, pp. 2084-2094, Oct. 2015.
neighborhoods of matching pairs by two similarity
measures, and mark the tampered regions in pixels
C.-M. Pun, X.-C. Yuan, and X.-L. Bi, ''Image
iteratively. The experimental results show that the forgery detection using adaptive over segmentation and
proposed method is superior to existing state-of- feature point matching,'' IEEE Trans. Inf. Forensics
art methods in terms of matching time complexity, Security, vol. 10, no. 8, pp. 1705-1716, Aug. 2015.
detection reliability and forgery location accuracy. Y. Wu, W. Abd - Almageed, and P. Natarajan ,
INDEX TERMS Copy-move forgery detection, ''BusterNet : Detecting copy move image forgery with
digital image forensics, keypoint clustering, similar Source/Target localization ,''in Proc. ECCV Int., Oct.
neigh bor hood search algorithm. Index Terms - 2018, pp. 168-184.
Copy-move forgery detection, digital image
forensics, keypoint clustering, similar neigh bor III. EXISTING METHOD
hood search algorithm. In today's digital world the important and convenient
I. INTRODUCTION source of information is the digital image. Due to their
ease of acquisition and storage they convey information
In recent years, the authenticity and dependability
in the fastest. In the court of law the images can be
of images have become the hot issues of research, and
used as proof or evidence. Digital images having large
a key technology in digital image identification is copy-
applications ranging from military to medical and from
move forgery detection(CMFD).The goal of CMFD
art piece to user photography. Hence the digital image
is to find some regions similar to other regions of the
forensic evolve as fast growing need for society. The
image , because the tampered part is copied from the
image needs to be authentic. Now a days due to
same image. However , the time complexity of existing
advancement in computers and easiness in availability
methods is high, especially in the feature matching stage,
of low cost tools that is hardware and software. It
and the location of tampered regions are not accurate
becomes very easy to manipulate the digital image
enough to meet the practical requirements.
without leaving any visible traces of manipulation and it
92 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Method Sensitivity FPR F1 Specificity Precision Fig 4: Experimental Results of Images a)Original Image,
(TPR) (PPV) b)Tempered image, c) Resized input image d) Gray conversion
SURF 100 18.84 93.04 81.15 87 Image
Fig 6:Localization-Gray,Localization-Binary
1000
800
600
400
200
0
-6 -4 -2 0 2 4 6
Output:
Fig 5: Experimental results of image (a)Contrast adjust input Forgery detected Elapsed Time is 48.679003
image (b)Contrast adjust input tampered image(c)Gray
Conversion of input image(d) Gray Conversion of input seconds
Tempered image(e) Matched point detection using SURF
SOFTWARE TOOLS REQUIREMENTS
• Simulation Tools : MATLAB R2019b
• Operating System : Windows 7
Abstract- As technology scaling is reaching its processing (DSP), multimedia, machine learning and
limits, new approaches have been proposed for pattern recognition. Approximate computing can be
computational efficiency. Approximate computing applied to these applications due to the large and
is a promising technique for high performance and redundant data sets with significant noise, so numerical
low power circuits as used in error-tolerant exactness can be relaxed. Approximate computing not
applications. Among approximate circuits,
only reduces power consumption, but also increases
approximate arithmetic designs have attracted
significant research interest. In this project, the performance by reducing the critical path delay.
design of approximate redundant binary (RB) Approximate techniques can be applied at several levels
multipliers is studied.Simulation results has proven including circuits, architectures and software]. The
different key performance parameters (power, area, application of approximate computing to deep learning
delay) has improved. The proposed approximate has also been studied. At circuit level, the design of
RB multipliers are compared with previous exact approximate arithmetic units has received significant
booth multipliers. The results show that the research interest due to its importance in many
approximate RB multipliers are better than exact computing applications. Typical applications, such as
RB booth multipliers with respect to key DSP and machine learning, require arithmetic computing
performance parameters are Power(3.03mw), 77% in the form of addition and multiplication. Addition has
of the Area is reduced andDelay(1.115ns).
been extensively studied for approximate circuit
Key words: Redundantbinary(RB) multiplier, implementations; various approximate adders have been
modified Boothencoder, RB compressor, RB-NB proposed to attain reductions in power consumption
converter, partial productarray. and delay. Current approximate adder designs include
I. INDRODUCTION speculative adders and non-speculative transistor-level
full adders approximate floating-point arithmetic has also
As classic Dennard scaling is coming to an end, on
been studied. Multiplication is more complex than
chip power consumption has becomeprohibitively high.
addition, because it requires the accumulation of the
Therefore, improvement in the performance of
partial product (PP)rows.
computing systems is encountering significant hurdles
at the same power level. Recently, approximate The main differences are summarized as follows
computing has been proposed as a new approach for • A new approximate Booth encoder with six errors in
efficient low power design. In this context, efficiency the K-map isproposed.
refers to the generation of approximate results and
comparable performance at a lower power • A new approximate RB 4:2 compressor at a smaller
complexity isproposed.
consumption. Approximate computing can generate
results that are good enough rather than always fully • For small approximate factors, rather than achieving
accurate. Approximate computing is driven by a regular PP array by ignoring the correction term,
applications that are related to human perception and an exact regular PP array is designed by combining
inherent error resilience to include digital signal the correction terms into the PPs using logic
optimization for more accurateresults.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 97
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
• Case studies are provided with applications to FIR b2i+1, b2i, b2i-1 Operation
filters, k-mean clustering and HDR image processing. 000 0
001 +A
II. LITERATURE SURVEY 010 +A
011 +2A
N. Maheshwari, Z. Yang, J. Han and F. Lombardi," 100 -2A
A design approach for compressor based approximate 101 -A
multipliers". In this paper, a new design approach is 110 -A
proposed to exploit the partitions of partial products 111 0
using recursive multiplication for compressor- based RB Partial Product Generator:
approximate multipliers. As two bits are used to represent one RB digit, then
G. Zervakis, K. Tsoumanis, S. Xydis, D. Soudris a RBPP is generated from two NB partial products.The
and K. Pekmestzi," Design-efficient approximate addition of two N-bit NB partial products X and Y
multiplication circuits through partial product using two's complement representation can be
perforation". In this paper, we focus on Partial Product expressed as follows :
Perforation technique for designing approximate X+Y=X-Y-1
multiplication circuits. The authors prove in a
Table 2: RB encoding
mathematically rigorous manner that in partial product
perforation, depending only on the input distribution. X1 X2 X
0 0 0
H. Jiang, J. Han, F. Qiao, F. Lombardi, 0 1 1
"Approximate radix-8 Booth multipliers for low- power 1 0 1
and high performance operation,". In this paper, this 1 1 0
issue is alleviated by the application of approximate Booth algorithm gives a procedure for multiplying
designs. An approximate 2-bit adder is deliberately binary integers in signed 2's complement representation
designed for calculating the sum of a binary number. in efficient way, i.e., less number of additions/
This adder requires a small area, a low power and a subtractions required.This modified booth multiplier's
short critical path delay. computation time and word length of operands are
III. EXISTING METHOD proportional to each other. We can reduce half the
number of partial product.
Radix-4 Booth Encoding:
Booth encoding has been proposed to facilitate the
multiplication of two's complement binary numbers. It
was revised as modified Booth encoding (MBE) or
radix-4 Booth encoding. The MBE scheme is
summarized in Table 1.
01 0 0 1 0 1 1 1 0
11 0 1 1 1 0 1 0 0
10 0 1 0 1 0 1 0 1
ANMBE
app'ij= b2i+1 ⊕ aj+ b2i.b2i-1
Table 6: K-Map of ANMBE
0 0 0 0 1 1 1 1
a/b 0 0 1 1 1 1 0 0
0 1 1 0 0 1 1 0
00 0 0 1 0 1 1 1 1
Fig 5: Approximate 4:2 Compressor(ARBC-1)
01 0 0 1 0 1 1 1 1
Approximate RB-NB Converter
11 1 1 1 1 0 1 0 0
The approximate RB-NB converter uses those small
10 1 1 1 1 0 1 0 0 values to convert to NB, which has been produced by
In table 3 and table 4 zero's is replaced by one's the 4:2 compressors.
and one's are replaced by zero's in the table 5 and table V. RESULTS
6 to design k-map of AMBE and ANMBE.
Synthesis Results of Proposed Method (Area)
Approximate
modified booth
encoder
100 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Synthesis Results of Proposed Method (Power) with key performance parameters Area, Power and
Delay.
VII. REFERENCES
[1] J. Han and M. Orshansky, "Approximate computing: an emerging
paradigm for energy-efficient design," in Proc. 18th IEEE
EuropeanTest Symposium, 2013.
[2] S. Venkataramani, S. Chakradhar, K. Roy and A. Raghunathan,
"Approximate computing and the quest for computing efficiency,"
in Proc. 52nd Annual Design Automation Conference (DAC),
2015.
[3] N. Maheshwari, Z. Yang, J. Han and F. Lombardi, "A design
approach for compressor based approximate multipliers," 2015.
[4] H. Jiang, J. Han, F. Qiao, F. Lombardi, "Approximate radix-8
Fig 7: Power report of Proposed Method
Booth multipliers for low-power and high performance
Synthesis Results of Proposed Method (Delay) operation," IEEE Trans. Computers, vol. 65, pp. 2638-2644,
Aug. 2016.
[5] Q. Xu, N. S. Kim and T. Mytkowicz, "Approximate computing:
a survey," IEEE Design and Test, vol. 33, no.1, pp. 8-22, 2016.
[6] G. Zervakis, K. Tsoumanis, S. Xydis, D. Soudris and K.
Pekmestzi," Design-efficient approximate multiplication circuits
through partial product perforation," 2016.
[7] H. Jiang, J. Han, F. Qiao, F. Lombardi, "Approximate radix-8
Booth multipliers for low-power and high performance
operation," Aug 2016.
[8] W. Liu, L. Qian, C. Wang, H. Jiang, J. Han and F. Lombardi,
"Design of approximate radix-4 booth multipliers for error-tolerant
computing," Aug. 2017.
Fig 8: Delay report of Proposed Method
[9] Y. Wang, H. Li, X. Li, "Real-time meets approximate compureting:
Advantages of Proposed Method An elastic CNN inference accelerator with adaptive trade-off be-
tween QoS and QoR," in Proc. 54th Annual Design Automation
• Numerical exactness can be relaxed. Conference (DAC), 2017.
• Area is Reduced.
• Reduces power consumption.
• Increases performance by reducing the critical path
delay.
VI. CONCLUSION
The Approximate RB multipliers contains
Approximate MBE, two 4:2 compressors and RB-NB
converter. The results proved that Approximate RB
multiplier is better than Exact RB multiplier. Approximate
MBE is used to generate the Partial products(PP) and
two 4:2 compressors used to reduce the number of
Partial Products. The Approximate RB multiplier
reduces the area by 77% with power consumed of 3.03
micro watts and delay is 1.115ns. The proposed
approximate redundant binary multipliers are efficient
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 101
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract:- Pseudorandom bit generator (PRBG) manage user privacy in IoT enabled resource constraint
is an essential component for securing data during devices. A high bit-rate, cryptographically secure and
transmission and storage in various cryptography large key size PRBG is difficult to attain due to hardware
applications. Among popular existing PRBG limitations which demands efficient VLSI architecture
methods such as linear feedback shift register
in terms of randomness, area, latency and power.
(LFSR), linear congruential generator (LCG),
coupled LCG (CLCG), and dual-coupled LCG The PRBG is assumed to be random if it satisfies
(dual-CLCG), the latter proves to be more secure. the fifteen benchmark tests of National Institute of
The hardware implementation of this method has Standard and Technology (NIST) standard. The outputs
a bottleneck due to the involvement of inequality of such generators may be used in many cryptographic
equations. Initially, a direct architectural mapping applications, such as the generation of key material.
of the dual-CLCG method is performed. Since two Generators suitable for use in cryptographic applications
inequality equations are involved for coupling, it
may need to meet stronger requirements than for other
generates pseudorandom bit at unequal interval of
time that leads to large variation in output latency. applications. In particular, their outputs must be
Besides, it consumes a large area and fails to unpredictable in the absence of knowledge of the inputs.
achieve the maximal period. Hence, to overcome A pseudorandom number generator (PRNG), also
the aforesaid drawbacks, a new efficient PRBG known as a deterministic random bit generator (DRBG),
method, i.e., "coupled variable input LCG is an algorithm for generating a sequence of numbers
(CVLCG)" and its architecture are proposed. The
whose properties approximate the properties of
novelty of the method is the coupling of two newly
formed variable input LCGs that generates
sequences of random numbers. The PRNG-generated
pseudorandom bit at every uniform clock rate, sequence is not truly random, because it is completely
attains maximum length sequence and reduces one determined by an initial value, called the PRNG's seed
comparator area as compared to the dual-CLCG (which may include truly random values). Although
architecture. An analysis on various PRBG methods sequences that are closer to truly random can be
have been done on this paper. generated using hardware random number generators,
Keywords: Pseudorandom Bit Generator pseudorandom number generators are important in
(PRBG), VLSI Architecture, FPGA Prototype practice for their speed in number generation and their
reproducibility.
1. INTRODUCTION
PRNGs are central in applications such as simulations
Security and privacy over the internet is the most
(e.g. for the Monte Carlo method), electronic games
sensitive and primary objective to protect data in various
(e.g. for procedural generation), and cryptography.
Internet-of-Things (IoT) applications. Millions of
Cryptographic applications require the output not to
devices which are connected to the internet generate
be predictable from earlier outputs, and more elaborate
big data that can lead to user privacy issues. Also, there
algorithms, which do not inherit the linearity of simpler
are significant security challenges to implement the IoT
PRNGs, are needed. PRNGs are central in applications
whose objectives are to connect people-to-things and
such as simulations (e.g. for the Monte Carlo method),
things-to-things over the internet. The pseudorandom
electronic games (e.g. for procedural generation), and
bit generator (PRBG) is an essential component to
102 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
cryptography. Cryptographic applications require the comparator area as compared to the dual-CLCG
output not to be predictable from earlier outputs, and architecture. Also, it generates pseudorandom bits at a
more elaborate algorithms, which do not inherit the uniform clock rate with one initial clock latency and
linearity of simpler PRNGs, are needed. A linear achieves the maximum length sequence. Moreover, the
congruential generator (LCG) is an algorithm that yields CVLCG method successfully passes all the fifteen
a sequence of pseudo-randomized numbers calculated benchmark tests of National Institute of Standard and
with a discontinuous piecewise linear equation. The Technology (NIST).
method represents one of the oldest and best-known 2. VARIOUS PRNG METHODS
pseudorandom number generator algorithms. The
theory behind them is relatively easy to understand, and Computer's first requirement of random numbers was
they are easily implemented and fast, especially on for simulations and numerical computations such as
computer hardware which can provide modular Monte Carlo calculations. It is significant to note that
arithmetic by storage-bit truncation. the requirement of randomness is different in
cryptographic applications than that of simulation.
The generator is defined by recurrence relation: Prediction is often a prerequisite when we talk about
X(n+1) = (a X(n)+c) mod m cryptographically secure pseudo random number
where X is the sequence of pseudorandom values, generator.
and m, 0 < m - the "modulus" a,0 < a < m - the First cryptographically secure pseudo random
"multiplier" c,0 ≤ c < m - the "increment" X0,0 ≤ X0<m number generator [7], in terms of unpredictability, was
- the "seed" or "start value" are integer constants that introduced by Adi Shamir in 1981 who is one of the
specify the generator. If c = 0, the generator is often inventors of RSA [8]. Shamir uses the core concept of
called a multiplicative congruential generator (MCG), RSA i.e. the problem of Integer factorization to ensure
or Lehmer RNG. If c ≠ 0, the method is called a mixed the security of his new CSPRNG, with the assumption
congruential generator. When c ≠ 0, a mathematician of the strength of this CSPRNG is equivalent to the
would call the recurrence an affine transformation, not security of the RSA cryptosystem because of
a linear one, but the misnomer is well-established in intractability of the problem of Integer factorization. On
computer science. the other hand, since it uses modular exponentiation of
As motivated by the concept of coupling and huge numbers, makes it slow as well as not suitable for
considering the challenges of efficient hardware practical applications.
implementation, the CVLCG method is developed by 2.1 Computer Based PRNG
the coupling of two variable input LCGs for generating An early computer-based PRNG, suggested by John
pseudorandom bit at every iteration. The main von Neumann in 1946[2], is known as the middle-
contribution of the CVLCG PRBG method is the square method. The algorithm is as follows: take any
replacing of a constant parameter with a variable input number, square it, remove the middle digits of the
in the LCG equation (the newly formed equation is resulting number as the "random number", then use that
named as variable-input LCG or Vi-LCG) and further number as the seed for the next iteration. For example,
uses the concept of coupling as post-processing squaring the number "1111" yields "1234321", which
between two Vi-LCGs for generating pseudorandom can be written as "01234321", an 8-digit number being
bit at every iteration. The variable-input LCG (Vi-LCG) the square of a 4-digit number. This gives "2343" as
is the class of LCG in which the variable parameter is the "random" number. Repeating this procedure gives
derived from another LCG. The coupling of two variable "4896" as the next result, and so on. Von Neumann
input LCGs in the CVLCG method provides the same used 10 digit numbers, but the process was the same.
security strength as existing dual-CLCG method in the A problem with the "middle square" method is that all
order of O(n22n). The CVLCG architecture saves one sequences eventually repeat themselves, some very
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 103
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
quickly, such as "0000". Von Neumann was aware of Among these, Blum-Blum-Shub generator (BBS)[6]
this, but he found the approach sufficient for his is one of the proven polynomial time unpredictable and
purposes and was worried that mathematical "fixes" cryptographic secure key generator because of its large
would simply hide errors rather than remove them. Von prime factorize problem. Although it is secure, the
Neumann judged hardware random number generators hardware implementation is quite challenging for
unsuitable, for, if they did not record the output performing the large prime integer modulus and
generated, they could not later be tested for errors. If computing the large special prime integer. There are
they did record their output, they would exhaust the various architectures of BBS PRBG, discussed in Panda
limited computer memories then available, and so the et. al.[7] and Lopez et.al.[8]. Most of them either
computer's ability to read and write numbers. If the consume a large amount of hardware area or high clock
numbers were written to cards, they would take very latency.
much longer to write and read. 2.3 Coupled LCG Based PRNG
2.2 Shift Register &Congruential Generator A bit "1" is output if the first LCG produces an output
Based PRNGs that is greater than the output of the second LCG and a
In computing, a linear-feedback shift register (LFSR) bit "0" is output otherwise. Breaking this scheme would
is a shift register whose input bit is a linear function of require one to obtain the seeds of the two independent
its previous state. The most commonly used linear generators, given the bits of the output bit sequence.
function of single bits is exclusive-or (XOR). Thus, an The problem of uniquely determining the seeds for the
LFSR is most often a shift register whose input bit is CLCG requires
driven by the XOR of some bits of the overall shift (i) a knowledge of at least log2 m2 (m being the LCG
register value. The initial value of the LFSR is called modulus) bits of the output sequence
the seed, and because the operation of the register is
(ii) the solution of at least log2 m2 inequalities where each
deterministic, the stream of values produced by the
inequality (dictated by the output bit observed) is
register is completely determined by its current (or applied over positive integers.
previous) state. Likewise, because the register has a
finite number of possible states, it must eventually enter Computationally, we show that this task is
a repeating cycle. However, an LFSR with a well- exponential in n (where n = log2 m is the number of bits
chosen feedback function can produce a sequence of in m) with complexity O(22n).The quality of the PRBS
bits that appears random and has a very long cycle. so obtained is assessed by performing a suite of
Applications of LFSRs include generating pseudo- statistical tests (NIST 800-22) recommended by NIST.
random numbers, pseudo-noise sequences, fast digital We observe that a variant of our generator that uses
counters, and whitening sequences. Both hardware and two CLCGs (called dual CLCG), pass all the NIST
software implementations of LFSRs are common. The pseudo randomness tests with a high degree of
mathematics of a cyclic redundancy check, used to consistency.
provide a quick check against transmission errors, are A linear congruential generator (LCG) is defined by
closely related to those of an LFSR. the recurrence xi+1 = a xi+b (mod m) where a, b and m
Zenner et. al.[4] and Stern et. al.[5] reported, linear are known and x0 is secret [11]. The LCG is full period
feedback shift register (LFSR) and linear congruential if the period of the sequence generated is m. The LCG
generator (LCG) are the most common and low has a fixed point (this implies that there exists i such
complexity PRBGs. However, these PRBGs badly fail that xi+1 = xi) when (1-a)-1(mod m) exists. When this
randomness tests and are insecure due to its linearity occurs the maximum period of the sequence is m-1, if
structure. Numerous studies on PRBG based on LFSR, the fixed point is not used as an initial condition. The
chaotic map and congruent modulo are reported. maximum period occurs when the following conditions
are satisfied.
104 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
1) b and m are relatively prime. the maximum length period of 2n (it depends on the
2) (a -1) is divisible by every prime factor of m. number of 0's in the CLCG sequence and is nearly 2n-
1
for randomly chosen n-bit input seed) and also fails
3) (a -1) is divisible by 4 if 4 divides m.
five major NIST statistical tests. Hence, to overcome
An example of the CLCG follows. these shortcomings in the existing dual-CLCG method
Example 2.1: and its architecture, a new PRBG method and its
architecture have been proposed.
Let a1 = 5, b1 = 5, a2 = 5, b2 = 3, and m = 8. Both
sequences, xi and yi have a period of 8 and are hence 2.4 DUAL-CLCG METHOD
full period. If the initial condition (or the seed) is (x0, y0) 2.4.1 Architectural Mapping of The Dual CLCG
= (2,7), then the sequences are, Method
xi = (7,0,5,6,3,4,1,2) The dual-CLCG method is a dual coupling of four
yi = (6,1,0,3,2,5,4,7) linear congruential generators and is defined
mathematically as follows:
The bit sequence Bi therefore is,
xi+1 = a1×xi+b1 mod 2n (2.1)
Bi = (1,0,1,1,1,0,0,0)
yi+1 = a2×yi+b2 mod 2n (2.2)
To mitigate the aforesaid problems of LFSR and
LCG based PRNGs, a low hardware complexity pi+1 = a3×pi+b3 mod 2n (2.3)
coupled LCG (CLCG) has been proposed in Katti et. qi+1 = a4×qi+b4 mod 2n (2.4)
al[9]. The coupling of two LCGs in the CLCG method
Zi ={1 if xi+1 > yi+1 and pi+1 > qi+1 and
makes it more secure than a single LCG and chaotic
based PRBGs that generates the pseudorandom bit at 0 if xi+1 < yi+1 and pi+1 < qi+1
every clock cycle. Despite an improvement in the The output sequence Zi can also be computed in an
security, the CLCG method fails the discrete Fourier alternative way as:
transform (DFT) test and five other major NIST
statistical tests. DFT test finds the periodic patterns in Zi = Bi if Ci = 0 (2.5)
CLCG which shows it as a weak generator. To amend Where,
this, Katti et al. [10] proposed another PRBG method,
Bi ={1, if xi+1 > yi+1 0, else;
i.e. dual-CLCG that involves two inequality
comparisons and four LCGs to generate pseudorandom Ci ={1, if pi+1 > qi+1 0, else
bit sequence. The dual-CLCG method generates one- Here, a1, b1, a2, b2, a3, b3, a4 and b4 are the constant
bit random output only when it holds inequality parameters; x0, y0, p0 and q0 are the initial seeds.
equations. Therefore, it is unable to generate
pseudorandom bit at every iteration. Hence, designing Following are the necessary conditions to get the
an efficient architecture is a major challenge to generate maximum period.
random bit in uniform clock time. (i) b1, b2, b3 and b4 are relatively prime with 2n(m).
To the knowledge of authors, the hardware (ii) (a1-1),(a2-1),(a3-1) and (a4-1) must be divisible by 4.
architecture of the dual-CLCG method is not deeply Following points can be observed from the dual-
investigated and therefore, in the beginning, the CLCG method i.e.
architectural mapping of the existing dual-CLCG
1. The output of the dual-CLCG method chooses the
method is developed to generate the random bit at a
value of Bi when Ci is 'zero'; else it skips the value of
uniform clock rate. However, it experiences various Bi and does not give any binary value at the output.
drawbacks such as: large usage of flip-flops, high initial
clock latency of 2n for n-bit architecture, fails to achieve
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 105
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
2. As a result, the dual-CLCG method is unable to clock cycle. Other three LCG equations can also be
generate pseudorandom bit at each iteration. mapped to the corresponding architecture similar to the
LCG equation (2.1). To implement the inequality
equation, a comparator is used that compares the output
of two LCGs. The comparator and two linear
congruential generators (LCG) are combined to form
a coupled-LCG (CLCG). Two CLCGs are used in
the dual-CLCG architecture. One is called controller-
CLCG which generates Ci and another one is called
controlled-CLCG which generates Bi. To perform the
operation of Zi =Bi if Ci =0, a 1-bit tristate buffer is
Fig. 2.1 Architectural mapping of the existing dual-CLCG employed that selects the Bi (output of controlled-
method. CLCG) only when Ci = 0 (the output of controller-
A hardware architecture of the existing dual-CLCG CLCG) and it does not select the value of Bi while Ci
method is developed to generate pseudorandom bit at =1. Since the CLCG output (Ci) is random; it selects
an equal interval of time for encrypting continuous data tristate buffer randomly. Therefore, the direct
stream in the stream cipher. The architecture is designed architectural mapping of the existing dual-CLCG
with two comparators, four LCG blocks, one controller method does not generate random bits in every clock
unit and memory (flip-flops) as shown in Fig. 2.1. The cycle at the output of the tristate buffer. In this case, the
LCG is the basic functional block in the dual-CLCG overall latency varies accordingly with the number of
architecture that involves multiplication and addition consecutive 1's between two 0's in the sequence Ci
processes to compute n-bit binary random number on (output of controller-CLCG). This asynchronous
every clock cycle. The multiplication in the LCG generation of pseudo-random bits is applicable only
equation can be implemented with shift operation, when where asynchronous interface is demanded. However,
a is considered as (2r+1). Here, r is a positive integer,1 in stream cipher encryption, the key size should be larger
< r < 2n. Therefore, for the efficient computation of than the message size where bitwise operation is
xi+1, the equation (2.1) can be rewritten as, performed at every clock cycle. Therefore, a fixed
number of flip-flops can be employed at the output stage
xi+1 = (a1xi+b1)mod 2n = [(2r1+1)xi+b1] mod 2n
of dual-CLCG architecture for generating pseudo-
random bit in a uniform clock time.
If the sequence Ci is considered to be known and
the zero-one combinations are in a uniform pattern, then
the fixed number of flip-flops can be estimated to
generate random bit at every uniform clock cycle. For
example:
If, C i = (0,1,1,0,1,0,0,1,0,1,0,1); and B i =
(1,0,1,1,1,0,0,0,1,1,0,1); then, Zi = Bi if Ci = 0; Zbufi
= (1,x,x,1,x,0,0,x,1,x,0,x)
Fig. 2.2 Architecture of the linear congruential generator. In this example, it is observed that the number of 0's
The architecture of LCG shown in Fig. 2.2 is and 1's are equal in every 4-bit patterns. There are two
implemented with a 3-operand modulo 2n adder, 2 ×1 0's and two 1's in every pattern. Therefore, a pair of
n-bit multiplexer and n-bit register. LCG generates a two flip-flops (two 2-bit registers) is sufficient to get
random n-bit binary equivalent to integer number in each the random bit in the uniform clock cycle. However, Ci
106 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
is not known to the user and is not always in a uniform for generating k number of pseudorandom bits. In
pattern. Consider an example, this case, it is assumed k ≈ 2n-1 for randomly chosen
n-bit input seed, therefore it needs 2n-1 flip-flops.
If, Ci = (0,1,0,0,0,1,1,0,0,1,1,1,0,1,0,1); and Bi =
(1,0,1,1,0,0,0,1,0,0,1,0,1,1,1,1); then, Z bufi = 2. Initial clock latency (input to first output) depends on
the number of clock cycles required to generate k
(1,x,1,1,0,x,x,1,0,x,x,x,1,x,1,x). No such uniform
random bits. The dual-CLCG architecture takes 2n
pattern can be observed in the sequence Ci of the above
initial clock latency if k is considered as maximum
example. Therefore, the fixed number of flip-flops length.
cannot be estimated in this case.
3. Maximum length period of dual-CLCG method
Considering this problem as mentioned above, k depends on the number of 0's in Ci and is nearly 2n-1
number of bits are generated first and then stored in k- for randomly chosen n -bit input seed.
flip flops (termed as 1×k-bit memory) when Ci = '0’. 4. The proposed architecture works when it is assumed
Further, these stored bits are released at every equal that the number of 0's ≤ number of 1's in a maximum
interval of clock cycle. If there are k number of 0's in length sequence generated from controller-CLCG.
the sequence Ci, then the dual-CLCG architecture can
5. The existing dual-CLCG method fails five major NIST
generate maximum of k- random bits in 2n- clock
randomness tests.
cycles. It can utilize k- flip-flops to store k different bits
of Bi while Ci = '0’. After 2n clock cycles, it releases 3. EXISTING CVLCG METHOD
these stored bits serially at every two clock cycles (1- To overcome the aforesaid shortcomings in the
bit per two clock cycles). Here, it is assumed that the existing dual-CLCG method and its architecture, a new
number of 0's = number of 1's = 2n-1 (for n-bit input PRBG method and its architecture have been designed.
seed) in the sequence Ci. This architecture may work The coupling of two or four LCGs is the main principle
even if the number of 0's in the sequence Ci are less for generating a pseudorandom bit sequence in the
than 2n-1. However, when the number of 0's are greater CLCG and dual-CLCG methods which make them
than the number of 1's, then this architecture may not more secure than any other linear PRBGs. Therefore,
work correctly. The maximum length period of dual- the same coupling concept is used as post-processing
CLCG method depends on the number of 0's in Ci and in the proposed PRBG method for generating
is nearly 2n-1 for randomly chosen n-bit input seed. pseudorandom bit at every iteration. Before post
The maximum combinational path delay in the dual- processing, a new formulation of congruential equation
CLCG architecture is the three-operand adder with is used instead of using LCG. The new form of
multiplexer. The reason is that three-operand adder with congruential generator is the class of LCG in which a
multiplexer has highest critical path delay as compared constant parameter is replaced with a variable input
to the comparator. Therefore, parameter and is defined as follows,
Area, ADCLCG = 4ALCG+2Acmp+Atri+Amem+Acntrl xi+1 = a1×xi+pi mod 2n (3.1)
Critical path, TDCLCG = Tadd +Tmux yi+1 = a2×yi+qi mod 2n (3.2)
2.4.2. Drawbacks: The newly formed equations (3.1) and (3.2) are
named as variable input linear congruential generators
Although the dual-CLCG method is secure when
(Vi-LCG), where, the variable parameters and are
compared with CLCG and single LCG, it suffers from
obtained from two different LCGs and are defined as,
several drawbacks in terms of hardware and
randomness test as mentioned below, pi+1 = a3×pi+b3 mod 2n (3.3)
1. It requires control circuit and a large number of flip- qi+1 = a4×qi+b4 mod 2n (3.4)
flops (referred as memory). It requires k flip-flops
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 107
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
units which consume the maximum area in the gate area (A) and 29.1% NOT gate area (A) as
architecture of the CVLCG method. Thus, the area of compared to the dual-CLCG architecture
the architecture is further reduced by employing the carry The CVLCG design of 32- bit word size is
save adder (CSA) [26] and mux based comparator implemented on Xilinx Virtex5, Virtex7 and Zynq7000
[27] to perform three-operand modulo 2n addition and FPGA devices; therefore the other existing PRBG
the n-bit binary comparison respectively. methods such as dual-CLCG, CLCG and BBS
The same carry-save adder and mux based methods are also implemented on the same FPGA
comparator are employed in both CLCG and dual- platforms to ensure a fair comparison. The performance
CLCG architectures for evaluating their overall on Virtex7 and Zynq7000 FPGA devices reports the
complexity. Section 4 summarizes the area and timing same results due to both fabricated with same 28nm
complexity of the architecture of the new CVLCG process technology. The CVLCG architecture is
method along with the architecture of the CLCG and compared with the most recent PRBG methods
dual-CLCG methods. considered for the comparison in Table 4.3. The physical
4. IMPLEMENTATION RESULTS implementation results such as FPGA resource
utilization, worst case delay, maximum operating
frequency, dynamic power and the power per megahertz
frequency are listed in Table 4.1. The estimated power
is computed using Xilinx Xpower analyzer at the
maximum operating frequency. The hardware
implementation in Table 4.1 reports that the CVLCG
architecture consumes considerably less hardware
resources than the existing PRBG methods.
Table 4.3 Result of 32 bit CVLCG and Its Comparison
This section presents the physical implementation
results of the CVLCG method of 32-bit word size
along with other existing PRBG methods. Further, the
statistical tests are performed on the captured random
bit sequences by using the NIST test tool for measuring
randomness. The proposed CVLCG architecture of 32- bit size
Table 4.1 summarizes the area and timing complexity saves upto 16.8% and 17.6% total area
of the architecture of the new CVLCG method along (8×[FF+LUT]) in comparison to the dual-CLCG and
with the architecture of the CLCG and dual-CLCG BBS architectures respectively on the Virtex5 FPGA
methods. It is observed that the CVLCG architecture device. The post synthesis analysis reports that the
significantly reduces the area of one comparator when critical path delay or minimal period (T) is consistent
compared with the architecture designed for the existing for CLCG, dual-CLCG and proposed CVLCG
dual-CLCG method. Furthermore, it generates architectures of 32- bit word size by taking estimated
pseudorandom bit at every uniform clock cycle, wire delay model. Similarly, the place and route (PAR)
whereas the architecture developed for the dual-CLCG static timing analysis reports that the critical path of
method is unable to generate pseudorandom bit at every above three architectures is consistent with small
uniform clock rate. Table 4.2 summarizes the deviations. The best achievable clock timing of the
comparison of the proposed CVLCG architecture with CLCG, dual-CLCG and proposed CVLCG
the CLCG and dual-CLCG architectures for 32- bit architectures are 4.101 ns, 4.170 ns and 4.174 ns
word size. It reports that a 32-bit architecture of the respectively. This deviation in clock timing could be due
proposed CVLCG method saves upto 14.9% basic to adding of actual wire delay after implementation.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 109
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Therefore, the CVLCG architecture can operate at variable-input LCG (CVLCG)" and its VLSI
the maximum frequency of 219.35 MHz which is 1.76 architecture. The CVLCG method is developed by
times faster than the BBS architecture. Moreover, it coupling of two variable-input LCGs, which generates
utilizes 15.3% and 10.6% less power per megahertz pseudorandom bit at every iteration and also attains
as compared to the dual-CLCG and BBS architectures. the maximum length sequence. Moreover, it saves one
Besides this, the proposed CVLCG architecture comparator area in comparison to the existing dual-
generates pseudorandom bit at every clock cycle CLCG architecture.
(output to output delay is one clock delay) with one The FPGA implementation results show that the
initial clock latency (input to first output delay). proposed CVLCG architecture is indeed capable of
Whereas, the BBS architecture [21] takes 69 clock generating pseudorandom bit with the latency of one
cycles to generate one random bit signal with 69 initial clock cycle, less hardware resources and low power.
clock latency and the dual-CLCG architecture is unable The battery of NIST test results report that all the
to generate pseudorandom bit in every clock cycle that stringent tests including linear complexity are
lead to varying in the output latency. The physical successfully passed with a high degree of consistency.
implementation results in Table 4.3 report that The advantages such as less area, low latency, low
architecture of the dual-CLCG method consumes power, long period, pseudorandom bit generation at
83.8%, 88.9% and 81.4% less flip-flops, slices and the uniform clock rate and a high degree of randomness
LUTs respectively.Similarly, it utilizes 42.3% less power in the CVLCG method makes it suitable for real-time
than the dual-CLCG architecture on Virtex5 for 8-bit secure information exchange and data security in the
design. The 8-bit dual-CLCG architecture takes 28 light weight IoT enabled smart devices.
initial clock cycles (input to first output latency) to get
the first pseudo-random bit and further, it takes two REFERENCES
clock cycles (output to output latency) to generate each [1] A.K. Panda and C.K. Ray "A Coupled Variable Input LCG Method
pseudo-random bit. The implementation of the dual- and its VLSI Architecture for Pseudorandom Bit Generation., "
IEEE Transactions on Instrumentation and Measurement, January
CLCG architecture failed for the 16- and 32- bit word 2020
size on both FPGA devices due to excessive usage of [2] A.K. Panda and C.K. Ray "Modified Dual-CLCG Method and
memory (< 215) resources on FPGA chip. Therefore, Its VLSI Architecture for Pseudorandom Bit Generation" IEEE
the CVLCG method is the efficient PRBG method for Transactions On Circuits And Systems-I: Regular Papers January
2020
generating pseudo-random bit at every uniform clock
[3] E. Fernandes, A. Rahmati, K. Eykholt and A. Prakash, "Internet
rate because of its advantages such as good of things security research: A rehash of old ideas or new intellectual
randomness, maximal period, less area, low power, low challenges," IEEE Security & Privacy, vol. 15, no. 4, pp. 79-84,
output latency and low initial clock latency. 2017.
[4] F. Firouzi, B. Farahani, M. Ibrahim and K. Chakrabarty, "From
5. CONCLUSION EDA to IoT e-Health: promise, challenges, and solutions," in
IEEE Transactions on Computer-Aided Design of Integrated
The aim of this work is analyze different PRBG Circuits and Systems, vol. PP, no. 99, pp. 1-1, 2018.
methods and find an efficient hardware architecture for [5] G. Mois, S. Folea and T. Sanislav, "Analysis of three IoT-based
generating pseudorandom bit sequence by targeting the wireless Sensors for environmental monitoring," in IEEE
IoT enabled applications. Initially, the BBS, CLCG and Transactions on Instrumentation and Meas., vol. 66, no. 8, pp.
2056-2064, Aug. 2017.
dual-CLCG algorithm is studied to perform its hardware
architecture. However, it experiences the drawbacks [6] K. Yu, M. Arifuzzaman, Z. Wen, D. Zhang and T. Sato, "A key
management scheme for secure communications of information
of generating pseudorandom bit at an unequal interval centric advanced metering infrastructure in smart grid", in IEEE
of time that lead to varying in the output latency and Trans. on Instrumentation and Meas., vol. 64, no. 8, pp. 2072-
also fails to achieve the maximum length period. 2085, Aug. 2015.
Therefore, the aforesaid drawbacks are overcome by [7] O. Goldreich, "Foundations of Cryptography II: Basic
Applications." Cambridge University Press, 2009, New York,
proposing a new efficient PRBG method, i.e. "coupled USA.
110 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 111
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: This project illustrates the equipment and safety system in order to make the more productive.
utilized in metro train motion which is employed in Driver less automated concepts have been adopted.The
most of the progressed countries. during this intent of this project to drive the train automatically with
automatic metro train, we've provided Raspberry the help of sensors and safety of passenger is the basic
PI based controller that facilitates the programmed concern of our model based pro-type metro train in
stopping of the train from one station to a different
this work part of auto mutation task is considered, and
station. This work presents the enhancement
process of a framework for a driver less train
a raspberry based protype is developed work like
instigated using Raspberry PI based controller. running through a given path with predefined stations
The hardware circuit is meant on circuit boards, and sensing the arrival at the station and hence, proper
are given various sensors for automation purposes stopping are implemented within the framework
like IR sensor for out and in counting. The information that are sinked with the trains movement
hardware is assembled during a toy- like train . through its path are announced to passenger via LCD
Driver- less trains are use the RFID module for display moreover alarm signals are produced as
automatic stopping of train at their prescribed appropriate. Controlling of the doors in terms of open
stations. Train timings path,delay timings , and shut and timings of such actions are considered.
distances between the required stations are all
predefined. Messages are automatically showed the II. LITERATURE SURVEY
passengers. This paper presents the event process 1. International Open Access Journal Driverless Metro
of a framework for a driver less train implemented Train Shuttle between the Stations using LabVIEW
employing a RASPBERRY PI. The hardware Manoj Kumar M1 , Hemavathi.R2 , H. Prasanna
circuits, which are built on handmade PCB board, Kumar3 PG Scholar (C&I), Dept. of EE, UVCE,
are interfaced with various sensors for automation Bangalore, India Assistant Professor, Dept. of EE,
purposes. The Raspberry pi on python language is UVCE, Bangalore, India The aim of this paper is to
employed for programming the Raspberry pi. illustrate an improvement in the existing technology
Keywords: Framework, actuators, raspberry pi, used in metro train movements. This train is provided
automation, sensors with an controller and a IR Object sensor that allows
the automatic stopping of the station. This paper used
I. INTRODUCTION for the development process of a first model for a
Recent technological advancements are being driver less train executed using a RASPBERRY PI
assimilated in almost all point of our life including controller.
transportation, where a lot of up gradation has been 2. International Research Driver less Metro Stations u
made . railway transport for fact has underground a Manoj Kumar M PG Scholar (C&I), Dept. of EE,
huge transformation, start in with the early steam UVCE, Bangalore, India Assistant Professor, Dept.
operated engines to the most recent bullet train. Many of EE, UVCE, Bangalore, India. The object of this
developments in transport has utilized the existing paper is to demonstrate an betterment in the present
infrastructure where the existing metro system is being technology used in metro train shifting. This train
accommodates with a controller and the IR Object
modernized and equipped with automatic train control
sensor that is used for the automatic stopping of the
112 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
train from one station to another station. This paper IV. PROPOSED SYSTEM
presents the development process of a pattern for a
driver less train using an RASPBERRY PI controller.
This project is designed to demonstrate the
technology used in auto metro train movement which
3. International Journal of Scientific Research and are used in most of the developed countries like France
Development ISSN: 2456-6470 @ Issue - 1| Nov-
. This train is equipped with RFID module that enables
Dec 2017 also the stop and start timing of the train in
the automatic running of the train from one station to
between the two stations is the distance is also be
determined. New technologies are being merge in another. This proposed system is an Auto metro train
almost all detail of our life including transportation, and it eliminates the need of any driver. Because of
where a lot of improvement has been made. Railroad automation the human error is ruled out. In this project
transport, for particular, has undergone a large servomotor is used for automatic opening and closing
transformation, starting with the early steam operated of doors. Whenever the train reaches the station it stops
engines to the most recent bullet train using an automatically by reading RFID tag. Then the door is
controller. opens automatically so that the passengers can go
4. Prakash et al in "Auto metro train shuffle between outside or inside the train. The door then closes after
two stations" is designed to demonstrate the technology some prescribed time set in the controller by using
used in movement of metro train which is used in program which is in python language. It is also equipped
most of the developed countries like Germany and with a counting section for passengers by using IR
France.This train is provided with RFID module for sensors which counts the number of passengers entering
automatic movement of train from one station to and leaving the train. The door closes when it reaches
another.The passenger count will be displayed using maximum occupancy level of passengers . The humidity
IR sensor.
and temperature will be displayed on a seven segment
5. A. P. More et.al in "Smart Metro trine" Presents a display interface to the micro controller. Motor driver
driverless trine which is demonstrated to run between IC controls the moment of the train . As the train reaches
two stations> it eliminates the need of the driver. Then the destination the process will be repeats.In this
the human error will be ruled out. RFID module is Autometro train project the humidity and temperature
used to run the train from one station to another. The
will be displayed in LCD screen for passengers
servo motor is used to control the doors opening and
closing of train.
convinience. This project is advanced version for "Mass
rapid transit system "to reduce the disadavantages in
6. Thabit sultan mohammad,wisam fahmi Al-Azzo et al "mass rapid transit system".
proposed a concept of " Fully Automated metro
train.The proposed system challenges many problems
in the metro trains.
III. EXISTING SYSTEM
Rail based "Mass Rapid transit system" has been
extensively used in developed countries in overall world
as a remedy for traffic related problems. when traffic
will increased respectively the vehicles also increases
due to this the traffic problems will be increases from
past years.In order to improve the transport system
the "mass transit system will be introduced. The major
problems related to existing system is human
error,Higher cost, consumes more time to install. Block diagram
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 113
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Ultrasonic Sensor can control two DC motor with single L293D IC. The
The ultrasonic sensor is a transducer which converts L293D is designed to provide bi directional drive
electric electricity into sound waves and vice versa. currents of up to 600-m A at voltages from 4.5V to
These sound waves fall above the everyday variety of 36V. Both the devices are designed to drive inductive
human listening to and therefore it's far referred to as loads such as relays, solenoids, DC and bipolar stepping
ultrasonic waves. These sort of waves are above the motors has high current or voltage loads in positive
frequency of approximately 18000 Hz. An ultrasonic supply applications. Each output is a completely totem
sensor transmits ultrasonic waves into the air and detects pole drive circuit with a Darlington transistor sink and a
contemplated waves from an object. There are many pseudo-Darlington source. Drivers are enabled in pairs
packages for ultrasonic sensors, consisting of in intrusion with driver 1 and driver 2 enabled by 1,2 EN and driver
alarm systems, automated door openers and backup 3 and driver 4 enabled by 3 and 4 EN. The L293 and
sensors for automobiles. Accompanied via way of L293D is operated from 0°C to 70°C.
means of the fast improvement of facts processing DC Servomotor
technology, new fields of application, consisting of A DC servo motor consist of a small DC motor
manufacturing unit automation system and vehicle feedback potentiometer, gearbox,motor drive electronic
electronics, are growing and have to preserve to do circuit and electronic feedback control loop. It's high
so.Ultrasonic sensors are superb creatures. Blind from or low similar to the normal DC motor. The rotor
the eyes and but a imaginative and prescient so particular consists of brush and shaft. A commutator and rotor
that would distinguish among a moth and a damaged metal supporting frame are attached to the outside of
leaf even if flying at complete speed. No doubt the the shaft .A brush is built with an armature coil that
imaginative and prescient is sharper than ours and is a supplies current to commutator. At the back of the shaft
whole lot past human abilities of seeing, however is detector is built into the rotor in order to detect the
actually now no longer past our understanding. speed of rotation. it's simple to design a controller using
Ultrasonicranging is the method utilized by bats and simple circuitry because the torque is proportional to
plenty of different creatures of the animal country for the amount of current flow through the armature. Types
navigational purposes. In a bid to mimic the methods of DC Servo motors include series motor, shunt control
of nature to gain an side over everything, we people motor, split series motor and permanent magnet shunt
have now no longer best understood it however have motor.
correctly imitated a number of those manifestations and
harnessed their ability to the finest extent Ultrasonic RFID Module
sensors are gadgets that use electric-mechanical Whenever the train reaches the station it stops
electricity transformation, the mechanical electricity automatically, as sensed by RFID reader. Then the door
being within side the shape of ultrasonic waves, to is opens automatically the passengers can go inside and
degree distance from the sensor to the goal object. outside the train . The door then closes after a certain
Ultrasonic waves are longitudinal mechanical waves time set in the controller by the program. It is also
which tour as a succession of compression and rare equipped with a passenger counting section, which
factions alongside the route of wave propagation thru counts the number of passengers entering and leaving
the medium. Any sound wave above the human auditory the train. The passenger in and out counts are displayed
variety of 20,000 Hz is known as ultrasound. on a LCD display. The movement of the train is
Motor driver controlled by a motor driver IC interfaced to it. When
the train reaches the destination the process repeats .
L293D is a typical Motor driver which allows DC The train is automated as we know which will work
motor to drive in both directions. L293D can control a without a driver. Thus this train will avoid human errors.
set of two DC motors at a time in any direction. We Thus this train will be very beneficial to us. If we use
114 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
this type of trains then the timetable of trains also will of a resistive detail and a experience of moist NTC
be maintained. Our proposed system uses RFID temperature size gadgets and with a excessive-overall
module which will detect the station. The train performance 8-bit micro controller linked. DHT11
incorporates a station by using command on WIFI output calibrated virtual sign. It makes use of distinctive
module start the train start and reach station the RFID virtual- sign-collecting-approach and humidity sensing
card reader is read the card action for stopping train, generation, assuring its reliability and stability. Its sensing
at that time display the station one is arrived as well as factors are linked with 8-bit single-chip computer. Every
by door is open automatically the door is close then sensor of this version is temperature compensated and
train is reaches to next station. When next station is calibrated in correct calibration chamber and the
arrived the controller send vacancies by WIFI module calibration-coefficient is stored in OTP memory. Small
it display on the LCD display which mounted on the size & low consumption & lengthy transmission distance
train coach. At that time the RFID card reader detects (20m) permit DHT11 to be proper in all sorts of harsh
RFID card which fixed on the station, that time display software occasions. Single- row packaged with 4 pins,
station 2 on LCD display the door open for 5sec to making the relationship very convenient.
enter/leave passenger after certain time door of coach Fire sensor
is closed and reach to next station.
It is used to detect the fire, when we met fire
Electric battery accidFire sensor or flame detector is a sensor designed
Electric battery is a combination of one or to come across and reply to the presence of a flame or
more Electrochemical cells, used to convert chemical hearth place, allowing flame detection. Responses to a
energy (stored) into electrical energy. The battery has detected flame rely on the installation, however can
become a common power source for many industrial consist of sounding an alarm, deactivating a gas line
applications, robotics..etc. Larger batteries provide (along with a propane or a herbal gas line), and activating
standby power for computer data centers or telephone a hearth place suppression system. When utilized in
exchanges programs along with commercial furnaces, their function
IR sensor is to offer affirmation that the furnace is properly; in
those instances they take no direct motion past notifying
Transmits infrared rays in the range of the operator or manage system. A flame detector can
wavelength760nm .Such LED's are usually made of regularly reply quicker and extra as it should be than a
gallium arsenide and aluminum gallium arsenic. IR smoke or warmness detector because ofents inside the
receivers are commonly used as sensors. The human train.
eye cannot see the infrared radiations, it is not possible
to identify whether the IR LED is working or not, unlike Raspberry pi:
a standard LED. To overcome this problem, the camera Raspberry pi is a small single board computer. It
on a cell phone is used. does not need to add peripherals like keyboards,mics
DTH sensor and cases.All models are featured like soc(system on
chip) and the processor ranges from 700MHZ to
It is used to measure the temperature and humidity 1.4GHZ.The code will be installed in Raspberry for
present inside the train. DHT11 virtual temperature and processing.
humidity sensor is a calibrated virtual sign output of the
temperature and humidity mixed sensor. It makes use V. RESULTS
of a committed virtual modules seize generation and After successfully giving connections to given to the
the temperature and humidity sensor generation to make raspberry pi processor the code will be install int he
certain that merchandise with excessive reliability and raspberry processor by using raspberry OS on system
exquisite lengthy-time period stability. Sensor consists by connectingraspberry pi setup to same system using
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 115
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
116 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- Adders and subtractors are quint RBS with multiple RBS circuits[1]. This method
essential circuit modules in design of processors, generates partial difference and borrow using
which determine the speed of processors. The multiplexers (MUX) and the final difference and borrow
processing speed of subtraction is limited by the is selected. As the BSLS utilizes multiple RBS circuits
sequential borrow bit propagation from LSB to in it, it is proved normally area inefficient. The
MSB, whichin turn depends on the number of bits
conventional method of subtraction for signed numbers
of operands (subtrahend and minuend). This paper
presents two architectures of modified borrow
uses two's complement method using addition. For
select subtractor that consume lower power within addition process, references[7][8][9][10][11][12] and
creased area efficiency. The modifications carried [13]use adders. Note that[12] has lower power
out in the logical flow of subtraction process by using operational advantage and power delay product (PDP).
blocks with lower number of logic gates lead to a Here, PDP is the product of power anddelay.
smaller number of gates, thus resulting in less
The proposed architectures are compared with the
device count, lower area and lowerpower
conventional two's complement method found in
dissipation. Validation of architectures are carried
out using Cadence Virtuoso® simulations on UMC literature, basically employing an adder[14][15]. The
90nm technology library. Comparison with existing adder given in [12] has been considered for comparison
architectures demonstrates the comparative of two's complement method against the proposed
advantages of proposedmethods. architectures. For subtraction of signed numbers, a
Keywords- Borrow Select Subtractor, Lowpower
variant of BSLS [1] is proposed. The primary focus is
Subtractor, Area Efficient Subtractor, BSLS,Adder- on reducing area and power consumption, which is
Subtractor achieved by using logic blocks with fewer gates
occupying less area even while aiming for same logic
I. INTRODUCTION functionality. Section II presents BSLS in brief. Section
Adders, subtractors and multipliers are the essential III portrays the modified architecture of BSLS-BLO
building blocks of processors [1] [2] [3] [4] [5] [6]. and the gate count calculation. Section IV describes
Normally, subtraction is done using adder-subtractor the modified architecture of BSLS-RBHS and its gate
module, which can practically result in slowing down count. Section V depicts the performance analysis and
arithmetic operation, since the same hardware has to comparison interms of power, delay and gate count.
be used for both addition and subtraction processes Section VI provides the summary and conclusion of
using additional control signals. The commonly used the present work.
Ripple Borrow Subtractor (RBS) used for subtraction II. OVERVIEW OFBSLS
of unsigned numbers possesses a simple architecture.
However, performance of RBS is limited by borrow Fig. 1 shows the structure of an half subtractor,
propagation time incurred from Least Significant Bit implemented using an XOR gate, a NOT gate and an
(LSB) to Most Significant Bit (MSB). In other words, AND gate. While producing the output, half subtractor
the delay of RBS depends on binary word length. structure incurs a maximum latency of 2. Difference D
Borrow Select Subtractor (BSLS) architecture is incurs a latency of 1 and generation of borrow B incurs
proposed here to overcome the limitations of existing a latency of 2. Fig. 2 shows half adder implemented
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 117
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
using an XOR gate and an AND gate. In order to difference bit output when the borrow from the previous
produce sum S and carry C, this half adder incurs a stage is 0. The minuend is increased by one using the
maximum of one latency. Fig. 3 shows internal structure BEC block. The subtrahend and increased minuend is
of a full subtractor realized using 2 XOR gates, 2 NOT given as input to RBS. This accounts to generation of
gates, 2 AND gates and 1 OR gate. The full subtractor difference bit when the borrow from previous stage is
incurs a maximum latency of 4. Realization of difference 1. The difference and borrow bits are available for
D incurs a latency of 2 and borrow B introduces a borrow as 0 and 1. The correct output is selected based
latency of 4. on the borrow bit obtained from the previous stage using
the MUX.
entire result in signed magnitude form. Fig. 5 depicts difference and borrow bits. The partial difference and
the signed borrow select subtractor. borrow bits obtained from first n-bit RBS, considering
III. MODIFIED BSLS USING BLO(BSLS- Bin=0 and Binary-Less-One (BLO) considered as
BLO) Bin=1 are given as input bits to multiplexer, which selects
the actual difference and borrow based on Bin generated
The proposed architecture replaces the second n- from previous group. The first group has only one two-
bit RBS and BEC-1 of BSLS using (n+1)-bit Binary- bit RBS, while, each of the functional groups except
Less-One (BLO) logic in all groups. It uses Binary- the first consists of one n-bit RBS, (n+1)-bit BLO and
Less-One (BLO) logic as shown in Fig. 6 for 3-bit a (2n+2):(n+1) multiplexer.
BLO logic. Table II shows the functional table. The 3-
bit BLO has been designed using Boolean expressions A full subtractor normally requires 2 numbers each
(1), (2) and (3). 4-bit BLO, 5-bit and 6- bit BLO of XOR, NOT and AND gates and one OR gate. A
structures can all be realized by using their respective half subtractor can be realized using one each of XOR,
Boolean expressionforms. NOT and AND gates. Torealise2:1MUX, one NOT
gate, 2ANDgates and one OR gate are required. First
X0= ~B0 3-bit processing in RBS requires one half subtractor
X1 = B1◉B0 and 2 full subtractors. Thus, the first 3-bit RBS requires
5 XOR gates, 5 NOT gates, 5 AND gates and 2 OR
X2 = B2 ◌
ْ ~(B0 +B1)
gates. The 4-bit BLO is realized using 2 each of XOR,
NOT and NOR gates and one XNOR gate. 8:4 MUX
selects actual difference and borrow bits, and this
comprises of four 2:1 multiplexers, containing 4 NOT,
8 AND and 4 OR gates.
Total gate count required to implement the group 3
structure in BSLS-BLO is thus the sum of counts,
Fig. 6. 3-bit Binary-Less-One (BLO)
namely, 1) first 3-bit RBS, 2) 4-bit BLO and 3) 8:4
TABLE II. FUNCTIONAL TABLE OF 3-BITBLO
MUX. Therefore, the total number of gates employed
to implement group 3 of BSLS-BLO is 7 XOR, one
B[2:0] X[2:0] B[2:0] X[2:0] XNOR, 11 NOT, 13 AND, 6 OR and 2 NOR gates.
000 111 100 011
001 000 101 100 Totally 40 gates are needed for group 3 in BSLS-BLO.
010 001 110 101 The gate counts for the other groups have also been
011 010 111 110 calculated and tabulated in Table III for comparison.
The proposed Binary-Less-One (BLO) logic
accomplishes the same operation of generating the
difference and borrow assuming that the Bin from the
previous stage is 1. This is analogous to the adder in
[9] but the internal components are different. It takes
the difference and borrow when the Bin is 0 as input
and subtracting one from the received difference and
borrow. The output of the BLO logic is the same as
that of difference and borrow when Bin is 1. Fig. 7 Fig. 7. Modified Borrow Select Subtractor using Binary-Less-
One Logic
shows the architecture of the modified Borrow Select
Subtractor circuit configured using Binary-Less-One
logic (BSLS-BLO). The Binary-Less-One logic is
employed in all groups except the group 1 to compute
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 119
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
120 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
the difference and borrow bit values have been V. RESULTS AND DISCUSSIONS
computed. The borrow-out bit Bout from both n-bit The proposed architectures have been designed
RBS and n-bit RBHS are given as input to the OR under the same design environment for comparing the
gate. The output of the OR gate is the borrow-out bit results justifiably. Table VI represents the power, delay,
Bout for the current group and borrow-in for the power delay product (PDP), device count comparison
succeeding group. In this architecture, the (2n+2):(n+1) for unsignedoperation.
multiplexer in each group has been replaced with a OR
TABLE VI. COMPARISON OF UNSIGNED SUBTRACTORS
gate. This results in reduction of number of gates. Each
Word Power Device
functional group except first group has one n-bit RBS, Size Architecture (uW)
Delay
PDP (fJ) Count #
(ps)
n-bit RBHS and an OR gate. The first group has only
one two-bitRBS. RBS 26.01 310.6 8.078 28
4-bit BSLS 37.70 232.8 8.776 51
Conventionally, a full subtractor requires 2 XOR BSLS-BLO 33.71 232.8 7.847 40
gates, 2 NOT gates, 2 AND gates and 2 OR gates. A BSLS-RBHS 26.83 265.7 7.128 31
RBS 50.05 647.1 32.387 56
half subtractor is used to be realized using one XOR 8-bit BSLS 91.84 344.6 31.648 128
gate, one NOT gate and one AND gate. First3-bit BSLS-BLO 73.85 344.6 25.448 94
BSLS-RBHS 55.05 477.1 26.264 68
processing in RBS requires one half subtractor and 2 RBS 92.59 1320.0 122.218 112
full subtractors. Therefore, the first 3-bit RBS requires 16-bit BSLS 210.50 567.4 119.437 282
5 XOR gates, 5 NOT gates, 5 AND gates and 2 OR BSLS-BLO 142.40 567.4 80.797 202
BSLS-RBHS 107.30 900.0 96.570 142
gates. It may be noted that Group 3 of BSLS-RBHS
contains 3-bitRBS and 3-bitRBHS.The3-bit RBHS has The power consumed by the modified BSLS-BLO
been realized using 3 XOR gates, 3 NOT gates and 3 is reduced when compared to BSLS, while holding on
AND gates. Total gate count required to implement to the same delay as that of the BSLS for different word
group 3 is the sum of gate counts required to implement size. The result is shown in Fig. 10 and Fig. 11. It can
first 3-bit RBS, 3-bit RBHS and a OR gate. Thus, the also be inferred that the delay of BSLS-RBHS is more
total number of gates employed to implement the group when compared to BSLS but the power is less when
3 is 8 XOR gates, 8 NOT gates, 8 AND gates and 3 compared to other architectures for different word size.
OR gates. Altogether, 27 gates are required for group PDP values of 4, 8, and 16-bit BSLS-BLO is lesser
3. Similarly, the gate count for the other groups are by 10.5%, 19.5%, 32.3%, respectively than BSLS as
calculated and tabulated in Table V for duecomparisons. shown in Figs.12 and 13. The PDP of 4, 8 and 16-bit
BSLS-RBHS is less by 18.7%, 17.0% and 19.1%,
The modified 16-bit BSLS-RBHS designed for
respectively, when compared to BSLS. The PDP of
unsigned numbers requires 42 XOR gates, 42 NOT
BSLS-RBHS for 4-bit is found lower when compared
gates, 42 AND gates and 16 OR gates. Overall, 142
to BSLS-BLO. On the other hand, for 8-bit and 16-
gates are required for constructing the modified 16-bit
bit word sizes, the PDP increases. It is also validated
BSLS using RBHS for unsigned numbers. The 16-bit
that the BSLS- BLO outperforms the BSLS-RBHS in
borrow select subtractor architecture for signed
terms of PDP as the word sizeincreases.
numbers has 16-bit borrow select subtractor, two's
complement circuit and a 34:17 MUX. The two's The modified BSLS-BLO for 4, 8 and 16-bit need
complement circuit contains 18 NOT gates, 16 XOR 11, 34 and 80 fewer gates, respectively, when compared
gates and 15 AND gates. The 34:17 MUX has to BSLS. This accounts to 21.5%, 26.5% and 28.3%
seventeen 2:1 MUX. Therefore, 34:17 MUX consists reduction in number of gates employed, respectively,
of 17 NOT gates, 34 AND gates and 17 OR gates in as shown in Fig. 13. The modified signed BSLS-RBHS
its making. Therefore, the modified 16-bit borrow select for 4-bit, 8-bit, 16-bit utilises 20, 60 and 140 fewer
subtractor using RBHS for signed numbers incurs two gates, respectively, when compared to BSLS,
hundred and sixty gates intotal. accounting to 39.2%, 46.8% and 49.6% reduction in
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 121
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
gate counts. For 4-bit words, it is found preferable to the conventional 2's complement method for different
use BSLS-RBHS, due to the fact that it has lower PDP word size as shown in Fig. 14.
and device count when compared to counterparts. For Fig.15 depicts delay of signed architectures for 4-
increased word size, preference can be made between bit, 8-bit and 16-bit. The delay of signed BSLS-BLO
BSLS-BLO and BSLS-RBHS since the BSLS-BLO is more or less equal to the delay of BSLS and it is less
claims advantage of lower PDP and BSLS-RBHS than 2's complement method for 8-bit and 16-bit. The
claims the advantage of lower device count. delay of signed BSLS-RBHS is more when compared
to BSLS for different word size. However, when
compared to conventional 2's complement method,
delay is more for 4-bit and 8-bit.
The power delay product of 4-bit, 8-bit and 16-bit
signed BSLS-BLO is lower by 16.3%, 18.6% and
Fig. 10. Unsigned DelayComparison
22.0%, respectively, when compared to BSLS as
represented in Fig. 16 and Fig.17. The power delay
product of 4-bit, 8-bit and 16- bit BSLS-RBHS is
reduced by 24.1%, 17.9% and 6.7%, respectively,
when compared to BSLS as represented in Figs. 16
and 17. The PDP of signed BSLS-RBHS for 4-bit is
less than that of BSLS-BLO. However, 8-bit and 16-
bit wordsizes the PDP increases due to the increased
Fig. 11. Unsigned PowerComparison complexity in architecture. It is also observed that signed
BSLS-BLO outperforms the signed BSLS-RBHS in
terms of PDP as the word sizeincreases.
TABLE VII. COMPARISON OF SIGNED SUBTRACTORS
Word Power Delay PDP Device
Architecture
Size (uW) (ps) (fJ) #
2 ’s Co mplement 73.13 408 .4 29 .866 103
BSLS 62.02 427 .7 26.5 25 85
4-bit
BSLS-BL O 51.86 427 .7 22.1 80 74
Fig. 12. Unsigned PDP Comparison BSLS-RBHS 4 3.97 457. 6 20.1 20 65
2 ’s Co mplement 137.70 700 .4 96 .445 169
BSLS 147.30 575 .4 84.7 56 190
8-bit
BSLS-BL O 119.80 575 .4 68.9 32 156
BSLS-RBHS 9 8.380 706. 5 69.5 05 130
2 ’s Co mplement 324.60 121 6.0 394 .713 333
BSLS 347.10 874 .5 303 .538 400
16-bit
BSLS-BL O 270.50 874 .5 236 .552 320
BSLS-RBHS 2 34.80 1205 .0 282 .934 260
122 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 123
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
124 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- Day by day the death rate of the floor and recover him. Within that time, he may be
construction workers at the construction site is expected to death.
increasing. But still there are no such remedies to
reduce this fatality rate. To provide continuous In India, Approximately 38 construction workers
monitoring of the workers and to prevent them die on construction sites every year. For example in
from any health hazards during working, this system 2017, there were 67 deaths, 2016 saw 55 deaths,
proposes a smart flexible helmet for the 2015 saw 62 deaths and 2014 saw 69 deaths, etc.
construction workers to provide security and
In order to provide continuous monitoring of the
rescue measures in case of any emergency
workers and to prevent them from any health hazards
conditions. The proposed system describes a smart
inexpensive helmet for the construction workers during working, this system proposes a smart flexible
made up of chromium embedded with helmet for the construction workers to provide security
Accelerometer and Gyroscope sensor. The and rescue measures in case of any emergency
Gyroscope sensor is used to indicate the rotation conditions.
and orientation of the person with respect to gravity II. LITERATURE SURVEY
whereas the Accelerometer sensor is used to
measure the linear acceleration or motion of the Kishor Shrestha et all proposed the "Hard Hat
worker. Both these sensors are used for fall Detection for Construction Safety Visualization". They
detection that may result from drowsiness, fatigue, used image processing techniques to check whether
etc. The helmet monitors the physical conditions the worker is wearing the helmet or not. This system is
of the construction workers and sends notification used to detect whether the worker is wearing the hat
to the Contractor via the Mobile. during working. But it does not provide any safety
Keywords- smart helmet, accelerometer and measures to overcome in case of any emergency
gyroscopic sensor, mobile app, GSM module. conditions.
I. INTRODUCTION S. Nandhini et all proposed "IOT based Smart
IOT, Internet of Thing, is a network of thing, which Helmet for ensuring Safety in Industries". This system
may be sensors, mobile devices, physical appliances, uses sensors to monitor the workplaces. This system is
etc. All these devices have unique identifier which particularly used for detecting safety at workplaces but
enables them to collect and exchange useful data. These not for the workers.
unique IDs are used to identify each and every worker S.R.Deokar et all proposed "Smart Helmet for Coal
working on the construction site .The Sensors are used Mines Safety Monitoring and Alerting" system. This
to sense the activity, orientation, movement of the system seems to be very efficient as it ensures safety
workers on the construction site. for both the workers and the workplace using wireless
The death rate of the construction workers at the sensor networks. It also includes fall detection, toxic
site has been increasing every year. If the worker gases emission from industry, etc.
working 5th or 10th floor of the large building gets severe Shruthi et all proposed "Smart Helmet for Coal
heart attack, it takes some amount of time to reach that Miners using Zigbee Technology". This system devises
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 125
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
a smart helmet using Zigbee technology for monitoring embedded inside a single chip. This chip is attached
the emission of hazardous gases, abnormal temperature with Helmet to detect the Acceleration, Axis and gravity
conditions, humidity levels etc. This system ensures of the Helmet. Both these sensors are used for fall
safety for workers at the mining area but this helmet is detection that may result from drowsiness, fatigue, etc.
not purposely provided for the safety of the workers. 2) Fall sensing phase:
III. PROPOSED SYSTEM Fall sensing phase is once the person can fall alert
The smart helmet is embedded with Arduino Uno message are sent through the contractor. Check The
kit to which the sensors like Heartbeat sensor, Workers Orientation And Motion. Once Trigger Is
Accelerometer and Gyroscope sensor are connected. Activated.
The helmet is also provided with a panic button to alarm 3) Location Tracking and Alert Message
others in case of any disaster. All these smart helmets
are worn by the construction workers at the time of GSM modem is a unique type of wireless modem
working. The civil engineer or the contractor receives accepts a SIM card. It operates similar to mobile phone
all the information about the worker provided by the with its own specific mobile number.
helmet with the use of the GSM module involved in it. C. Arduino Uno
Through this GSM module, alert message are sent
The Arduino Uno is designed with 14 digital input/
through SMS. DC- DC converter is used to regulate a
output pins and 6 analog input pins. This kit in this system
flow of current. The contractor or the civil engineer
is used as a microcontroller for controlling all the
monitors functions of all the workers provided by the
activities of all the modules involved in the process. The
helmet with the use of a mobile application specially
sensors are connected to this Arduino board. This kit
designed to serve this purpose.
is embedded inside the smart helmet during the
A. Methodology manufacturing process.
Buzzer
Acceleromete
Helmet Arduino
r and
Uno kit
Gyroscope GSM
sensor Module
SMS
Fig. 2 Arduino Uno
Fig. 1 System architecture. D. Accelerometer and Gyroscope sensor
B. Overview The gyroscope sensor is used to measure the angular
The proposed system is divided into three phases: velocity of the object. The 3 axis gyroscope sensor
can find the orientation and rotation of the person in all
1) Monitoring phase
three directions with respect to gravity. This provides
2) Detecting phase an angle value ? which is then used to indicate the
3) Fall Sensing phase position of the person during fall. An accelerometer
sensor is used to measure the acceleration or motion of
1) The Monitoring phase: the human body. A tri axial accelerometer measures
It is used to measure the angular velocity of the object the acceleration in all 3 axes x, y and z respectively.
and the acceleration or motion of the human body. The accelerometer sensor provides a parameter value
Continuously Monitor the Physical Condition of the for measuring the person motion. Both these sensors
Workers the accelerometer and the gyroscope are are used for Fall detection.
126 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 127
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
The output image of the Arduino Uno which is used E. Location Tracking
to identify the person condition. If the person condition Figure 11 shows the location of the particular worker
is critical and the trigger is activated through person in the construction place.
fall. It shows the figure 3.
The alert message is sent to the contractor, if the Advantages of Proposed System
contractor receives any SMS about the workers • Monitoring of workers health condition at the
condition he/she receive the worker easily. construction site.
• Fall detection of the workers due to fatigue,
drowsiness, etc.
• Alarming system provided in case of any natural
calamity.
• Prior intimation and notification of the workers
condition to the contractor.
128 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
• Inexpensive user-friendly hardest shield that could [3] Kiran Kishore V, E Narasimha, Y Shruthi, "Smart Helmet for
Coal Miners using Zigbee Technology" Issue 2, Volume 2, 067-
save the workers from all type of hazards. 069.
V. CONCLUSION [4] Kishor Shrestha, Dinesh Bajracharya, Pramen P. Shrestha, "Hard
Hat Detection for Construction Safety Visualization".
If this proposed system is implemented to ensure
[5] ArkhamZahriRakhman, LukitoNugroho, Widyawan,
the complete safety of the workers at the construction Kumianaingsih, "Fall Detection system using Accelerometer and
site. Through this smart helmet, the contractor can Gyroscope Based on Smartphone", ICITACEE, 2014.
continuously monitor the entire workers involved in [6] Adlian Jefiza, EkoPramunanato, Hanny, Mauridhy Heri
construction process and can also get notification about Purnomo "Fall Detection Based on Accelerometer and Gyroscope
the workers' physical condition and can immediately using Back Propagation", EECSI, 2017.
save the workers from any serious issues in case of [7] C. j. Behr, A. Kumar and G. P. Hancke, "A Smart Helmet for Air
Quality and Hazardous Event Detection for the Industry?, IEEE,
emergency. Hence we can reduce the death rate of the PP. 2028-2031, 2016.
construction workers and provides increased security
[8] Pranjal Hazarika, "implementation of safety helmet for coal mine
to them. workers", 1st IEEE International Conference on Power
Electronics Intelligent Control and Energy Systems, pp. 1-3,
2016.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 129
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- In many VLSI chips, Static Random [2]. Simultaneously, increase of power dissipation has
Access memory (SRAM) has become an important become the major obstacle against further development
part due to their large storage capacity and small of VLSI circuits. Power consumption due to memory
access time. Low power adequate memory design accesses in a computing system, often constitutes a
is one of the most challenging issues in SRAM dominant portion of the total power consumption [3].
architecture. As the technology node scaling down,
leakage power consumption has become a Static Random Access Memory (SRAM) is an
significant problem. There are various power gating important component in most of the VLSI chips; it often
schemes available in the literature such as sleep consumes a dominant portion of power in each chip.
technique, stack technique, sleepy stack By reducing the power of SRAM, the overall power of
technique, sleepy keeper technique, lector chips can be reduced. Due to the quadratic relation
technique, foot switch technique and double switch between power and supply voltage of transistors [4];
technique for leakage power reduction. In this
one of the most effective method to reduce the power
paper a novel power gating technique namely
sleepy keeper leakage control transistor technique
consumption is by decreasing the supply voltage. Due
(SK-LCT) is proposed for a low power SRAM to the strong demand of the SRAM memory in hand
architecture design. The SRAM architecture has held devices, System On-Chip (SoC) & high
two main components, namely SRAM cell and performance VLSI circuits, the reduction of power
sense amplifier. The proposed SK-LCT technique consumption is very important. Owing to high bit-line
is applied in both SRAM cell and sense amplifier swing requirement, the leakage power consumption of
for a new low power high speed SRAM architecture memory circuit during a write operation is high. Sleep
design. Simulation is done using Tanner EDA tool technique, Stack technique, Sleepy stack technique,
in 180nm technology and the results obtained show Sleepy keeper technique, LECTOR technique, Foot
a significant improvement in leakage power switch technique & Double switch technique are some
consumption and speed.
of the most commonly used power gating technique for
Keywords-SRAM, SK-LCT Technique, Tanner leakage power reduction. To overcome the
EDA, VLSI disadvantages of the above existing techniques, a novel
I. INTRODUCTION technique is proposed.
Very Large Scale Integration is the process of A novel power gating technique, namely SK-LCT
integrating a million of transistors within a single chip. Technique is used in the design of SRAM cell and sense
Rapid growth in VLSI fabrication process results in amplifier. The SRAM architecture using a SK-LCT
the increase of densities of the integrated circuit by technique has several advantages over the conventional
scaling down the technology [1]. With the advancement SRAM?s design with higher speed and less power
in technology that are happening in the world, the consumption.
demand for large storage of data is increasing in a way
that needs to be faster than the existing technologies
130 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
II. DESIGN OF SRAM ARCHITECTURE two stable states which are denoted as "1 & "0. During
SRAM Architecture consists of SRAM cell, sense read and write operation, two additional NMOS
amplifier, precharge circuit, row/ column decoder and transistors control the access to the storage cell. The
write driver circuit. Fig.1 shows the block diagram of conventional SRAM cell uses six MOSFET to store
SRAM Architecture. The decoder (row decoder/ data in memory as shown in Fig.2
column decoder) translates the binary address into
unary address exactly only one word in the array is
selected. The memory location within the memory
devices are selected by the address inputs of the
decoder. Based on the memory location found in the
memory device, the number of memory address input
pins is determined. The data I/O connection is the path A. Sense Amplifier
in which data are entered for storage and extracted for Sense amplifier is the part of read circuitry that is
reading. The bit lines (BL&BLB) are read by sense used to read the data from the SRAM Architecture; its
circuitry that sense the value of the bit lines; amplify it role is to sense the low power signals from the bit lines
to speed it up and restore the signal to the proper voltage (BL&BLB) and amplify the small voltage to
levels. decipherable logic levels so that the data obtained can
be interpreted properly in SRAM array. Fig.3 shows
Differential sense amplifier.
Write Driver Circuit LECTOR technique has two leakage control transistors
The write driver circuit is used to discharge any one (LCT1 &LCT2) which are inserted between the pull
of the bit lines (BL & BLB) from precharge level. It is up & pull down network. It has a very low leakage
enabled by a write enable (WE) circuitry. In the each power which results in a delay penalty [8]. The data
column of memory array, only one write driver circuit retention problem occurs in the circuit, which can be
is required. The WE signal is turned on; when the write minimized by placing sleep transistor [9]. There is a
operation is intended. Otherwise, the WE signal isolates need of a new power gating technique to overcome the
the bit lines from write drivers. disadvantages of the above existing techniques.
In memory design, the decoder is used to decode Sense Amplifier is one of the critical parts in the
the given address and enable the particular row or memory. The performance of sense amplifier strongly
column of the memory array. Row and column decoder affects both memory access time and overall memory
is used to enable Word Line (WL) and Write Enable power dissipation. Improper design of the amplifier
(WE) of a SRAM array. Based on the address line, circuitry affects the robustness of the memory device.
particular memory cell is chosen and the data is read In order to reduce static power & delay of Sense
and written in the memory array. Amplifier; Latch- type Sense Amplifier is designed using
Foot switch Technique & Double switch Technique.
III. POWER GATING TECHNIQUES
The Footer Switch Voltage Latch Sense Amplifier
Power gating technique is most commonly used (FS- VLSA) senses the voltage difference (VBL)
integrated circuit design to reduce the leakage power, between bit line voltage (VBL) & bit line bar voltage
by shutting off the current to blocks of the circuit which (VBLB) and amplifies it to rail output voltages. The
are not in use. An externally switched power supply is Footer Switch Current Latch Sense Amplifier (FS-
used to achieve the static power reduction, which is CLSA) senses the current difference produced by
the basic form of power gating. VBL and amplifies it. By inserting an additional head
Power Gating in SRAM cell switch (i.e. Double Switch PMOS Access & Double
Switch NMOS Access) the invalid current paths in FS-
During standby mode, most of the power is wasted
VLSA can be removed which introducing a
in SRAM cell; because leakage power plays a
complementary sense enable signal. The sensing dead
predominant role in SRAM power consumption. The
zone can be completely removed using Double Switch
various power gating techniques are available in literature
Transmission Access-Voltage Latch Sense Amplifier
to shrink the static power of memory cell.
(DSTA-VLSA) [10].
In sleep technique, "sleep S" PMOS transistor is
IV. SLEEPY KEEPER LEAKAGE CONTROL
inserted between VDD & pull up network and "sleep
TRANSISTOR TECHNIQUE (SK-LCT
S BAR" NMOS transistor is inserted between the pull
TECHNIQUE) FOR LOW POWER HIGH
down network & ground. The wake up time of the
SPEED SRAM ARCHITECTURE
sleep technique has a considerable impact on the
competence of the circuit [5]. Stack technique is state The SK-LCT Technique is the combination of both
maintenance technique with the disadvantage of Sleepy Keeper and LECTOR Technique. The delay
increased delay and area [6]. The divided transistor of & power of the SRAM Architecture can be further
sleepy stack technique increases the delay drastically reduced and the data retention can be maintained using
& also limits the convenience of this technique [7]. In this novel technique.
Sleepy Keeper Technique parallel connected PMOS Fig.5 shows the SK-LCT Technique. Here, leakage
and NMOS transistor is placed between pull up control transistor (LCT-PMOS & LCT-NMOS) is
network & VDD and pull down network & ground.
132 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
WRITE
OPERATION READ OPERATION
Q=0, Q- Precharge both the
bar=1 Bit lines
WRITE Word REA Word line=1
„1? Line=1 D „1? Bit bar=0(discharges
Bit bar=0 to 0)
Fig.5: SK-LCT Technique
Bit =1 Bit=1
The SRAM cell and Sense Amplifier are the two Q=1, Q- Precharge both the
main peripheral components of SRAM Architecture; bar=0 Bit lines
WRITE Word REA Word line=1
by the optimized design of these two components using „0? Line=1 D „0? Bit bar=1
this SK- LCT technique low power & high speed Bit bar=1 Bit =0(discharges to
memory architecture can be obtained. Bit =0 0)
V. SRAM ARCHITECTURE USING SK- Table I show the read and write operation of SRAM
LCT TECHNIQUE cell. When Word Line (WL) and Write enable circuitry
Fig.6 shows the Block Diagram of SRAM (WE) is enabled, previous data is modified and new
Architecture using SK-LCT Technique. Initially, data is written in the memory cell. When either Word
precharge both the bit lines (BL & BLB) by using Line (WL) or Write enable circuitry (WE) is disabled,
Precharge circuit. By enabling the word line (WL) of the previous data is hold in the memory cell. No change
the SRAM cell, the data either "0” or "1” is stored. If in the memory cell takes place during hold operation.
data "1” is written in SRAM cell, BLB automatically
discharges to "0” & BL remains high and vice-versa.
Sense Amplifier boosts the data in SRAM cell and acts
as a read part circuitry. No change in the memory cell
takes place during hold operation.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 133
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
B
L
134 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
W
R
I
T
E
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Table II: Performance Comparison of SRAM cell Table III. Performance Comparison of Sense Amplifier
READ
WRITE
DATAIN
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 135
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
136 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract - This article reviews the emerging the health status of patients and give warnings about
research on the exploitation of heartbeat data as possible attacks in advance, which can make generalized
biometric for human identification. A variety of medical care more intelligent.
methods for acquiring heartbeat signatures have
been proposed and a variety of processing methods II. INTERNET OF THINGS
have been examined. The paper addresses the The Web of things (adapted Web of things or IoT)
problem of biometric identification and verification is the interconnection of physical gadgets, vehicles
by characterizing the three main factors that affect (additionally called "associated gadgets" and "brilliant
performance: individual variants, environmental
gadgets"), structures and different components,
variants and sensor variants. The ability to collect
and process the signal, exploit the data for coordinated with hardware, programming, sensors,
individual identification or verification and actuators and system network that permit these items
disseminate the information depends on these to gather and trade information. In 2013, the Global
three factors. Standards on Internet of Things Activity (IoT-GSI)
characterized IoT as "the data society framework". IoT
I. INTRODUCTION
permits items to be distinguished and/or controlled
The heart is the most important component of the distantly through existing system foundation, making
cardiovascular system. It weighs about 250-350 grams, open doors for more straightforward coordination of
that is, about the size of a fist. It hits about 2.5 billion the physical world into PC based frameworks and
times during a lifespan of 66-68 years. The heart is bringing about more prominent effectiveness, precision
electrically stimulated by a special unit called the Chinese and monetary advantage. When IoT is enlarged with
atrial node. This region produces a definite potential sensors and actuators, the innovation turns into an
and discharges slowly, thus sending an electrical impulse occasion of the broadest class of digital physical
through the atria. This electrical impulse is of a very frameworks, which likewise envelops advances, for
sequential nature and responsible for systole and example, savvy networks, keen homes, shrewd
diastole in the four chambers, respectively. Recent years transportation and brilliant urban areas. Each thing is
have seen a growing enthusiasm for portable sensors uniquely identifiable through its integrated computer
and today some devices are industrially accessible for system, but can interact within the existing Internet
individual human services, fitness and movement infrastructure. Experts estimate that IoT will consist of
attention. Despite the field of specialized recreational almost 50 billion objects by 2020. Generally, IoT is
fitness that flow and reflux devices take into account, expected to offer advanced connectivity of devices,
analysts have also considered the use sensors. systems and services that goes beyond machine-to-
This monitoring system meets the basic needs of machine (M2M) communications and covers a variety
generalized medical care for heart disease, also takes of protocols, domains and applications.
into account the cost to ensure that the general mode is The NSF Communitarian Industry/University
as economical as possible. In addition, it can also be Exploration Place for Intelligent Maintenance Systems
combined with real-time analysis algorithms to assess (IMS) at the University of Cincinnati has exhibited an
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 137
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
intelligent Ich case framework on a band saw machine utilized as PWM yields), 6 simple sources of info, a 16
at IMTS 2014 in Chicago. Band saw machines are not MHz clay resonator, a USB association, a force
really costly, yet the expenses of the band saw belt are connector, an ICSP header and a reset button. It
tremendous as they debase a lot quicker. Be that as it contains all things needed to help the microcontroller;
may, without intelligent discovery and examination, it essentially interface it to a PC with a USB link or turn it
must be dictated by experience when the band saw on with an AC to DC connector or a battery to begin.
belt will break. The created gauging framework will It is an open source physical figuring stage dependent
have the option to perceive and screen the corruption on a basic microcontroller board and an improvement
of the band saw belts, regardless of whether the domain for composing programming for the board. The
condition is changing, with the goal that clients know Arduino board is shown in Fig 1.
nearly progressively when the best an ideal opportunity
to supplant the band saw is this will fundamentally
improve client experience and administrator wellbeing
and spare costs by replacing belt saw belts before they
actually break. The analytical algorithm developed was
performed on a server in the cloud and made accessible
through the Internet and mobile devices. The system
will probably be an example of an event-based
architecture, from the bottom up (based on the context
of processes and operations, in real time) and will
consider any subsidiary level. Therefore, model-based
and functional approaches will coexist with new ones Fig 1: The Arduino Board
capable of dealing with exceptions and unusual process IV. PULSE SENSOR
evolution (multi-agent systems, BADSc, etc.).
A Heartbeat sensor is a monitoring device that allows
Combination with the Web suggests that the gadgets
one to measure their heart rate in real time or record
will utilize an IP address as a one of a kind identifier. Be
the heart rate for further study. It provides a simple
that as it may, because of the restricted IPv4 address
way to study cardiac function. This sensor Monitors
space (which permits billions of one of a kind locations),
blood flow through the International Journal of
questions in IoT should utilize IPv6 to oblige the
Engineering Science and Computing, April 2017 6665
amazingly huge
http://ijesc.org/ finger and is designed to give digital
Location space required. The articles in IoT won't output of the heartbeat when a finger is placed on it.
just be gadgets with tangible abilities, however will When the sensor is working, the beat LED flashes once
likewise give activation capacities (for instance, lights with each beat. This digital output can be connected to
or bolts constrained by the Web). To an enormous the microcontroller directly to measure the frequency
degree, the fate of the Web of things won't be of beats per minute (BPM). It works according to the
conceivable without the help of IPv6; and, thus, the principle of light modulation by blood flow through the
worldwide reception of IPv6 in the coming years will finger on each pulse. The pulse sensor, shown in Fig 2
be essential for the effective improvement of IoT later is a well-designed plug and play heart rate sensor for
on. Arduino. It also includes an open source monitoring
III. THE ARDUINO UNO BOARD application that graphs your pulse in real time.
The Arduino Uno is a microcontroller board
dependent on the ATmega 328 (information sheet). It
has 14 advanced info/yield pins (of which 6 can be
138 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
V. SYSTEM ARCHITECTURE
The general architecture of IoT applications can be Fig 3: System Architecture
divided into three layers: the detection layer, the VII. CONCLUSION
transport layer and the application layer. This type of
Nowadays we have a more prominent number of
architecture is clear and flexible enough for our
heart sicknesses, including an expanded danger of
monitoring system. Therefore, we design the system
respiratory failures. The client sensors of our proposed
architecture based on that general model. Figure 3
framework permit identifying the pulse of an individual
shows the architecture of the IoT-based monitoring
utilizing heartbeat identification regardless of whether
system for patients with heart disease.
the individual is at home. The sensor is associated with
VI. SYSTEM IMPLEMENTATION a microcontroller that permits you to confirm pulse
First, we need to connect the pulse sensor to any readings and send them over the Web. The client can
organ in the body where it can easily detect the pulse set the high and low degrees of heartbeat limit. In the
like a finger. Then, the pulse sensor will measure the wake of setting these limits, the framework starts to
change in blood volume, which occurs screen and when the patient's pulse surpasses a specific
breaking point, the framework sends an alarm to the
When each time the heart pumps blood to the body. regulator that at that point communicates it over the
This change in the volume of blood causes a change in Web and cautions specialists and intrigued clients.
the intensity of the light through that organ. The Arduino Furthermore, the framework cautions for lower pulses.
will convert this change into the heartbeat per minute Each time the user logs in to monitor, the system also
(BPM). The LED connected on pin 13 will also flash shows the patient's live heart rate. Therefore, those
according to Heart Beat. ESP8266 will communicate interested can monitor the heart rate and get a heart
with the Arduino and send the data to Thing Speak. attack alert for the patient immediately from anywhere
The ESP8266 will connect the network to the router and the person can be saved on time. In our proposed
and the user will provide the code and send the sensor research, we try to propose a complete document to
data online. This data in Thing Speak will be displayed detect heart attacks in two ways. However, we have a
on a chart that shows the previous readings as well and plan about this research. Time of India, a leading
can be accessed from anywhere via the Internet. The newspaper in India, published that "Researchers in the
connected LCD will also show you the BPM. United States, within the next decade, Microchip Heart
Microeconomic will be placed in a blood vessel of the
human body. The smartphone will collect data and send
us information." Researchers are trying to implement
Microchip requirements for uses of smartphone
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 139
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
technology We will try to use this technology in the future [5] Heartbeat monitoring and alert system using GSM technology,
UfaraohS.U,Oranugo C.O, International Journal of Engineering
If this technology is developed, our project can detect Research and General Science Volume 3, Issue 4, July-August,
heart block through this technology. 2015 ISSN 2091-2730
140 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract-The main objective of wireless Wireless Power Transmission (WPT) is the efficient
inductive charging is to transfer power through transmission of electric power across small range of
inductive coupling by means of Faraday's Law of distances which varies from inches to feet through a
Electromagnetic Induction. The technology of vacuum or an atmosphere without the use of wire. This
wireless power transmission can eliminate the use
can be used for applications where either an
of the wires and their messy connection with the
vehicles, thus increasing the mobility, hygiene,
instantaneous amount or a continuous delivery of charge
convenience, and safety of an electronic vehicle is needed. There are two main standards in inductive
for all users. This technology can be adopted in charging namely Qi and Power Matters Alliance (PMA).
automotive industry, especially in Electric Vehicle. Operation of both the standards are similar but they
This paper deals with the implementation of differ in transmission frequencies and connection
wireless charging systems for electric vehicles protocols. Inductive charging is achieved using Qi
through a few automated parking slots for charging standard (driven by Wireless Power Consortium) during
along with the corresponding price. Thus, the whole implementation. Charging the battery of electric vehicles
system serves as a wireless charging bunk for by means of inductive coupling could be the next big
charging electric vehicles accommodated with thing.
automated sensory entry and exit gates.
II. FUNDAMENTAL BLOCK DIAGRAM
Keywords-Electric Vehicle (EV), Fuel Gauge,
Internet of Things (IOT), Radio Frequency
Identification (RFID), Wireless Power Transfer
(WPT).
I. INTRODUCTION
The depletion of non-renewable energy sources and
the current climatic conditions led the mankind to
explore alternative sources of energy. We evolved from
bullock carts to fuel engine based vehicles. But we
needed something more besides combustion engines in Fig 1. Block diagram of EV Bunk
automotive industry, with the continuous research and
The whole system consists of microcontrollers such
development we have modernized fuel-engine based
as STM32 L476RG and NodeMCUs which controls
vehicles to electric vehicles. Despite all these, we still
all the operations. The RFID modules are used to detect
rely on the classical and conventional wire system to
authorized users for letting in and out in the bunk.
charge our everyday electronic gadgets. The
Opening and closing of the gate will be controlled by
conventional wire system creates a mess when it comes
servo motors. Inductive charging is performed by WPT
to charging several electric vehicles simultaneously. It
charging module. Battery's state of charge, health and
also takes up lot of charging points and cables.
other parameters are monitored by battery fuel gauge
Moreover, connections have to be established manually
module. The Blynk IOT platform serves as a cloud,
by the user.
server and used to display real time data to the user.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 141
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
III. PRINCIPLE OF OPERATION Once the car is parked on the charging slot, the
A. Entry Section presence of the car is detected by sensors and the
charger will be turned ON automatically. Then
The actuators and sensors at the entrance of the alternating current passes through the primary coil which
bunk is monitored and controlled by the STM32 is installed in the slot. The moving charge carriers
Nucleo-64 Development Board with STM32L476RG generates a magnetic field which results in varying
MCU which is the main controller of the entrance magnetic field strength as the current amplitude is varying.
section. STM32 is programmed through Arduino IDE This fluctuating magnetic field induces an alternating
to perform the specific tasks as follows: electric current in the secondary coil which is installed
• STM32 monitors and fetches data from RFID reader. in the vehicle. Thus, wireless charging of battery of the
car is achieved through inductive coupling. The
• The RFID Tag in the car will be scanned by the RFID
secondary coil is connected to the receiver circuit of
reader present at the entrance section.
the charging module which is in turn connected to the
• The RFID reader fetches UID from the tag and STM battery babysitter module which monitors state of
compares it with pre-registered UIDs charge (in %) and update the same to the NodeMCU.
• If it is matched, the entrance gate will open using The NodeMCU which is in connection with the Blynk
servo and charging slot will be allotted once the slot cloud gets the data serially from the fuel gauge and
is checked whether it is empty or not with the help of publishes the data in the Blynk platform which can be
IR sensor. viewed by user through Blynk app/website.
• The above process will be displayed in LCD. When the battery of the car is charged to the desired
B. Electric Car design level as specified by the user, the fare will be calculated
according the percentage of charge level and will be
The electric car is implemented using 4WD car displayed in the Blynk platform. Then the user can pay
chassis with BO gear motors each of 125RPM speed the fare using Payment Link provided in the Blynk. The
and are single shaft gear motors which gives good torque user will be alerted with the email notification along with
and RPM at lower operating voltages. These motors payment invoice if the transaction is successful and
are driven through L298N driver module which is a payment status will be updated to the NodeMCU at
high-power motor driver for driving DC motor. This the exit section through Blynk Bridge connection.
module controls direction and speed of BO motors.
D. Exit section
The car is equipped with the NodeMCU as ECU,
battery fuel gauge and driver module. The NodeMCU Subsequent to the payment process, car reaches
is responsible for controlling the car, monitoring the the exit section. The UID of RFID tag will be once
battery status and publishing the data into the cloud. again scanned and payment status will be verified
The car is controlled remotely using Blynk app through through Bridge connection. If the payment is successful,
Joystick widget and slider widget for direction and the exit gate will open. Otherwise, the user will not be
speed control respectively. permitted to go out of the bunk.
142 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
IV. FLOW CHART problem. Wireless chargers solve the problem of messy
wires. The protected connection, corrosion-free and
spark-free nature of inductive charging provides eco-
friendly environment for charging stations. The
e1ectrification of transportation is underway and wireless
charging is playing a significant role, so WPT technology
provides convenient way for charging electric vehicles.
VII. FUTURE SCOPE
The implementation can be enhanced with more
advanced features such as fast charging methods can
be adopted, which is one of the main concerns in the
charging a battery. Transmission efficiency can be
improved to greater extent by increasing the number of
turns of coil or by adding coils of smaller thickness at
the transmitter end. Hybrid charging station can be
designed using solar panels along with the conventional
power supply as a source. Multiple charging slots can
be implemented in the bunk, if there is no slot available
station can be made to direct user to the nearby charging
station.
Fig 2. Flowchart ACKNOWLEDGMENT
V. RESULT AND DISCUSSION The satisfaction and euphoria that accompany the
successful completion of our project would be
All the interfaces and configurations are implemented
impossible without the set of people, whose guidance
gradually. Battery parameters such as state of charge,
and encouragement crowned our effort with success.
current, voltage, capacity, and health are monitored and
We have great pleasure in expressing our deep sense
displayed in real time. User interaction is achieved
of gratitude to Prof. Richard Lincoln Paulraj, Assistant
successfully by sending appropriate messages at right
Professor (2), Department of Electronics and
instance of time and receiving the inputs from the user
Communication, New Horizon College of Engineering
side and thereby responding accordingly from the
for constantly monitoring the development of the project
system.
and setting up precise deadline. His valuable suggestions
The charge current can be set to various ranges of were the key factors in the completion of project.
100mA, 500mA, 1A and 1.5A for charging the battery. REFERENCES
Batteries with higher C ratings can be used to reduce
[1] A. G. Akhil et al., "Coupled Wireless Charging system for Electric
the time of charging. Different payment gateways can Vehicles," 2021 Third International Conference on Intelligent
be interfaced for more secure transactions. Communication Technologies and Virtual Mobile Networks
(ICICV), 2021, pp. 475-479.
VI. CONCLUSION [2] G. Bekaroo and A. Seeam, "Improving wireless charging energy
As the electric cars are booming nowadays, and efficiency of mobile phones: Analysis of key practices," 2016
IEEE International Conference on Emerging Technologies and
the cost of petroleum products are increasing, people Innovative Business Practices for the Transformation of Societies
are gaining interest towards electric vehicles and (EmergiTech), 2016, pp. 357-360.
automation. Many questions will be arriving to the [3] G. Sharma, A. Goel and S. Agarwal, "Wireless charging system
people and one of them is the charging station. So, in using resonant coupling," 2017 International Conference on
Inventive Systems and Control (ICISC), 2017, pp. 1-5.
this paper a feasible solution is provided for that
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 143
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
[4] M. Kesler, "Wireless Charging of Electric Vehicles," 2018 IEEE [7] W. Luo and L. Shen, "Design and Research of an Automatic
Wireless Power Transfer Conference (WPTC), 2018, pp. 1-4. Charging System for Electric Vehicles," 2020 15th IEEE
Conference on Industrial Electronics and Applications (ICIEA),
[5] S. R. Khutwad and S. Gaur, "Wireless charging system for electric
2020, pp. 1832-1836.
vehicle," 2016 International Conference on Signal Processing,
Communication, Power and Embedded System (SCOPES), 2016, [8] X. Lu, P. Wang, D. Niyato, D. I. Kim and Z. Han, "Wireless
pp. 441-445. Charging Technologies: Fundamentals, Standards, and Network
Applications" in IEEE Communications Surveys & Tutorials,
[6] S. Y. Hui, "Planar Wireless Charging Technology for Portable
2016,vol. 18, no. 2, pp. 1413-1452.
Electronic Products and Qi," in Proceedings of the IEEE, 2013,
vol. 101, no. 6, pp. 1290-1301.
144 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- Fire detection tools based on images/ processing). In most fire scenes, flames and smog exist.
video can avoid many flaws in conventional Fire detection technology based on video images
methods and detect fires. To achieve this, various recognizes flames or smog in video images and then
learning techniques are used for fire detection. In implements real-time monitoring of fire scenes. This
this paper various learning techniques are analyzed noncontact technique requires a computer to process
and compared for better accuracy. Experiments
imagery and discriminates suspicious targets that appear
show that the RS-SVM classifier model gives
excellent reliability and stability, and enhances the
in the video images by studying and extracting visual
forecast accuracy of fires. The RS-SVM method features of flames or smog. To enhance the reliability
also reduces false fire-detection alarms and uses and stability of a fire detection system, various machine
fire feature selection in videos/ images compared and learning have been studied and developed for the
to other state art of methods.. field of fire detection. In this paper, various learning
Keywords- Deep CNN; SVM techniques are analyzed and compared for fire detection
using images/videos.
1. INTRODUCTION
2. ROUGH SET SUPPORT VECTOR
Accidental fire is a natural disaster that seriously MACHINE CLASSIFIER
threatens public safety. In recent years, accidental fire
has frequently occurred in many places, including
superstores, communities and forests, yielding huge
losses to production and human life. After several
decades of development, virtual reality technology has
matured quickly and has changed people's lifestyles by
being widely applied in many fields.
For example, VR technology has been used to
manage accidental fire in industry, agriculture, hospitals,
aviation, aerospace, and firefighting. Thus, virtual fire Fig.1 Block Diagram of RS-SVM Classifier.
environment technology has become integral to future
Rough set theory approximately describes uncertain
fire protection. Due to their detection principles or
and inaccurate knowledge compared to known
system structures, traditional fire detectors, which
knowledge within a database, works well in processing
include temperature detectors, smog detectors and
large amounts of data, and removes redundant
optical detectors, usually have inherent defects or
information. Therefore, this method investigates an image
application restrictions. Because flames and smog have
processing technology that uses both SVM and RS,
specific colors, textures, shapes and other image
and develops a fire flame image recognition method
features, people have begun to consider using computer
based on the RS-SVM classifier model. The block
visual features to improve the efficiency of fire detection
diagram of RS-SVM classifier as shown in Fig.1. The
(e.g., video flame detection technology based on image
contributions of this method include the following:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 145
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
a. The research background of fire detection technology In nonlinear problems, both the optimization object
and the development status of video fire detection function and the classification function only involve the
are presented, and the problems of conventional fire inner product (x · xi) between training samples. Assume
detection and recognition methods are discussed. that the nonlinear mapping : Rd → H maps the
b. RS is combined with SVM to create an RS-SVM samples in the input space into high-dimension feature
classification model. Dimension reduction on the input space H. When constructing the optimal hyper-plane
vectors is achieved, redundant information is in the feature space H, the training algorithm only uses
removed, and the reduced results are input into the the dot product in the space, i.e., (xi)· (xj), without
classifier model for classification. the appearance of (xi) alone. Thus, a function K is
c. The selection of kernel parameters strongly affects found to meet:
the classification and recognition ability of SVM, this
method investigates kernel parameter selection and
K(xi · xj) =(xi)· (xj) (1)
analyzes the impact of the model built by kernel Only the inner product computation is required in
parameter optimization method on the flame image high dimension space, and such an operation can be
recognition rate. realized with the function in the original space. According
d. This method solves the problems of traditional fire to related functional theories, the function corresponds
flame image detection methods and yields reliable and to the inner product of a certain transformation space
stable performance with improved fire prediction as long as one kind of kernel function K(xi·xj) satisfies
accuracy. the Mercer condition. Therefore, in the optimal hyper-
2.1 Standard SVM plane, the use of the proper inner product function K(xi
· xj) can achieve linear classification after a certain
SVM uses the principle of structural risk minimization nonlinear transform without increasing computational
as its theoretical foundation. This theory selects the complexity.
subset of the function and the discrimination function in
this subset to minimize risk and ensure that the small In summary, SVM maps the input vector into a high-
error classifier obtained by finite training samples yield dimension feature space using certain preselected
small test errors with independent test sets nonlinear mappings and then constructs the optimal
classification hyper-plane. The SVM classification
SVM operates as follows: function is similar to that of a neural network, and the
1a) in a linearly separable case, SVM searches for the output is the linear combination of the middle nodes
optimal classification hyper planes of two classes of and every middle node corresponds to a support vector.
samples in the original space;
For any a symmetric function k (x, x'), its sufficient
1b) in a linearly inseparable case, SVM adds a slack and necessary condition for inner product computation
variable to the analysis and maps the samples in a
low-dimension input space into a high-dimension
in a certain feature space is that for any ≠ 0 and
attribute space via nonlinear mapping to make it linear, (x)
making it possible to analyze the nonlinearity of
samples using linear algorithms and search for the (2)
optimal classification hyper-plane in this feature
space ; Thus, seeking the optimal classification plane in a
2) SVM then uses the principle of structured risk
high dimension space can transform the inner product
minimization to construct the optimal classification computation in a high-dimension space into the function
hyper-plane in the attribute space to make the operation in low-dimension space through the proper
classifier obtain the global optimum and the expected function K(xi·xj) to solve nonlinear classification
risk in the entire sample space meet a certain upper problems without affecting computational complexity.
bound at a certain probability. The equation is as follows:
146 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 147
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
148 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
training data. This kind of network is better at learning obtained feature vector is sent to the final classification
scene information of images. layer to finally realize smoke detection.
3.2.3 PERSONNEL DETECTION BASED ON (1) Candidate area scaling
MULTI-FLOW CNN (2) Implicitly expanding candidate smoke areas
In this method, the scene recognition CNN network (3) Feature extraction and classification
is added to the traditional dual-Flow CNN network
model, and it is hoped that the number of misjudgments 4. EARLY FIRE DETECTION USING
of behavior recognition can be reduced by scene CONVOLUTIONAL NEURAL
recognition. The system structure is shown in Fig. 3. NETWORKS(CNN)
Early fire detection in the context of disaster
management systems during surveillance of public areas,
forests, and nuclear power plants, can result in saving
of ecological, economical, and social damages.
However, early detection is one of the challenging
problems due to varying lighting conditions, shadows,
and movement of fire-colored objects. Thus, there is a
need for such an algorithm which can achieve better
accuracy in the aforementioned scenarios while minimize
Fig. 3. Multi-Flow CNNs Based on Scene Recognition. the number of false alarms. To achieve this goal, we
As can be seen from the figure.3, the scene explored deep CNNs and devised a fine-tuned
recognition CNN is based on the video as the input architecture for early fire detection during surveillance
unit, and finally gives the prediction of the current video for effective disaster management systems. After
scene; for each video, the scene recognition divides successful fire detection, another desirable requirement
the video into single-frame images for prediction one is sending an immediate alert to disaster management
by one (see Fig. 6). system along with the representative key frames. To
this end, we devised an adaptive prioritization scheme
3.3 Fire smoke detection algorithm based on for the camera nodes of the surveillance system,
DCNN considering the contents they perceive. Finally, the data
3.3.1 Smoke characteristics of high-priority nodes is transmitted using a reliable
channel 4selected through our reliable channel selection
The characteristics of smoke are very rich. This
algorithm. The overall of this system is overviewed in
method mainly introduces color features, texture features
Fig. 4.
and shape irregularities.
3.3.2 Fire smoke detection algorithm
The fire smoke detection algorithm proposed in this
paper can be roughly divided into three steps. In the
first step, the candidate smoke area is determined from
the video frame. In the second step, a DCNN is used
to extract fixed-length feature vectors from the smoke
candidate region to realize automatic extraction of
smoke features. This effectively solves the problem of
difficulty in characterizing the characteristics caused by
the diversity of smoke species. In the third step, the Fig. 4: Early fire detection using CNN with reliable
communication for effective disaster management
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 149
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
(8)
(d) Roberts Operator
150 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
however, the selection, construction and parameter Fig.6. (a) Power equipment personnel image (b) Power
equipment fire smoke image
optimization of mixed kernel functions must still be
Table.2 Training and Testing Results of SVM, BP and
improved. Rui et.al (2019) for Fire Detection
It can be seen from the results of Figs. 7 and 8 that In this method, all the experiments were performed
the number of iterations of the experimental setup is using a dataset of 68457 images, which are collected
10,000, and the test is performed every 1000 times, from different fire datasets of both images and videos.
and the test results are recorded. As the number of The Muhammad et.al(2018) method is compared with
iterations increases, the training of the three detection Figgia et.al(2015) method in Table 3. The existing
models gradually converges and tends to be stable. methods for comparison are selected carefully
After the iteration, the convergence rate of the fire smoke considering the underlying dataset, year of publication,
detection algorithm based on the DCNN is the highest, and used features. The Muhammad et.al(2018
reaching 0.98. The accuracy of the support vector proposed work inspired from deep features, reported
machine method is the lowest of the three. Similarly, in further improvement by increasing the accuracy from
terms of MAE, the fire detection algorithm based on 93.55% to 94.39% and reducing the false positives
DCNN proposed in this method has also achieved the from 11.67% to 9.07%. Although, our work also
best results. It is indicated that the fire anomaly detection resulted in false negatives of 2.13%, yet it sustained a
model proposed in this method can better cope with better balance between accuracy, false positives, and
such emergencies. false negatives, making our method more suitable for
early fire detection, which is of paramount interest to
disaster management systems.
152 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Table 3. Comparison of Muhammad et.al(2018) and Figgia [9] S. S. Esfahlani, ''Mixed reality and remote sensing application of
et.al(2015) Methods unmanned aerial vehicle in fire and smoke detection,'' J. Ind. Inf.
False False- Integr., vol. 15, pp. 42-49, Sep. 2019.
Method Accuracy
Positives Negatives [10] A. Hackner, H. Oberpriller, A. Ohnesorge, V. Hechtenberg, and
Muhammad G. Müller, ''Heterogeneous sensor arrays: Merging cameras and
et.al(2018) gas sensors into innovative fire detection systems,'' Sens.
9.07% 2.13% 9 4.39%
after Fine Actuators B, Chem., vol. 231, pp. 497-505, Aug. 2016.
Tuning
[11] Z. Lin, F. Chen, Z. Niu, B. Li, B. Yu, H. Jia, and M. Zhang, ''An
Muhammad
active fire detection algorithm based on multi-temporal FengYun-
et.al(2018)
9.22% 10.65% 90.06% 3C VIRR data,'' Remote Sens. Environ., vol. 211, pp. 376-387,
Without after Jun. 2018.
Fine Tuning
Fig gia [12] K. Muhammad, J. Ahmad, and S. W. Baik, ''Early fire detection
11.67% 0% 93.55% using convolutional neural networks during surveillance for
et.al(2015)
effective disaster management,'' Neurocomputing, vol. 288, pp.
8. CONCLUSION 30-42, May 2018.
In this paper, the evaluation parameters of various [13] C. Filizzola, R. Corrado, F. Marchese, G. Mazzeo, R. Paciello,
learning schemes for fire detection are compared. The N. Pergola, and V. Tramutoli, ''RST-FIRES, an exportable
algorithm for early-fire detection and monitoring: Description,
experimental result of RS-SVM fire flame frame implementation, and field validation in the case of the MSG-
recognition method yields a high recognition rate, a fast SEVIRI sensor,'' Remote Sens. Environ., vol. 186, pp. 196-216,
recogotion speed, excellent robusrness, and a wide Dec. 2016.
range of application compared to other methods. [14] A. Koltunov, S. L. Ustin, B. Quayle, B. Schwind, V. G. Ambrosia,
and W. Li, ''The development and first validation of the GOES
REFERENCES early fire detection (GOES-EFD) algorithm,'' Remote Sens.
Environ., vol. 184, pp. 436-453, Oct. 2016.
[1] S. M. Nemalidinne and D. Gupta, ``Nonsubsampled contourlet
domain visible and infrared image fusion framework for fire [15] T. Zhang, M. J. Wooster, and W. Xu, ''Approaches for
detection using pulse coupled neural network and spatial fuzzy synergistically exploiting VIIRS I- and M-Band data in regional
clustering,'' Fire Saf. J., vol. 101, pp. 84_101, Oct. 2018. active fire detection and FRP assessment: A demonstration with
[2] Q.-X. Zhang, G.-H. Lin, Y.-M. Zhang, G. Xu, and J.-J. Wang, respect to agricultural residue burning in eastern China,'' Remote
``Wildland forest fire smoke detection based on faster R-CNN Sens. Environ., vol. 198, pp. 407-424, Sep. 2017.
using synthetic smoke images,'' Procedia Eng., vol. 211, pp. [16] H.-J. Zhang, N. Zhang, and N.-F. Xiao, ''Fire detection and
441_446, Jan. 2018. identification method based on visual attention mechanism,''
[3] P. Li and W. Zhao, ``Image fire detection algorithms based on Optik, vol. 126, no. 24, pp. 5011-5018, Dec. 2015.
convolutional neural networks,'' Case Stud. Thermal Eng., vol. [17] Y. Peng and Y. Wang, ''Real-time forest smoke detection using
19, Jun. 2020, Art. no. 100625. hand designed features and deep learning,'' Comput. Electron.
[4] P. Coppo, ``Simulation of fire detection by infrared imagers from Agricult., vol. 167, Dec. 2019, Art. no. 105029.
geostationary satellites,'' Remote Sens. Environ., vol. 162, pp.
[18] S. Garcia-Jimenez, A. Jurio, M. Pagola, L. De Miguel, E.
84_98, Jun. 2015.
Barrenechea, and H. Bustince, ''Forest fire detection: A fuzzy
[5] C. Singh, E. Walia, and K. P. Kaur, ``Enhancing color image retrieval system approach based on overlap indices,'' Appl. Soft Comput.,
performance with feature fusion and non-linear support vector vol. 52, pp. 834-842, Mar. 2017.
machine classifier,'' Optik, vol. 158, pp. 127_141, Apr. 2018.
[19] D. T. Gottuk, J. A. Lynch, S. L. Rose-Pehrsson, J. C. Owrutsky,
[6] Y. Sun, C. Xu, G. Li, W. Xu, J. Kong, D. Jiang, B. Tao, and D. and F. W. Williams, ''Video image fire detection for shipboard
Chen, ``Intelligent human computer interaction based on non use,'' Fire Saf. J., vol. 41, no. 4, pp. 321-326, Jun. 2006.
redundant EMG signal,'' Alexandria Eng. J., to be published.
[Online]. Available: https:// www.sciencedirect.com/science/ [20] G. Marbach, M. Loepfe, and T. Brupbacher, ''An image processing
article/pii/S1110016820300168, doi: 10.1016/j.aej.2020.01.015. technique for fire detection in video images,'' Fire Saf. J., vol. 41,
no. 4, pp. 285-289, Jun. 2006.
[7] R. Azhar, D. Tuwohingide, D. Kamudi, Sarimuddin, and N.
Suciati, ``Batik image classification using SIFT feature extraction, [21] T. X. Tung and J.-M. Kim, ''An effective four-stage smoke-
bag of features and support vector machine,'' Procedia Comput. detection algorithm using video images for early fire-alarm
Sci., vol. 72, no. 1, pp. 24_30, 2015. systems,'' Fire Saf. J., vol. 46, no. 5, pp. 276-282, Jul. 2011.
[8] R. Hou, M. Pan, Y. Zhao, and Y. Yang, ''Image anomaly detection [22] S. G. Kong, D. Jin, S. Li, and H. Kim, ''Fast fire flame detection
for IoT equipment based on deep learning,'' J. Vis. Commun. in surveillance video using logistic regression and temporal
Image Represent., vol. 64, Oct. 2019, Art. no. 102599. smoothing,'' Fire Saf. J., vol. 79, pp. 37-43, Jan. 2016
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 153
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
[23] Q. Zheng, H. Li, B. Fan, S. Wu, and J. Xu, ''Integrating support [27] H. Anzid, G. L. Goic, A. Bekkari, A. Mansouri, and D. Mammass,
vector machine and graph cuts for medical image segmentation,'' ''Multimodal images classification using dense SURF,'' Spectral
J. Vis. Commun. Image Represent., vol. 55, pp. 157-165, Aug. Inf. Support Vector Mach., Procedia Comput. Sci., vol. 148, no.
2018. 1, pp. 107-115, 2019.
[24] Y. Ji, L. Sun, Y. Li, J. Li, S. Liu, X. Xie, and Y. Xu, ''Non- [28] G. Chen, R. Xu, and Z. Yang, ''Deep ranking structural support
destructive classification of defective potatoes based on vector machine for image tagging,'' Pattern Recognit. Lett., vol.
hyperspectral imaging and support vector machine,'' Infr. Phys. 105, pp. 30-38, Apr. 2018.
Technol., vol. 99, pp. 71-79, Jun. 2019.
[29] H. Cevikalp, M. Elmas, and S. Ozkan, ''Large-scale image retrieval
[25] M. Zhou, Q. Zhao, and Y. Chen, ''Endpoint prediction of BOF using transductive support vector machines,'' Comput. Vis. Image
by flame spectrum and furnace mouth image based on fuzzy Understand., vol. 173, pp. 2-12, Aug. 2018.
support vector machine,'' Optik, vol. 178, pp. 575-581, Feb.
[30] Z. Gu, Z. Zhang, J. Sun, and B. Li, ''Robust image recognition by
2019.
L1- norm twin-projection support vector machine,''
[26] Z. Huang, X. Xu, H. Zhu, and M. Zhou, ''An efficient group Neurocomputing, vol. 223, pp. 1-11, Feb. 2017
recommendation model with multiattention-based neural
networks,'' IEEE Trans. Neural Netw. Learn. Syst., early access,
Jan. 15, 2020, doi: 10.1109/ TNNLS.2019.2955567.
154 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- In this brief, we propose a fast yet To meet the power and speed design constraints, a
energy-efficient reconfigurable approximate carry variety of methods at different design abstraction levels
look-ahead adder (RAP-CLA). This adder has the have been suggested. Approximate computing which
ability of switching between the approximate and
is an emerging paradigm deals with demand
exact operating modes making it suitable for both
performance and power efficiency constraints for
error-resilient and exact applications. The
structure, which is more area and power efficient adders at the cost of reducing the computational
than state-of-the-art reconfigurable approximate accuracy of the result. This paradigm is especially
adders, is achieved by some modifications to the suitable for applications where the answer is not unique
conventional carry look ahead adder (CLA). The and a set of approximate answers are acceptable.
efficacy of the proposed RAP-CLA adder is Approximate arithmetic units are mainly based on
evaluated by comparing its characteristics to those
the simplification of the arithmetic units circuits. Different
of two state of-the-art reconfigurable approximate
adders as well as the conventional (exact) CLA.
structures for approximate adders have been proposed.
The results reveal that, in the approximate Most of the proposed adders are fully approximate and
operating mode, the proposed 8 bit adder provides may only be utilized in error resilient applications. At
better delay and power reductions compared to the same time, some of these structures have a constant
those of the exact CLA, respectively, at the cost level of deviation from the actual result, i.e., during the
of low error rate. It also provides lower delay and system operation their accuracies are not tunable.
power consumption, respectively.The proposed Runtime accuracy reconfigurability, however, may be
architecture of this paper analysis the delay and considered as a useful feature for a system providing
area using Xilinx 14.3. different levels of quality of service during operation.
Index Terms-Approximate computing, carry Here, by reducing the quality, the total computation time
look-ahead adder (CLA), quality of service, and/or power consumption of the unit are reduced
reconfigurable. resulting in higher energy efficiency. In addition, some
I. INTRODUCTION digital systems, such as general purpose processors,
may be utilized for both approximate and exact
Power consumption and performance are critical computing, necessitating the ability to dynamically switch
parameters in the design of digital circuit in general. In between exact and approximate operating modes. This
the case of digital processing systems (especially the feature may be obtained by adding a correction unit to
portable ones), owing to limited power budgets and the approximate circuit that would turn the approximate
reliability concerns, achieving a desired performance solution to an exact solution. The correction unit,
level can be challenging. Adders are key building blocks however, increases the delay, power, and area overhead
in arithmetic and logic units. Adders, which are utilized of the design. Also, the error correction procedure may
to perform other operations such as subtraction, require more than one clock cycle which could slow
multiplication, and division are among the most power down the processing.
hungry components in processors and are often hot-
spot locations.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 155
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
156 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
them to improve yield of a wide range of adder V. Gupta, D. Mohapatra et al.[5]was explained in
architectures by exploiting error tolerance in these this paper"Low-power digital signal processing using
applications. Experiment results show that even for approximate adders," Low power is an imperative
small thresholds on, we can obtain significant requirement for portable multimedia devices employing
improvements in manufacturing yield. various signal processing algorithms and architectures.
N. Zhu, W. L. Goh et al.[3] an error tolerant adder In most multimedia applications, human beings can
(ETA-I) which utilized a modified XOR gate instead of gather useful information from slightly erroneous outputs.
the FAs for the LS part of the adder was discussed. Therefore, we do not need to produce exactly correct
Note that the LS and most significant (MS) part of the numerical outputs. Previous research in this context
adder in this approach were independent from each exploits error resiliency primarily through voltage
other and the carry input of the MS part was zero. In overscaling, utilizing algorithmic and architectural
modern VLSI technology, the occurrence of all kinds techniques to mitigate the resulting errors. In this paper,
of errors has become inevitable. By adopting an we propose logic complexity reduction at the transistor
emerging concept in VLSI design and test, error level as an alternative approach to take advantage of
tolerance (ET), a novel error-tolerant adder (ETA) is the relaxation of numerical accuracy. We demonstrate
proposed. The ETA is able to ease the strict restriction this concept by proposing various imprecise or
on accuracy, and at the same time achieve tremendous approximate full adder cells with reduced complexity
improvements in both the power consumption and at the transistor level, and utilize them to design
speed performance. When compared to its conventional approximate multi-bit adders. In addition to the inherent
counterparts, the proposed ETA is able to attain more reduction in switched capacitance, our techniques result
than 65% improvement in the Power-Delay Product in significantly shorter critical paths, enabling voltage
(PDP). One important potential application of the scaling. We design architectures for video and image
proposed ETA is in digital signal processing systems compression algorithms using the proposed
that can tolerate certain amount of errors. approximate arithmetic units and evaluate them to
demonstrate the efficacy of our approach. We also
N. Zhu et al.[4]explains that the adder was divided derive simple mathematical models for error and power
to more than two segments where the input carry o consumption of these approximate adders.
f each segment was generated approximately by the Furthermore, we demonstrate the utility of these
previous segment. All the above approximate adders approximate adders in two digital signal processing
operated only in the approximate mode. The occurrence architectures (discrete cosine transform and finite
of errors are inevitable in modern VLSI technology and impulse response filter) with specific quality constraints.
to overcome all possible errors is an expensive task. It Simulation results indicate up to 69% power savings
not only consumes a lot of power but degrades the using the proposed approximate adders, when
speed performance. By adopting an emerging concept compared to existing implementations using accurate
in VLSI design and test-error-tolerance (ET), we adders.
managed to develop a novel error-tolerant adder which
we named the Type II (ETAII). The circuit to some A. B. Kahng et al.[6] where the proposed adder
extent is able to ease the strict restriction on accuracy operated in both accurate and approximate modes
to achieve tremendous improvements in both the power Approximation can increase performance or reduce
consumption and speed performance. When compared power consumption with a simplified or inaccurate
to its conventional counterparts, the proposed ETAII circuit in application contexts where strict requirements
is able to achieve more than 60% improvement in the are relaxed. For applications related to human senses,
power-delay product (PDP). The proposed ETAII is approximate arithmetic can be used to generate
an enhancement of our earlier design, the ETAI, which sufficient results rather than absolutely accurate results.
has problem adding small number. Approximate design exploits a tradeoff of accuracy in
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 157
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
computation versus performance and power. However, addition and subtraction are the basic operations
required accuracy varies according to applications, and whereas multiplication and division are the repeated
100% accurate results are still required in some addition and subtraction respectively.
situations.Because of its configurability, the ACA adder To perform these operations 'Adder circuits' are
can adaptively operate in both approximate (inaccurate) implemented using basic logic gates. Adder circuits are
mode and accurate mode. The proposed adder can evolved as Half-adder, Full-adder, Ripple-carry Adder,
achieve significant throughput improvement and total and Carry Look-ahead Adder. Among these Carry
power reduction over conventional adder designs. It Look-ahead Adder is the faster adder circuit. It reduces
can be used in accuracy-configurable applications, and the propagation delay, which occurs during addition,
improves the achievable tradeoff between performance/ by using more complex hardware circuitry. It is designed
power and quality. The ACA adder achieves by transforming the ripple-carry Adder circuit such that
approximately 30% power reduction versus the the carry logic of the adder is changed into two-level
conventional pipelined adder at the relaxed accuracy logic.
requirement,
A. Half Adder
J. Hu et al.[7] a segmented approximate adder
which enhanced by a carry speculation structure for The half adder adds two one-bit binary numbers A
increasing the accuracy was suggested. In addition, an and B. It has two outputs, S and C (the value
error reduction unit was used to reduce the error of the theoretically carried on to the next addition); the final
adder. The delay of this adder with and without the sum is 2C + S. The simplest half-adder design, pictured
error reduction unit was larger than the conventional on the right, incorporates an XOR gate for S and an
exact CLA. Note that by increasing the segment size,the AND gate for C. With the addition of an OR gate to
delay of this adder became considerably larger than combine their carry outputs, two half adders can be
that of the conventional CLA. combined to make a full adder.
Table 1. Truth Table Of Half Adder
M. Shafique et al.[8]a generalized model for
generating an ACA has been proposed where the
generated adders were called GeAr. Also, a
configurable error correction unit was discussed.The
error correction unit was a multicycle sequential unit
requiring up to k cycles to determine the exact value of
summation where k was the number of the subadders.
R. Ye, T.Wang et al.[9] "On reconfiguration oriented
approximate adder design and its application". The
structure was based on the ACA without supporting
the error correction mechanism. Compared to the above
approximate adders, our proposed reconfigurable
approximate adder operates in two modes of the exact
and approximate. Its delay and power are considerably
smaller (especially in the approximate mode) compared
to those of the exact CLA.
III.EXISTING SYSTEM
Fig 1. Circuit Diagrm Of Half Adder
A digital computer must contain circuits which can
perform arithmetic operations such as addition,
subtraction, multiplication, and division. Among these,
158 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
B. Full Adder
A full adder adds binary numbers and accounts for A full adder can be constructed from two half adders
values carried in as well as out. A onebit full adder adds by connecting A and B to the input of one half adder,
three one-bit numbers, often written as A, B, and Cin; connecting the sum from that to an input to the second
A and B are the operands, and Cin is a bit carried in adder, connecting Ci to the other input and OR the two
from the next less significant stage. The full-adder is carry outputs. Equivalently, S could be made the three-
usually a component in a cascade of adders, which add bit XOR of A, B, and Ci, and Cout could be made the
8, 16, 32, etc. binary numbers. A full adder can be three-bit majority function of A, B, and Ci.
implemented in many different ways such as with a C. Ripple carry adder
custom transistor-level circuit or composed of other
gates. One example implementation is with and It is possible to create a logical circuit using multiple
full adders to add N-bit numbers. Each full adder inputs
a Cin, which is the Cout of the previous adder. This
Table 2.Truth Table Of Full Adder kind of adder is a ripple carry adder, since each carry
bit "ripples" to the next full adder. Note that the first
(and only the first) full adder may be replaced by a half
adder. The layout of a ripple carry adder is simple,
which allows for fast design time; however, the ripple
carry adder is relatively slow, since each full adder must
wait for the carry bit.calculated from the previous full
adder. The gate delay can easily be calculated by
inspection of the full adder circuit.Each full adder
requires three levels of logic.
In a 32bit [ripple carry] adder, there are 32 full
adders, so the critical path (worst case) delay is 3 (from
input to carry in first adder) + 31 * 2 (for carry
propagation in later adders) = 65 gate delays. A design
with alternating carry polarities and optimized AND-
ORInvert gates can be about twice as fast.
Table 3. Truth Table Of Ripple Carry Adder
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 159
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
and sum outputs of any state unless a carry input is independent stages. Here the output of any stage is
available for that state. So, for computation to occur, dependent only on the bits which are added in the
the circuit has to wait until the carry bit propagated to previous stages and the carry input provided at the
all states. beginning stage. Hence, the circuit at any stage does
not have to wait for the generation of carry-bit from the
previous stage and carry bit can be evaluated at any
instant of time
For deriving the truth table of this adder, two new
terms are introduced - Carry generate and carry
propagate. Carry generate Gi =1 whenever there is a
carry Ci+1 generated. It depends on Ai and Bi inputs.
Gi is 1 when both Ai and Bi are 1. Hence, Gi is
calculated as Gi = Ai. Bi.Carry propagated Pi is
Fig 3:-4-bit-Ripple-CarryAdder
associated with the propagation of carry from Ci to
Ci+1. It is calculated as Pi = Ai ⊕ Bi. The truth table
Consider the 4-bit ripple carry adder circuit above. of this adder can be derived from modifying the truth
Here the sum S3 can be produced as soon as the inputs table of a full adder.
A3 and B3 are given. But carry C3 cannot be computed
until the carry bit C2 is applied whereas C2 depends Using the Gi and Pi terms the Sum Si and Carry
on C1. Therefore to produce final steady-state results, Ci+1 are given as below -
carry must propagate through all the states. This • Si = Pi ⊕ Gi.
increases the carry propagation delay of the circuit.
• Ci+1 = Ci.Pi +Gi.
The propagation delay of the adder is calculated as
"the propagation delay of each gate times the number Therefore, the carry bits C1, C2, C3, and C4 can
of stages in the circuit". For the computation of a large be calculated as
number of bits, more stages have to be added, which • C1 = C0.P0+G0.
makes the delay much worse. Hence, to solve this • C2 = C1.P1+G1 = ( C0.P0+G0).P1+G1.
situation, Carry Look-ahead Adder was introduced.To
understand the functioning of a Carry Look-ahead • C3 = C2.P2+G2 = (C1.P1+G1).P2+G2.
Adder, a 4-bit Carry Look-ahead Adder is described • C4 = C3.P3+G3 = C0.P0.P1.P2.P3 + P3.P2.P1.G0
below + P3.P2.G1 + G2.P3 + G3.
It can be observed from the equations that carry
Ci+1 only depends on the carry C0, not on the
intermediate carry bits.
Table 4.Carry-Look-ahead-Adder-Truth-Table
Fig 4. 4-bit-Carry-Look-ahead-Adder-Logic-Diagram
The above equations are implemented using two- W, the first segment contains W MS terms of (1) while
level combinational circuits along with AND, OR gates, the other segment contains the remaining (LS) terms.
where gates are assumed to have multiple inputs. Hence, (1) may be rewritten as
(2)
Supposing that we have two bits of storage per digit, of the exact CLA. In the case of GeAr, however, by
we can use a redundant binary representation, storing increasing the windows size to a larger value than 6,
the values 0, 1, 2, or 3 in each digit position. It is the delay (area) becomes larger than that of the exact
therefore obvious that one more binary number can be CLA. In addition, when the window size become larger
added to our carry-save result without overflowing our than 4, the delay of the proposed adder exceeds the
storage capacity. The key to success is that at the delay of the exact CLA. Also, for all the window sizes,
moment of each partial addition we add three bits: the power and area of the adder are larger than those
0 or 1, from the number we are adding. of the exact CLA. For the window sizes larger than 4,
the RAP-CLA outperforms the GeAr. The results also
- 0 if the digit in our store is 0 or 2, or 1 if it is 1 or 3.
show that, in the case of the lowest (highest) accuracy
- 0 if the digit to its right is 0 or 1, or 1 if it is 2 or 3 of W = 1(W = 6), the delay, power, area, energy and
EDP of our 8-bit proposed approximate adder are
about 73% (22%), 28% (3%), 30% (17%), 81%
(36%), and 95% (50%), respectively, lower compared
to those of the exact 8-bit CLA.
Table 5.Comparison of 8 bit
between the approximate and exact operating modes [10] N. Zhu, W. L. Goh, and K. S. Yeo, "An enhanced low-power
highspeed adder for error-tolerant application," in Proc. Int.
making it suitable for both error-resilient and exact Symp. Integr. Circuits (ISIC), Singapore, 2009, pp. 69-72.
applications. The structure of the proposed adder was [11] A. B. Kahng and S. Kang, "Accuracy-con?gurable adder for
based on some modifications to the structure of the approximate arithmetic designs," in Proc. 49th ACM/EDAC/
IEEE Design Autom. Conf. (DAC), San Francisco, CA, USA,
conventional CLA. To assess the efficacy of the 2012, pp. 820-825.
proposed structure, its design parameters were [12] V. Gupta, D. Mohapatra, A. Raghunathan, and K. Roy, "Low-
compared to those of 4 bit reconfigurable approximate power digital signal processing using approximate adders," IEEE
CLA adders. The parameters which included delay, Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 32, no.
1, pp. 124-137, Jan. 2013.
power, energy energy-delay-product, and area were
[13] M. Sha?que, W. Ahmad, R. Ha?z, and J. Henkel, "A low latency
evaluated at a 15nm technology. The results showed generic accuracy con?gurable adder," in Proc. 52nd ACM/EDAC/
up to 49% and 19% lower delay and power IEEE Design Autom. Conf. (DAC), San Francisco, CA, USA,
consumption, respectively, compared to the those of 2015, pp. 1-6.
the approximate adders at the price of up to an error [14] J. Hu and W. Qian, "A new approximate adder with low relative
error and correct sign calculation," in Proc. Design Autom. Test
rate of 35.16% Europe Conf. Exhibit. (DATE), Grenoble, France, 2015, pp.
1449-1454.
REFERENCES
[15] C. Efstathiou, Z. Owda, and Y. Tsiatouhas, "New high-speed
[1] B. K. Mohanty and S. K. Patel, "Area-delay-power ef?cient multioutput carry look-ahead adders," IEEE Trans. Circuits Syst.
carryselect adder," IEEE Trans. Circuits Syst. II, Exp. Briefs, II, Exp. Briefs, vol. 60, no. 10, pp. 667-671, Oct. 2013.
vol. 61, no. 6, pp. 418-422, Jun. 2014. [16] J. Liang, J. Han, and F. Lombardi, "New metrics for the reliability
[2] B. Shao and P. Li, "Array-based approximate arithmetic of approximate and probabilistic adders," IEEE Trans. Comput.,
computing: A general model and applications to multiplier and vol. 62, no. 9, pp. 1760-1771, Sep. 2013.
squarer design," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. [17] NanGate-The Standard Cell Library Optimization Company.
62, no. 4, pp. 1081-1090, Apr. 2015. (2016). [Online]. Available: http://www.nangate.com/
[3] A. Raha, H. Jayakumar, and V. Raghunathan, "Input-based [18] M. S. K. Lau, K.-V. Ling, and Y.-C. Chu, "Energy-aware
dynamic recon?guration of approximate arithmetic units for video probabilistic multiplier: Design and analysis," in Proc. Int. Conf.
encoding," IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Compilers Archit. Synthesis Embedded Syst., Grenoble, France,
vol. 24, no. 3, pp. 846-857, Mar. 2016. 2009, pp. 281-290.
[4] M. S. Khairy, A. Khajeh, A. M. Eltawil, and F. J. Kurdahi, [19] H. R. Myler and A. R. Weeks, The Pocket Handbook of Image
"Equinoise: A statistical model that combines embedded memory Processing Algorithms in C. Upper Saddle River, NJ, USA:
failures and channel noise," IEEE Trans. Circuits Syst. I, Reg. Prentice-Hall, 2009.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 163
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: In most of the CPUs, the multiplier two remaining rows will be added by means of, for
lies in the critical path for signal propagation which example, a carry propagation adder.At the second stage
leads to the delay and complexity of systems. So, and after generation of PPs, a partial product reduction
in order to decrease the delay and complexity of tree (PPRT) is often employed for efficient summation
systems, compressors are used. A compressor
of the products. Considering the full adder (FA)as the
reduces the delay and carry relay problem by
introducing the Carry Selective MUX instead of
main building block in various multiplication
Full-Adders. For the carry rippling problem "n-2 configurations, this block constitutes the basis for many
compressors" has been developed which improves different architectures.
the speed performance and efficiency of the circuit. However, the main drawback of FA-based
With the help of introduced procedure, the gate- configurations, which limits their usage in today's parallel
level delay has been reduced considerably when
multiplier design, is the propagation latency for the
compared with the previous designs, while the total
transistor and gate count remain in a reasonable
cascaded cells. Moreover, the most important concern
range. Moreover, for a fair comparative conclusion, in the design process of a parallel multiplier is the circuit
the best-reported circuits have been redesigned, size and power consumption, which is directly related
and their parasitic elements were extracted utilizing to the number of employed gates used in the various
the same technology employed for the synthesis parts of the architecture. An efficient solution to
of the proposed circuits. Finally, a typical multiplier overcome the drawbacks is to utilize a compressor that
has been implemented to investigatethe efficiency has to reduce carry repelling problem that the most
of the designed compressor block. significant part of the total delay and power dissipation
Keywords: Integrate design environment (IDE), will belong to the network instead of FA trees, especially
Look up table (LUT), Full adder (FA), Register in the PPRT.Therefore, the performance enhancement
transfer logic (RTL), Electronic design of this stage can significantly improve the speed and
environment (EDA). lower the power dissipations of the whole system.
I. 1.INTRODUCTION N- 2 COMPRESSOR:
Compressor refer to the "compressing of full-adders As a universal principle, an n-2 compressor modifies
by "n-2". The basic idea of Compressors used for the interconnection of the adjacent cells in the
accumulating and reducing partial products by reduction accumulation stage by means of one or more horizontal
of n operands to 2. For example, an 5:2 compressor paths defined as Cout1, Cout2, etc. These paths will
requires 5-2 full-adders i.e., 3-full-adder's.In a parallel transmit their logic value to the adjoining compressor
multiplier, the multiplication process is divided into three as Cin1, Cin2, etc. for the latter compressor.
steps. Considering the above, the focus in this article is to
improve the speed performance of n - 2 compressors
At first, the partial products (PPs) are generated.
by bringing up the carry rippling problem as a new design
Then these products are summed, and the process
consideration. Also, the fact that power and active area
continues until two rows remain. The final stage, the
164 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
on-chip should be comparable to the best-reported Table 1: Truth table for 4:2 compressor
designs is focused.
• Finally, for high performance and overall goal of power
minimization is to reduce system cost and ensure long-
term circuit reliability. These different requirements
impact how power optimization is addressed and how
much the designer is willing to sacrifice in cost or
performance to obtain lower power dissipation.
• Both critical path and power delay product can be
minimized by using the compressor techniques.
• Compressor technique also helps to reduce in the
number of required logic gates, which leads to the
efficient area. The optimized design of an exact 4:2compressor
2. LITERATURESURVEY based on the so-called XOR-XNOR gates; a XOR-
XNOR gate simultaneously generates the XOR and
D. Balobas and N. Konofaos, "Low-power high-
XNOR output signals. The design of consists of three
performance CMOS 5-2 compressor with 58
XORXNOR (denoted by XOR*) gates, one XOR and
transistorscomponents in the partial product reduction
two 2-1 MUX's. The critical path of this design has a
stage of CMOS multipliers. Simulation results show that
delay of 3, where is the unitary delay through any
the proposed 5:2 compressor has significantly improved
gate in the design.4:2 compressors are capable of
power-delay performance compared to previously
adding 4 bits and one carry, in turn producing a 3-bit
proposed approach.
output.
P. Saha, P. Samanta, and D. Kumar, "4:2 and 5:2
The common implementation of a 4:2 compressor
decimal compressors, having improved design and
is accomplished by utilizing two full-adder (FA) To add
architectures of 4:2 and 5:2 high speed compressor
binary numbers cells4:2 compressor is composed of
offered ~38% improvement in speed compared with
two serially connected full adders as shown in Fig.1With
the best reported architecture so far for 5:2 compressor.
minimal carry propagation delay of the circuits. We use
3. EXISTINGMETHOD: compressor adder instead of another adder.
4:2 COMPRESSOR: Compressor is a digital modern circuit for high speed
with minimum gates requires designing technique.
The common implementation of a 4:2 compressor
is accomplished by utilizing two full-adder (FA) cells.
Different designs have been proposed in the literature
for 4:2 compressor.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 165
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
• Two output bits Sum and Carry along with carry input The architecture for the 7:2 compressor has been
Cin, and carry output bits, Cout are generated. proposed to higher speed performance when compared
with the previous designs, the carry rippling between
• The output obtained is governed by the following adjacent blocks has been reduced by one stage.The
equation:
designed scheme, in which the latency from inputs to
I1+I2+I3+I4+Cin=Sum+2(Carry+Cout) outputs is reduced to less than four XOR logic
4. PROPOSED METHOD: gates.Also, driving problems are decreased
considerably by use of logic gates with no Threshold
PROPOSED 5:2 COMPRESSOR: problems.
166 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 167
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Fig 6:AreareportofProposedMethod
PERFORMANCE PARAMETERS:
SYNTHESIS REPORT OF PROPOSED
MULTIPLIER(DELAY):
168 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
7:2 compressors. The main advantage of the designed [4] J.HanandM.Orshansky,"Approximatecomputing: an emerging
paradigm for energy-efficient design,"in Proc.18th IEEE European
structures is the considerably lower delay in comparison Test Symposium, 2013.
with previously reported works. Thus, the proposed
[5] S. Venkataramani, S. Chakradhar, K. Roy and A. Raghunathan,
approach is significant for high speed improvement and "Approximate computing and the quest for computing efficiency,"
area efficiency in circuits. in Proc. 52nd Annual Design Automation Conference (DAC),
2015.Q. Xu, N. S. Kim and T.Mytkowicz, "Approximate
REFERENCES computing: asurvey," IEEE Design and Test, vol.33, no.1, pp.8-
22, 2016.
[1] D. Balobas and N. Konofaos, "Low-power high-performance
CMOS 5-2 compressor with 58 transistors components in the [6]G. Zervakis, K. Tsoumanis, S. Xydis, D. Soudris and K.Pekmestzi
partial product reduction stage of CMOS multipliers. Simulation ,"Design-efficient approximate multiplication circuits through
results show that the proposed 5:2 compressor has significantly partial product perforation, "2016.
improved power-delay performance compared to previously
[7] H.Jiang, J.Han.F.Qiao,.F.Lombardi, "Approximate radix-8 Booth
proposed approach.
multipliers for low-power and high performance operation," IEEE
[2] P. Saha, P. Samanta, and D. Kumar, "4:2 and 5:2 decimal Trans. Computers, vol. 65, pp. 2638-2644, Aug. 2016.
compressors, having improved design and architectures of 4:2
[8] W. Liu, L. Qian, C. Wang, H. Jiang, J. Han and F.Lombardi,
and 5:2 high speed compressor offered ~38% improvement in
"Design of approximate radix-4 booth multipliers for error-tolerant
speed compared with the best reported architecture so far for 5:2
computing," Aug. 2017.
compressor
[9] Y.Wang,H.Li,X.Li,"Real-timemeetsapproximate compureting: An
[3] N.Maheshwari,Z.Yang,J.HananF.Lombardi, "A design approach
elastic CNN inferenceaccelerator with adaptive trade-off be-
for compressor based approximate multipliers,"2015.
tween QoS and QoR," in Proc. 54th Annual Design Automation
Conference (DAC), 2017.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 169
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract - Every day social multimedia massive amounts of images. According to Instagram,
applications generate millions of images. To handle more than 100 million images are posted per day. Due
such huge amount of images, an optimal solution to the high storage costs, social service providers prefer
is using the public cloud, since it has powerful to outsource such massive number of images to public
storage capability. Images usually contain a wealth
cloud platforms such as Amazon Cloud. Images usually
of sensitive information, therefore social service
providers need not only to provide services such
contain sensitive information that could reveal personal
as retrieval and sharing but also to protect the privacies, and encryption is an effective method to
privacies of the images. A privacy-preserving protect privacy. Based on cryptography, a number of
scheme is proposed for content-based image privacy-preserving schemes that support remote image
retrieval and sharing in social multimedia retrieval and sharing have been proposed. The scheme
applications. First, the users extract visual features allows the image owners to outsource images to the
from the images, and perform locality-sensitive public cloud server, and outsource secure index to the
hashing functions on visual features to generate social service provider.
image problem vectors. The retrieval on the images
is then model as the equality search on the image A. Cloud Computing
problem vectors. To enable accurate and efficient Cloud computing is the on-demand availability
retrieval, the secure index structure is designed of computer system resources, especially data storage
based on cuckoo hashing, which has constant
(cloud storage) and computing power, without direct
lookup time. To meet the requirements of dynamic
active management by the user. The term is generally
image updating, this service is enriched with image
insertion and deletion. In order to reduce the key used to describe data centres available to many users
management overhead and the access control over the Internet. Large clouds, predominant today,
overhead in social applications, keys are processed often have functions distributed over multiple locations
using secret sharing techniques to enable the users from central servers. If the connection to the user is
holding similar images to query and decrypt images relatively close, it may be designated an edge server.
independently. Finally the prototype of the Clouds may be limited to a single organization (enterprise
proposed scheme is implemented, and perform clouds), or be available to multiple organizations (public
experiments over encrypted image databases. cloud).
Index Terms - image retrieval, cloud computing, B. Multimedia Cloud Computing
privacy preserving, secure AES.
Due to the invention of cloud computing, nowadays
I. INTRODUCTION
users can easily access the multimedia content over the
Due to the popularity of mobile devices with internet at any time. Here the user can efficiently store
cameras, such as mobile phones, tablets, sensors, and the multimedia content of any type and of any size in
etc., the number of images has grown tremendously. the cloud after subscribing it with no difficulties. Not
Specially, social multi-media applications, that provide only storing the media content like Audio, Video and
platforms to post and share multimedia, generate Image, but can process them within the cloud since the
170 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
computation time for processing media data is more in transmission. Security of data becomes a large concern
complex hardware. After processing the processed data to insure various attribute like integrity, confidentiality,
can be easily received from the cloud through a client authentication etc. cryptography techniques like DES,
without any need of installing complex hardware. Thus 3DES plays a major roles in protecting the data in those
Multimedia cloud computing is the processing, accessing application which are running in a network environment.
and storing of multimedia contents like audio, video and Many organisations and people store their important
image using the services and applications available in data on cloud and data is also accessed by many
the cloud without physically acquiring them. persons, so it is very important to secure the data from
II. LITERATURE REVIEW intruders.
X. Yuan, X. Wang, C. Wang, A. C. Squicciarini, Q. Zou, J. Wang, J. Ye, J. Shen, and X. Chen,
and K. Ren,toward privacy-preserving and practical efficient and secure encrypted image search in mobile
image-centric social discovery (2018): Images are cloud computing (2017): Mobile could computing
becoming one of the key enablers of user connectivity (MCC) is the availability of cloud computing services
in social media applications. Many of them are directly in the mobile ecosystem. MCC integrates the cloud
exploring image content to suggest new friends with computing into the mobile environment and has been
similar interests. To handle the explosive volumes of introduced to be a potential technology for mobile
images, one common trend is to leverage the public devices. Although mobile devices brought us lots of
cloud as their robust service backend. Despite the convenience, it is still difficult or impossible to perform
convenience, exposing content-rich images to the cloud some expensive tasks due to the limited resources such
inevitably raises acute privacy concerns. In this paper, as computing abilities, battery lifetime, processing
we propose a privacy-preserving architecture for abilities, and storage capacity. Therefore, many
image-centric social discovery services, designed to researchers focus on designing applications which could
function over encrypted images. We first adopt the run on mobile devices in mobile cloud computing.
effective Bag-of-Words model to extract the 'visual Among them, secure encrypted image search has
content' of users' images into respective image profile attracted considerable interest recently. However, it also
vectors. We then model the core problem as similarity suffers from some challenges such as privacy of images,
retrieval of encrypted high-dimensional vectors. To and distance matching over cipher texts. In this paper,
achieve scalable services over millions of encrypted we introduce a novel encryption search scheme for
images, we design a secure and efficient index structure, content-based image retrieval using comparable
which enables practical and accurate social discovery encryption and order-preserving encryption technology.
from the cloud, without revealing any image profile or Because of avoiding the usage of the homomorphic
image content. For completeness, we further enrich our encryption, our construction greatly reduces
service with secure updates, facilitating user's image computation overhead on client side and improves the
update. Our implementation is deployed at an Android precision of fuzzy search compared with previous
phone and Amazon Cloud, and extensive experiments solutions.
are conducted on a large Flickr image dataset which III. EXISTING METHOD
demonstrates the desired quality of services. Nowadays visual data is responsible for one of the
Tushar J Raval, Karishma A Choudhary, Pulatsya largest shares of global Internet traffic in both corporate
Kanasagara, review on Data Encryption Algorithm in and personal use scenarios. The amount of images,
Cloud Computing (2017): Cloud computing provides graphics, and photos being generated and shared every
an illusion to the customers of using infinite computing day is growing at an ever increasing rate. The storage
resources that are available from anywhere, any time needs for such large amounts of data has been a driving
on demand. Cloud computing provide secure data factor for data outsourcing services such as the ones
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 171
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
leveraging Cloud Storage and Computing solutions. vectors. Then model the retrieval on the images as the
Such services (e.g. Instagram and Flickr) have been equality search on the image problem vectors. To enable
reported to be among the largest growing internet accurate and efficient retrieval, we design the secure
services. Additionally, the availability of large amounts index structure based on cuckoo hashing, which has
of images in public and private repositories naturally constant lookup time. To meet the requirements of
leads to the need for content-based image retrieval dynamic image updating, the service is enriched with
(CBIR) solutions. Content-based means that the search image insertion and deletion. In order to reduce the
analyses the contents of the image rather than the key management overhead and the access control
metadata such as keywords, tags, or descriptions overhead in social applications, the keys are processed
associated with the image. The term content in this using secret sharing techniques to enable the users
context might refer to colours, shapes, textures, or any holding similar images to query and decrypt images
other information that can be derived from the image independently.
itself. CBIR is desirable because searches that rely The contributions of this method can be summarized
purely on metadata are dependent on annotation quality as follows
and completeness. The most common method for
comparing two images in content-based image retrieval • A privacy-preserving content-based image retrieval
(typically an example image and an image from the and sharing scheme for social multimedia applications.
database) is using an image distance measure. An image The scheme allows the image owners to out- source
images to the public cloud server, and outsource secure
distance measure compares the similarity of two images
index to the social service provider.
in various dimensions such as colour, texture, shape,
and others. • The scheme is constructed under a stronger and more
realistic threat model that the social service provider
The proposals that support outsourced storage, is not a completely trusted entity. The social service
search and retrieval of images in the encrypted domain provider is allowed to acquire a part of the users'
can be broadly divided in two classes: Searchable information, but it cannot be trusted to store the keys.
Symmetric Encryption (SSE) based approaches and
• The scheme greatly simplifies access control and key
Public-Key partially-Homomorphic approaches
management in multi-user social applications. The
(PKHE). SSE has been widely used in the past by the users holding similar images are allowed to submit
research community, both for text and image search/ the retrieval queries, and decrypt the query results
retrieval. In SSE-based solutions, clients process and on their own.
encrypt their data before outsourcing it to the Cloud.
• A secure index is designed that provides efficient
From this processing, an index is created, encrypted,
retrieval service for large image set. The index
and stored in the outsourced infrastructure, which allows
requires constant lookup time and supports dynamic
clients to search their data efficiently and in a secure image updating.
way. Data is typically encrypted with a probabilistic
symmetric-key encryption scheme, while the index is
protected through a combination of probabilistic and
deterministic (or even order-preserving) encryption.
IV. PROPOSED METHOD
A privacy-preserving scheme is proposed for
content-based image retrieval and sharing in social
applications. First, the users extract visual features from
the images, and perform locality-sensitive hashing
functions on visual features to generate image problem
172 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Module Description
Data owner: • Data Owner have to register first. •
Login the correct username and password. • Upload
the files to the cloud in encrypted format with file private
and trapdoor key by using fuzzy logic for key generation
and AES algorithm for encryption & decryption. View
user request then accept and reject. • Manage the file.
• Logout
Data user: • Register their own details. • Login Fig. 2AES Bit Diagram.
their correct user name and password. • Search Files, VII. CONCLUSION
User can view the all image in decrypted format, then
A privacy- preserving content-based image retrieval
sends the request to the Data owner. • View Request
and sharing scheme is proposed and implemented,
Status Waiting or Accept.• Download Files by using
which can be used for friend recommendation in social
the file private & trapdoor key, user can download the
multimedia applications. The image similarity is measured
files in decrypted format. • Logout
through image visual features. To reduce the
Cloud: •View all registered Data Owners. • View dimensionality of visual features the leash is used and
all registered Data Users. •View all Data owner accept realize similarity search on visual features. The index is
file then, key send to user mail id. • Result- Generate designed based on cuckoo hashing to speed up the
the result based on the file request counts. • Throughput similarity search. Based on secret sharing, the user is
Result- calculate the throughput of all the image allowed to query and recover images on his own, which
Download to the cloud. • Logout eliminates key management overhead and access control
VI. ALGORITHM USING ADVANCED overhead compared with other schemes. Finally, a
ENCRYPTION STANDARD(AES) prototype is implemented to evaluate the efficiency of
the proposed scheme. The results showed that this
In 1997, the U.S. National Institute for Standards scheme achieves practical performance under the UK
and Technology (NIST) put out a public call for a Bench database. In future the plan is to explicitly address
replacement to DES. It narrowed down the list of orthogonal issues in our design, such as key sharing,
submissions to five finalists, and ultimately chose an user access control, and reliability issues. Also the plan
algorithm that is now known as the Advanced is to investigate the applicability of this methodology -
Encryption Standard (AES). The more popular and
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 173
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
i.e., the separation of information contexts when [7] X. Yuan, X. Wang, C. Wang, A. C. Squicciarini, and K. Ren,
``Towards privacypreserving and practical image-centric social
processing data (colour and texture in this paper) - in discovery,'' IEEE Trans. Dependable Secure Comput., vol. 15,
other domains beyond image data. no. 5, pp. 868_882, Sep. 2018.
174 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract-A floating-point unit (FPU) is a math 1) Sign, 2) Exponent, and 3) Significand. Sign Bit : A
coprocessor, a part of a computer system specially positive number is denoted by "0" a negative number is
designed to carry out operations on floating point denoted by "1". By changing the value of this bit, change
numbers. The term floating point refers to the fact the sign of the number. Exponent Field : Positive and
that the radix point can "float"; that is, it can placed
Negative both the numbers are represented by the
anywhere with respect to the significant digits of
the number. Double precision floating point, also
exponent field. For doing this, a bias is added to the
known as double, is a commonly used format on actual exponent in order to get a stored exponent. The
PCs due to its wider range over single precision in exponent field is 8 bits wide according to the 32-bit
spite of its performance and bandwidth cost. This floating point unit and is of 11 bit wide according to the
paper aims at developing the double precision 64-bit floating point unit. This field contain an
floating point core designed to meet the IEEE 754 exponential with a base of 2 for binary and 10 for
standard .This standard defines a double as sign decimal. The Significand Bit: The significand, is also
bit, exponent and mantissa. The aim is to build an called as mantissa, represent the precision bits of the
efficient FPU that performs basic functions with number. It contained the fraction bits and an implicit
reduced complexity of the logic used and also leading bit. The significand needs to be normalized in
reduces the memory requirement as far as possible.
order to attain the form of 1.xxx, so that MSB is always
Key words:
"1". IEEE-754 Layout for Single & Double Precision
Keywords- FPU, Double precision floating point Floating Point Values
I. INTRODUCTION 2. Representation of a Number into Floating
An Arithmetic circuit has multiple applications in Point Number:
digital coprocessors, microprocessors and in For an example, how would the number 3.5 be in a
application specific circuits because they performs the double precision floating point format?
digital arithmetic operations. In modern era as the size
of chip is decreasing and density increasing power and
speed are the most significant parameters for any VLSI
design. IEEE -754 Floating-Point Standard through
which the floating point operations carried out efficiently
with modest storage requirements is the most popular
code introduced in 1990, for representing the floating
point numbers. Here Double Precision arithmetic units
• Here the given number is positive so the sign bit will
are designed in which 64- bit is given as input and by
be '0' (63- bit will be 0)
using this Double Precision accuracy of the system will
be increased. • In next step 3.5 can be converted as (1.75) * 2^(1).
The exponent offset is 1023, so you add 1023 + 1 to
1. Floating-Point Numerical Representation: calculate the value for the exponent field. Therefore,
The floating-point number consists of three parts: bits 62-52 will be "1000000000".
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 175
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
The mantissa corresponds to the 1.75, which is requires whose bits may be represented as numbered
multiplied by the power of 2 (2^1) to get 3.5. The from 0 to 63, left to right. Pipelining concept also
leading '1' is implied in the mantissa but not actually introduced in the proposed method for transfer of
included in the 64-bit format. So .75 is represented by information.
the mantissa. Bit 51, the highest bit of the mantissa,
corresponds to 2^(-1). Bit 50 corresponds to 2^(-2),
and this continues down to Bit 0 which corresponds
carry" will always refer to such adders). Implicit in this normalised. More specifically, setting aside SR=0, there
is also the identification of the larger of the two are three cases: (a) SR is normalised (b) SR is
exponents, and this provisionally becomes the exponent subnormal and requires a left shift by one or more places
ER of the result. The relation between the two operands and (c) SR is supernormal and requires a right shift by
A and B is determined based on the relation between just one place. For the first two cases, a leading-1
EA and EB and by comparing the significands SA and detection component examines SR and calculates the
SB, which is required if EA=EB. This significand appropriate normalisation shift size, equal to the number
comparison deviates from the generic algorithm given of 0 bits that are above the leading-1. Figure 2 shows a
earlier but has certain advantages, as will be seen. The straightforward design for a leading-1 detector. The 56-
significand comparator was implemented using seven bit leading-1 detector is comprised of seven 8-bit
8- bit comparators that operate in parallel and an components and some simple connecting logic.
additional 8-bit comparator which processes their For the final normalisation case, i.e. a supernormal
outputs. All the comparators employ the fast carry logic SR in the range [2,4), the output of the leading-1
of the device. If B>A then the significands SA and SB detector is overridden. This case is easily detected by
are swapped Both significands are then extended to monitoring the carry-out of the significand adder. Finally,
56 bits, i.e. by the G, R and S bits as discussed earlier, if SR=0
and are stored in registers. Swapping SA and SB is
A B
equivalent to swapping A and B and making an Operation
Unpack
adjustment to the sign sR. This swapping requires only sA
sB EA EB SA SB
multiplexers. In the second cycle, the significand
EB>EA
alignment shift is performed and the effective operation Effective
Operation
ExponentSwap
Difference
EB=EA Logic
is carried out. The advantage of swapping the ER |EA–EB|
B=A B>A
significands is that it is always SB which will undergo
Sign Logic Swap
the alignment shift. Hence, only the SB path needs a
sR
shifter. A modified 6-stage barrel shifter wired for Align
Adjust
value that is in the sticky bit position of the output pattern. ER
Rounding
The barrel shifter is organised so that the 32-bit stage Control SR
normalised, then it passes straight through the shifter Calculate the exponent of the result as ER=EA+EB-
unmodified Ebias. Multiply SA and SB to obtain the significand SR
If SR is subnormal, it is shifted right and rotated by of the result. Normalise SR, adjusting ER as
the appropriate number of places so that the appropriate, and round SR, which may require ER to
normalisation left shift can be achieved. If SR is be readjusted. After addition and subtraction,
supernormal, it is right shifted by one place, feeding a 1 multiplication is the most frequent operation in scientific
at the MSB, and the sticky bit S is recalculated. The computing. Thus, our double precision floating-point
output of the shifter is the normalised 56-bit SR with multiplier aims at a low implementation cost while
the correct values in the G, R and S positions. Then, maintaining a low latency, relative to the scale of the
rounding is performed as discussed earlier. The rounding significand multiplication involved. The circuit is not
addition is performed by the significand adder, with SR pipelined and with a latency of ten cycles. Unlike the
on the SB path The normalised and rounded SR is given floating-point adder which operates on a single clock,
by the top 53 bits of the result, i.e. MSB down to the L this circuit operates on two clocks; a primary clock
bit, of which MSB will become hidden during packing. (CLK1), to which the ten cycle latency corresponds,
A complication that could arise is the rounding addition and an internal secondary clock (CLK2), which is twice
producing the significand SR=10.000…000. However, as fast as the primary clock and is used by the
no actual normalisation takes place because the bits significand multiplier. Figure 3 shows the overall
MSB-1 down to L already represent the correct fraction organisation of this circuit.The first CLK1 cycle, the
fR for packing. Each time SR requires normalisation, operands A and B are unpacked and checks are
the exponent ER needs to be adjusted. This relies on performed for zero, infinity or NaN operands. For now
the same hardware used for the processing of EA and we can assume that neither operand is zero, infinity or
EB in the first cycle. One adder performs the adjustment NaN. The sign sR of the result is easily determined as
arising from the normalisation of SR. If SR is normalised, the XOR of the signs sA and sB. From this point, A
ER passes through unmodified. and B can be considered positive. As the first step in
the calculation of ER, the sum EA+EB is calculated
If SR is subnormal, ER is reduced by the left shift using a fast ripple- carry adder.
amount required for the SR normalisation. If SR is
supernormal, ER is incremented by 1. The second In the second CLK1 cycle, the excess bias is
cascaded adder increments this result by 1. The two removed from EA+EB using the same adder that was
results are multiplexed. If the rounded SR is used for the exponent processing of the previous cycle.
supernormal then the result of the second adder is the This completes the calculation of ER. The significand
correct ER. Otherwise, the result of the first adder is multiplication also begins in the second CLK1 cycle.
the correct ER. The calculation of the sign SR is Since both SA and SB are 53-bit normalised numbers,
performed in the first cycle and is trivial, requiring only SR will initially be 106 bits long and in the range [1,4).
a few logic gates. Checks are also performed on the The significand multiplier is based on the Modified
final ER to detect an overflow or underflow, whereby Booth's 2-bit parallel multiplier recoding method and
R is forced to the appropriate patterns before packing. has been implemented using a serial carry-save adder
Another check that is performed is for an effective array and a fast ripple-carry adder for the assimilation
subtraction with A=B, whereby R is set to a positive of the final carry bits into the final sum bits.
zero, according the IEEE standard. Finally, infinity or
NaN operands result in an infinity or NaN value for R
according to a set of rules.
b. Multiplication
The most significant steps in the calculation of the
product R of two numbers A and B are as follows.
178 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
require ER to be readjusted. Our double precision place. The divisor SB is subtracted from the remainder
floating-point divider Exponent Subtract EA EB Add for the calculation of MSB-1 and so on. The significand
Bias Significand Divide SA SB Sign Logic sA sB EA- divider calculates one SR bit per cycle and its main
EB ER SR Normalise Exponent Adjust ER SR components are two registers for the remainder and
Exponent Adjust SR Rounding Control Round ER s A, the divisor, a fast ripple-carry adder, and a shift register
B = 0 , R ∞ , NaN Unpack Pack A B R Figure 4. for SR. The divider operates for 55 cycles, i.e. during
Floating- pointdivider aims solely at a low the cycles 2 to 56, and produces a 55-bit SR, the two
implementation cost. A non-pipelined design is adopted, least significant bits being the G and R bits. In cycle 57,
incorporating an economic significand divider, with a the sticky bit S is calculated as the OR of all the bits of
fixed latency of 60 clock cycles. Figure 4 shows the the final remainder. Since both SA and SB are
overall organisation of this circuit. In the first cycle, the normalised, SR will be in the range (0.5,2), i.e. if not
operands A and B are unpacked For now, we can already normalised, it will require a left shift by just one
assume that neither operand is zero, infinity or NaN. place. This normalisation is also performed in cycle 57.
The sign sR of the result is the XOR of sA and sB,. As No additional hardware is required, since SR is already
the first step in the calculation of ER, the difference stored in a shift register. If SR requires normalisation,
EA-EB is calculated using a fast ripple-carry adder. In the exponent ER is incremented by 1 in cycle 5. This
the second cycle, the bias is added to EA-EB, using exponent adjustment is performed using the same adder
the same exponent processing adder of the previous that is used for the exponent processing of the previous
cycle. This completes the calculation of ER. The cycles. Also in cycle 58, SR is transferred to the divisor
significand division also begins in the second cycle. The register, which is connected to the adder of the
division algorithm employed here is the simple non- significand divider. In cycle 59, the 56-bit SR is rounded
performing sequential algorithm and the division to 53 bits using the significand divider adder. For a
proceeds as follows. First, the remainder of the division supernormal SR after rounding no normalisation is
is set to the value of the dividend SA. The divisor SB is actually required but the exponent ER is incremented
subtracted from the remainder. by 1 and this takes place in cycle 60 and using the
same adder that is used for the exponent processing of
the previous cycles. Checks are also performed on ER
for an overflow or underflow, whereby the result R is
appropriately set before packing. As for zero, infinity
and NaN operands, R will also be zero, infinity or NaN
according to a simple set of rules.
IV. SIMULATION RESULTS
182 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
However, the longer carry propagation delay in the The Han-Carlson adder provides a reasonably good
ripple-carry stage of CS3A seriously influences the speed at low gate complexity as compared to other
performance cryptography architectures. existing techniques. It has the lowest area delay product
It computes the addition of three operands in two (ADP) and power-delay product (PDP) among all.
stages. The first stage is the array of full adders. Each Thus, the three-operand addition can be performed
full adder computes "carry" bit and "sum" bit using Han-Carlson adder (HCA).The proposed VLSI
concurrently from three binary input ai, bi and ci. The architecture of the three-operand binary adder and its
second stage is the ripple-carry adder that computes internal structure is shown in Fig. 2. The new adder
the final n-bit size "sum" and one-bit size "carry-out" technique performs the addition of three n-bit binary
signals at the output of three-operand addition. The inputs in four different stages. They are. Bit addition
"carry-out" signal is propagated through the n number logic, Base logic, PG (propagate and generate) logic.
of full adders in the ripple-carry stage. Therefore, the Sum logic.
delay increases linearly with the increase of bit length.
The architecture of the three-operand carry-save adder
is shown in Fig. 3 and the critical path delay is highlighted
with a dashed line. It shows that the critical path delay
depends on the carry propagation delay of ripple carry
stage.
In this work, we study the computation of this
operation on a twisted Edwards curve with an efficiently
computable endomorphism, which allows reducing the
number of point doublings by approximately 50 percent
compared to a conventional implementation.
Figure 1. Three-operand carry save adder (CS3A). Figure 2. Proposed three-operand adder; (a) First order VLSI
architecture, (b) Logical diagram of bit addition, base logic,
DISADVANTAGE OF EXISTING METHOD sum logic, black-cell and grey-cell.
1. More area and critical path delay In the first stage (bit-addition logic), the bitwise
addition of three n-bit binary input operands. Array of
2. Delay increases linearly full adders, and each full adder computes "sum" and
3. Less performance. "carry" signals. The logical diagram of bit addition logic
IV. PROPOSED METHOD is shown in Fig. 2(b).The first stage output signal "sum"
bit of current full adder and the output signal "carry" bit
In order to shorten the critical path delay, The Han- of its right-adjacent full adder are used together to
Carlson (HCA) Adder can be used for three-operand compute the generate and propagate signals in the
binary addition. second stage (base logic).
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 183
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
184 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
D. PG LOGIC
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 185
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
REFERENCES
[1] M. M. Islam, M. S. Hossain, M. K. Hasan, M. Shahjalal, and Y.
M. Jang, "FPGA implementation of high-speed area-efficient
processor for elliptic curve point multiplication over prime field,"
IEEE Access, vol. 7, pp. 178811-178826, 2019.
[2] Z. Liu, J. GroBschadl, Z. Hu, K. Jarvinen, H. Wang, and I.
Verbauwhede, "Elliptic curve cryptography with efficiently
computable endomorphisms and its hardware implementations
for the Internet of Things," IEEE Trans. Compute., vol. 66, no.
5, pp. 773-785, May 2017.
[3] Z. Liu, D. Liu, and X. Zou, "An efficient and flexible hardware
implementation of the dual-field elliptic curve cryptographic
processor," IEEE Trans. Ind. Electron., vol. 64, no. 3, pp. 2353-
2362, Mar. 2017.
[4] B. Parhami, Computer Arithmetic: Algorithms and Hardware
FIGURE 13 SCHEMATIC DIAGRAM OF PROPOSED Design. New York, NY, USA: Oxford Univ. Press, 2000.
TECHNIQUE
[5] P. L. Montgomery, "Modular multiplication without trial
VII. PARAMETER ANALYSIS division," Math. Comput, vol. 44, no. 170, pp. 519-521, Apr.
1985.
TABLE 1: PARAMETER ANALYSIS
[6] S.-R. Kaung, K.-Y. Wu, and R.-Y. Lu, "Low-cost high-performance
TECHNIQUE AREA DELAY VLSI architecture for Montgomery modular
EXISTING(CSA) 2600 5.4 ns
PROPOSED(USING HAN 2426 3 ns
CARLSON ADDER)
VIII. CONCLUSION
In this project, a high-speed area-efficient adder
technique and its VLSI architecture is proposed to
perform the three-operand binary addition for efficient
computation of modular arithmetic used in cryptography
and PRBG applications. The proposed three-operand
adder technique is a parallel prefix adder that uses four-
stage structures to compute the addition of three input
operands.
IX. FUTURE WORK
In the future work, to improve the performance by
reducing the delay of present work, we have to
investigate for the selective type of adder like
Speculative Han-Carlson adder. Prepositional phrases.
186 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- Researchers have widely used Fuzzy deep learning [3],and SVM [5]. Wender et al.
statistical and machine learning techniques to [3] reported that lung cancer as a serious killer disease
construct prediction models inseveral domains in the world mainly in America and East Asia.
such as prediction of software faults, spamdetection, Moreover, the authors presented that lung cancer
disease diagnosis, and financial fraud identification.
patients are 25% higher than patients of other cancer
The prediction of patients prone to lung cancer can
help doctors in their decision making regarding types such as breast cancer and blood cancer. The
their treatments. In this regard, this research paper tumor movements are divided into two parts intra-
attempts to evaluate the discriminative power of fractional variation and inter-fractional variation. Intra-
several predictors in the study to increase the fractional works in single treatmentsessions and inter-
efficiency of lung cancer detection through fractional arises between different sessions.
theirsymptoms. A number of classifiers including Consequently, we evaluate the discriminative power of
Support Vector Machine (SVM), C4.5 Decision certain predictors used to improve the accuracy of the
tree, Multi-Layer Perceptron,Neural Network, and prediction model. The layout of an ensemble-based
Naïve Bayes (NB) are evaluated on a bench mark approach is shown inFigure 1.
dataset obtained from UCI repository. The
performance is also compared with well-known The dataset was retrieved from the UCI repository.
ensembles such as Random Forest and Majority Firstly, the effectiveness of Naïve Bayes(NB), Random
Voting. Based on performance evaluations, it is Forrest(RF), Support Vector Machine (SVM), and
observed that Gradient-boostedTree outperformed MLP is assessed in terms of accuracy and f-measure.
all other individual as well as ensemble classifiers Secondly, a majority voting based ensemble of top-3
and achieved 90% accuracy. best performing classifiers is constructed to predict lung
Keywords: Machine Learning, Prediction, cancer.
Performance, Ensembles
Research Contributions:
1. INTRODUCTION
The major contributions of this research areas follows
In 2012, a survey was conducted, which reports
• Identification of well-known classifiers and ensemble
[1] 1.6 milliondeaths and 1.8 million new cases of lung approaches utilized for lung cancer prediction
cancer patients. Lungcancer is common in both gender
of US and reported as moredangerous as compared • Computation of results over benchmark dataset
to other types of cancer. Only 15% of cases are obtained from UCI repository
detected at the early stage. The most common symptom, • Proposed a majority voting based ensemble based on
i.e. smoking, is reported for lung cancer patients but top-3 best performing individual classifiers
not all patients involve this symptom. However, several • Comparison and evaluation of results which show that
symptoms of lung cancer patients such as their smoking Gradient-boosted Tree outperformed all another
ratecan help to detect the lung cancer patient at the individual as well as ensemble classifiers
early stage.Though,the research community has used
certain machine learning techniques such as GEP [2], • Achieved 90% accuracy for lung cancer identification
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 187
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
The remaining part of the study is structured in four authors proposed a model for the diagnosis of lung
sections. In the second section, we present related cancer from microarray data. In GEP model,SVM and
work. The third section presents the experimental Neural network models were used to predict lung
procedure whereas the results are discussed in the fourth cancer and effective results were produced.
section. Finally, in the fifth section, we present Wender et al. [6] used fuzzy deep learning to predict
conclusions of our work. tumor movements which helped to increase the delivery,
reduce and accurate application of the radiation and
less damage to the healthy tissues during the
radiography[7-8]. Karakachetal.
[9] suggest micro array analysis as a tool to diagnose
diseases. This tool becomes functional by implementing
SVM. Due to variations in lung cancer symptoms, its
treatment becomes difficult for patients. Data mining or
machine learning tool can be more effective to use when
these symptoms are utilized as features andpredict lung
cancer patients in the early stage[10].
It is evident from the state of the art literature review
that lung cancer has achieved much attention from the
researcher community. A number of approaches have
been proposed which need to evaluated and compared
Figure1:Overview of Ensemble-based Approach for lung cancer prediction [11-14]. This research is
2. RELATED WORK focused on assessing such approaches in order to
conclude the best methodology for lung cancer
Like other domains, researchers have successfully detection.
implemented the machine and statistical learning
techniques to construct prediction models in the context 3. PROPOSED METHODOLOGY
of certain diseases such as lungs cancer. The proposed methodology starts with data
For diagnosing lung cancer, authors [2] performed acquisition whichis followed by pre-processing. The
some testson DNA and proteins to identify a tumor in selected classifiers are thentrained and tested on the
earlier stages. In this study, the author reports the best benchmark dataset using standard 10-fold cross-
results of GEP as compared to other classifiers. Li et validation approach. The results are computed
al. [4] reported that lung cancer may affect one or both andevaluated to identify the best methodology for lung
lungs. Moreover, the authors listthe symptoms of lung cancerdetection. An overview of the proposed
cancer as chest pain, chronic cough, difficulty breathing approach is given in Figure 2.
and sudden weight loss. These symptomscan be 3.1 DataAcquisition
diagnosed in an early stage. If treatment can be started
In this paper, we used a dataset namely Lung
in a nearly stage, it can help patients recover. Like other
Cancer which isretrieved from the UCI online
studies, Kourou et al. [5] also investigated that lung
repository. The dataset has 32instances and 57
cancer is an important reason for cancer-related deaths
attributes, 1 class attribute, and 56 predictive attributes.
around the world. If it is identified in the early stage
then patients can be treated effectively. Subsequently,
authors reported that Micro array technology is the best
way to diagnose the lung cancer. In this regard, the
188 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
3.3 MajorityVotingbasedEnsemblemethod
We constructour approach via theuseof awidely use
ensemble technique namely majority voting. The voting
ensemble technique is a common example of the multi-
expert approach, which helps to combine the classifiers
in a parallel fashion. Subsequently, each classifier trained
on all data and contributes to a decision. Finally, the
voting technique helps to generate the final solution[13,
14].
4. RESULTS, EVALUATION, AND
DISCUSSION
Figure2:Overviewofthe Proposed Approach
Firstly, we compare the performance of base-level
The main objective of our proposed study is to classifiers to each other. The outcomes are shown in
investigate and measure the effectiveness of different Table1.
base level predictors and well-known ensemble
methods such as Random Forest and Majority Voting. 4.1 Performance and Validation measures
In this study, Rapid Miner tool was utilized to perform In this paper, we perform 10-fold cross-validation
experiments with base level classifiers namely Naïve and used performance measures such as Precision,
Bayes (NB), Support Vector Machine(SVM), Neural Recall, F-measure, and Accuracy to determine the
Networks, Multi-Layer Perceptron, Decision Tree and effectiveness of the proposed approach.
Gradient-boosted DecisionTree. Random Forest and
4.2 Workflow
Majority Voting based ensembles are also evaluated
using the same tool. We performed several experiments. However, work
flow of experiments is generalized and can be shown
3.2 BaselevelClassifier/Predictors
through the following steps
The selection of these base-level classifiers depends
Step-1: Extraction of datasets through an online
on certain aspects, such as they're widely used in the
repository.
context of disease prediction. The short description of
base level classifiers namely Naïve Bayes (NB), C4.5 Step-2:Application of pre-processing for data
Decision Tree, and Support Vector Machine (SVM) cleaning.
[11,12] is as follows. Step-3: Standard 10-fold cross validation is applied
• Naïve Bayes (NB): NB classifier is based on the for training and testing.
Naïve Bayes theorem and works according to the Step-4: Computation of results for all individual
probability of events. The core assumption of NB is classifiers.
that all attributes are independent.
Step-5: Select top-3 classifiers based on the
• Support Vector Machine (SVM): SVM is a
performance measure such as accuracy and compose
classifier which constructs a decision area beside a
margin via the nearest data points. majority voting based ensemble.
• C4.5 Decision Tree: It produces a set of rules. Step-6: Compute results for Random Forest and
Classification decisions can be functional via these Majority Voting based ensemble.
rules. This classifier utilizes the concept of information Step-7: Performance comparison is conducted for
entropy. all individual as well as ensemble classifiers in order to
identify the best classifier for lung cancer detection.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 189
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
The results indicate that SVM and C4.5 Decision [2] Yu,Z.,Chen,X.Z.,Cui,L.H.,Si,H.Z.,Lu,H.J.,&Liu,S. H.(2014).
Prediction of lung cancer based on serum bio markers by gene
Tree is out performed with a minor difference interms expression programming methods. Asian Pacific Journal of Cancer
of F-measure. Similarly, interms of accuracy, SVM out Prevention, 15(21), 9367-9373.
performed the rest of predictors. [3] Wender, R., Sharpe, K. B., Westmaas, J. L., & Patel, A. V.(2016).
The American Cancer Society's approach to addressing the cancer
Subsequently, to achieve our research aim and burden in the LGBT community, 3(1),15-18.
investigate the performance of ensemble methods in the
[4] Li,Y.,Qiu,C.,Tu,J.,Geng,B.,Yang,J.,Jiang,T.,&Cui, Q.(2013).
context of lungs cancer prediction, the results are HMDDv2.0:a database for experimentally supported human
computed for Random Forest and Majority Voting micro RNA and disease associations. Nucleic acids research,
based ensemble. The results indicate that the majority 42(D1), D1070-D1074.
voting based ensemble out performed all other [5] Kourou,K.,Exarchos,T.P.,Exarchos,K.P.,Karamouzis, M.V.,&
Fotiadis,D.I.(2015). Machine learning applications in cancer
classifiers except Gradient Boosted Tree which prognosis and prediction. Computational and structural
performed best overall to achieve 90% accuracy. biotechnology journal,13,8-17.
In this research, we also found some threats. The [6] Wender, R., Sharpe, K. B., Westmaas, J. L., & Patel, A. V.(2016).
The American Cancer Society's approach to addressing the cancer
first threatis related to a generalization of results since burden in the LGBT community. LGBT health, 3(1),15-18.
we performed our experiments on a single dataset.
[7] Hussain.S, Keung.J, Khan.A.A., Performance evaluation of
Consequently, the result may vary if we consider several ensemble methods for software fault prediction, An experiment,
experiments with different datasets. The secondly Proceeding of ASWEC,2015.
related threat to the selection of one ensemble [8] Hussain.S, Asghar. Z, Ahmad. B, Ahmad. S., A step towards
technique. We report the results according to the software corrective maintenance using RCM model, International
Journal of Computer Science and Information Security, 4(1),2009.
functionality of the majority voting method.
[9] Karakach,T.K., Flight, R.M., Douglas,S.E., &Wentzell, P. D.
5. CONCLUSIONSANDFUTUREWORK (2010). An introduction to DNA microarrays for gene expression
analysis. Chemo metrics and Intelligent Laboratory
The focus of this research is an evaluation of machine Systems,104(1),28-52.
learning classifiers as well as ensembles for lung cancer [10]Marusyk,A.,Almendro,V., &Polyak,K.(2012).Intra-tumour
detection. For this purpose, individual classifiers heterogeneity: a looking glass for cancer?. Nature Reviews-Cancer,
including MLP, Neural Network, Decision Tree, Naïve 12(5),323.
Bayes, Gradient Boosted Tree, and SVM are assessed. [11]Hussain. S, Saqib. S. M., Ahmad. B, Ahmad. S., Mapping of
Random forest and majority voting based ensembles SOA and RUP : DOA as case study, Journal of Computing,
2(1),2010.
are also analyzed for lung cancer prediction. It i
[12]Hussain. S, Threshold analysis of design metrics to detect design
sobserved that Gradient Boosted Tree out performed flaws, Proceeding ofACMSAC, 2016.
all other individual and ensemble classifiers. In the future,
[13]Zeng,X., Zhang,X., & Zou,Q.(2015). Integrative approaches for
we plan to evaluateother lung cancer and different predicting micro RNA function and prioritizing disease-related
disease datasets. Similarly, other ensemble technique micro RNA using biological interaction networks. Briefings in
like Stacking, A daboost, and Bagging will be analyzed. bio informatics, 17(2), 193-203.
[14]Yu, H. L., Gao, S., Qin, B., & Zhao, J. (2012). Multi class micro
array data classification based on confidence evaluation. Genetics
and molecular research: GMR, 11(2),1357-1369.
190 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- Ultrasound imaging is one of the Machine (SVM) algorithm of machine learning with a
available imaging techniques used for diagnosis of kernel function.
kidney abnormalities like change in shape and
position, swelling of limb and formation of stones. Limitations of Ultrasound Images:
One of the major downsides of involving ultrasound Even though, ultrasound imaging plays an important
images in medical analysis is the prevalence of role to detect and locate the position of the kidney stone
speckle noises. This challenge is overcome by as primary diagnosis technique. Apart from that, it is
employing suitable image processing techniques
widely used because of its low cost as well as it is
using a SVM classifier. The algorithm is designed
by employing the MATLAB image processing tool. radiation free, safe and manageable diagnosis
The percentage accuracy of the proposed algorithm assistance. Moreover, it is also necessary to identify
is 94.12 percent. The accuracy of artifacts detection the exact and precise location of kidney stone during
and less complex procedure of operation makes surgical processes. So, there is need of superior image
this algorithm a prominent contender for various quality to extract related features. But entry of noise
health applications related to ultrasound imaging. into these images as well as having low contrast and
This research provides an understanding of the other artifacts generate various problems. Moreover,
detection of kidney stones in ultrasound images there are three types of noises as (a) Impulsive noise,
with the help of a SVM classifier. also called salt and paper noise, which is caused by
Keywords - Ultrasound imaging, Image error in data transmission, memory location problem
processing or error in timing for digitization, (b) Additive Noise
I. INTRODUCTION (Gaussian noise) is arising from electronic noise in the
image acquisition system, (c) Multiplicative noise
Ultrasound imaging technique has been extensively (Speckle) is unsystematic in nature and it is main issue
used in the field of medical imaging and the diagnosis of in ultrasound images. The proper balance between noise
various diseases. The main drawback of medical reduction and image quality enhancement should be
ultrasonography is its average quality of images that are made so that essential features are not affected.
prone to be affected by speckle noises. Since the
underlying structures of Kidney are usually too small to Speckle Noise:
be resolved by such large ultrasound wavelengths, the Speckle noise is an unsystematic and multiplicative
presence of such noises is highly undesirable as it in nature as well as it is a signal dependent noise which
deteriorates the image and thus makes the tasks of degrades the original image. To degrade the image, this
human interpretation and diagnosis a tougher one. This noise changes some pixels of the original image with
work divides into two portions. In the rudimentary new pixels. These new pixels contain luminance values
portion, Image pre-processing and segmentation have which are almost equal to the minimum or maximum of
been applied to reduce noise and exaggerate the image. the allowable dynamic luminance range. Speckle noise
In the second portion, we extract the involved features removes significant information from image as edge,
to classify the stones with the help of the Support Vector shape, intensity value and may lead to the identification
problem for the doctors. Moreover, speckle noise can
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 191
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
192 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
196 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
CONCLUSION
This project is primarily concerned with the
application of the SVM in order to considerably
improve the prediction capacity for the detection of
kidney stones. The proposed methodology possesses
the highest accuracy of over 94.12% that makes it
Figure: 3(a) Ultrasound image (b) Enhanced processed image readily usable after the clinical observations. Even
(c) Resultant image
though, the parameter values had been fine-tuned so
Similarly, the process for analyzing the other is image that the classifier exhibits a better accuracy only limited
shown in figure 4. Figure 4(a) shows the other for the trained dataset, in real time applications, the
ultrasound images and its processed version is shown classifier may undergo processing real time acquired
in figure 4(b). Figure 4(c) illustrates the resultant image subjects that are not trained and are naturally dynamic
which is obtained after iteration process. The algorithm as well. This demands a fast and effective SVM
was tested with approximate ten different ultrasound parameter optimization method.
images depicting disorders in abdominal/pelvic regions
like kidney, gallbladder etc. It was found to be accurate FUTURE SCOPE
in highlighting the artifacts with great precision. In future, local features such as LBP, SURF and
Hence, the proposed algorithm provides a mean SIFT features will be considered and experimented with
which may prove to be helpful for the doctors to some advanced classifiers like Deep Learning. Also,
concentrate only on the area of interest and artifacts in the works will also be carried out to translate these
the ultra sound images. The accuracy and complexity algorithms into a software toolbox that could finally be
of the algorithm is optimum which can be improved distributed among physicians for their fieldwork and
further. feedbacks.
REFERENCES
[1] Manjunath, S.Pande, & Raveesh, "Computer aided system for
diagnosis of kidney stones using neural networks", International
journal of current engineering and scientific research (ijcesr), Vol.4,
pp. 22-27, 2017.
[2] Aadhirai S and Najumnissa Jamal D, "Feature Extraction and
Analysis of Renal Abnormalities using Fuzzy Clustering
Segmentation and SIFT Method", International Conference on
Biosignals, Images and Instrumentation (ICBSII), 978-1-5090-
4980-6, 2017.
[3] R. Vasanthselvakumar, M. Balasubramanian, & S.Palanivel,
"Pattern analysis of kidney diseases for detection and
classification using ultrasound b- mode images", Int J Pure Appl
Math , vol. 117, no. 15, pp. 635-653, 2017.
[4] J. Verma, M. Nath, P. Tripathi, & K. K. Saini, "Analysis and
identification of kidney stone using Kth nearest neighbour (KNN)
and support vector machine (SVM) classification techniques,
Pattern Recognition and Image Analysis", vol. 27, no. 3, pp.
574-580, 2017.
[5] N. A. Shaharuddin, W. Mahani, & H. Wan, "Development of
computer aided diagnosis system (CAD) for detection of kidney
ultrasound images", International Conference on Engineering
Technology and Technopreneurship (ICE2T), pp. 18-20, IEEE,
2017.
Figure: 4(a) Ultrasound image (b) Enhanced processed image
(c) Resultant image
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 197
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
[6] M. P. Pawar & A. N. Mulla, "Design and Analysis Performance [9] Ranjitha, "Extraction and Dimensionality reduction of features
of Kidney Cyst Detection from Ultrasound Images", for renal calculi detection and artifact differentiation from
International Journal of Engineering Development and Research, segmented ultrasound kidney images", 3rd International
vol. 5, no. 4, pp. 911-917, 2017. Conference on Computing for Sustainable Global Development
(INDIACom), pp. 5- 10, IEEE, 2016.
[7] M. Pathak, H. Sadawarti & S. Singh, "Features extraction and
classification for detection of kidney stone region in ultrasound [10]P. T. Akkasalgar & S. S. Karakalmani, "Abnormality detection in
images", International Journal of Multidisciplinary Research and kidney ultrasound imaging", International Journal of Engineering
Development, Volume 3, no.5, pp. 81-83, 2016. and Computer Science, vol. 4, no. 7, pp. 13151-13155, 2015.
[8] P. Vaish, R. Bharath, P. Rajalakshmi & U. B. Desai, "Smartphone [11]Soumya & Narayanan, "Classification Of Kidney Disorders From
based automatic abnormality detection of kidney in ultrasound Ultrasound Images Using Adaptive Neuro-Fuzzy Inference
images", IEEE 18th International Conference on e-Health System", International Journal of Scientific Engineering and
Networking, Applications and Services (Healthcom), pp. 1- 6, Applied Science (IJSEAS), Volume-1, no. 3, pp. 298-305, 2015.
IEEE, 2016.
198 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: The low power consumption block- approximate accelerator, imprecise logic or arithmetic
based carry speculative approximate adder is unit and approximate Instruction Set Architecture (ISA).
proposed. Its structure is based on partitioning the
adder into some non-overlapped summation blocks In this project, we deal with approximate adders
whose structures may be selected from both the which are utilized as the basic operator in performing
carry propagate and parallel-prefix adders. Here, other arithmetic operations such as subtraction,
the carry output of each block is speculated based multiplication, and division. Approximate adders have
on the input operands of the block itself and those been received many attention by the designers. In the
of the next block. In this adder, the length of the state-of-the-art approximate adders, where most of
carry chain is reduced to two blocks (worst case), them are based on the carry propagate structures, the
where in most cases only one block is employed to energy and speed gains have been achieved by
calculate the carry output leading to a lower average
hardware manipulation, logic simplification, and voltage
delay. In addition, to increase the accuracy and
over scaling. While some of the adders were based on
reduce the output error rate, an error detection
and recovery mechanism is proposed. The configurable output accuracy, others had a fixed
effectiveness of the proposed approximate adder accuracy level. The accuracy configurability imposed
is compared with state-of-the art approximate some overheads in terms of delay, area, and power
adders using a cost function based on the energy, which could limit their use in some applications where
delay, area, and output quality. The results indicate such re-configurability is not needed.
an average of 50% reduction in terms of the cost
APPROXIMATE ADDER
function compared to other approximate adders.
The power consumption reduction and speed
I. INTRODUCTION
improvement are the key goal in the design of digital
In current digital systems, one of the key constraints circuit is general. One of the approaches to improve
is the Thermal Design Power (TDP) could limit the both the power and speed is to approximate adders.
performance of digital systems. One of the techniques Approximate adders have been received many
which may help to obtain the most out of this constraint attentions by the designers. Adder blocks, which are
is the use of the approximate computing technique. It the main components in arithmetic units of DSP systems,
may be used for application domains such as multimedia are power hungry and often from hotspots locations on
and image processing, digital signal processing, wireless the die. Prior researches on approximate adders have
communication, machine learning, and data mining taken two general approaches of focusing on error
which are inherently error-resilient. The technique may weight and error probability reduction. For these adders,
be used to attain more energy reduction and/or reducing the error probability of the summation as well
performance at the cost of some accuracy loss. In recent as reducing the power and delay is the key design
years, various approximate computing techniques at criteria. They may also accompany by an error
different software/hardware levels have been proposed. correction unit which has time, power and area
Examples include thread fusion and tunable kernels, overheads. Approximate arithmetic units are mainly
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 199
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
adjustment, a series of designs are developed to In the conventional CLA, the carry output of the ith
implement accuracy-configurable approximation, which stage is determined from
could be reconfigured online to save more power.
2. LITERATURE SURVEY Ci+1 =Gi + Gi-1Pi +···+ G0 + Cin
• H. Jiang, C. Liu, L. Liu, F. Lombardi and J. Han, "A Where Cin is the input carry and Pi and Gi are the
review, classification and comparative evaluation of propagate (Ai ⊕ Bi) and generate (AiBi) signals of the
approximate arithmetic circuits," ACM JETCAS, vol. ith stage, respectively. By increasing the width of CLA,
13, no. 4, Article no. 60, 2017. The authors said that it the delay, and power consumption of the carry generator
plays a major role in speed and power consumption units increase. In this brief, we propose to split into
of a digital signal processing system. two segments. Given a window size of W, the first
• M.Pashaeifar, M. Kamal, A. Afzali-Kusha, and M. segment contains W MS terms while the other segment
Pedram, "Approximate Reverse Carry Propagate contains the remaining (LS) terms. Hence it may be
Adder for Energy-Efficient DSP Applications," IEEE rewritten as
TVLSI, vol. 26, no. 11, pp. 2530-2541, 2018.
M.Pashaeifar with his team proposed a technique of
=
Approximate Reverse Carry Propagate Adder for
energy-efficient DSP Applications
Where the left part is called approximate part and
the right part is called augmenting part. If both of these
parts are employed to calculate the carry output, the
generated Ci+1 is exact whereas if only the
200 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 201
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Consider the full adder circuit shown below with C4 = G3 + P3C3 = G3 + P3G2 + P3P2G1 +
corresponding truth table. P3P2P1P0Cin
We define two variables as 'carry generate' and 'carry From the above Boolean equations we can observe
propagate' then, that C_ {4} does not have to wait for C_ {3} and C_
Pi= Ai ⊕ Bi {2} to propagate but actually C_ {4} is propagated at
the same time as C_ {3} and C_ {2}. Since the Boolean
Gi = Ai*Bi
expression for each carry output is the sum of products
Table 1: Truth table for carry lookahed adder
so these can be implemented with one level of AND
gates followed by an OR gate.
The implementations of three Boolean functions for
each carry output (C_ {2}, C_ {3} and C_ {4}) for a
carry look-ahead carry generator shown in below
figure.
202 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
consecutive input bits are given as a input to a single energy consumption. In this case, the dependencies
block adder. A block adder is known as the window, between the blocks are cut at the cost of some accuracy
the number of consecutive input bits is known as window loss. Thus, the accuracy of the add operation depends
size and it is denoted by K. number of windows to be on the accuracy of the Carry Predictor unit, and also,
used is found by M=N/K where, n is the total number the policy of the carry output signal selection. In our
of input bits. proposed structure, in the worst-case, the length of a
SYSTEM MODEL carry chain is equal to two blocks (i.e., 2l).
Figure 5: Block diagram of Carry Speculative Adder In most of the state-of-the-art approximate adders,
The different formats like XS-3, binary coded faster the carry input of each block is chosen only based on
but the possibility of occurrence of error is increased. the input signals of the previous block. In this work,
The proposed speculative adder can be able to however, we propose a speculative approximate adder
complete the addition process quickly when compared that the carry input of its ith block is determined based
to the existing technique speculative sum bit is calculated on some input signals of the current block and those of
by the carry out bit of the window. By this prediction the next one. As we will show, this approach results in
technique, the addition Consider two inputs A and B. a considerable accuracy improvement compared to the
A=01, B=10. other approximate adders. In BCSA, the carry output
of the I th summation block (COi) is obtained from
First cycle: Addition is done without carry.
Second cycle: addition is done with Carry
Speculative adder. where the is the output signal of the
INTERNAL STRUCTURE OF THE SYSTEM Select (Carry Predictor) unit. Also, is the carry
output of the sub-adder of the ith summation block
The general architecture of an n-bit speculative assuming that the carry input of the block is zero.
approximate adder enhanced by a carry predictor unit
is illustrated below. The add operation is performed by
[n/l} l-bit summation blocks working in parallel where
l is the bit-length of each summation block. Each
summation block includes an l-bit sub-adder, a Carry
Predictor unit, and a Select unit. In this structure, the
carry input of the ith sub-adder, is chosen by (i-1)th
Select unit from the carry signal generated by the (i-
1)st Carry Predictor unit and the one generated by the
(i-1)th sub-adder. Selecting the carry output of the Carry
Predictor unit leads to a shorter critical path and lower
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 203
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ADDER WITH ERROR RECOVERY UNIT In the third case, although the carry input of the block
(ERU): is killed and is not propagated, the carry input is
employed to determine the first summation bit of the
block. Therefore, if the carry input in this case is wrong,
it impacts on the output accuracy of the summation.
Hence, for improving the accuracy of the proposed
adder, we suggest an error recovery unit which
generates the first summation bit of the ith block S0 by
S0 i+1 = (K0 i+1 .CAddi) + (P0 i+1 ⊕ Cini+1)
Note that P0 i+1 ⊕ Cini+1(Cini+1 = CPrdti)is the
Figure 7: Adder with error recovery unit approximate summation output in the first bit of the
In the first case ( = 0 and = 0), since (i+1)th block denoted as A in Fig. 2. Since the ERU is
=0, the P( ) and P are 2/3 and 1/3, not on the critical path of adder, using the Error
respectively. P(x) denotes the probability of the signal Recovery Unit (ERU) leads to improving the accuracy
x. Thus, the may be incorrect. In addition, when without increasing the delay of the proposed adder
= 0, the P( ) and P( ) are 2/3 and 1/3, structure. Fig. 4.5 shows the functionality of the
respectively. Note that theseprobabilities have been proposed speculative approximate adder with ERU.
obtained by assuming that the distribution of the 1 and The ERU imposes only about 3% and 2% power and
0 in the input operands bits are uniform. Therefore, the area overheads, respectively.
carry input of the (i+1)th block may be propagated to
its most significant bits. Hence, to reduce the probability
of the error propagation in the proposed adder, in this
case, the Select unit circuit, chooses the whose
error probability is smaller than .
In the second case ( = 0 and = 1), because
is 1, the speculated carry is correct.
Therefore, for this case, the is selected as the
.
In the third case ( = 1 and = 0), because
is 1, independent from the accuracy of the carry
input of the (i+1)th block, the carry input is not
propagated. Therefore, for shortening the critical path,
we suggest to select as the carry output of the i th Figure 8: An example of functionality of the proposed
approximate adder, (a) without ERU(BCSAW/OERU), and
block. (b)with ERU.
limit, transfer speed, and execution, or searching for a by this release, and also the group of CPLDs, which
minimal effort, FPGA takes to a product characterized means small designers and instructive establishments,
innovation to the following dimension. have no overheads from the expense of advancement
Notwithstanding its programmable stages, Xilinx programming.
gives configuration administrations, client preparing, field The ISE software controls all aspects of the design
designing and specialized support. License enrolment flow. Through the Project Navigator interface, you can
is required to utilize the Web Edition of Xilinx ISE, which access all of the design entry and design implementation
is free and can be re-established a boundless number tools. You can also access the files and documents
of times. Xilinx ISE (coordinated programming associated with your project.
condition) controls all parts of the improvement stream.
Project Navigator is a graphical interface for users to
access software tools and relevant files associated with
the project. It is divided into four sub windows:
1. Source's window (top left): hierarchically displays the
files included in the project
2. Processes window (middle left): displays available
processes for the source file currently selected.
3. Transcript window (bottom): displays status
messages, errors, and warnings
4. Workplace window (top right): contains multiple
document windows (such as HDL code, report,
schematic, and so on) for viewing and editing
Figure 9 : Project Navigator
The Xilinx ISE Web-PACK is a complete FPGA/
By default, the Project Navigator interface is divided
CPLD programmable logic design suite providing:
into four panel sub-windows, as seen in Figure 5-1.
• Specification of programmable logic via schematic On the top left are the Start, Design, Files, and Libraries
capture or Verilog/VHDL panels, which include display and access to the source
• Synthesis and Place & Route of specified logic for files in the project as well as access to running processes
various Xilinx FPGAs and CPLDs for the currently selected source.
• Functional (Behavioural) and Timing (post-Place & 4. RESULTS
Route) simulation SYNTHESIS RESULTS OF PROPOSED BCSA
• Download of configuration data into target device via (AREA):
communications cable
Xilinx currently claims that its FPGAs, due to their
ability to be customized for different workloads,
accelerate processing by 40 times for machine-learning
inference, 10 times for video and image processing,
and 100 times for genomics, with respect to CPU-or
GPU-based frameworks.
Xilinx FPGAs provide you with system integration
while optimizing for performance/watt. The minimal
Figure 10: Area report of Proposed Method
effort Spartan group of FPGAs is completely upheld
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 205
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Figure 13 : Realize logic by the Xilinx ISE for the verilog code
206 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
• Has less delay time. [9]. J. Hu and W. Qian, "A new approximate adder with low relative
error and correct sign calculation," In Proc. IEEE DATE, pp.
• Size is small. 1449-1454, 2015.
[10]. W. Xu, S. S. Sapatnekar, and J. Hu. "A Simple Yet Efficient
• Functioning speed is high. Accuracy Configurable Adder Design," In Proc. ISLPED, 2017.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 207
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- The discrete cosine transform (DCT) type of radiation is primarily formed by high-energy
is a key building block for many applications in protons and electrons. Finally, solar radiation includes
communications and signal processing. Likewise, a variety of sources such as protons, ions, neutrons,
it is also popular in space applications such as those gamma rays, and so on.
that perform audio or image compression. The
problem with space applications is that they usually In all cases, solutions to mitigate this problem have
have to work in a high radiation environment that been difficult to implement, mainly due to the hard
affects electronic components and distorts their constraints on area and power consumption of the space
correct functionality. Therefore, it is usual to devise applications. Among all the solutions, a first possibility
alternative implementation of the designs that can is to physically shield the electronic components. This
detect the presence of errors and discard the is, most of the times, unfeasible due to the heavy weight
affected samples. In this brief, we explore the use of the shielding materials. Besides, not all particles can
of algorithmic-based fault tolerance (ABFT)
be easily deflected with standard shielding, thus not
techniques, which exploit certain algorithmic
properties to detect errors. In particular, an ABFT solving the problem entirely [1]. Another solution is to
technique for the Arai DCT is proposed and fabricate circuits with a technology that can support
compared to standard protection schemes based higher doses of radiation, something known as rad- hard
on modular redundancy. Experimental results show components. This infers a couple of problems. Rad-
that important savings in terms of resource hard technologies require a much more expensive
overhead can be obtained with our approach while fabrication process, since runs are usually limited and
still maintaining the error detection rate at a not all the facilities can provide this technology. This
reasonable level. usually leads to hefty cost overheads, sometimes of an
Index Terms- Configuration memory, discrete order of magnitude with respect to the commercial off-
cosine trans- form (DCT), field-programmable gate the- shelf counterpart designs. Moreover, rad-hard
array (FPGA), image compression, soft error. components usually provide lower functionality than
I. INTRODUCTION standard components, which may limit the scope of the
mission [3]. Finally, another approach is to produce
Since the beginning of space exploration, radiation components protected by design. In this case, the
has posed serious problems to the electronics onboard technology is the same as in the commercial case, but
satellites and other spacecraft [1]. From temporary the actual circuit is designed with extra redundancy in
failures to permanent damages in instruments, particle order to provide error-handling capabilities. An example
strikes have jeopardized missions, limiting func- tionality of this are error-correction codes (e.g., Hamming) to
and efficiency [1], [2]. The sources of this problem are protect memories [4]. Other examples to detect and
diverse and may be classified into three categories: correct errors are dual modular redundancy (DMR)
radiation induced by cosmic rays, radiation trapped in and triple modular redundancy (TMR) schemes [5].
the Earth's magnetic field, and solar radiation. The first These techniques usually incur area and power
one consists of protons and heavy ions and usually tends consumption overheads, thus creating difficulties to
to present a continuous low intensity [2]. The second space missions in which small satellites are used (e.g.,
208 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
CubeSats). Therefore, in order to reduce these power consumption of the DCT architecture. In [17],
overheads, other approaches not based on massive the voltage scaling versus robustness tradeoff is studied
redundancy are usually followed by hardware designers. with a soft N-modular redundancy scheme, while in
One of these approaches is the so-called algorithmic- [18], the voltage scaling versus delay error resiliency is
based fault tolerance (ABFT) [6]. This approach can analyzed. From the reliability point of view, there are
be applied to circuits with certain algorithmic properties. publications that explore properties of fast unitary
If one of these properties exists, it can be used to check transforms, a family that comprises DCT and other
the correctness of each output with respect to its similar transforms [19]. In this brief, we explore the
corresponding input, usually with a lower overhead than ABFT properties of the Arai 1-D DCT imple-
DMR. One of the most paradigmatic cases of ABFT is mentation but with an approach different from [17],
the Parseval's check in signal processing [7]. [18]. Specifically, the reliability versus resource
In this brief, we have focused on the discrete overhead tradeoff is analyzed, since this is an important
cosine trans- form (DCT) and have managed to protect issue in space applications. Section II introduces the
it with the previously mentioned ABFT approach. The mathematical properties of the DCT as well as the
choice of the DCT as the design to protect corresponds hardware implementation studied in this brief. In Section
to two reasons. The first one is its ubiquitous uti- lization III, the proposed protection technique for the DCT is
in many signal-processing systems [8]. The second one explained. The experimental setup and the results
is that it is a basic building block for image-processing obtained after the fault injection campaigns are presented
hardware onboard satellites [9] and therefore very in Sections IV and V. Finally, the shortcomings of the
sensitive to the aforementioned effects of radiation. proposed technique are discussed in Section VI, and
There are several briefs that study DCT implementations Section VII concludes this brief.
from different points of view. One approach is to try to II. DISCRETE COSINE TRANSFORM
optimize the mathematical foundation to come up with The amount of memory space required to store raw
a simpler circuit (less area and power consumption) images can be restrictive in terms of cost and power
[10]. DCT area-efficient implementations have also consumption in space applications. As mentioned in
been researched [11]. Efficiency, specifically in video Section I, the DCT is widely used in image- or video-
coding applications, is usually a primary target. A processing systems for data compression. The main
common approach is to use hardware acceleration and reason for this is the energy compaction property of
parallelism [12]. The research of alternative the DCT, which is very close to the Karhunen-Loève
implementation is also usual, so that the DCT can save transform [20]. For example, in a lossy image
computational cycles and resources [13]. Another compression process (e.g., JPEG) the image is
approach is to use hardware-software co-design to processed in blocks of 8×8 pixels to express them as a
reach a tradeoff between performance and used sum of cosine functions oscillating at different frequencies.
resources [14]. Reconfigurable architectures for DCT In order to do that in hardware, each region of 8 × 8
are also a recent target, especially to deal with variable pixels is decomposed into a cascade of 8 × 1 1-D DCTs
transform size due to video resolution changes. Field- that are applied on the eight rows. Then, this intermediate
programmable gate arrays (FPGAs) are a popular result is transposed, and the 1-D DCTs are applied
alternative to support this reconfig- urable functionality again but this time on the eight columns. Different
[15]. For top performance, DCT implementation on variants of the 1-D DCT can be applied in these steps,
multicore architectures is sometimes proposed, which being the type-II DCT the most commonly used form
usually increases the power consumption. Efforts to [21]. This variant is usually referred to as "the DCT"
keep consumption within reasonable limits without and is defined by
jeopardizing efficiency are also present in the literature
[16]. There are also articles devoted to reduce the (1)
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 209
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
210 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
F0 = a31 F1 = a32 F2 = a41 F3 = a42 Finally, if the sum of the Fk outputs is performed,
the following can be obtained:
F4 = a51 F5 = a52 F6 = a53 F7 = a54 (8)
(10)
where aij represents the outcome of adder j of step
i . In each step, the adders are enumerated from top to This algorithmic property of the Arai DCT has been
bottom. For example, adder a25 is the fifth adder of used to create the ABFT protection scheme illustrated
step 2, which is the adder just before the multiplier m3. in Fig. 2.
In this figure, the sum of the outputs of the DCT
module is compared to the f0 input multiplied by 8 to
enable an error-detection capability in the 8-point Arai
1-D DCT. It should be mentioned that this multiplication
by 8 has been performed by concatenating three zeros
to the right to mimic a 3-bit left-shifting operation. In
Section IV, the proposed error-detection scheme
presented in Fig. 2 has been evaluated and compared
Fig. 2. Proposed protection technique for the eight-point Arai to the classic DMR implementation and the unprotected
1-D DCT architecture.
version of the Arai DCT.
Using these equations, the Fk output values of the
Arai DCT can be expressed as a function of the fn input IV. EXPERIMENTAL SETUP
values as follows: In order to assess the error-detection capabilities
F0 = f0 + f1 + f2 + f3 + f4 + f5 + f6 + f7 of the proposed protection technique, three fault
injection campaigns have been conducted. In particular,
F1 = f0 - f1 - f2 + f3 + f4 - f5 - f6 + f7 the unprotected DCT (see Fig. 1), the DCT protected
F2 = f0 + f7 - f3 - f4 with a DMR scheme, and the proposed technique (see
-[m1 · ( f1 + f6 - f2 - f5 + f0 + f7 - f3 - f4)] Fig. 2) have been evaluated. The first implementation
provides no protection and minimal FPGA resources.
F3 = f0 + f7 - f3 - f4 The second one provides the upper bound protection
+[m1 · ( f1 + f6 - f2 - f5 + f0 + f7 - f3 - f4)] (in terms of error detection) and a significant area
F4 = ( f0 - f7) - [m1 · ( f2 - f5 + f1 - f6)] overhead. Therefore, both of them will be compared
with our proposed technique (third implementation) to
-[m3 · ( f3 - f4 + f2 - f5)
evaluate the protection and area tradeoff. All designs
+m2 · ( f3 - f4 + f2 - f5 - f1 + f6 - f0 + f7)] have been implemented in a Digilent Nexys 4 double
F5 = ( f0 - f7) - [m1 · ( f2 - f5 + f1 - f6)] data rate (DDR) Artix-7 FPGA together with the Xilinx
+[m3 · ( f3 - f4 + f2 - f5) soft error mitigation (SEM) intellectual property (IP)
Controller [24], which has been used to perform the
+m2 · ( f3 - f4 + f2 - f5 - f1 + f6 - f0 + f7)] fault injection campaigns. In these experiments, the
F6 = m1 · ( f2 - f5 + f1 - f6) + ( f0 - f7) FPGA failure model has been followed. This means
-{m4 · ( f1 - f6 + f0 - f7) that the errors have been injected in the configuration
memory of the device and not in the user logic. This is
+[m2 · ( f3 - f4 + f2 - f5 - f1 + f6 - f0 + f7)]}
a usual approach for FPGAs, since in a real scenario,
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 211
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
most errors would happen in the aforementioned in the configuration memory does translate into an error
configuration memory, given that it has a much higher at the output, but this error is detected by the protection
cross section compared to the user logic storage logic added to the design. This is a positive outcome
elements (user flip-flops, registers, and so on). It is since the error does not propagate outside the circuit.
worth mentioning that the FPGA failure model produces A third possibility is when an error injected in the
more complex and unpredictable effects than the regular configuration memory translates into an error at the
application-specific integrated circuit (ASIC) failure output and that error is undetected by the protection
model. While the latter usually produces errors in the logic. This is the worst scenario, since the error
data path that propagate (or are masked) toward the propagates as silent data corruption. From the point of
output, the former may also produce transformations view of the reliability, the percentage of undetected
in the actual structure of the design and its routing [25]. errors will be used as the figure of merit to compare the
Since most of the errors that happen in a real scenario fault-tolerant capabilities of the different
are isolated, single-error fault injection campaigns have implementations. The reliability results are depicted in
been conducted. First, an error is injected with the SEM Table I.
IP in one of the essential bits of the design. These are First, an exhaustive fault injection campaign was
the configuration bits that may produce an error in the conducted on the unprotected version. A total of 21
design, depending on whether the bit is critical or not 932 errors were injected in all the essential bits. Of
[26]. The circuit is exercised and the output is compared these, 15 474 did not produce any error at the output
with the previously calculated golden (error-free) output. of the design. This phenomenon is common in FPGAs
The behavior of the circuit is logged and the previously since the bit flip can be performed in a bit that does not
injected error is removed. Then, a new error is injected create a malfunction in the design (i.e., noncritical bit).
in a different essential bit of the design, and the process From the rest that actually produced an error at the
is repeated. The campaign ends when all the essential output (6458), all of them were undetected, which
bits of the design are injected and tested, performing represents a 29.4% of the performed injections.
an exhaustive fault injection campaign. Since all the TABLE I
essential bits are targeted, each implementation has RELIABILITY COMPARISON
received a different number of injections. In other
words, more injections have been performed in the
DMR version than in the unprotected version. This is
reasonable, since in a real scenario, a larger circuit
would receive a higher number of events than a smaller
one. In any case, all versions of the DCT (unprotected,
DMR, and proposed) have been fully characterized.
The results are presented and discussed in Section V.
V. EXPERIMENTAL RESULTS
It makes sense that none of the errors that
In terms of reliability, different outcomes may arise propagated to the output was detected, since the
when errors are injected. A first possibility is when an unprotected version does not contain any fault-tolerant
error injected in the configuration memory does not technique. The FPGA resources needed by this design
translate into an error at the output of the circuit. This were 378 LUTs and 96 flip-flops (see Table II).
may happen when the affected resource in the FPGA
Then, another injection campaign was conducted in
does not interact with the actual data processing, e.g.,
the DMR version of the circuit. In this case, a total of
an unused lookup table (LUT) entry, a logical masking,
47 643 injections were performed. Of this, 33 260 did
and so on. A second possibility is when an error injected
not produce any error at the output. From the rest, 12
212 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
842 errors were detected by the DMR scheme, and reliability is still in a reasonable range, much better than
1541 were undetected, which represents 3.2% of the the one offered by the unprotected version. The same
total injections. This is of course lower than the 29.4% applies to power consumption. In this case, the
of the unprotected version. It is worth noticing that the proposed technique has a consumption overhead in the
DMR scheme did not detect 100% of the errors. Errors same range as the unprotected design, which represents
in the routing can produce a small percentage of errors half of the overhead incurred by DMR. This is very
that go undetected at the output. To achieve this important in the case of small space missions (e.g.,
reliability, the FPGA resources needed were 732 LUTs CubeSats), since the power budget is typically the worst
and 193 flip-flops, which represent an overhead of 94% constraint in these types of scenarios. Finally, regarding
and 101%, respectively, compared to the unprotected the frequency, it can be seen that the proposed technique
case. So, as expected, the area approximately doubles has a delay that is around 10% worse than DMR. If
in order to reduce the percentage of undetected errors this is a hard constraint in the application, a possible
to 3.2%. solution would be to pipeline the design in order to
Finally, an error injection campaign was also increase the throughput.
conducted in the proposed ABFT-based design in order SHORTCOMINGS OF THE PROPOSED
to evaluate the error detection rate and the resource TECHNIQUE
overhead. A total of 30 190 errors were injected in this As presented in Section V, the proposed technique
design, of which 17 354 did not produce any error at has 11.1% of undetected errors, whereas DMR only
the output. Considering the rest that did produce an has 3.2%. The reason is that the ABFT strategy used is
error, 9471 were detected and 3365 were undetected, not valid in all cases as the equality still holds when the
which represents 11.1% of the total number of error affects some parts of the circuit. This is due to
injections. This means that although the proposed compensation effects between branches.
technique is eight percentage points higher than DMR
in terms of undetected errors, it manages to reduce Let us consider, for example, that there is an error
around two-thirds of the percentage of undetected in a43 from (6) in step 4. This error propagates to a51
errors produced in the unprotected version. and a52 in step 5 correspond to F4 and F5 in the output.
When the outputs are summed up in the presented
Although it is not the goal of this brief, it is interesting
algorithm, a43 is canceled as F4 + F5 = a51 + a52 = -
to point out that the behavior of the DMR and the
a43+ a44 a43 a44 ·2 a44. The same occurs with
proposed technique when single-event upsets (SEUs)
a45, a33, and other signals.
affect the user logic (i.e., flip-flops) is similar. The reason
is that the intermediate steps are not registered. This approach has given a solution with a slightly
Consequently, if only the last stage is registered, all the worse reliability but with significant savings in the area
bit flips in the flip-flops would be detected if the overhead with respect to DMR. It is possible to explore
protection technique is applied to the registered outputs. additional techniques to provide a higher protection
However, an error in the registers after comparison (e.g., by using a selective DMR), but the overhead
would not be detected in either case. would also increase. The bottom line is that there are
Next, the FPGA overheads of the different no solutions better than others, since those that excel in
techniques have been analyzed (see Table II). Our reliability would offer worse overheads and vice versa.
protection technique only needs 476 LUTs and 120 The important aspect is to have a variety of protection
flip-flops, which represent an overhead of 26% and techniques, with a wide range of the reliability versus
25%, respectively, compared to the unprotected design. overhead tradeoffs. Then, it would be up to the designer
This infers important savings compared to the resources to choosethe one that fits better the application
consumed by the DMR scheme (which doubles the area requirements, meeting the expected reliability constraint
of the unprotected design). Besides, the obtained while minimizing the incurred overhead.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 213
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
VI. CONCLUSION [6] K.-H. Huang and J. A. Abraham, "Algorithm-based fault tolerance
for matrix operations," IEEE Trans. Comput., vol. C-33, no. 6,
In this brief, a new protection technique for the DCT pp. 518-528, Jun. 1984.
implemented in an FPGA has been presented. It is [7] S.-J. Wang and N. Jha, "Algorithm-based fault tolerance for FFT
based on an algorithmic property, which states that the networks," IEEE Trans. Comput., vol. 43, no. 7, pp. 849-854,
Jul. 1994.
addition of the DCT outputs is equal to eight times the
least significant input. Using this, a checker has been [8] S. Bouguezel, M. Ahmad, and M. Swamy, "A new class of
reciprocal- orthogonal parametric transforms," IEEE Trans.
designed to reduce the number of undetected errors of Circuits Syst. I, Reg. Papers, vol. 56, no. 4, pp. 795-805, Apr.
the unprotected DCT. Due to the circuit structure, not 2009.
all the errors can be detected, since some wrong outputs [9] S. Vijay and D. Anchit, "Low power implementation of DCT for
still meet the previous algorithmic property. However, on- board satellite image processing systems," in Proc. 52nd IEEE
Int. Midwest Symp. Circuits Syst., Cancun, Mexico, Aug. 2009,
the percentage of undetected errors is close to that of pp. 774-777.
DMR and much better than the results offered by the
[10]D. F. Chiper and L. T. Cotorobai, "A unified VLSI architecture
unprotected DCT. Besides, the FPGA resource for 1D IDCT and IDST based on pseudo-band correlations," in
overhead that our technique incurs is very limited Proc. 10th Int. Conf. Electron., Comput. Artif. Intell. (ECAI),
compared to DMR (which doubles this overhead). In Iasi, Romania, Jun. 2018, pp. 1-5.
summary, the reliability versus area ratio in our technique [11]M. Masera, G. Masera, and M. Martina, "An area-efficient
variable-size fixed-point DCT architecture for HEVC encoding,"
outperforms the DMR solution, since the area of the IEEE Trans. Circuits Syst. Video Technol., vol. 30, no. 1, pp.
former is quite limited. The reduction in area and power 232-242, Jan. 2020.
consumption is especially important in small-satellite [12]S. Nouri, R. Ghaznavi-Youvalari, and J. Nurmi, "Design and
applications. The loss of reliability in respect to DMR implemen- tation of multi-purpose DCT/DST-specific accelerator
can be acceptable in applications that can allow a on heterogeneous multicore architecture," in Proc. IEEE Nordic
Circuits Syst. Conf. (NORCAS) Int. Symp. System-Chip (SoC),
percentage of wrong outputs without compromising the Tallinn, Estonia, Oct. 2018, pp. 1-10.
expected functionality (e.g., vision applications). In
[13]P. Dahiya and P. Jain, "Realization of recursive algorithm for
future studies, the protection of other DCT one- dimensional discrete cosine transform and its inverse," in
implementations, such as the Leoffler algorithm, will be Advances in System Optimization and Control (Lecture Notes
explored to keep on demonstrating the convenience of in Electrical Engi- neering), vol. 509, S. Singh, F. Wen, M. Jain,
Eds. Singapore: Springer, 2019.B. Chan Jia Ching, A. A.-H. Ab
the ABFT approach. Rahman, and N. Ahmad, "Implementa- tion of an 8 8 discrete
cosine transform on programmable system-on- chip," J. Phys.,
REFERENCES Conf. Ser., vol. 1049, Jul. 2018, Art. no. 012084.
[1] J. W. Howard and D. M. Hardage, "Spacecraft environments [14]M. Zheng, J. Zheng, Z. Chen, L. Wu, X. Yang, and N. Ling, "A
interac- tions: Space radiation and its effects on electronic reconfig- urable architecture for discrete cosine transform in video
systems," NASA, Washington, DC, USA, NASA Tech. Rep. coding," IEEE Trans. Circuits Syst. Video Technol., to be
TP-1999-209373, 1999. published.
[2] A. Holmes-Siedle and L. Adams, Handbook of Radiation Effects. [15]R. Radhika and N. Partheeban, "Improving power efficiency in
New York, NY, USA: Oxford Univ. Press, 2002, pp. 80-85. the implementation of discrete cosine transform in multicore
[3] I. Mcloughlin, V. Gupta, G. Sandhu, S. Lim, and T. Bretschneider, architecture," J. Comput. Theor. Nanosci., vol. 15, no. 8, pp.
"Fault tolerance through redundant COTS components for satellite 2597-2603, Aug. 2018.
processing applications," in Proc. 4th Int. Conf. Inf., Commun. [16]E. P. Kim and N. R. Shanbhag, "Soft N-modular redundancy,"
Signal Process. Joint 4th Pacific Rim Conf. Multimedia, Jul. IEEE Trans. Comput., vol. 61, no. 3, pp. 323-336, Mar. 2012.
2004, pp. 296-299.
[17]G. Karakonstantis, N. Banerjee, and K. Roy, "Process-variation
[4] C. L. Chen and M. Y. Hsiao, "Error-correcting codes for resilient and voltage-scalable DCT architecture for robust low-
semiconductor memory applications: A state-of-the-art review," power computing," IEEE Trans. Very Large Scale Integr. (VLSI)
IBM J. Res. Develop., vol. 28, no. 2, pp. 124-134, 1984. Syst., vol. 18, no. 10, pp. 1461-1470, Oct. 2010.
[5] Techniques for Radiation Effects Mitigation in ASICs and FPGAs [18]S.-H. Hu and J. A. Abraham, "Quality aware error detection in 2-
Hand- book, Standard ECSS-Q-HB-60-02A, ECSS Secretariat D separable linear transformation," in Proc. IEEE 25th Asian
ESA-ESTEC Requirements & Standards Division, Noordwijk, Test Symp. (ATS), Hiroshima, Japan, Nov. 2016, pp. 257-262.
The Netherlands, 2016.
214 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
[19]A. Edirisuriya, A. Madanayake, V. S. Dimitrov, R. J. Cintra, and [22]Y. Arai, T. Agui, and M. Nakajima, "A fast DCT-SQ scheme for
J. Adikari, "VLSI architecture for 8-point AI-based Arai DCT images," IEICE Trans., vol. E71, no. 11, pp. 1095-1097, 1988.
having low area-time complexity and power at improved accu-
[23]Soft Error Mitigation Controller Logicore IP Product Guide
racy," J. Low Power Electron. Appl., vol. 2, no. 2, pp. 127-142,
(PG036), Xilinx, San Jose, CA, USA, Sep. 2015.
Mar. 2012.
[24]B. Du and L. Sterpone, "Online monitoring soft errors in
[20]N. Ahmed, T. Natarajan, and K. R. Rao, "Discrete cosine trans-
reconfigurable FPGA during radiation test," in Proc. IEEE Int.
form," IEEE Trans. Comput., vol. C-100, no. 1, pp. 90-93,
Instrum. Meas. Technol. Conf. (I2MTC), Turin, Italy, May
Jan. 1974.
2017, pp. 1-5.
[21]D. F. G. Coelho, S. Nimmalapalli, V. S. Dimitrov, A. Madanayake,
[25]C. D. Patterson, P. Sundararajan, B. J. Blodget, and S. P.
R. J. Cintra, and A. Tisserand, "Computation of 2D 8 8 DCT
McMillan, "Method and system for identifying essential
based on the Loeffler factorization using algebraic integer
configuration bits," U.S. Patent 7 406 673, Jul. 29, 2008.
encoding," IEEE Trans. Comput., vol. 67, no. 12, pp. 1692-
1702, Dec. 2018.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 215
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: In severe situations like accidents various dimensions of data like at flag, pixel, highlight,
occur, majority of registered cases are for bone or emblematic dimension, and so on. The combination of
head injury. For proper diagnosis, both CT scan pictures at pixel level demonstrates best for restorative
and MRI scan are required to study the damage picture preparing. It experiences the way toward
occurred for skull as well as for the internal organ
building up a composite picture from various information
injury of brain for the development of any brain
tumors. If a combination of both images is present
pictures. Different applications where the picture
in a single image, then diagnosing the patient would combination is utilized are the combination of pictures
be easier. Image Fusion is a method used to from an airborne sensor stage to assist a pilot with
combine two input images to generate a combined navigating in poor climate conditions or dimness, i.e.,
complementary information contained image. For to meld forward looking infrared (FLIR) and low light
medical image processing, the resultant image is obvious pictures (LLTV).
required to be highly reliable, low cost in terms of
In pixel-level picture combination, the essential
storage cost, uncertainty, etc. Also the information
in both CT scan and MRI scan must be retained in requirements are that the combination procedure should
the fused image for reliable study and assessment safeguard all significant data of the info symbolism in
for diagnosis. This paper deals with pixel level the composite picture called as example protection, it
fusion methods and their generic multiresolution ought not present any ancient rarities or irregularities
fusion scheme. This scheme utilizes the low pass which would divert the human spectator or following
residuals and high pass residuals to segregate the handling stages, the combination procedure ought to
information of two input images that are to be fused. be move and rotational invariant, for example the
The linear and nonlinear methods are used to combination result ought not rely upon the area or
develop the fused image. The fused image is introduction of an article the information symbolism,
evaluated in terms of fusion metrics such as
consolidating out-of-center pictures, remote detecting,
standard deviation, entropy, fusion mutual
and so on.
information, etc. The methods like laplacian
pyramid, ratio pyramid, principal component Be that as it may, for the instance of picture
analysis, average methods prove to be better arrangement combination, the extra issue of worldly
options for medical image fusion. steadiness and consistency emerge. Transient solidness
Keywords: Image Fusion, PCA, LUT, FPGA, alludes to the graylevel changes in the melded
Optimal filter, etc. succession brought about by graylevel changes in the
1. INTRODUCTION information groupings which must not be presented by
the combination plot. Transient consistency alludes to
With the appearance of imaging sensors state in graylevel changes happening in the information
restorative applications, the combination of various successions that must be available in the melded
pictures caught from various sources are important to arrangement immediately or differentiate change. These
build up a significant picture for appropriate are caused because of human visual framework which
determination. The caught pictures can be combined at is delicate to moving light boosts, so when antiques
216 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
move or time depended differentiate changes, the weighting coefficients, concerning data substance and
combination procedure will be profoundly diverting to repetition evacuation, can be dictated by a central part
the human eyewitness. examination (PCA) of all information forces. By playing
In therapeutic imaging for finding, significantly two out a PCA of the covariance grid of info forces, the
outputs are utilized to acquire the fundamental sweep weightings for each information outline are gotten from
information of malady influenced zones. They are CT the eigenvector relating to the biggest eigen value.
(Computed Tomography) picture and MRI (Magnetic Nonlinear Methods are produced dependent on
Resonance Imaging) picture. In situations where mind basic nonlinear administrator, for example, max or min.
related pictures are to be examined these two pictures In the event that in all information pictures the splendid
are considered for appraisal. In the event that there items are of intrigue, a great decision is to register the
exists an answer for consolidation these two subtleties combined picture by a pixel-by-pixel utilization of the
absent much misfortune, it would assist specialist with most extreme administrator. Essentially these utilization
assessing the phase of ailment accurately and push him morphological administrators, for example, opening or
to legitimately analyze the patient to propose drug or shutting, the genuine combination process is performed
elective medical procedure. The CT check is utilized by the use of restrictive disintegration and expansion
to watch the bone wounds though MRI Scan is utilized administrators. In abnormal state arithmetical expansion
to watch the mind tumors. The mix of these two is of picture morphology, the fundamental sorts
assessed for complete mind analysis, particularly when characterized in picture polynomial math are esteem
an individual has been harmed in a mishap. sets, arrange sets which permit the coordination of
This paper manages the strategies utilized for various goals and decorations, pictures and formats.
therapeutic picture combination dependent on pixel level For every fundamental kind double and unary activities
combination. The measurements utilized for contrasting are characterized which reach from the essential set
combined pictures are standard deviation, entropy, tasks to progressively complex ones for the activities
PSNR, SNR and Mutual Information. These on pictures and layouts. Picture variable based math
measurements demonstrate whether the data in melded has been utilized conventionally to consolidate
picture is right to use or not. multisensor pictures.
few improvements are presented: All info pictures are - the inclination pyramid - results, if the info picture is
demonstrated as markov irregular fields to characterize decayed into its directional edge portrayal utilizing
a vitality work which portrays the combination directional subordinate channelsWavelet Transform is
objective. Because of the equality of gibbs irregular fields a flag examination strategy like picture pyramids, called
and markov arbitrary fields, this vitality capacity can as discrete wavelet change. The principle contrast is
be communicated as an entirety of purported coterie that while picture pyramids lead to an overcomplete
possibilities, where just pixels in a predefined set of change coefficients, the wavelet change results in
neighborhood influence the real pixel. The combination a nonredundant picture portrayal. The discrete 2-
assignment at that point comprises of an amplification diminish wavelet change is figured by the recursive
of the vitality work. Since this vitality capacity will be utilization of lowpass and highpass channels toward
non-curved as a rule, regularly stochastic improvement every path of the information picture (for example lines
systems, for example, mimicked tempering or changes and segments) trailed by subsampling. One noteworthy
like iterated contingent modes will be utilized. disadvantage of the wavelet change when connected
Picture pyramids have been at first portrayed for to picture combination is its notable move reliance, for
multiresolution picture examination [8-10] and as a example a straightforward move of the info flag may
model for the binocular combination in human vision. A prompt total distinctive change coefficients. This
conventional picture pyramid is an arrangement of outcomes in conflicting intertwined pictures when
pictures where each picture is built by lowpass conjured in picture arrangement combination.
separating and subsampling from its antecedent. To beat the move reliance of the wavelet
Because of inspecting, the picture estimate is split in combination plot, the information pictures must be
both spatial ways at each dimension of the deterioration decayed into a move invariant portrayal. There are a
procedure, accordingly prompting a multiresolution flag few different ways to accomplish this: The direct path
portrayal. The distinction between the information is to register the wavelet change for all conceivable round
picture and the separated picture is important to permit movements of the info flag. For this situation, not all
a correct remaking from the pyramidal portrayal. The movements are vital and it is conceivable to build up a
picture pyramid approach accordingly prompts a flag proficient calculation plot for the subsequent wavelet
portrayal with two pyramids: The smoothing pyramid portrayal. Another straightforward methodology is to
containing the arrived at the midpoint of pixel esteems, drop the subsampling in the decay procedure and rather
and the distinction pyramid containing the pixel adjust the channels at every deterioration level, bringing
contrasts, for example the edges. So the distinction about a very repetitive flag portrayal.
pyramid can be seen as a multiresolution edge portrayal 3. PROPOSED METHODS
of the info picture. The genuine combination process
can be portrayed by a nonexclusive multiresolution The Generic Multiresolution Fusion Scheme builds
combination conspire which is material both to picture up a neighborhood differentiate change i.e., at edges
pyramids and the wavelet approach. as both picture pyramids and the wavelet change result
in a multiresolution edge portrayal. The information
There are a few alterations of this nonexclusive pictures are decayed into their multiscale edge portrayal,
pyramid development strategy portrayed previously. A utilizing either any picture pyramid or any wavelet
few creators propose the calculation of nonlinear change. The multiscale fearless pictures are joined
pyramids, for example, the proportion and difference utilizing the high pass residuals and low pass residuals
pyramid, where the multiscale edge portrayal is by utilizing wavelets by the procedure of pixel-by-pixel
registered by a pixel-by-pixel division of neighboring choice of the coefficients with greatest size. At last the
goals. A further change is to substitute the direct channels melded picture is registered by an utilization of the fitting
by morphological nonlinear channels, bringing about the remaking plan. The comparing figure is appeared in
morphological pyramid. Another sort of picture pyramid figure 1.
218 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 219
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract - Recently multiple high-performance divided into two kinds: internal methods and external
algorithms have been developed to infer high- example-based methods.
resolution images from low-resolution image input
using deep learning algorithms. The related The pipeline of most external example-based
problem of super-resolution from blurred or approaches is shared, where the focus is on learning
corrupted low-resolution images has however and optimizing the dictionaries or learning mapping
received much less attention. In this work, I functions. Despite some similarities convolutional neural
propose a new deep learning approach that networks (CNNs) based technique are different
simultaneously addresses deblurring and super- because they attempt to learn an end-to-end mapping
resolution from blurred low- resolution images. I function between LR and HR images without addressing
evaluate the state-of-the-art super-resolution explicitly the problem of selection and composition of
convolutional neural network (SRCNN)
dictionaries and manifolds. Currently, the majority of
architecture proposed for the blurred
the best performing state-of-the-art methods for SR
reconstruction scenario and propose a revised
deeper architecture that proves its superiority are based on deep neural networks. The pioneering
experimentally both when the levels of blur are SRCNN model of Dong et al. introduced a simple yet
known and unknown a prior architecture of SRCNN efficient deep architecture for SR.
corresponds to a relatively small network that All these algorithms assume that a constant amount
contains 8,032 parameters and is composed of 2
of noising or blurring is applied to all training and testing
hidden layers: added to the input and the output
images. In this study I address an additional factor of
layers there are 4 layers in total. The objective is
to learn a mapping function F performing three unknown amount of blurring applied to images that are
tasks: patch extraction, non-linear mapping, and received by the SR pipeline.
reconstruction. II. LITERATURE REVIEW
Index Terms - deep learning, SRCNN, patch M. Agrawal et-al, presented a technique for
extraction. enhancing resolution of images by interpolating high
I. INTRODUCTION frequency sub-bands generated using lifting wavelet
As, Single image super-resolution (SR) is an essential transform (LWT) and spatial information of input low
application in computer vision that proves useful in resolution (LR) image. Stationary wavelet transform
multiple areas such as remote sensing image processing, (SWT) is used at intermediate stage for edge
security systems, medical imaging, etc. The SR task is enhancement. The input image is decomposed using
an ill-posed problem, where one LR image has many LWT in order to generate high frequency (HF) sub
solutions for HR image. The topic of image super bands. The generated HF sub bands are interpolated
resolution for the first time. Since then the problem has further. Different high frequency sub-bands obtained
received a lot of attention, and typical state-of-the-art through SWT are added to correct the estimated HF
methods perform as example-based approaches where sub bands. The input LR image is interpolated in parallel.
learned prior information alleviates the problem of All these sub-bands and estimated LR image are
multiple solutions. The example-based methods are reconstructed by inverse lifting wavelet transformation
220 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
(ILWT) to produce high resolution image. The complex high- dimensional mapping given massive
qualitative, quantitative and visual images of the raw data.
described technique show the superiority of the • The perspective of DL, although many other
proposed method over conventional and state-of-the techniques such as data pre -processing and model
art methods. training techniques are also quite important
combination of DL and domain knowledge in SISR is
Y. Sun Et-al, presented an observation for medical
usually the key to success and is often reflected in
imaging and astronomical, high-resolution (HR) images
the innovations of neural network architectures and
are urgently desired and required. In recent years, many optimization objectives for SISR.
researchers have proposed various ways to achieve
the goal of image super-resolution (SR). ranging from • For each category, a baseline is first established, and
simple linear interpolation schemes to nonlinear complex several critical limitations of the baseline are
summarized. Then, representative works on
methods. In this paper, we deal with the SR
overcoming these limitations are presented based on
reconstruction problem based on the theory of their original content, as well as our critical exposition
compressive sensing, which uses a redundant dictionary and analyses, and relevant comparisons are conducted
instead of a conventional orthogonal basis. We further from a variety of perspectives.
demonstrate better results on true images in terms of
peak signal-to-noise ratio (PSNR) and root mean- It is well known that an image is clear if I can perceive
square error (RMSE) and give several important the shape of all its objects correctly. For example, a
improvements, compared with other methods. face image is clear if I can recognize lips, eyes, nose,
etc. The shapes of contained objects are recognized
Jian-Feng Cai, Hui Ji, Chaoqiang Liu, and Zuowei from its edges. By contrast, blurring means reducing
Shen proposed a new optimization approach to remove the edge content and making the transition from one
complex motion blurring from a single image by color to another very smooth think that zooming is one
introducing new sparsity-based regularization terms on type of blurring. Actually, if an image is zoomed using
both images and motion-blur kernels. Based on the pixel replication and large zooming factor, the resulting
assumption that the motion-blur kernel can be image is a blurred image. However, the difference
approximated by a smooth function with the support between zooming and blurring is that the number of
close to a continuous "thin" curve, we proposed mixed pixels in the zoomed image is larger than the number of
regularization strategy for the blur kernel. The framelet pixels in the original image, but the number of pixels in
system proposed by A.Ron and Z.Shen's analysis the original image and blurred one is the same. Blurring
operator and I. Daubechies, B. Han, A. Ron, and Z. can be thought of as applying some filter to an image.
Shen, "Framelets: MRA-based constructions of There are many kind of filters that can be used to
wavelet frames," is used to represent both original perform blurring, such as average filter, weighted
images and motion-blur kernels for its implementation average filter, Gaussian filter and motion filter. The
simplicity and computational efficiency to provide a average filter has three properties: it is odd ordered,
powerful algorithm for uniform motion deblurring. the sum of all its elements equal 1, and all its elements
III. EXISTING METHOD are the same. The amount of the blurring is increased
when the size of the kernel is increased. That is because
• Single image super-resolution (SISR) is a notoriously
a large number of pixels are included and one smooth
challenging ill-posed problem because a specific low-
resolution (LR) input can correspond to a crop of
transition is defined. The weighted average filter gives
possible high- resolution (HR) images. more weight to the center value. As a result, the
contribution of the center pixel becomes more than the
• one is the unclear definition of the mapping that I aim rest of the pixels.
to develop between the LR space and the HR space,
and the other is the inefficiency of establishing a
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 221
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
222 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
HIGH RESOLUTION: [6] [5] Z. Cui, H. Chang, S. Shan, B. Zhong, and X. Chen, "Deep
network cascade for imagesuper-resolution," in Proc. ECCV.
Springer, 2014, pp. 49-64.
[7] J. Huang, A. Singh, and N. Ahuja, "Single image superresolution
from transformed selfexemplars,"in Proc. CVPR, 2015, pp. 5197-
5206.
[8] J. Yang, J. Wright, T. S. Huang, and Y. Ma, "Image super-resolution
via sparserepresentation," IEEE Trans. Image Process., vol. 19,
no. 11, pp. 2861-2873, 2010.
the-art methods. I have proposed a new architecture [13]S. Schulter, C. Leistner, and H. Bischof, "Fast and accurate image
upscaling withsuper- resolution forests," in Proc. CVPR, 2015,
DBSRCNN that enhances the reconstruction by pp. 3791-3799. [13] C. Dong, C. Loy, K. He,and X. Tang,
boosting the relevant features that were originally lost "Learning a deep convolutional network for image super-
in the SRCNN pipeline. Our experimental study with resolution," in Proc.ECCV. Springer, 2014, pp. 184-199.
different levels of Gaussian blur demonstrates that our
revised deeper architecture performs better in both blind
and non-blind testing scenarios. Icon injecture that
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 223
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- Today, it is not difficult to make to the database the system will stop immediately. All
duplicates of vehicle keys and using such keys the process here is controlled by programmed
increases the risk of robbery.For such problems, Raspberry Pi.
we hereby propose an efficient andeliablesolution.
Our system uses a face recognition system to A. EXISTINGMETHOD
identify the authorized users of the vehicles and 1) Intheexisting system of car securities, various sensors
only authorized users are allowed to use the vehicle. are Used door sensors, engine sensors, light sensors,
This allows for a fast easy to use the authentication etc.
system. The system uses a Raspberry Pi circuit, it
also consists of a camera. When we turn on the 2) Where the door sensors are used for locking and
system authority provided by 3 options that are unlocking The car doors through suitable key, when
registration, Start, and clear data, while registering, any duplicate key is Inserted it sends some signals to
it first scans the Owner's face. After successful the controller, however
registration, the owner can startthe vehicle. If an 3)When key is made suitable as the original one the sensor
unauthorized user tries to use the car, the systems Might not be able to differentiate the changes in the
cans the person's face and checks whether face system.
matches with the authorized face, if it does not
4) Hence resulting in the car theft.
match the system denies. In this way, the system
helps to secure such intelligent vehicles. II. LITERATURE CONCERN TO VEHICLE
IndexTerms -Raspberry Pi, vehiclekeys, THEFT
authentication. This paper aims to deploy a network that consists a
I. INTRODUCTION group of computers connected with a micro computer
with a camera.
With the new modern era development of new
technologies is amust be it in the management sector or The system takes images of people, analyze, detect
in the technical sector. improvements are necessary for and recognize human faces using image processing
every field. regarding the project chosen in the field of algorithms.The system can serve as a security system
vehicle security. various techniques have been improved in public places like Malls, Universities, and airports. It
such as biometrics, retinal scanning, image processing. can detect and recognize a human face in different
Apart from all the improvised techniques the theft of situations and scenarios. This system implements
vehicle still remains high in order to maintain the car "Boosted Cascade of Simple Features algorithm" to
security the system needs to be efficient, robust and detect human faces. "Local Binary Pattern algorithm"
highly reliable soin this paper, the security system to recognize these faces. Raspberry Pi is the main
involving face detection using Raspberry Pi, FRS component connected to a camera for image capturing.
algorithm along with database which consist of images All needed programs were written in python. Tests and
uploaded by theowner of vehicle. If the newly scanned performance analysis were done to verify the
image does not matchwith the image uploaded earlier efficiencyof this system. The Automatic Face
224 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 225
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Fig:2 RaspberryPi
Fig:3Proposdestructure
226 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
REFERENCES [5] J.-G.Lu,"Title of paper with only the first word capitalized," J.
Name Stand. Abbrev., inpress.
[1] M. King and B. Zhu, "Gaming strategies," in Path Planningto the
West, vol. II, S. Tang and M. King, Eds. Xian: Jiaoda Press,1998, [6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa,
pp.158-176.. "Electronspectroscopy studies on magneto-optical media and
plastic substrate interface," Translated J. Magn. Japan, vol. 2,
[2] H. Simpson, Dumb Robots, 3rd ed., Springfield: UOS pp.740-741, August 1987 [Digest 9th Annual Conf. Magnetics
Press,2004,pp.6-9. Japan, p.301,1982].
[3] M. King, B. Zhu, and S. Tang, "Optimal path planning,"Mobile [7] M. Young, The Technical Writer's Handbook, Mill
Robots,vol.8,no. 2,pp. 520-531,March 2001. Valley,CA:University Science, 1989.
[4] B.Simpson,etal, "Title of paper goes here if known,"unpublished.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 227
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- Most of the people who have seen common home computer software applications. This
the glasses, but may not allowed speaking publicly; system is working throughout the world as an artificial
a major feature of the glasses was the location brain. .It is related to the similar task of using computers
information. Google will be able to capture images
to understand human intelligence.
to its computers and augmented reality information
returns to the person wearing them through the II. CLASSIFICATION OFARTIFICIAL
camera already built-in on the glasses. For moment, INTELLIGENCE
if a person looking at a landmark then he could
see historical and detailed information. Also
Under such a system ,an AI can perform more
comments about it that their friend's left. If it's facial human-like functions with equivalent levels of proficiency
recognition software becomes moderate and will be considered as a more evolved type of AI. Based
accurate enough, the glasses could remind a wearer on this criterion, there are two ways in which AI is
and also tells us when and how he met the foggy generally classified. (i)strong AI and (ii) is weak AI.
familiar person standing in front of him at a function
A. STRONG AI
or party. A computer which is spectacle based
operated directly through your eyes rather than Strong AI is term used to describe a certain mind
your pouch or pocket. A gifted technology for all set of AI development. Strong AI's goal to develop AI
kinds of Handicapped/disabled people. to the point where the machine's intellectual capability
Keywords- Virtual reality, Augmented Reality, is functionally equally to a human's. It is theoretical form
Eye-Tap. of machine intelligence that is equal to human intelligence.
Key characteristics of Strong AI include the ability to
I. INTRODUCTION
reason, solve puzzles ,make judgements, plan, learn and
Now a days the people are inventing so many communicate. It should also have consciousness,
technologies, one of the technology is artificial objective thoughts, self-awareness, sentience and
intelligence. Artificial intelligence is defined as intelligence sapience. It is also called True intelligence or Artificial
exhibited by an artificial entity. Such a system is generally general intelligence.
assumed to be a computer. Although AI has a strong
B. WEAK AI
science fiction connotation, it forms a vital branch of
computer science dealing with intelligent behaviour, Weak AI or narrow AI is a machine intelligence that
learning and adaption in machines. Research in AI is is limited to a specific or narrow area. Weak AI simulates
concerned with producing machines to automate tasks human cognition and benefits mankind by automating
requiring intelligent behaviour. Examples include control, time-consuming tasks and by analysing data in ways
planning and scheduling the ability to answer diagnostic that humans sometimes can't. Weak AI lacks human
and consumer questions, speech and facial recognition. consciousness, though it may be able to simulate it.
As such it has become a scientific discipline, focused Narrow or weak AI system don't have general
on providing solutions to real life problems. AI systems intelligence; they have specific intelligence. Weak AI
are now in routine use in economics, medicine, helps turn big data into usable information by detecting
engineering and military as well as being built into many patterns and mankind predictions. Examples include
228 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
and understand digital videos and images. By looking Here input can be taken from both voice commands
at an object and its appearance, location and the or through visual information.
settings, it identifies what the object is.
• Input through visual information.:
For any information that has to be taken from visual
needs camera module
i. CAMERA Camera Module
The Raspberry Pi camera module is capable of taking
full HD 1080p photo and video and can be controlled
programmatically.
• Connecting the camera
Fig.,1. AI VISION The flex cable inserts into the connector situated
Whereas, virtual reality is the name for computer between the Ethernet and HDMI ports, with the silver
technology that makes a person feel like they are connectors facing the HDMI port.
somewhere else. It uses software to produce images The camera may come with a small piece of
,sounds and other sensations to create a different place, translucent blue plastic film covering the lens. This is
so that a user feels like he or she is really part of this only present to protect the lens while it is being mailed
other place. These two things plays a major role in the to you, and needs to be removed by gently peeling it
vision platform. off.
The camera may come with a small piece of
translucent blue plastic film covering the lens. This is
only present to protect the lens while it is being mailed
to you, and needs to be removed by gently peeling it
off.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 229
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
230 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Fig.,9.Output in display
VI. APPLICATIONS
• Education
• Remote teaching
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 231
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
232 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: Internet of Things (IoT) finds community services [1]. Data is at the heart ofthe IoT,
applications across many fields like health care, but to make it trustworthy enough for wide spread
industries, smart homes, safety and government acceptance, the security and privacy of that data must
sectors through their unique flexibility and ability be protected. It is atthis focus thing of demand for
to be suitable for any environment. Within this
innovation andthe requirements for acceptable data
context, building automation plays an important
securityand privacy[2].
role in maintaining living standard of people by
providing a secure and convenient environment. The smart home is one of the most prominent
The objective of our work is todevelop an automatic applications in the paradigm of the IoT. While it has
control of air conditioner(AC) and intruder added a level of comfort and convenience to users'
detection system for smartbuildings. The system everyday lives, it also brings a unique security challenge
automatically controls the compressor cycle of AC of mitigating insider threats posed by legitimate users.
based on the values of temperature sensor and
Such threats primarily arise due to the sharing of IoT
motion sensor obtained using the micro controller.
Once the motion is detected, temperature sensor devices and the presence of complex social and trust
senses the room temperature and if relationships among users. State-of-the-art home IoT
thetemperature goes above a threshold value, AC platforms manage access control by deploying various
will be turned on and set in to a predefined value. multi factor authentication mechanisms. Nevertheless,
Additionally, only authorized person can enter in such hard security measures are in adequate to defend
to the house with help of RFID tagat entrance and against insider threats, and there is a growing need to
got message to mobile using GSM. If any integrate userbehavior and environmental context in
unauthorized person tries toenter it will not allow, order to make intelligent authorization decisions[3].
this can be achievedusing RFID Module it has a
unique id in it anditisregistered with micro Some of the leading home IoT platforms that have
controller. emerged over the past few years are Samsung's Smart
Things, Apple's Home Kit, and Google's Android
I. INTRODUCTION
Things. These platforms are energy efficient, connect
A smart city is a future trend solution that uses heterogeneous devices and protocols, allow remote
various electronic Internet of Things (IoT) sensors to control and actuation, and support third-party
collect data. Insights obtained from that data are application development[4].
subsequently used to manage assets, resources, and
The popularity of smart home appliances is causing
services efficiently; assuch, the data is used to improve
the increasing development of the IoT. For example,
operationsacross the city. It includes data collected
most smart home devices-such as smart televisions,
fromcitizens, devices, buildings, and assets that are
fridges, dishwashers,cooling systems, and heating
processed and analyzed to monitor and manage traffic
machines, amongothers-are connected to the Internet
and transportation systems, power plants, utilities, water
to make people's lives more comfortable and easier.
supply networks, waste, crime detection, information
Nowadays, the ability of smart home management to
systems, universities, libraries, hospitals, and other
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 233
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
234 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
the minimum amount of time required by the LCD data 3) Set data to data lines (if it is writing)
sheet (this varies from LCD toLCD), and end by 4) Set E line to high
bringing it low(0) again.
5) Set E line to low
RS: Line is the "Register Select" line. When RS is
low (0), the data is to be treated as a command or Entering Text:
special instruction (such as clear screen, position cursor, First, a little tip: it is manually a lot easier to enter
etc.). When RS is high(1), the data being sent is text characters and commands in hexadecimal rather than
data which should be displayed on the screen. For binary (although, of course, you will need to translate
example, to display the letter "T" on the screen you commands from binary couple of sub-miniature
would set RS high. hexadecimal rotary switches is as imple matter, although
RW: Line is the "Read/Write" control line. When a little bit into hex so that you knowwhich bits you are
RW is low (0), the information on the data bus is being setting). Replacing the d.i.l.switch pack with a of re-
written to the LCD. When RW is high(1), the program wiring is necessary.
is effectively querying (or reading) the LCD. Only one LCD Commands:
instruction ("Get LCD status") is a read command. All
There are some present commands instructions in
others are write commands, soRW will almost always
LCD, which we need to send to LCD through some
be low. Finally, thedata bus consists of 4 or 8 lines
microcontroller. Some important command instructions
(depending onthe mode of operation selected by the
are given below:
user). In the case of an 8-bit data bus, the lines are
referred to as DB0, DB1, DB2, DB3, DB4, DB5, DB6, Table 3.5 Commands
and DB7.
Logic status on control lines:
• E-0 Access to LCDdisabled
- 1 Access to LCDenabled
• R/W-0 Writingdatato LCD
- 1 Readingdata fromLCD
• RS -0Instructions
- 1Character
Writing data to the LCD:
1) Set R/Wbit tolow
2) Set RS bit to logic 0 or 1(instruction or character)
3.4 Relays
3) Set data to data lines (if it is writing)
A relay is an electrically operated switch. These are
4) Set E line to high
remote control electrical switches that are controlled
5) Set E line to low by another switch,such as a horn switch or a computer
Read data from data lines (if it is reading) on as in a power train control module, devices in industries,
LCD: home based applications. Relays allow a small current
pin, 4-pin, 5-pin, and 6-pin, single switch or dual
1) Set R/W bit to high switches. Relays are used throughout the automobile.
2) Set RS bit to logic 0 or 1 (instruction or character) Relays which come in as sorted sizes, ratings, and
236 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Relay Circuit
IV. RESULTS
4.1 BLOCK DIAGRAM
Relay
Working
R fid tag 1 acess grant wifi message otherwisemotor
off rfid tag 2 acess denied wifi message then motor off.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 237
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
motion sensor sends message to the wifi module 7. Shrouf, F.; Ordieres, J.; Miragliotta,G. Smart factories in Industry
4.0: A review ofthe concept and of energy management approached
temperature is greater than 35 then message sends to in productionbasedontheInternetofThingsparadigm. In
the wifi module. Proceedings of the 2014 IEEE International Conference on
Industrial Engineering and Engineering Management(IEEM),
V. CONCLUSION Selangor Darul Ehsan, Malaysia, 9-12 December 2014;pp. 697-
701.
Numerous IoT techniques have been installed in
smarthomes to improve home owners' quality of life. In 8. Bandyopadhyay, D.; Sen, J. Internet of Things: Applications
and Challenges in Technology and Standardization.Wir
this context, an excellent asset for a smart home is el.Pers.Commun.2011,58,49-69.[CrossRef]
proposed in this study. We have designed and 9. International Energy Agency(IEA). Global Energy & CO2 Status
implemented a system to control the home, which has Report.2019. Available online:https://www.iea.org/geco/(accessed
three parts: hardware, a server with high security,and a on 27 September 2019).
web application. The IoT node hardware was designed
for real-life testing, and to receive IoT information from
any device. A server was designed and implemented to
control the IoT nodes in the system. Finally, an
application for use anytime or anywhere on a
smartphone or web browser via a Wi-Fi communication
connection link was built to control the IoT smart system
in real time. This application permits both automatic
and manual functional control, which is flexible for the
user.
REFERENCES
1. Stearns, P.N. Reconceptualizing the Industrial Revolution.J.
Interdiscip. Hist.2011, 42, 442-443.
2. Mokyr, J.The second industrial revolution, 1870-1914. In
Storiadell' Economia Mondiale; Citeseer; 1998; pp.219-
245.Available online:http://citeseerx.ist.psu.edu/view doc/
download?doi=10.1.1.481.2996&rep=rep1&type=pdf (accessed
on16 January2020).
3. Jensen, M. The Modern Industrial Revolution, Exit, and the
Failure of Interna lControl Systems. J.Financ.1993, 48,831-880.
4. Kagermann, H.; Helbig, J.; Hellinger,A.;Wahlster, W. Recommend
tions for Implementing the Strategic Initiative Industrie4.0:
Securing the Future of German Manufacturing Industry; Final
Report of the Industrie 4.0 Working Group; Forschungs union:
Frankfurt/Main,Germany,2013.
5. Witchalls, C.;Chambers, J. The Internet of Things Business Index:
A Quiet Revolution Gathers Pace; The Economist Intelligence
Unit: London,UK, 2013;pp.58-66.
6. Datta, S.K.; Bonnet, C. MEC and IoTBased Automatic Agen t
Reconfiguration in Industry 4.0. In Proceedings of the 2018 IEEE
International Conference on Advanced Networks and
Telecommunications Systems (ANTS), Indore, India, 16-19
December 2018; pp. 1-5.
238 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- In this paper we are going to the virus before the appearance of the first
presented an IOT based notification system for symptoms.Like other known viruses and disease,
identification of covid-19 symptoms at initial stages scientists and researchers have identified some
to avoid the spreading of this virus. symptoms that may describe a person as infected with
Keywords- temperature sensor, esp8266 IOT a coronavirus. The most common symptoms of
board. COVID-19 are fever, dry cough, and fatigue. Other
I. INTRODUCTION less common symptoms, like wheezing and pain, nasal
congestion, headache, arthritis, sore throat, diarrhea,
Coronavirus is a large group of viruses that can be loss of taste or smell and rash or discoloration of the
pathogenic in animals or humans. The novel coronavirus fingers or toes, may be observed in some cases. These
that was recently discovered is responsible for the symptoms, appearing gradually, are usually mild.
coronavirus disease 2019 (COVID-19), which is a However, some patients experience very cautious
contagious illness caused by the last discovered type symptoms. As we can see, scientists are still unable to
of coronavirus, SARS-CoV-2. This new virus and the declare exact and definitive symptoms for detection of
disease were not known before the outbreak in Wuhan, the coronavirus.Considering all these factors related to
China, in December 2019 . According to the Centers the difficulty in the diagnosis of the coronavirus and the
for Disease Control and Prevention (CDC), at least difficulty in its treatment due to its contactless spread in
seven different human coronaviruses are known so far the patient's environment, it is highly desirable to devise
and this number may increase in the future. As of now, a solution for detecting the presence of coronavirus in
COVID-19 epidemic has resulted in about 2.6 million a patient using non-invasive and remote methods with
deaths as well as 117 million cases so far world- minimum involvement of the medical staff. Current
wide.COVID-19 is transmitted through respiratory solutions focus on taking blood samples or patient's
droplets expelled from the nose or mouth when a sick saliva using a swab test or using X-rays of the lungs.
person coughs, sneezes, or talks. These drops are Because of the immediate risk of infections, it is highly
relatively heavy and do not cover large distances. Rather, desirable to develop contactless, remote solutions for
they fall quickly on the ground. COVID-19 can be coronavirus detection. One of the solutions is to use
contracted if these droplets are inhaled. For this reason, cheap medical devices that can be distributed in the
it is so important that we stay at least one meter away community and can be discarded after its use to avoid
from others. These droplets can be found on objects potential spread of the virus from person-to-person. In
or surfaces (tables, door handles, ramps, etc.) around the related work, we identify some efforts in this
a sick person. COVID-19 can then be contracted if direction, and in the continuity of the previous such
one touches these objects or surfaces and then touches efforts, we devise an improved screening mechanism
their eyes, nose, or mouth. The incubation time of utilizing the latest findings of the disease.
COVID- 19 coronavirus, which is the period between
contamination and the onset of the first symptoms, II DETECTION OF COVID-19 USING
ranges generally from three to five days. However, in WEARABLE DEVICES
some cases it may extend to fourteen days. During this The idea of using sensors for screening or detection
period, a person may be contagious: they may carry of COVID-19 is not new, but many of the existing
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 239
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
solutions propose proprietary devices and the focus monitoring system. The goal was to improve outdoor
has been mainly on making ventilators and safety. The system consists of two layers: one is used
personalprotective equipment 3D-printed medical to collect user data, and the other to aggregate the
equipment , nanotechnology-enabled solutions, etc. In collected data over the Internet. Wearable devices were
the market, many smart- phones and wearable devices used to collect safety indicators from the surrounding
also offer some sensors for monitoring heartbeat, environment, and health signs from the user [9].Hamidi
respiratory rate, sleep quality, etc. and some of them studied authentication of IoT smart health data to ensure
also have API's for accessing their data in third-party privacy and security of health information. The work
apps. However, due to privacy issues with such devices proposed a biometric-based authentication technology
and given that the proprietary solutions do not provide [10].Rath and Pattanayak proposed a smart healthcare
any flexibility and extensibility, we chose to develop hospital in urban areas using IoT devices, inspired by
our solution using open-source components. As such the literature. Issues such as safety, security and timely
the concept of using Free and Open Source scientific treatment of patients in VANET zone were discussed.
and medical Hardware (FOSH) has led to some efforts Evaluation of the proposed system was conducted using
in combining sensors for the treatment of coronavirus. simulators such as NS2 and NetSim [11].Darwish et
Novel Contributions of this Work al. proposed a CloudIoT-Health paradigm, which
integrates cloud computing with IoT in the health area,
Similar to some of the previous approaches, we based on the relevant literature. The paper presented
propose a framework for screeningof COVID-19 the challenges of integration, as well as new trends in
remotely, with the help of wearable sensorial devices. CloudIoT-Health. These challenges are classified at
However, unlike existing approaches, our proposed three levels: technology, communication and networking,
solution has several novel features. First, the and intelligence [12].Zhong and Li studied the
sensorsutilized in our approach are cheaper, available monitoring of college students during their physical
off- the-shelf, and can be easily integratedto detect activities. The paper focused on a Physical Activity
various symptoms, as described above. Each sensor Recognition and Monitoring (PARM) model, which
used in our device costs only a few dollars. The involves data pre- processing. Several classifiers, such
advantage is a device can easily be discarded if it is as decision tree, neural networks, and SVM, were
found to be contaminated. Since the sensors are generic, tested and discussed [13].Din and Paul proposed an
they can be replaced or recomposed into an improved IoT-based smart health monitoring and management
device in the future. Second, the novelty of our approach architecture. The architecture is composed of three
is that the test can be carried out by experts and non- layers: (1) data generation from battery-operated
experts and the results obtained can be inferred by medical sensors andprocessing, (2) Hadoop
anyone. All the processing is done by the sensors and processing, and (3) application layers. Because of the
the accompanying framework. Third, the results can limited capacity of batteries to power the sensors, the
be monitored and analyzed remotely. work employed an energy-harvesting approach using
III. LITERATURE REVIEW piezoelectric devices attached to the human body
[14].Otoom et al. developed an IoT-based prototype
There is considerable work in the literature regarding
for real-time blood sugar control. ARIMA and Markov-
the use of the Internet of Things (IoT) to deliver health
based statistical models were used to determine the
services. Usak et al. conducted a systematic literature
appropriate insulin dose. Alshraideh et al. proposed an
review of the use of IoT in health care systems. That
IoT-based system for Cardiovascular Disease detection.
work also included a discussion of the main challenges
Several machine learning algorithms were used for CVD
of using IoT to deliver health services, and a
detection.Nguyen presented a survey of Artificial
classification of the reviewed work in the literature
intelligence (AI) methods being used in the research of
[8].Wu et al. proposed a hybrid IoT safety and health
COVID-19. This work classified these methods into
240 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
several categories, including the use of IoT. Maghdid - No headache and pains.
proposed the use of sensors available on smartphones - No comorbidities.
to collect health data, such as temperature.Rao and
Vazquez proposed the use of machine learning • Class 1: Mild symptoms
algorithms to identify possible COVID-19 cases. The - SpO2 95%;
learning is done on collected data from the user through
- Heartbeat Rate100 bpm;
web survey accessed from smartphones. Allam and
Jones discussed the need to develop standard protocols - 36 0C Temperature 38 0C;
to share information between smart cities in pandemics, - No shortness of breath.
motivated by the outbreak of COVID-19. For instance,
AI methods can be applied to data collected from - No comorbidities
thermal cameras installed in smart cities, to identify • Class 2: Moderate clinical symptoms
possible COVID-19 cases. Fatima et al. proposed an
- 93% SpO2 94%;
IoT-based approach to identify coronavirus cases. The
approach is based on a fuzzy inference system [19]. - Heartbeat Rate > 100 bpm;
Peeri et al. conducted a comparison between MERS, - Temperature ≥ 38 0C.
SARS, and COVID-19, using the available literature.
They suggested the use of IoT in mapping the spread • Class 3: Serious clinical symptoms
of the infection. - SpO2 92%;
IV. PROPOSED METHOD - Heartbeat Rate > 120 bpm;
We consulted two experts specialized in infectious - Temperature > 38 0C
disease. The consulted doctors identified that SpO2
• While the sensors are useful for detection of vital
measurement is a key and essential determinant of
signs, we have also additional parameters of shortness
COVID-19. If the SpO2 is > 95% with a normal of breath, headache, and occurrence of any
temperature, the patient does not present any sign of comorbidity (diabetes, heart disease, hypertension,
disease and the test will be negative and the patient etc.) in our rules. At the moment these parameters
should not go to the COVID-19 center. However, if are assessed from visual inspection and through
the SpO2 is between 93% and 94% with enough high question-answering. In the current version, and for
temperature (>38), then it is important to get one tested screen- ing purposes, it is sufficient to have the
for COVID-19. In addition, we also extracted some confirmation from the patient. In the diagnosis stage,
rules from the existing literature as discussed in Section further devices can be used to determine these
2.This allowed us to define four classes of screening symptoms. For example, the expert or physician can
carry out measurement of glucose level, blood
results. Each class meets a specific set of rules. A patient
pressure, or performing an ECG for a conclusive
is evaluated against the rules and is assigned a class
outcome. This will only be needed in the case of serious
based on the conditions stated in each class. These clinical symp- toms (class 3). For screening purposes,
classes as defined as below. verbal confirmation of a patient may require several
V. SIMULATION AND RESULT additional questions depending upon the regional
guidelines [60] for COVID-19 screening
• Class 0: Non-symptomatic
- SpO2 95%;
- Heartbeat Rate100 bpm;
- Temperature 37.2 0C;
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 241
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
REAL-TIME SCREENING: ANALYSIS AND VISUALIZATION For IoT solutions, we have used the blynk IoT
We illustrate the working of our prototype medical platform that is designed with the objective of rapid
device using the following scenario.A person is development of IoT-based solutions. The platform
suspected of COVID-19 and needs to be screened. supports streaming of data from sensors and mobile
The person is instructed to obtain a device from a devices, which is then analyzed in real-time. A variety
designated place and wear it according to the directions of visualization techniques are available to visualize the
given by a health worker or professional through some data in real-time. Figure shows the interface of our
distance. Once a person feels comfortable in wearing system displaying the data obtained from a patient's
the device, it is activated through a mobile interface device. This interface is important to consolidate the
that starts reading through all the sensors. As each data obtained from a number of patients. Through
sensor completes its reading, the data is immediately advanced analytics, we will be able to carry out statistical
sent to the IoT platform through the Wi-Fi module of analysis, identifying the need for enforcing special
Arduino. The data is sent in streams. To be able to precautions in an area infected with coronavirus,
detect the cough, the patient is required to wear the etc.However, these features will be integrated in the
device for at least two minutes while the data is being near future. In addition, we have also developed a
streamed and stored at the cloud, and subsequently, dedicated smartphone interface, that is locally
visualized at the dashboard. As soon as all the sensors connected to the medical device and displays the data
finish collecting the data, a signal is sent to the mobile in real-time
device indicating to the health worker to stop the VI. CONCLUSIONS AND FUTURE SCOPE
measurement process. A final snapshot is also shown
The COVID-19 virus has been around for almost a
on the mobile screen as it receives data from the IoT
year now and the medical com- munity, scientists, and
platform. The patient is instructed to remove the device
researchers are trying their best to identify a cure for
and put it back at a designated place. In case, the patient
the disease. At the same time, people around the world
242 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
are facing issues in determining the state of an individual 3. New York Post . 2020. The Most Promising Coronavirus
Breakthroughs so Far, from Vaccines to Treatments.https://
as healthy or affected by the virus. The state-of-the-art nypost.com/2020/04/08/coronavirus-breakthroughs-how-close-
solutions require visiting a hospital or a healthcare facility are-we-to-a-vaccine/ April 8. [Google Scholar]
to perform COVID-19 diagnosis. Considering the 4. Kelly M.P. Digital technologies and disease prevention. Am. J.
numerous difficulties and the associated dangers in its Prev. Med. 2016;51(5):861-866. doi: 10.1016/
diagnosis, it is preferable to be able to perform the j.amepre.2016.06.012. [PubMed] [CrossRef] [Google Scholar]
disease detection using wearable devices.This article 5. Hlaing P.M., Nopparatjamjomras T.R., Nopparatjamjomras S.
Digital technology for preventative health care in Myanmar.
proposed a framework for remote screening of the virus Digital Medicine. 2018;4(3):117-121. doi: 10.4103/
using standards- based practice identified in the digm.digm_25_18. [CrossRef] [Google Scholar]
literature. The framework utilizes sensors combined in 6. Cerina L., Notargiacomo S., Paccanit M.G., Santambrogio M.D.
the form of a wearable device that can be worn by any IEEE 3rd International Forum on Research and Technologies for
individual to know in a few seconds whether the person Society and Industry (RTSI) 2017. A fog-computing architecture
for preventive healthcare and assisted living in smart ambients;
is healthy or is doubtful of carrying the disease.The pp. 1-6. Modena. [CrossRef] [Google Scholar]
framework requires testing on a large population and 7. Dinesen B., Nonnecke B., Lindeman D. Personalized telehealth
at the same time the data obtained through testing can in the future: a global research agenda. J. Med. Internet Res.
be used for advanced analytics such as outbreak 2016;18(3):e53. doi: 10.2196/jmir.5257. [PMC free article]
[PubMed] [CrossRef] [Google Scholar].
prediction and prevention, population segmenting, as
well as helping the government and decision- makers 8. Usak M., Kubiatko M., Shabbir M.S., Dudnik O.V.,
Jermsittiparsert K., Rajabion L. Health care service delivery based
to take appropriate measures. As a future work and on the Internet of things: a systematic and comprehensive study.
due to unavailability of the required data, we will test Int. J. Commun. Syst. 2020;33(2) [Google Scholar]
our device using data in order to establish its 9. Wu F., Wu T., Yuce M.R. An internet-of-things (IoT) network
performance.In the Covid 19 pandemic, attempts and system for connected safety and health monitoring applications.
uses of smart technologies to manage the pandemic has Sensors. 2019;19(1):21. [PMC free article] [PubMed] [Google
Scholar]
been started. The Chinese and Japanese used robots
10. Hamidi H. An approach to develop the smart health using Internet
for surveillance. Countries like Qatar, Indonesia, and of Things and authentication based on biometric technology.
Jordan also use drones to monitor the isolation process. Future Gen. Comput. Syst. 2019;91:434-449. [Google Scholar]
New applications related to remote temperature checks 11. Rath M., Pattanayak B. Technological improvement in modern
and thermal monitoring cameras have also emerged to health care applications using Internet of Things (IoT) and
identify injuries in public places. In addition to that, proposal of novel health care approach. Int. J. Hum. Rights
Healthcare. 2019;12(2):148-162. doi: 10.1108/IJHRH-01-2018-
locator and tracker applications through smart phones 0007. [CrossRef] [Google Scholar]
have been used. Smart robots can be used in hospitals, 12. Darwish A., Hassanien A.E., Elhoseny M., Sangaiah A.K.,
mobile clinics and smart medical rooms. Although many Muhammad K. The impact of the hybrid platform of internet of
researches in AI have been started, the most attention things and cloud computing on healthcare systems: opportunities,
challenges, and open problems. J. Ambient Intell. Hum. Comput.
must be given to smart simulation that focus on future 2019;10(10):4151-4166. [Google Scholar]
prediction.
13. Zhong C.-L., Li Y.-L. Internet of things sensors assisted physical
REFERENCES activity recognition and health monitoring of college students.
Measurement. 2020;159 [Google Scholar]
1. World Health Organization; 2020. Coronavirus COVID-19 Global
Cases by the Center for Systems Science and Engineering (CSSE) 14. Din S., Paul A. Erratum to "Smart health monitoring and
at Johns Hopkins University (JHU)https://coronavirus.jhu.edu/ management system: toward autonomous wearable sensing for
map.html Accessed 21 July. [Google Scholar] Internet of Things using big data analytics. Future Gener. Comput.
Syst. 2019;91:611-619. [Google Scholar].
2. 2020.WHODirector-General's Opening Remarks at the media
Briefing on COVID-19 11 March.https://www.who.int/dg/
speeches/detail/who-director-general-s-opening-remarks-at-the-
media- briefing-on-covid-19-.11-march-2020 Accessed 11 March
2020. [Google Scholar]
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 243
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: Smart Card Payment Software is a to user.The data will be stored in database for further
RFID Based Payment Solution for Colleges, usage.
Hospitals, Public Parks, Gym's etc., to Register,
Validate, Perform and Monitor Real Time Smart Card:
transactions Using Smart Card as an ID card. Smart-Card is a secure portable storage device
Member/Student/User or Staff registers in the which is used in various applications requiring controlled
College using Smart card Payment Software at the
access to sensitive information. It is in the size of a credit/
time of registration Smart card will be encoded with
User details, balance will be pre-loaded in to the
debit card, incorporated with one or more integrated
Smart Id Card and printing User details can be done circuit chips.
after Issuing the card to the Card Holder on It functions as a microprocessor, memory and
verification and enabling to use the card with-in provides an input-output interface. The International
the Campus. Either Admin/Staff can do registration, Organization for Standardization (ISO) specifies certain
Recharge, Canteen and Game Deductions Based
voluntary international standards in many scientific and
on the Privileges. Smart card Payment Software
Functions: Staff Registration with pin generation
technological fields. However, till to date, ISO has not
and card encoding for login. Member/Student defined any standards for the devices termed as "Smart
Registration handles with pin generation, card Cards."
encoding and Amount loading in smart card.
Keywords: XAMPP Software, My SQL,
CSS,HTML & PHP.
1. INTRODUCTION
In colleges, schools or Inside an University campus
canteen facility is provided. Students, college staff or
university staff uses this facility. In this canteens students
or employees pay their bills by cash. In existing system, Fig. 1 Smart Card
cash payment is the only option for making the Smart Card Architecture:
payment.The main draw back of cash payment system
is that user always needs to carry the cash with him/ A Smart Card's architecture basically consists of
her. And tendering exact change might become an three elements. They are:I/O System,Central Processing
issue.Maintaining paper based records(of income) can Unit (CPU) and Memory
get spoiled or damaged and data of student account
might get lost. To overcome these problem smart cards
are used.The objective of this project is to develop
smart card payments using Mifare, to use in campus
for manipulation of data and to provide better services
244 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
computer, which determines the user's identity and the from the tag. The reader then passes the information in
information which the user is entitled to access. digital form to a computer system. Once a link is
Chip Model: established with a unique ID on an item, then automation
of an assortment of processes ensures.
246 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
wireless
LAPTOP/PC with
Browser
USB
3. PROPOSED SYSTEM:
APPLICATION FLOW GRAPH
Staff Registration:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 247
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
can be either students or staffs and in case of an [9]. New XAMPP with MariaDB apachefriends.org. 19 October
2015. Archived from the original on 2015-11-19. Retrieved 19
organisation. It is very much useful for the people who November 2015.
go to canteen regularly, may be daily. The major
[10]. PHP - history of PHP presentation by Rasmus Lerdorf given at
downside in cash payment system is that user seems to the MYSQL Conference in Santa Clara, California.
pay correct sum else there might be issues in providing
the balance money. To overcome this, we are using
cashless payment system. In this Cashless payment, they
do not have to bring the cash with them anymore. Each
and every registered customer will get a card and person
can do recharge with whatever amount he/she wishes
to have. This is done by reducing the paper work and
costs. This model can be easily scaled according to the
requirement.
FUTURE SCOPE:
Future development strategies of smart card
application are as follows. It is used to develop services
upon the activities for students and staff on campus;
applications for specific locations such as libraries,
stationary, gymnasiums, games, document uploading.
REFERENCES:
[1].Ashalatha R, Jayashree Agarkhed - Evaluation of Auto scaling
and Load balancing features in cloud - International Journal of
Computer Applications (0975 8887) Volume 117 No. 6, May
2015 from P.D.A College of Engineering, Kalaburagi, India.
[2]. Student Card System using Smart Card Technology - Information
Technology Based Higher Education and Training, 2004. ITHET
2004. Proceedings of the Fifth International Conference in January
2004 from the University of New South Wales UNSW, Sydney,
NSW 2052, Australia.
[3]. MIFARE (Card) Coil Design GuideApplication note, BU- ID
Document number 0177
[4]. MIFARE Type Identification ProcedureApplication note, BU-
Document number 0184
[5]. Contactless smart card module specification MOA4Delivery
Type Description, BU - Document number 0823
[6]. S.B. Patil, Srikantha Rao, P.S. Patil 2001 'Canteen Management
Design Principles' Proceedings of the International Conference
& workshop on trades in Technology, pp. 765-766, viewed 7
October 2001.
[7]. Lavina Mall, Nihal Shaikh - "Canteen management system using
RFID Technology based on cloud computing ", International
journal of engineering science & research Technology volume:
173, April - 2017 from Rizvi College of Engineering, India.
[8]. Prashant Sharma, Bibin Mathew, "RFID based canteen cashier
system". International Journal for Research in Engineering
application and management volume: 03, Issue: 04, May -2017.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 249
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract - Low contrast and non-uniform continuous progress in the areas of X-ray, Ultrasound,
illumination in retinal images hinders the process CT, MRI, Nuclear and other imaging modalities. Since,
of accurate lesion detection. Machine learning has medical images are affected with poor illumination, local
been of significant importance with its ability to luminosity and contrast variability, and noise arising from
correct the contrast and illumination problems. In
the process of acquisition it becomes necessary to
this paper, in our proposed system, by applying
ensemble of machine learning classifying algorithms
enhance the images for accurate diagnosis. One of the
on features extracted from output of different many areas where medical image enhancement has been
retinal image processing algorithms, like diameter put to clinical use is retinal image analysis. Fundus
of optic disk, lesion specific (micro aneurysms, photography is the most common method to image an
exudates), image level (pre-screening, AM/FM, eye and is thus used for screening large scale population
quality assessment). Decision making for for Diabetic Retinopathy (DR), Glaucoma, and Age-
predicting the presence of diabetic retinopathy was Related Macular Degeneration. In order to analyze the
performed using Random Forest. Here GLCM extent of degradation of an image, different image quality
(Gray Level Co-Occurrence Matrix) is used for metrics have been developed. These image quality
feature extraction. Fuzzy C-Means (FCM) is used metrics also track unperceived errors and can be used
for image segmentation. Here we will get the high
to compare image enhancement algorithms. If an image
Accuracy compared to all other existing methods
classification. Processing time is very less
without any kind of distortion or minimal distortion is
compared to Neural Network methods. present, it is called a reference image. This image is
Experimental results obtained the better then used to measure the quality of other images using
performance when compared to other techniques. parameters like mean squared error, peak signal-to-
noise ratio and structured similarity index. If a reference
INDEXTERMS: BRISQUE,CLAHE,DOTHE,
ETHE, Histogram, Lesions image is not available, the quality of image is then
calculated based on the expected image statistics.
I. INTRODUCTION
II. LITERATURE REVIEW
Medical image as one of the pioneers in the field of
scientific images with the use advance medical K. Wisaeng, and W. Sa-Ngiamvibool, "Exudates
equipment allowing better image reconstruction and Detection using Morphology Mean Shift Algorithm in
easier diagnosis. One of the many areas where medical Retinal Images," IEEE Access, vol.7,pp.11946-11958,
image enhancement as been put to clinical using retinal Jan. 2019, doi: 10.1109/ACCESS.2018.2890426.
image analysis.Many high disease as well as which T.Selcuk, and A. Alkan, "Detection of Micro
systemic diseases manifest on the retinal itself. aneurysms using Ant Colony optimization Algorithm in
Medical imaging has clearly established itself as one the early detection of Diabetic Retinopathy," Med.
of the pioneers in the field of scientific imaging, with the Hypotheses, vol. 129, Aug. 2019, doi: 10.1016/
use of advance medical equipment allowing better image j.mehy.2019.10924
reconstruction and easier diagnosis. There has been
250 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
III. EXISTING METHOD applying a threshold to the image. Edges having a value
Medical imaging has clearly established itself as one greater than threshold are dominant edges (threshold is
of the pioneers in the field of scientific imaging, with the set to 1). Once the dominant edges have been
use of advance medical equipment allowing better image highlighted, maximum () and minimum () grey level
reconstruction and easier diagnosis. There has been values in the NXN neighborhood (N is set to 3) are
continuous progress in the areas of X-ray, Ultrasound, identified. Then the histogram is computed for all the
CT, MRI, Nuclear and other imaging modalities. Since, values in this range. The histogram computed is
medical images are affected with poor illumination, local extended to the entire image for enhancement. A total
luminosity and contrast variability, and noise arising from of 644 images across four different databases have been
the process of acquisition it becomes necessary to used.
enhance the images for accurate diagnosis. One of the (i) STARE Database contains 397 images with average
many areas where medical image enhancement has been image quality score 29.5658.
put to clinical use is retinal image analysis. Many eye (ii) DIARET DB1 Database contains 89 images with
diseases as well as systemic diseases manifest on the average image quality score 40.8554.
retina itself. Fundus photography is the most common (iii)DIARET DB0 Database contains 130 images with
method to image an eye and is thus used for screening average image quality score 40.6831.
large scale population for Diabetic Retinopathy (DR),
Glaucoma, and Age-Related Macular Degeneration. (iv)CHASE Database contains 28 images with average
image quality score 48.4418.
Optical Coherence Tomography (OCT) is another
imaging technique for diagnosis of inflammatory retinal Image Quality Parameter Evaluation BRISQUE
diseases. In order to analyze the extent of degradation model is used to calculate the image quality score before
of an image, different image quality metrics have been and after the application of image enhancement
developed. These image quality metrics also track techniques. It is highly efficient as it does not require
unperceived errors and can be used to compare image transformation to calculate its features. The features for
enhancement algorithms. If an image without any kind image quality are obtained by fitting mean subtracted
of distortion or minimal distortion is present, it is called contrast normalized coefficients (MSCN) to the
a reference image. This image is then used to measure generalized Gaussian distribution (GDD) and the
the quality of other images using parameters like mean pairwise products to the asymmetrical generalized
squared error, peak signal-to-noise ratio and structured Gaussian distribution (AGGD) .
similarity index. If a reference image is not available, Supervised learning method is used in the most of
the quality of image is then calculated based on the the application of the system. The disadvantage of this
expected image statistics. method is the segmented image is compared to the
In the existing method, the Diabetic Retinopathy original reference image. Hence large time is needed.
images will be identified using some techniques based Supervised learning can be separated into two types
on the ETHE, even though the images will be classified, of problems regarding to classification and regression:
the accuracy and precision will be comparatively less.
• Classification uses an algorithm to accurately assign
Edge-based Texture Histogram Equalization (ETHE) test data into specific categories. It recognizes specific
technique has been proposed to enhance the image entities within the dataset and attempts to draw some
quality. A textured area is characterized by the presence conclusions on how those entities should bedefined.
ofdensity edges in a particular region. In ETHE, the Common classification algorithms are linear
pixels present in the nontextured areas are suppressed classifiers, support vector machines (SVM), decision
and stress is placed on the textured regions. In this trees, k-nearest neighbour, and random forest, which
method, the significant edges are identified using the are described in more detail below.
Sobel edge detector. An edge-map is created by
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 251
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
DWT and
Feature Extraction
GLCM
Random
Classification
Forest
Performance Analysis
Fig. 1: Block Diagram of Existing Method.
Fig 2 : Block diagram of proposed method
DRAWBACKS
• Poor illumination condition. Algorithm of Proposed Method:
• Noisy texture background. • Step 1 : Select the image from data set.
• Less Performance. • Step 2 : Perform preprocessing using Gaussian filter.
• Low pixel intensity. • Step 3: Segmentation is done using FCM.
• Accuracy is less. • Step 4: Feature extraction using DWT & GCLM.
• Supervised technique is applied. • Step 5: Classification is performed using Random
• Precision value is also less. Forest.
IV. PROPOSED METHOD POSSIBLE OUTCOMES OF RANDOM
In proposed system, by applying ensemble of FOREST CLASSIFIERS
machine learning classifying algorithms on features Input Image Output of The System
extracted from output of different retinal image Original Image Tampered Image
Normal True Positive (TP) False Negative (FN)
processing algorithms, like diameter of optic disk, lesion Abnormal False Positive (FP) True Negative (TN)
specific (micro aneurysms, exudates), image level (pre-
Table 1: Possible Outcomes of RFC
screening, AM/FM, quality assessment). Decision
making for predicting the presence of diabetic PERFORMANCE PARAMETERS OF
retinopathy was performed using Random Forest. Here PROPOSED METHOD:
GLCM (Gray Level Co-Occurrence Matrix) is used The performance of the proposed system is
for feature extraction. Fuzzy C-Means (FCM) is used evaluated in terms of following parameters
for image segmentation.Here we will get the high
• Accuracy=(TP+TN)/(TP+TN+FP+FN)
Accuracy compared to all other existing methods of
classification.Processing time is very less compared to • Sensitivity=(TP)/(TP+FN)
Neural Network methods. We reviewed the both • Specificity=(TN)/(TN+FP)
sequential and parallel algorithms and proposed a new
method inspired on some techniques presented. Through • TN = True positive, TP = True negative
Our algorithm we expect to achieve a significant increase FP = Flase positive, FN = Flase Negative
on the performance.
252 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: The security system now is being high, enabling everyday objects that uses embedded circuits
still people are facing many problems due to to interact and communicate with one another utilizing
robberies. So, to improve the security a prototype the present Internetinfrastructure.
Three Level Security System is implemented.
Three Level Security System helps in decreasing This project is implemented using face recognition,
of robberies. This system can be used anywhere, in this prototype it has three levels like Level-I is used
and easy to implement and maintain. The prototype for when a person comes near to a room which consists
is designed with many sensors like magnetic locker the authenticator gets a notification through the
sensor, vibration sensor, motion sensor. The app. The software can be used for both laptops and
System also consists of an application especially mobiles, in this the notification system is given to know
designed for users to get notification. So, before the status of the thief and also in Level-II the admin
the robbery takes place the user gets cautious
gets a notification when a person enters into a room the
when he/she gets a notification. Three Level
image of a person is captured through camera which is
Security System consists of three levels. Level-I
is designed to get a notification when a person placed inside the room and in Level-III it sends the
comes near to room and the image of person is notification of person movements captured by motion
sent to the admin/user. Level-II is the motions of sensor and complete motions are sent as notification to
person is detected and notification is sent to the user.
admin/user. Level-III sends the notification to user We came up with this idea of developing an easier,
when the locker isbroken.
multipurpose, cost-effective design to regulate the on-
Keywords- Internet of Things, WIFI module, off mechanism of assorted devices within the field via
Sensors,Security, Notification short message service or SMS. The project is more
I. INTRODUCTION helpful just in case of crisis, true being the absence of
the supervisor at the work place so he/she is unable to
IOT or Internet of Things refers to the network of
observe in the flesh for the aim of safety.
connected physical objects that may communicate and
exchange data among themselves without the necessity Aim
of any human intervention. It's been formally defined as The major aim of the project is to provide high
an "Infrastructure of data Society", because IOT allows security system for the users. This system consists of
us to gather information from all quite mediums like an app from which user gets a notification when a
humans, animals, vehicles, kitchen appliances. Thus, any person enters in to locker room of home. This system
object within the physical world which might be supplied can be used both in laptops and mobiles. The objective
with an IP address to enable data transmission over a of the Three Level Security System is to provide high
network is made a part of IOT system by embedding security system for the admins and users. The user gets
them with electronic hardware like sensors, software an alert message when the person tries to break the
and networking gear. IOT is different than Internet as door using vibration sensor, the message is sent to the
during a way it transcends Internet connectivity by admin through the app.
254 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
images rather than characters or numbers in user internet. The utility is a front end which gives the
authentication. Inspite of the growing acceptance of consumer with a listing of gadgets to have interaction
graphical passwords, empirical studies have shown that with. Forthis, we've got arise to graphical authentication
graphical authentication systems have also inherited schemes. There are strategies in graphical authentication
some of the flaws of text-based passwords. These flaws i.e., consultation password authentication and photo
include predictability, vulnerability to observational primarily based totally authentication. Session
attacks and the inability of systems to efficiently combine passwords may be used handiest as soon as and on
security with usability. Hence, there is continued quest every occasion brand new password is generated.
to find a system that has both strong usability and strong Image password can clean to remember.
security. This paper is a detailed view of the current The Lee et al. (2017) describes, of their paper the
state of research into graphical authentication systems. net of bodily items is internet of things which includes
The paper considers in difficult to confide the records the embedded era assisting in growing device to device
a tour online world so whilst growing safety is a problem or guy to device communication. This paper presents a
textual content primarily based totally passwords aren't dynamic records sheet approximately the town
sufficient to buffer such problem. The necessitate for surrounding parameter taken from the stand -on my
something greater stable alongside being own gadget.
consumeraffable is required. This is in which Image The Chou et al. (2017) describes of their paper a
Based Authentication (IBA)comes into play. It gives domestic automatic gadget has faraway managed
customers a very particular and secured authentication operation. This paper discusses approximately the
device to paintings on. IBA complements the protective problem on their installation locating out the diverse
layerina really consumer affable way. This paper is an answers via one of a kind community technology and
international have a look at as regards to the usage of looking to optimize the usage of both gadgets. The home
pin because the password set.This device gives a stable automation system[HAS] calls for heterogeneous, an
communication channel among the speaking entities. The everlasting and distributive computing surrounding's
categorization of image set as customer password cautious examine to broaden the suitable HAS.
pursuits at thwarting Brute Forcetries, Shoulder strives,
and Tempest strive on the customer aspect at the same The Kamal et al. (2017) describes of their paper
time as the tries on the server aspect may be headed how this paper used Raspberry Pi as the network
off with the aid of using putting into the exercise gateway. This paper make use of MQTT [Message
Kerberos protocol. Queuing Telemetry Transport] protocol for sending and
receiving the records. All the sensors used on this paper
The Christian Reinischet al. (2007) describes, has been managed via way of means of net web page
password safety is important trouble in safety. There is enforcing the access control list [ACL] for imparting
one-of-a-kind manner for hacking password alongwith encryption technique for the secure transaction of the
adwareand key logger your computer sports are reveal records. This paper makes use of diverse sensors,
through the adware. Spyware similar to malware, it stressed and wireless, are linked with the Raspberry
collects non-public data which websites are visited Pi.
through consumer and for away long. Spyware has
numerous approaches of infection. A not unusual place Drawbacks of existing model
techniqueis through "piggy-banking" on software High installation cost, one level notification system,
program downloads. Another is key-logger; a key- Security level is low.
logger is essentially adware. As indicated through its
III. ROPOSED SYSTEM
call's sake, its" logs"or facts your keystrokes.
Keystrokes are gathered in a brief file, that is then By utilizing the sensors like magnetic sensor,vibration
periodically uploaded to the authors region over the sensor, Motion sensor and Arduino the system is
256 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
designed. The model helps in sending notifications to this concept of level-oping a less complicated,
the user if the following actions takes place and the multipurpose, cost-effective design to regulate the on-
actions are divided in to three levels.InLevel- off mechanism of varied devices within the field via short
Iisdesignedtogetanotificationwhenapersoncomes near to message service or SMS. The project is more helpful
room and the image of person is sent to the admin and just in case of crisis, things being the absence of the
user. So, that the person confirms that the person is not super- visor at the work place so he/she is unable to
a family or known person. In Level-II the motions of observe in the flesh for the aim of safety. The images of
person is detected and notification is sent to the admin relatives, friends etc. details where trained in a model
and user and that admin makes sure that the person and if unknown faces detected in the main gate means
has come for locker. In Level-III sends the notification the user can get that notification.
to user when the locker is broken. The main advantage Flowchart
of the system is identifying and capturing of image of
that person. First, we will scan the images of the house
members and save in the file. So, whenever the person
image is captured, the owner gets a name of the person
if already there, Else it notifies unknownperson.
System specifications
Hardware: Magneticsensor, Vibration sensor,
Motion sensor, WI-FI module, Buzzer, Relays
Software: Arduino IDE, Embedded C
Block diagram
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 257
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
258 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
REFERENCES
[1]I. Jermyn, A. Mayer, F. Monrose, M.K. Reiter, and A.D. Rubin,
"The design and analysis of graphical passwords", Proceedings
of the Eighth USENIX Security Symposium, pp. 1-14, 1999.
[2] J. Thorpe, and P.C. Oorschot, "Towards secure design choices
for implementing graphical passwords", ACSAC '04: Proceedings
of the 20th Annual Computer Security Applications Conference
(ACSAC'04), Washington, DC, USA, Vol. 3, pp. 664 -666, 2004.
[3] M. N. Doja and Naveen Kumar, "Image Authentication Schemes
Against Key-logger Spyware", Ninth ACIS International
Conference on Software Engineering, Artificial Intelligence,
Networking, and Parallel/Distributed Computing 2008 IEEE DOI
10.1109/SNPD.2006.166.
Fig: Notifications
[4] Christian Reinisch, "Wireless Communication in Home and
VI. CONCLUSION Building Automation", Master thesis, Viennia university of
technology, Feb 2007.
The sensors placed on the door informs the house
owner as soon because the door is opened by sending [5] S. Lee, N. Lee, J. Ahn, J. Kim, B. Moon, S.h.Jung, and D.
Han,"Construction of an indoor positioning system for home
a Push notification. The user will get this notification IOT applications", May 2017.
regardless of whether the phone is locked or unlocked
[6] P. H. Chou, Y.L. Hsu, W.L. Lee, Y.C. Kuo, C.C. Chang, Y. S.
or maybe if the other app is opened at the instant. This Cheng, H.C. Chang, S. L. Lin, S.C. Yang, and H.H. Lee,
was the most objective of the project, which is that the "Development of a smart home system based on multi sensor
data fusion technology" May 2017
user feels safe and not worry about any intrusion or
break-ins when he's aloof from home. Thissetup can [7] M.S. Kamal, S. Parvin, K. Saleem, H. Al-Hamadi, and
A.Gawanmeh," Efficientlow-cost supervisory system for internet
even be utilized in commercial offices where some areas of things enabled smart home", May 2017
are restricted for sure personnel, such a system will
[8] Kiruthika.M and Nithya.p," Development of Home Security
immediately inform the administrator of any unauthorized System Using GSM Module, International Journal of Science,
personnel trying to access such a section. Therefore, Technology andManagement",July, 2015.
the extensibility and applicability of such a system is [9] Hasan, R. and Khan, M.M.," Microcontroller Based Home
merely limited only by the imagination. Another Security System with GSM Technology, Open Journal of Safety
Science and Technology", November2015
important component of the project is that the
connectivity between the ESP8266 (Wi-Fimodule) and [10] Vishal Jain," IOTBases Smart Security and Home Automatsion
System," October 2017
therefore the Blynk server.The system successfully
[11] SudipanSaha, SutasomBhaumik, "SMS Based Wireless Global
connectedto the Blynk server using the authentication Range Automation Security System", December2017
token and therefore the Blynk libraries. As a result, we
[12]Oluyemi Adetoyi," Residential Area Security Network and
had been capable of get the notification on our clever Remote Home Security System", January2018
telephones as quickly as there become any alternate
[13]Mahler, M," A Home Security System Based on Smartphone
inside the popularity of the reed module sensor. Also, Sensors", July 2018
the extra ability to manage the alarm remotely is [14]AnitaA, "HomeSecurity System Using Internet of Things",
incredibly beneficial and maybe very useful in some January 2020.
unforeseen circumstances. It had been also observed
that the Blynk app worked smoothly and administrated
all communication between the hardware and therefore
the app very accurately.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 259
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract - In the recent years, wireless personal UWB antenna design is attaining the wide impedance
area network (WPAN) has been fascinating bandwidth while still upholding high radiation efficiency.
substantial attention and experiencing hasty Planar monopole antennas have been shown to exhibit
expansion worldwide. In recent years, fast wireless a relatively wide impedance bandwidth and good
connections between portable devices, computers radiation pattern characteristics over entire UWB range
and consumer electronics within a short range are
of frequencies [11]-[20]. This planner antenna is
provided by WPAN. In future WPAN provide
stream less operation among home or business
appropriate for wireless communication because of its
devices and systems and also provide fast data ease of fabrication, simple structure, omnidirectional
storage and exchange among all these devices. radiation characteristic, low profile, and lightweight.
This demands a data rate which is much higher than Usually, the antenna is able to achieve low bandwidth
what has been achieved in currently existing at VSWR below 2. In order to enhance the impedance
wireless technologies so the demand for high data bandwidth, some methods have been suggested. Initially,
rate is continually increasing. Antenna is an the shape of the antenna may be varied viz. Square,
essential part for all communication systems. To Rectangle, Circle, Trapezoidal, Pentagon and Triangular
cover various bands an ultra-wide band (UWB) etc. A number of techniques have been used to create
antenna from 3.1 GHz to 10.6 GHz are preferred. single or multiband stop band UWB antennas[21]-[23].
As wireless devices are becoming more compact,
A typical multiband antenna, which is a composite
increasing effort has been put to miniaturize the
UWB antennas, which is becoming a new challenge
structure of narrow band resonant components, has a
for antenna designers. This communication great difficulty in design because of the sophisticated
enlightens design, simulation, fabrication and structure and extremely sensitive impedance bandwidth.
testing of a novel compact ultra-wide band (UWB) Another technique for a multiband design is to create
U-Shaped patch antenna. The planned antenna an ultra-wideband antenna having responsive part
contains U-Shaped patch with partial ground plane. (became radiator) to specific band of frequencies of
This compact antenna is effective and useful for interests and non-responsive (resonator) to undesired
short areas and can be easily incorporated in small band of frequencies. So, we initiated with simple
devices. The results show that the antenna is planner monopole structure of antenna. There are many
having a band width from 2.77GHz to 13GHz. This different shapes or types of planar monopole antennas
antenna gains a worthy harmony between the
that are being considered for UWB applications. It is
simulated results and measured results.
very much need to design compact UWB antennas for
Keywords:UWB, FCC,U-Shaped patch. wireless communication applications.
I. INTRODUCTION II. RECTANGULAR ANTENNA FOR UWB
There are plentiful understandings on planner type WITH PARTIAL GROUND PLANE
of antenna which have been prevailing in the literature Small and compact size of an Ultra-Wide Band
[1]-[10] and antenna engineer's emphasis on the planar (UWB) antenna is highly desirable due to their ease of
monopole design of antenna since the main challenge in
260 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
integration into space-limited systems. Figure 1shows 10 mm and 11 mm respectively parametric analysis is
the Structure of a rectangular antenna in different views. carried for the feed gap. It is observed that the -10dB
(return loss) band width is varied remarkably with the
variation of gap between feed line and ground plane.
When the gap is increased from 0.2mm to 1.4 mm there
is increase in bandwidth from 2.5 to 6.6 GHz. The
optimized feed gap is found at 1.4 mm where the band
width starts from 3.4 GHz and ends at 10 GHz.
Table 1.Parametric study for gap between feed line and
ground plane
Patch length fl fh BW
(Pl) (mm) (GHz) (GHz) (GHz)
11 3.4 11.1 7.7
12 3.3 11.4 8.1
13 3.2 11.6 8.4
14 3.1 11.8 8.7
We can conclude that to increase the bandwidth of
the antenna the gap between the patch and feed line,
patch width and patch length should be increased. The
optimum values to increase the band width is found at
feed gap as 1.4 mm, patch width as 13 mm and patch
length as 14 mm with a bandwidth of 8.7 GHz.
III. MODIFIED RECTANGULAR Figure 3:simulated return loss curve for the
COMPACT ANTENNA CONFIGURATIONS rectangular antenna without slot and with optimum slot
In modern communication the antenna system is length and width.
integral part which is desired. To achieve compactness, To analyze the performance of the antenna
etching slots on the patch is simple and easy method as parametric analysis is carried for the slot dimensions.
shown in Figure 2. This starts with simple rectangular First parametric analysis is carried for slot width by
slot with length Sl and width Sw near the edge of the keeping length as 4 mm constant. By varying width from
feed line since there is no change in the antenna 2 mm to 8 mm it is observed that the size reduction of
characteristics because of low current density. Further 17.6 percentage is achieved at the center frequency of
the slot dimensions are increased to get the compact 7.8 GHz. Similarly, the parametric study has been carried
antenna. Figure 2(c) shows the fabricated photograph over by keeping the width constant at 8mm and varying
of the U-shaped antenna. the length from 4mm to 12 mm.The detail parametric
study by keeping length constant and varying the width
the lower cutoff frequency, upper cutoff frequency,
bandwidth along with size reduction has been given in
Table 4.
Table 4. Parametric study for slot width by keeping
length constant, the lower cutoff frequency, upper cutoff
frequency, bandwidth along with size reduction.
Slot width Area fl fh BW (%) Size
Figure2:Various rectangular compact antenna (Sw ) (mm) (mm2 ) (GHz) (GHz) (GHz) reduction
configurations (a) Rectangular antenna with rectangular 2 174 3.3 11.8 8.5 4.4
slot (Sw=8mm, Sl=4mm) (b) U shaped antenna 4 166 3.3 11.9 8.6 8.8
6 158 3.4 12 8.6 13.2
(Sw=8mm, Sl=12mm) (c) Fabricated Photograph of 8 150 3.28 12.3 9.07 17.6
the U-shaped antenna.
By varying the length and keeping the width constant
The simulated return loss curve for the rectangular the lower cutoff frequency, upper cutoff frequency,
patch without slot and with optimum slot length and bandwidth along with size reduction has been given in
width is shown in Figure.3. From Figure 3 it can be Table 5. It is observed that width at 8mm, length at 12
seen that there is a large variation in bandwidth with mm the size reduction is over 52.7 percentage with
significance reduction in the size. bandwidth of 9.4 GHz. The optimum U-shaped antenna
262 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 263
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
V. CONCLUSION
The partial ground plane rectangular antenna is
studied which achieve ultra-wide bandwidth. To reduce
the size of the antenna an additional rectangular slot is
introduced on the non-radiating area of the patch and
the length of the slot is increased until U-shaped patch
is formed. The study shows that operating bandwidth
and impedance matching of the antenna critically
dependent on the feed gap but not on the slot. The
area of the antenna for this case is 86 mm2 with a
Figure 7:Simulated radiation efficiency of U-shaped antenna. bandwidth of 9.3 GHz. The U-shaped patch area has
It is observed that the radiation pattern in E-Plane a compactness of 52.7 percent compared to rectangular
(Y-Z plane) is directional whereas the radiational patch.Wide investigation on all of the above proposed
patterns in H-Plane (X-Z plane) is isotropic which is antennas in frequency domain is done. Based on the
the property of monopole antenna. Figure 9. Shows result of analysis, the antenna is developed for all the
the three-dimensional radiation pattern of the proposed cases. The antennas are fabricated with FR4 substrate
antenna. of thickness 1.6mm and characterized by measuring
return loss, gain and radiation pattern. The measured
results are appreciably in good agreement with the
simulated results and this proves the validity of the
proposed antennas.
VI. REFERENCES
[1] L. E Miller, "Why UWB? A review of ultrawideband technology",
National Institute of Standards and Technology, 2003.
[2] Federal Communications Commission, "Revision of Part 15 of
the Commission's Rules Regarding Ultra-Wideband Transmission
Systems First Report and Order", ET Docket 98-153, FCC 02-
48, February 2002. [Online]. Available: http://www.fcc.gov.
[3] Martin and R Gomez, "Electromagnetic field theory for physicists
and engineers Fundamentals and Applications", Universidad de
Granada 2009.
Figure8:Simulated and Measured Radiation Pattern of the U- [4] Thomas A. Milligan, "Modern antenna design", Second edition,
shaped antenna at 5 GHz
A John Wiley & sons, Inc., Publication, Hoboken, New Jersey,
2005.
[5] Kai Fong Lee and Wei Chen, Eds., "Advances in microstrip and
printed antennas", John Wiley,1997.
264 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
[6] John D Kraus, Ronald J Marhefka and Ahmad S Khan, "Antenna [17]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "Novel
and Wave Propagation", Fourth edition, Special Indian Edition Ultra-Wide Band (UWB) Antenna with Dual Band Notch
2010, 2006, McGraw Hill Education (India) Private Limited. Characteristics for Short Distance Wireless Telecommunication
Applications", International Journal of Pure and Applied
[7] H Arslan, Z N Chen and M G D Benedetto, "Ultra-Wideband
Mathematics, Volume 114 No. 12 2017, 437-451.
Wireless Communication", A john Wiley & sons, inc., publication,
2006. [18]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "Compact
UWB microstrip antenna with quadruple band-notched
[8] Y Rahayu, T A Rahman, R Ngah and P S Hall, "Ultra-Wideband
characteristics for short distance wireless tele-communication
Technology and Its Applications", in 5th IFIP International
applications", International Journal of Engineering & Technology
Conference on Wireless and Optical Communications Networks,
7(1) (2018) 57-64.
2008.
[19]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "UWB
[9] P, Withington "Ultra-wideband RF-A Tutorial", in presentation
Microstrip Antenna with Tunable Band-Notched characteristics
to the IEEE 802 Plenary meeting, 2000.
for Wireless Applications", International Journal of Scientific
[10]Narayan Prasad Agrawal, Girish kumar, and k P Ray, "Wide- Progress and Research (IJSPR), Volume 42, Number 01, 2017.
band planar monopole antennas", IEEE Transactions on Antennas
[20]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "Novel
and Propagation, Vols. 46, no. 2, February 1998.
UWB microstrip antenna with dual band-notched characteristics
[11]E Lee, P S Hall and P Gardner, "Compact wideband planar for short distance wireless applications", Journal of Engineering
monopole antenna", Electronics Letters, vol. 35. No. 25, 9th Technology (JOET), Volume 6, Issue1, Jan. 2018, PP.584-594.
December 1999.
[21]R. Kalyan, Dr. K. T. V. Reddy and Dr. K. Padma Priya "Compact
[12]J, Ammann M, "Control of the impedance bandwidth of wideband CSRR Etched UWB Microstrip Antenna with Quadruple Band
planar antennas using a bevelling technique", Microwave and Refusal Characteristics for Short Distance Wireless
Optical Technology Letters, Vols. 30, No. 4, August 20 2001. Communication Applications", Progress in Electromagnetics
Research Letters, Volume 82, 139-146, 2019.
[13]Chen, M J Ammann, Zhi Ning, "A Wide-Band Shorted Planer
Monopole with Bevel", IEEE Transaction on Antennas and [22]R. Kalyan, K. T. V. Reddy, and K. Padma Priya. "compact band
Propagation, Vols. 51, No. 4, April 2003. notched ultra wide band microstrip antenna for short distance
wireless applications", International Conference on Inventive
[14]Kin-Lu Wong, Chih-Hsien Wu, and Saou-Wen (Stephen) SU,
Communication and Computational Technologies, 10-11 March
"Ultra-Wide-Band Square Planar Metal-Plate Monopole Antenna
2017, Coimbatore, India, DOI: 10.1109/ICICCT.2017.7975161.
with a Trident-Shaped Feeding Strip", IEEE Transactions on
Antennas and Propagation, Vols. 53, No. 4, April 2005. [23]Ragini Mishra, R. Kalyan, Y. M. Dubey, "Miniaturized W slot
ultra-wide band microstrip antenna for short distance
[15]Seok H Choi, Jong K Park, Sun K Kim and Jae Y Park, "A new
communication" The International Conference of Electronics,
ultra-wideband antenna for UWB applications", Microwave and
Communication and aerospace technology (ICECA) sponsored
Optical Technology Letters, Vols. 40, No. 5, March 5 2004.
by IEEE, organized on 20-22, April 2017, Coimbatore, India.
[16]Jianxin Liang, Choo C. Chiau, Xiaodong Chen and Clive G. Parini, DOI: 10.1109/ICECA.2017.8212828.
"Study of printed circular disc monopole antenna for UWB
systems", IEEE Transactions on Antennas and Propagation, Vols.
53, NO.11, November 2005.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 265
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract - One of the most important measures Automatic hand sanitizer: In this corona period
suggested by the World Health Organization is hand sanitizer is a nessential thing. Because in this
constant hand washing with hand sanitizers. But process of using sanitization reduces the risk of
one of the most significant problems is the way we spreading of covid-19. But using the normal sanitizer
do it and that is by physically touching the dispenser
bottle becomes very dangerous. When an infected
which eliminates the whole purpose of the action
and even creates a great risk of infection. We person presses the bottle trigger, the virus may spread
proposed to create something using an Arduino Uno from this hand to the sanitizer bottle. We can solve this
board that could combat this problem, but we also by using Automatic hand sanitizer kit. Automatic means,
wanted it to be cheap and to be able to be attached no need to trigger with our hand. Just placeyour hand
to many different dispensers easily, quickly and near the bottle will automatically trigger.
effectively and this is exactly what we made, an
Automatic Door Lock system based on checking
accessory that can be attached to most hand
sanitizer dispensers and turn them completely
of person's Blood Oxygen Levels and temperature. In
hands-free and automatic. COVID-19 is a disease this process the kit checks both spo2 level and
caused by the SARS-CoV-2 virus that primarily temperature. When theseare above or below the
attacks a person's respiratory system. Some milder restricted level the door locks and unlocks. Long-
symptoms can include fever, aches, and chills, but distance measurement of a person's body temperature
it can also lead to more serious conditions such as maybe used to reduce cross-contamination risk and
pneumonia. A person who has pneumonia or even minimize the risk of spreading Corona virus disease.
slight shortness of breath might not know when to
go to a hospital, especially as they start to get even II. PROPOSED METHOD
more overwhelmed. This is why we proposed this Automatic Hand Sanitisation: One of the most
pulse oximeter, which can assist in getting people important measures suggested by the World Health
their SpO2 level. Temperature sensor gives Organization is constant handwashing with hand
accurate information about their temperature.The sanitizers. But one of the most significant problems is
door lock or unlock will depend on these two
the way we do it and that is by physically touching the
levels. Suppose the temperature and spo2 levels
are below or above the prescribed level they are dispenser which eliminates the whole purpose of the
not allowed. action and even creates a greatr isk of infection.
Index Terms -Arduino Uno, Dispenser, We proposed to create something using an Arduino
Pulseoximeter, Temperature sensor, SpO2 level Uno board that could combat this problem, but we also
I. INTRODUCTION wanted it to be cheap and to be able to be attached to
In this paper, the aim is to develop a Covid-19 many differentd ispensers easily, quickly and effectively
detection and safety measurement device. Nowaday's and this is exactly what we made, an accessorythat can
most of the peoples are facing a critical situation that is be attached to most hand sanitizer dispensers and turn
spreading of covid-19. So we are trying to reduce this them completely hands-free and automatic.
spread of covid-19 by using this kit. This single device Door Lock Based On Temperature and Spo2
can doThree various works. Level: As we know one of the main symptoms of
266 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
covid-19 are the increase of temperature and fall of IV. HARDWARE UNITS
SpO2 i.e., blood oxygen level or oxygen saturation A. ARDUINO UNO BOARD: The Arduino Uno
decrease or increase in these two cases may get covid is a microcontroller board based on the AT mega 328.
virus.To check the pulse of the patient we use It has 14 digital input/output pins (of which 6 can be
stethoscope. By using the stethoscope, we cannot used as PWM outputs), 6 analog inputs, a 16 MHz
etermine a person's accurate heartbeat, using ceramic resonator, an USB connection, a power jack,
stethoscope we cannot able to identify the exact anI CSP header, and are set button. It contains
heartbeat of a person. Whereas using pulse oximeter everything needed to support the micro controller;
we can determine accurate SpO2 and heartbeat (BPM) simply connect it to a computer with a USB cable or
of a person. Similarly, to check the temperature at any power it with a AC-to-DC adapter or battery to get
crowded place we use temperature gun, here the started.
temperature gun is a time taking process to hold a gun
by the person. Using our equipment without the help of
the person we can achieve the exact temperature.
COVID-19 is a disease caused by the SARS-CoV-
2 virus that primarily attacks a person's respiratory
system. Some milder symptoms can include fever,
aches, and chills, but it can also lead to more serious
conditions such as pneumonia. A person who has
pneumonia or even slight shortness of breath might not
know when to go to a hospital, especially as they start
to get even more overwhelmed. This is why we Fig. Arduino uno board
proposed this pulse oximeter, which can assist in getting
IR Sensor: A passive infrared sensor (PIR sensor)
their spo2 level. Temperature sensor gives accurate
is an electronic sensor that measures infrared (IR) light
information about their temperature. The door lock or
radiating from objects in its field of view. They are most
unlock will depend on these two levels. Suppose the
often used in PIR-based motion detectors. PIR sensors
temperature and spo2 levels are below or above the
are commonly used in security alarms and automatic
prescribed level they are not allowed.
lighting applications.
III. BLOCK DIAGRAM & COMPONENTS
MAX30100 Sensor: MAX30100 is an integrated
pulse oximeter and heart-rate monitor sensor solution.
It integrates two LEDs (IR and Red), a photo detector
(Red), optimized optics, and low-noise analog signal
processing to detect pulse oximeter and heart-rate
signals. It is fully configurable through software registers,
and the digital output data is stored is stored in a 16-
deep F
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 267
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
MLX90614 Sensor: The MLX90614 is an infrared supply. When power supply is given to PCB then the
thermometer for non-contact temperature required parameters will get displayed in theL CD with
measurements. Both the IR sensitive thermopile detector the help of sensor in thePCB.This sensor is connected
chip and the signal conditioning ASIC are integrated in successfullyto the Arduino
the same TO-39 can. Integrated into the MLX90614
are a low noise amplifier, 17-bit ADC and powerful
DSP unit thus achieving high accuracy and resolution
of the thermometer.
Solenoid Lock: When the power is applied, DC
creates a magnetic field that moves the slug inside and
keeps the door in the unlocked position. The slug will
retain its position until the power is removed. When the
power is disconnected the slug moves outside and locks
the door.
Fig.Results of Discussion
268 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 269
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract- In any Digital signal processing a lower accuracy loss, an error detection and recovery
applications adders plays a vital role. Here, a high mechanism, which significantly reduces the output error
speed and area efficient block-based carry rate, is proposed.
speculative approximate adder with a new parallel
prefix adder is proposed. Its structure is based on II. RELATED WORK
partitioning the adder into some non-overlapped The general architecture of n-bit speculative
summation blocks whose structures may be
approximate adder enhanced by a carry predictor unit
selected from different adders like the carry
is illustrated in Fig 3.1. The add operation is performed
propagate or parallel-prefix adders. Here, the carry
output of each block is speculated based on the by [n/l] l-bit summation blocks working in parallel
input operands of the block itself and those of the where l is the bit-length of each summation block. Each
next block. The block adder used in this is a summation block includes an l-bit sub-adder, a Carry
modified parallel prefix adder which has less area Predictor unit, and a Select unit. In this structure, the
and delay compared with existing Parallel prefix carry input of the ith sub-adder, is chosen by (i-1) th
adder circuit. In this, we propose a high Select unit from the carry signal generated by the (i-1)
performance yet low power/energy consumed th Carry Predictor unit and the one generated by the (i-
block-based carry speculative approximate adder 1) th sub-adder. Selecting the carry output of the Carry
structure which is called BCSA Adder. To reduce Predictor unit leads to a shorter critical path and lower
the critical path more, we suggest an approach to
energy consumption. In this case, the dependency
predict the carry output of a block based on its
between the blocks is cut at the cost of some accuracy
signals as well as of the next block.
loss. Thus, the accuracy of the add operation depends
Keywords- parallel prefix adder, BCSA Adder, on the accuracy of the Carry Predictor unit, and also,
power/energy consumption the policy of the carry output signal selection. In our
I. INTRODUCTION proposed structure, in the worst-case, the length of a
carry chain is equal to two blocks (i.e., 2??).
Introduction In this approach, we propose a high
performance yet low power/energy block-based carry In most of the state-of-the-art approximate adders,
speculative approximate adder structure which is called the carry input of each block is chosen only based on
BCSA Adder. In this structure, the adder is partitioned the input signals of the previous blocks. In this work,
into some non-overlapped parallel blocks, which in the however, we propose a speculative approximate adder
worst case, the carry output of a block is dependent that the carry input
on the carry output of the previous block. To reduce III. ROPOSED WORK
the critical path more, we suggest an approach to
predict the carry output of a block based on its signals A) Adders:
as well as of the next block. The structure has a low Adders are utilized for calculating the addition (or
hardware complexity leading a low delay (on average, sum) of two binary numbers. Two common types of
about one block) and a rather high quality. To achieve adders are the ripple-carry adder (RCA) and the carry
270 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
look ahead adder (CLA). In an n-bit RCA, n 1-bit full example, four LSBs are used to calculate each carry
adders (FAs) are cascaded; the carry of each FA is bit in Fig 1. As each carry bit needs a k-bit sub-carry
propagated to the next FA; thus, the delay of RCA generator in the design of, (n - k) k-bit sub-carry
grows in proportion to n (or O (n)). An n-bit CLA generators are required in an n-bit adder and thus, the
consists of n SPGs, which operate in parallel to produce hardware overhead is rather high. This issue is solved
the sum, generate (gi = aibi) and propagate (pi = ai + by sharing some components among the sub-carry
bi) signals, and connected to a carry look ahead generators. Moreover, a variable latency speculative
generator. For CLA, all carries are generated directly adder (VLSA) is then proposed with an error detection
by the carry look ahead generator using only generate and recovery scheme. VLSA achieves a speedup of
and propagate signals, so the delay of CLA is logarithmic 1.5 times on an average compared to CLA.
in n (or O (log (n))), thus significantly shorter than that
of RCA. However, CLA requires larger circuit area
and higher power dissipation. The carry look ahead
generator becomes very complex for large n. The area
complexity of CLA is O (nlog (n)) when the fan-in and
fan-out of the constituent gates are fixed.
Many approximation schemes have been proposed
by reducing the critical path and hardware complexity
of the accurate adder. An early methodology is based
Fig 1The almost correct adder (ACA)
on a speculative operation. In an n-bit speculative adder,
each sum bit is predicted by its previous k less significant C) Segmented Adders:
bits (LSBs) (k < n). A speculative design makes an A dynamic segmentation with error compensation
adder significantly faster than the conventional design. (DSEC) is proposed to approximate an adder. This
Segmented adders are also proposed. An n-bit scheme divides an n-bit adder into a number of smaller
segmented adder is implemented by several smaller sub-adders; these sub-adders operate in parallel with
adders operating in parallel. Hence, the carry fixed carry inputs. In this, the error compensation
propagation chain is truncated into shorter segments. technique is ignored because the focus is on the
But their carry inputs for each sub-adder are selected approximate design, so the equal segmentation adder
differently. This type of adder is referred to as a carry (ESA) (Fig 4.3.1) is considered as a simple structure
select adder. Another method for reducing the critical of the DSEC adder. Hence, the delay of ESA is O (log
path delay and power dissipation of a conventional (k)) and the hardware overhead is significantly less than
adder is by approximating the full adder the approximate ACA.
adder is usually applied to the LSBs of an accurate
Another segmentation based approximate adder
adder. In the sequel, the approximate adders are divided
(ETAII) is proposed. Different from ESA, ETAII
into four categories.
consists of carry generators and sum generators. The
B) Speculative Adders: carry signal from the previous carry generator
As the carry chain is significantly shorter than n in propagates to the next sum generator. Therefore, ETAII
most practical cases, has proposed an almost correct utilizes more information to predict the carry bit and
adder (ACA) based on the speculative adder design. thus, it is more accurate compared with ESA for the
In an n-bit ACA, k LSBs is used to predict the carry same k. Because the sub-adders in ESA produce both
for each sum bit (n > k). Therefore, the critical path sum and carry, the circuit complexity of ETAII is similar
delay is reduced to O(log(k)) (for a parallel to ESA, however its delay is larger (O(log(2k))). In
implementation such as CLA, the same below). As an addition to ETAII, several other error tolerant adders
(ETAs) have been proposed.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 271
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
272 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 273
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
274 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: This system uses the Global created programming, which will program the parallel
Positioning System (GPS) tracking technology in port and speak with the robot by means of radio signs.
combination with Global System for Mobile (GSM)
technology. An integrated system employing latest Created programming program utilizes catch and
tracking techniques using satellite receiver in the mouse control to explore the robot. The created
form of GPS Modem, integrated with a robotic programming will Demonstrate the ongoing area of the
vehicle can be used to detect the exact location of robot and the area is transmitted. At the point when the
metal in the field. Then the GSM module transmits robot distinguishes a landmine it sends the flag to the
the received data to the authorized Mobile user. GSM framework as the sort of metal recognized and
Main purpose of this project is to detect landmines their area in, for example, Latitude, Longitude, the
by using a GPS enabled remotely controlled robot. mechanical model.
Keywords: Microcontroller, GSM Module, GPS II. LITERATURE SURVEY
module, Sensors
There were a few writings which alluded before
I. INTRODUCTION
beginning the work to take a smart thought and to check
Expectedly, Wireless - controlled robots use RF the conceivable outcomes of getting the required
circuits, which have the downsides of restricted working outcomes. Jadhav. 2013) have appeared in his
reach, constrained recurrence run and the constrained examination about the car limitation framework utilizing
control. Utilization of a cell phone for mechanical control GPS and GSM administrations. The framework
can beat these confinements. It gives the benefit of strong licenses confinement of the vehicle and transmitting the
control, working extent as huge as the inclusion territory situation to the landmine at the getting station. This
of the specialist co-op, no obstruction with different framework is additionally given GSM to get an instant
controllers and up to twelve controls. In spite of the message about the where about of the mine.This writing
fact that the appearance and the abilities of robots differ has some shortcoming as specialist in a few spots where
inconceivably, all robots share the highlights of a there is no arrangement of GSM systems it is
mechanical, mobile structure under some type of control. troublesome for correspondence likewise did not make
The Control of robot includes three unmistakable stages reference to progressively required data of the diverse
as follows:1.Perception 2. Preparing 3. Activity. For sort of metals utilized for the mine. This is gotten by a
the most part, the preceptors are sensors mounted on GSM modem in the gadget and handled by the Spartan
the robot, handling is finished by the on-board processor and the processor sends order to a GPS
microcontroller or processor, and the undertaking is module in the gadget. The GPS module reacts with
performed utilizing engines or with some different arrange's situation of the mine. This position is sent to
actuators. Robot is intended to recognize landmines in the station as a SMS to the client with date, time, scope
a remotely controlled manner. Client can explore the and longitude positions. This writing has some
robot and find the landmines. Areas of distinguished shortcoming when comprise air masses in the sky GPS
landmines can likewise be gotten to by cell phones will stop the work and don't send message and decide
through SMS. The robot can be constrained by the the area. Likewise some quality, utilizing a FPGA
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 275
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
controlled framework we can without much of a stretch information/yield (I/O) sticks that might be interfaced
track the dig which guarantees wellbeing for the troops to different development sheets or breadboards
in the military vehicles and furthermore bunches of (shields) and different circuits. The sheets highlight
employments for open transport framework. sequential correspondences interfaces, including
Universal Serial Bus (USB) on a few models, which
This writing has some shortcoming as the postponed are likewise utilized for stacking programs from PCs.
correspondence systems to send message recorded
The microcontrollers are ordinarily customized
when the mishap and has some quality can catch the
utilizing a tongue of highlights from the programming
surges of information given by their accelerometers,
dialects C and C++. Notwithstanding utilizing customary
compasses, and GPS sensors to give a convenient black
compiler toolchains, the Arduino venture gives an
box that distinguishes impact mishaps. The main writing
incorporated improvement condition (IDE) in light of
study has done about the mishap location and send
the Processing dialect venture.
message utilizing GPS and GSM modems. The second
examination is planning the metal location sensor, which GPS Receiver with Active Antenna-Global
checks if the mishap has been caused because of the Positioning System (GPS) satellites Broadcast signals
impact of mines. Third writing to configuration station from space that GPS receivers use to provide three-
alert framework in case of impact. Fourthly, ponder dimensional location (latitude, longitude, and altitude)
planning mine following framework utilizing GPS. At plus precise time.GPS receivers provides reliable
long last, every one of the written works found are great positioning, Navigation and timing services to worldwide
and gave data about the application, working rule, how users on a continuous basis in all Weather, day and
to plan the System and pick best program to structure night, anywhere on or near the Earth. Sunroom's ultra-
the circuit this enables us to compose the paper and sensitive GPS receiver can acquire GPS signals from
furthermore to structure mishap notice system. 65 channels of satellites and output position data with
high accuracy in extremely challenging environments and
III. DESCRIPTION
under poor signal conditions due to its active antenna
The automated control system consists of GPS and high sensitivity. The GPS receiver's160dBm tracking
module, GSM Modem, Microcontroller, Metal detector sensitivity allows continuous position coverage in nearly
sensor Motor Driver L298, DC Motor. The unit is all application environments. The output is serial data
expressed in figure below: of 9600 baud rate which is standard NMEA 0183 v3.0
protocol offering Industry standard data messages and
a command for easy interface to mapping software and
Embedded devices.
2. Power supply unit- On-board 5Vrechargeable
battery is used to drive dc motors &PIC16F877
&AT89C51. We require 3.3V and for various sensors
and we require 5V to drive RF module, etc. So to do
this we will have to build power supply unit using
voltage
IV. WORKING
Fig 1: - block diagram of landmine detection using GSM & Metal detector consists of copper coils. On the off
GPS. We have built a prototype model which as shown in
above block diagram. Following is the hardware description.
chance that any metal is identified, it sends the flag
information to controller and with the assistance of GPS
1. Arduino UNO- Arduino board structures utilize an
it shows the scope and longitude of the correct position.
assortment of chip and controllers. The sheets are
furnished with sets of computerized and simple GSM through Attention Command sends the SMS. We
utilize engine driver L298D on the grounds that we give
276 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
just +5v control supply and +12v is required to turn thelandmine sullied area and adds a point highlight to
the engine so just L298D has the property to pivot the the landmine point layer in the GIS database.
engine regardless of whether the information control V. ADVANTAGES
supply is +5v.System comprises of two fundamental
modules, which are the control station, which keeps Totally Remote Controlled.
running on a PC or Laptop and the remotely controlled With the help of GPS we get the latitude and longitude
robot. of the detected position.
The control station comprises of three coordinated Locations of detected landmines can also be
modules comprising of Metal recognizing segment, GPS accessed by mobile phones via GPRS and SMS.
information gathering segment and Remote control
Wireless-controlled robots use RF circuits, which
segment. These three segments go about as one
have the drawbacks of limited working range, limited
framework however the fundamental framework parts
frequency range and the limited control. Use of a mobile
go about as all the while working autonomous
phone for robotic control can overcome these
frameworks. Remote control framework utilizes a radio
limitations. It provides the advantage of robust control,
recurrence transmitter. Control framework, which keeps
working range as large as the Coverage area of the
running on a PC or a Laptop, utilizes the parallel port
Service provider, no interference with other controllers
and control transfers to remotely control the robot.
and up to twelve controls.
Bluetooth GPS sends the area of the robot through
VI. APPLICATIONS
Bluetooth information association. Controlling
programming of the GPS of three incorporated modules Anti-Car Theft.
comprising of Metal distinguishing segment, GPS Alive Human Detector.
information gathering part and Remote control segment.
These three segments go about as one framework yet To detect the landmine and prevent the loss of human
the fundamental framework parts go about as all the lives.
while working free frameworks. Remote control VII. CONCLUSION
framework utilizes a radio recurrence transmitter.
The paper presents an advanced solution and a new
Control framework, which keeps running on a PC or a
direct approach for remote sensing based on the
Laptop, utilizes the parallel port and control transfers
concept of metal detectors to detect the metallic
to remotely control the robot. Bluetooth GPS sends
landmines in El Alamein region. The advanced solution
the area of the robot by means of Bluetooth information
solves three main problems a) The absence of maps
association. Controlling programming of the GPS goes
thatshow landmines locations that planted in the Egyptian
about as a transitional layer, in the correspondence
western desert from WWII, b) The lack of funds, c)
between the created programming and the robot. GPS
The limited use of technology. The solution based on
segment of the created programming peruses NMEA
integrated technologies by using the wireless
information by means of correspondence port of the
communications, cellular technologies and the packet
PC or the laptop.The programming unravels NMEA
oriented mobile data service to obtain a full control from
information and the area of the robo delineate is utilized
a safe distance for landmine monitoring team in fenced
as the GIS programming, which serves the GIS layers
minefields or suspicious regions. GSM sound tracker,
to the created programming. In the event that the robot
GPS tracker, smart cellphones plus advanced
recognizes a landmine by utilizing its metal indicator, it
applications and RC truck equipment were brought
sends a radio flag by utilizing a FM transmitter. At that
together to do three main tasks for metal landmines, a)
point the flag is caught by a FM collector which is
Tracing,-b) Detecting,-c) pinpoint location coordinates.
connected to the control framework and afterward
framework perceive the situation of the robot as
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 277
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
278 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract - At present situation the human beings The main objective of proposed system is to detect
are faced many accidents during the road ways the road sign automatically while driving and control
transportation. At the same time, they lose our life the speed or makes the turn according to that Road
and valuable properties in those accidents. To avoid sign. Road sign recognition is used to warn the distracted
these problems the system designed with the help
driver, and prevent his/her actions that can lead an
of Raspberry pi. The Digital image processing plays
important role in the sign capturing and detection
accident. The goal is to avoid accidents by both manual
system. The image processing algorithms to takes and automation process in which all the actions will be
the necessary action for resizing the captured signs. performed based on the detected Road signs[3]. A real-
The Raspberry pi camera port used to capture the time automatic speed sign detection and recognition can
road signs with image enhancement techniques. help the driver, significantly increasing his/her safety. To
The embedded system small computing platform avoid accidents and traffic jam road signs are generally
studies the characteristics of speed signs. In that placed near curved areas, hospital zones, school zones
daylight vision time to take the shape analysis for etc. Driver has to view the road signs and control the
recognizing the signs using edge detection speed or makes the turn according to it. Due to various
algorithms. The objective of the proposed work is issues,
to implement the available technique to traffic sign
with the help of raspberry pi3 board. Our worked focused on a low cost, off the shelf
Key Words: Raspberry pi3, Traffic signal
solution, specifically, a mini embedded computer
detection, Python, L298N, Robot chassis kit. Raspberry Pi. In order to provide fast processed results,
this system aimed to demonstrate use of simple shape
1. INTRODUCTION recognition algorithms and open-source optical
Every person, whether a passenger, driver, character recognition (Tesseract OCR) on Raspberry
pedestrian would have noticed along the roadside Pi. Tesseract OCR is an open-source optical character
various sign board that serve important purposes. These recognition module for various operating systems. And
important road paraphernalia help us as route guides, its development supported by Google since 2006[4].
warnings and traffic regulators. As control devices for 2. LITERATURE SURVEY
traffic, signs need full attention, respect and appropriate
driver's response. With the advent of motorized traffic According to, the first work on automated traffic
and its increasing pressure on road, many have adopted sign detection was reported in Japan in 1984. This
pictorial signs and standardized their signs to facilitate attempt was followed by several methods introduced
international travel, where language differences would by different researchers to develop an efficient TSDR
create barriers. In adverse traffic conditions, the driver system and minimize all the issues stated above. An
may not notice traffic signs, which may cause accidents. efficient TSDR system can be divided into several
In such scenarios, automatic road sign detection comes stages: preprocessing, detection, tracking, and
into effect[1,2] . recognition [5]. In the preprocessing stage the visual
appearance of images has been enhanced. Different
color and shape-based approaches are used to minimize
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 279
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
the effect of environment on the test images. The goal real world of traffic signboards using camera. After
of traffic sign detection is to identify the region of interest match found it generates a signal so the raspberry pi
(ROI) in which a traffic sign is supposed to be found sends a control signal to the L298 to control the
and verify the sign after a large-scale search for motorsof the chassis.
candidates within an image. Different color and shape 4. BLOCK DIAGRAM
based approaches are used by the researchers to detect
the ROI. The popular color based detection methods The block of proposed system is as follows:
are hsi/hsv transformation, region growing, color
indexing, ycbcr color space transform.
Greenhalgh and Mirmehdi [6, 7] showed a
comparison between SVM, MLP, HOG-based
classifiers, and Decision Trees and found that a Decision Fig. 1 - Block Diagram ofSystem
Tree has the highest accuracy rate and the lowest 5. HARDWARE & SOFTWARE
computational time. Its accuracy is approximately REQUIREMENT: RASPBERRY PI3
94.2%, whereas the accuracy of the SVM is 87.8%
Raspberry pi is a small chip of single board computer.
and that of MLP is 89.2%. Neural Network is flexible,
There are various model of raspberry available in the
adaptive, and robust. Hechri and Mtibaa [8] used a 3-
market i.e. the Raspberry Pi 1 Model B, Raspberry Pi
layer MLP network whereas Sheng et al. used a
1 Model B+, Raspberry pi 2,Raspberry Pi 3 Model B.
Probabilistic Neural Network for the recognition
These all are differ in memory capacity and hardware
process. Support Vector Machine (SVM) is another
features like Raspberry pi 3 has inbuilt Bluetooth and
popular method used by the researchers which is robust
wifi modules as shown in Fig. 2 whereas in previous
against illumination and rotation with a very high
versions these modules were not available. It has 1.2
accuracy. Yang and Garcia- Garrido [9, 10] used SVM
GHz 64- bit quad core ARMv8 CPU with 1 GB of
with Gaussian Kernels for the recognition whereas Park
RAM [12, 13].
and Kim used an advanced SVM technique that
improved the computational time and the accuracy rate
for gray scale images. For improving the recognition
rate of the damaged or partially occluded sign. Principal
Component Analysis (PCA) is used by Sebanja and
Megherbi [11] in which have a very high accuracy rate.
signs. Grey-scale images are used to make our detection
and recognition algorithm morerobust to changes in
illumination.
3. SYSTEM DEVELOPMENT
The main work of proposed system is to detect the
sign boards like stop board. For this, system will always
trying to determine between the lower and upper range Fig. 2 - Raspberry Pi 3 Model B Board
of the red color and a rectangle be formed on the red Camera
signals. The rectangle formed on the red light signal has
a fixed area by the use of that area system creates a Camera is used to take the continuous images to
signal that control the GPIO pins of the raspberry pi. get the traffic signs and signals from the real world.
For the detection of the stop board sign system used According to the images available through the camera
cascade classifier in which it compare the xml file of we can send these images to the raspberry pi to perform
different size of stop word with the input available from car's control action.
280 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Fig 5 system have to slow down the right wheel. In the Execution of Signs
proposed system the input to the motor driver IC from
is given from the GPIO pins(2,3) for driving the left
motor and GPIO pins(4,17) is used to drive the right
motor from L293d.
8. PERFORMANCE ANALYSIS
Actual Assembly of System
The Fig 4 shows actual assembly of system
by the robot
Road Signs Actio n to be p e rf or m ed
282 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
This system is fully based on automation process which [5] Safat B. Wali, Mahammad A. Hannan, Aini Hussain, & Salina A.
Samad "An Automatic Traffic Sign Detection and Recognition
replaces the existing manual operation. Automation System Based on Colour Segmentation, Shape Matching, and
process, in turn decreases the human error, increases SVM" Hindawi Publishing Corporation Mathematical Problems
the accuracy, processing speed and reliability. In this in Engineering Volume 2015, Article ID 250461
report, a method to make a self- responding robot car [6] J. Greenhalgh and M. Mirmehdi, "Traffic sign recognition
is represented .Working of different hardware UsingMSERandRandomForests,"inProceedingsofthe 20 th
European Signal Processing Conference (EUSIPCO'12), pp.
components are described .A way to find the stop signs 1935- 1939, August 2012.
board and red signals have been defined and also way [7] J. Greenhalgh and M. Mirmehdi,"Real-time detection and
to detect the obstacles .All methods and algorithm recognition of road traffic signs," IEEE Transactions on Intelligent
mentioned in this paper are successfully implemented Transportation Systems, vol. 13, no. 4, pp. 1498-1506, 2012.
in a robot car of chassis having two wheels. [8] \A. Hechri and A.Mtibaa, "Automatic detection and recognition
of road sign for driver assistance system," in Proceedings of the
For future enhancement, more advanced 16 th IEEE Mediterranean Electro technical Conference
resolutioncamera and advanced processors can be used (MELECON '12), pp. 888-891, Yasmine Ham Mamet, Tunisia,
March 2012.
in order to detect the sign perfectly and quickly. A
System should be developed to monitor the rear end [9] S. Yang, X. Wu, and Q. Miao, "Road-sign segmentation and
recognition in natural scenes," in Proceedings of the IEEE
vehicle during the turnings so that the automation International Conference on Signal Processing, Communications
process will ensure more safety. and Computing (ICSPCC '11), pp. 1-4, Xi'an, China, September
2011.
To enhance it more in the future machine learning
[10]M. A. Garcia-Garrido, M. Oca˜na, D. F. Llorca,M. A. Sotelo, E.
algorithms can be used so it can be able to determine Arroyo, and A. Llamazares, "Robust traffic signs detection by
each objects .The current performance is good but to means of vision and V2I communications," in Proceedings of the
make it more efficient it is necessary to implement it 14th International IEEE Conference on Intelligent Transportation
Systems (ITSC '11), pp. 1003- 1008, IEEE, Washington USA,
using machine learning and other algorithms so it will Oct -2011.
understand more things .So in future to make it more [11]I. Sebanja and D. B. Megherbi, "Automatic detection and
advance it. recognition of traffic road signs for intelligent autonomous
unmanned vehicles for urban surveillance and rescue," in
10. REFERENCES Proceedings of the 10 th IEEE International Conference on
[1] Rafael C. Gonzalez, Richard E. Woods & Steven L. Eddins, Technologies for Homeland Security (HST '10), pp. 132-138,
"Digital Image Processing using MATLAB", Second Edition, - IEEE, Waltham, Mass, USA, November2010.
Pearson Education. [12]https://www.raspberrypi.org/documentation/configur ation/
[2] https://maker.pro/raspberry-pi/tutorial/how-to-do- basic- image- [13]https://www.raspberrypi.org/downloads/raspbian/
processing-with-raspberry-pi
[14]https://www.sparkfun.com/datasheets/Robotics/L298_
[3] https://www.raspberrypi.org/magpi-issues/Projects_Book_v1. H_Bridge.pdf
pdf
[15]https://researchdesignlab.com/l298-motor-driver.html
[4] Enis Bilgin, Dr. Stefan Robila, "Road sign recognition system on
Raspberry Pi" in Proceedings of IEEE Long Island Systems,
Applications and Technology Conference (LISAT), Farmingdale,
NY, USA, April 201610.1109/LISAT.2016.7494102
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 283
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: According to the Internet of Things, homes, power management, assistance for disabled and
a future in which the internet has extended to elderly people, cochlear implants, object tracking,
everyday objects is envisaged. As a result of the equipment manufacturing, agriculture, and other
Internet of Things (IoT), remote sensing and industries. The number of connected devices is
control of things can be accomplished through
projected to reach 30 billion by 2020, valuing the
existing network infrastructure, allowing the
commercial sector at about 7.1 trillion dollars [2]. Using
physical world to be fully integrated into computer-
based systems and yielding increased efficiency, the Internet of Things, we may enable machine-to-
accuracy, and economic gain, as well as a reduction machine (M2M) or device-to-device communication
in human involvement. A number of applications, without requiring human intervention [3] [4].
such as solar cities and smart villages, as well as
microgrids and solar street lighting, may be made
possible via this technology. As In this time period,
renewable energy grew at a faster rate than it has
at any other moment in history before it. The online
display of solar energy's power consumption as a
renewable energy source is one of the methods
that have been proposed. This monitoring is
achieved via the use of the Raspberry Pi and the
Flask programming language. Smart Monitoring
keeps track of how much renewable energy is used
on a daily basis. This provides the user with the
ability to do an energy analysis. The implications Fig. 1:The percentage of power sources installed
for renewable energy usage and power shortages
Everyone in the modern world now need electricity,
are examined.
which has been added to the list of most basic
Keywords- Renewable energy; IoT, Electricity, necessities. The graph of energy use is rising on a daily
Solar panel etc. basis, while energy sources are decreasing at the same
I. INTRODUCTION time. As a means of compensating for the lack of
available power, energy is produced using a number of
The internet of things (IoT) is playing an important
techniques. There are two types of energy generation
and essential part in people's everyday lives by allowing
methods: conventional and unconventional.
the internet to link many and most physical objects in
Conventional electricity generation is the more common
order to exchange data and monitor and manage the
of the two. While certain sources of energy, such as
devices from a distant place, where the devices become
fossil fuels and nuclear fuels, are used, these sources of
intelligent [1]. This technology has the potential to
energy are not renewable (in the sense that the resources
connect a wide range of things, including animals,
are not renewed by nature) and are thus categorised as
humans, smart transportation, smart grids, virtual electric
non-conventional. Solar energy, in its broadest
grids, smart cities, vehicles, heart monitoring systems,
definition, may be used to provide a sustainable energy
environment monitoring, shopping systems, automated
284 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
source that is environmentally friendly. Solar energy is item on the globe. Some gadgets, buildings, vehicles,
readily accessible on a worldwide scale and is relatively and other objects with software, sensors, electronics,
inexpensive. The sun, like all other sources of energy, and a network connection may gather and share data
has been generating energy for billions of years. Solar [10].
energy has the potential to be a major source of energy Wireless sensor networks, sensor networks, 2G/3G/
production since it has the ability to transform heat into 4G, GSM, GPRS, RFID, WI-FI, GPS,
electricity. The term "solar thermal energy" refers to this microcontrollers, and microprocessors, as well as the
in the conventional meaning of the term [5] [6]. Internet of Things itself, are all essential components of
While there are many renewable energy sources the Internet of Things (Internet of Things). The article
available, such as wind, rain, tides, and geothermal investigates and categorises technical advances that
energy, as well as natural-based biofuels and enable the Internet of Things. They are-
conventional biomass, solar energy offers significant • A technological advancement that enables "things"
benefits over these other sources [7]. to absorb contextual information.
In India, power outages are very common these • Advancement that enables "things" to process
days, and they may last for hours. In order to do this, pertinent data and innovation that improves security
the primary goal should be the usage of renewable and protection.
energy, with monitoring coming in as a close second.
Accepting and analysing relevant data may offer the
Increased manufacturing efficiency, unrivalled quality, necessary knowledge for embedding "intelligence" into
and long-term durability of renewable energy "things" through artificial intelligence. The capacity of
applications have all contributed to the rapid growth of the Internet of Things to connect wirelessly distinguishes
renewable energy applications during the last decades. it from traditional internet [11].
In addition, by keeping an eye on energy predictions,
The Internet of Things idea is being used in this solar
families, and communities, productivity may be increased
tracking system to solve the main limitations of solar
even further [8].
energy-based power production. The quantity of solar
For India's growth and economic prosperity to be energy that reaches the planet changes throughout the
successful, electricity must be readily available. After year. Because the range varies according on location,
China, the United States of America, and Russia, India historical period, and weather circumstances. As a result,
is the world's fourth-largest energy user in terms of regardless of the weather, the solar panel is always fully
consumption. India had a total installed capacity of exposed to the sun's beams. As a result, the solar panel
278.7 GW and a total energy consumption per capita may be remotely monitored utilising Internet of Things
of 1,010 kWh in 2014-15, according to the technology. A number of techniques for solar panel
International Energy Agency. With a 5.54 percent rise tracking systems that utilise the Internet of Things have
in 2013-14 and reduced energy costs, In comparison been investigated. In addition, the sections that follow
to many other nations, notably the United States, the include assessments of a few methods [12].
country's per capita consumption remains low.
Two more segments are identified in this article.
Approximately 21% of the world's population lives in
Segment II delves into the numerous important research
countries with no access to electricity at all. India now
that have been conducted in this area. The conclusion
has a total electrification rate of 64.5 percent, with 35.5
and, finally, the references that were utilised in this part
percent of the population without access to electricity
are found in Segment III.
[9].
A. Solar Panel
A network of physical items that interact with one
another is referred to as the "internet of things." As a Solar energy is the electricity generated by collecting
result, the wireless sensor network can link to every the sun's rays, and it may be used for a variety of business
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 285
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
and domestic applications, including heating and cooling. The effects of dirt on solar panels were investigated
The sun acts as a natural nuclear reactor, releasing by Google, a well-known business in the globe that
energy in the form of tiny packets of energy known as runs a 1.6 MW solar facility at its headquarters in
photons as it heats the earth. When photons hit the solar California [15]. Researchers Hottel et al. performed
cells, the electrons in the atoms are stripped away [13]. pioneering research on the impact of dust on solar
It is possible to build a solar panel from multiple panels systems, which revealed an average loss of 4.7 percent
that are linked together; the greater the number of panels in solar efficiency. [16]. According to Salim et al., who
we deploy, the more energy we generate. The performed a research into dust accumulation, they found
semiconductors used in the construction of PV a 32 percent reduction in solar production over an
photovoltaic solar panels are silicon-like, as shown in eight-month period in a solar village in Riyadh. An
the picture. Direct current is produced by solar panels. experiment is carried out by the authors Dirk Goosen
Because alternating current is less expensive to transmit and colleagues. As reported in, the deposition of dust
over long distances, the vast majority of electrical particles that affected the performance of solar
equipment are powered by this kind of power source photovoltaic cells, as well as the effect of dust
[14]. accumulation on airborne concentration and wind
velocity, were investigated [16]. Garg of Roorkee
performed an experiment and discovered that dirt
accumulation on a 45-degree slanted glass plate
decreased average transmittance by 8 percent over a
10-day period. The accumulation of dust on the panels
leads in a 30 percent decrease in the amount of energy
that may be harvested. The most often used method of
dust removal is to spray water on the panels while
simultaneously spraying a cleaning solution on the panels.
Motors shock the panels in the same manner as a mobile
phone vibrates, ejecting dust from the panels as a result
Fig. 2: Solar Panels
of the shaking. The dust is propelled off the panels as a
II. LITERATURE OF THE EXISTING result of the generation of a positive charge. Manual
METHOD cleaning of the PV panels using a brush is required. It is
Several researchers have performed several essential to keep an eye on solar panels. Regular
researches on this important problem, and the results inspection of solar panels is required in some form or
have revealed that dust build-up on cleaned photovoltaic another on a recurring basis. To verify that they are
solar panels reduces the effectiveness of photovoltaic operating correctly and that the system is generating
solar panels by 50%. the quantity expected, you must check their
performance. [17] If you have solar panels installed,
you should check the generation metre at least once a
week and make a note of the reading. In addition, they
should pay frequent visits to the panel's location in order
to take notes on the readings. To capture the data, you
must physically go to the site where the solar panel
system is installed on a regular basis. Consequently, it
is not possible to gather readings on a continuous basis;
instead, whenever required, the user needs go to the
Fig. 3: Due to dust buildup prior to cleaning, the solar module place where the system configuration is stored.
was coated by a thick coating.
Furthermore, since solar radiation is not correctly
286 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
oriented, it is not possible to generate optimum Nkoloma, Mayamiko, Marco Zennaro, and Antoine
electricity. Bagula [10] discuss their recent work on a wireless-
Ersan Kabalci, Alper Gorgun, and Yasin Kabalci based remote monitoring system for Malawi's renewable
[24] present a real-time monitoring infrastructure for a energy projects, which they worked on alongside the
renewable energy production system consisting of a University of Malawi. The primary objective was to
wind turbine and solar panel arrays that may be used create a low-cost data collection system capable of
to track the performance of the system. It is based on continuously showing remote energy yields and
current and voltage data from each renewable energy performance metrics while staying under budget. The
source that the monitoring platform is built. In this case, project's output provides immediate access to electrical
the sensor circuits are intended to determine the related power produced at a remote location through SMS
values, which are then processed by a Microchip communication by utilising wireless sensor boards and
18F4450 microcontroller. The parameters that have text message (SMS) delivery over a cellular network.
been analysed are then sent to a personal computer Preliminary study findings indicate that the performance
(PC) via USB for storing in a database and real-time of renewable energy systems in distant rural regions
monitoring of the system's performance. Using the may be effectively assessed at a reasonable cost, despite
monitoring software's programmed visual interface, you the systems' remote location.
can manage your recorded data and analyse the results Antoine Bagula, Nkoloma, Mayamiko, Marco
for each measurement on a daily, weekly, and monthly Zennaro, and Marco Zennaro [10] present a novel
basis. monitoring and control system for real-time monitoring
K. Jiju and colleagues [7] discuss the creation of an and control of a hybrid wind-photovoltaic battery for
Android-based online monitoring and control system renewable energy systems. The proposed system offers
for dispersed Renewable Energy Sources (RES). When supervisory control and data acquisition (SCADA)
dealing with the digital hardware of the Power capabilities by using the campus network of National
Conditioning Unit, this approach connects to it through Cheng Kung University in conjunction with a
the Bluetooth interface on an Android tablet or programmable logic controller (PLC) and digital power
smartphone (PCU). metres. In addition to detecting electrical data in real
time, the suggested system can efficiently transmit it to
Yoshihiro Goto and colleagues [8] investigated the
a distant monitoring centre through the internet. The
development and deployment of an integrated system
simulation and experiment findings indicate that the
for managing and remotely monitoring telecoms power
proposed monitoring and control system can provide
infrastructure. The technology is used to monitor and
real-time supervisory control and data collection for
maintain over 200,000 telecoms power plants. These
distant renewable energy installations of various types
power plants comprise rectifiers, inverters,
and sizes.
uninterruptible power supplies, and air conditioning
plants located in about 8,000 telecommunications Several problems with solar panels were identified
facilities. The system's characteristics include enhanced in this study, including the time required for repairs, the
user interfaces that make use of information and lack of flexibility, the inability to be managed effectively,
communication technologies such as web technology, and difficulties with maintenance. In the next section,
in addition to combining management and remote they suggested a system concept in which a gateway is
monitoring responsibilities into a single system. integrated in the solar panel and linked to the internet
The issue of load disaggregation is described by through GPRS in order to update everything in a smart
Suzdalenko et al. [9] via the use of non-intrusive load system via the Internet of Things [18]. It provides
monitoring. When a large number of local renewable information on Internet of Things surveys performed in
energy producers are linked to the same grid, they may a variety of settings, including the home, city,
be mismatched with changing demand over time. environment, and business, as well as information on
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 287
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
the present status of IoT systems. However, in order for Wireless Personal Area Networks (WPAN). They
to provide a more effective suggestion [19], it is provide software for interfacing with and controlling
necessary to They recognised problems associated with remote sensing systems (RSSs), as well as the
solar panel management and field issues throughout the supervisory control system, which is built on a digital
power generation process in this paper, and in order to signal processor (DSP) [27]. They provide performance
solve these concerns, they developed a model that made data for a middle-scale grid-connected photovoltaic
use of tiny operating systems (small OS). In addition, it (PV) system throughout the duration of a monitoring
includes gateways, host computers, and other similar period throughout this article. The performance of
devices [20-23]. They are time-sensitive and feature photovoltaic systems is quantitatively evaluated and
WSN-based data recording capabilities (Wireless studied using a mathematical model and data from
Sensor Nodes). It can withstand 146V and 15.5A monitored systems to aid in the development of new
systems and has the potential to be improved further solar system technologies. Their aim is to develop a
[24]. To connect multi-mode power converters to solar reliable and accurate technique for evaluating
photovoltaic cells, a wireless communication protocol photovoltaic (PV) system performance, which will
known as ZigBee is utilised. It functions as a single host ensure that maximum output is reached throughout the
and monitors the surrounding environment. Each module system's lifespan while also improving performance [28-
in the MPPT (Maximum Power Point Tracking) method 30].
gathers information about itself and saves it as reference III. SOLAR ENERGY TRACKING USING
parameters in reference parameters. Once they have INTERNET OF THINGS
presented it, students will examine and evaluate a linear
parabolic solar power plant in this article. Each online It is possible to monitor the current and voltage of
feature is assessed for quality and efficiency, giving solar cells from a distance using this setup.
students a greater knowledge of how the Internet works. Communication between the solar boards and the server
They investigated delayed behaviour by reviewing prior is accomplished via the Internet of Things (IoT). The
study findings. Following an investigation of the delay microcontroller unit (MCU) manages current and
behaviour, system recognition techniques are utilised voltage information [31-33].
to mimic the dynamics associated with the delay on the With the help of remote transmission, the intended
Internet, and the Wave Variable approach is selected data is sent to the supporting server. During the
as the most effective remote monitoring method. Finally, verification process, the estimated current and voltage
a method for remotely monitoring solar energy facilities are sent to the IoT Module, which records the current
via the Internet has been developed [25]. This article and voltage measurements together with the date and
tackles these limitations by providing a technique for time on its own internal memory [34-38].
monitoring the health of solar photovoltaic (PV) systems
Compared to existing ways of remotely monitoring
in order to maximise performance while minimising
solar panels, the technology is more time efficient.
maintenance. When performance is on the verge of
failing, remote monitoring capabilities alert you. This There is a remote monitoring system for solar panels
data may be utilised to do preventative maintenance on installed in the construction. This module is used to keep
the system, extending its life and lowering its total track of the solar board from a distance. A current and
operating costs [26]. This article discusses the design voltage sensor is used to measure the current and
of a solar photovoltaic distributed generator (PVDG) voltage of the solar board. Due to the fact that these
for microgrid applications, as well as the development outputs are in analogue format, they must be converted
of a wireless remote monitoring and control system for to digital format using an analogue to advanced
a PVDG. The wireless communication technology is converter before being used. The calculated data is sent
created by combining a full duplex digital system with to the microcontroller unit.
the ZigBee protocol and the IEEE 802.15.4 standard
288 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
[10].Nkoloma, Mayamiko, Marco Zennaro, and Antoine Bagula. "SM [26].L.V. Hien, Q.P. Ha, V.N. Phat,2009, "Stability and stabilization
2: Solar monitoring system in Malawi." Kaleidoscope 2011: The of switched linear dynamic systems with time delay and
Fully Networked Human? -Innovations for Future Networks uncertainties," Applied Mathematics and Computation, vol. 210,
and Services (K-2011), Proceedings of ITU. IEEE, 2011. pp. 223-231.
[11].Wang, Li, and Kuo-Hua Liu. "Implementation of a Monitoring [27].L.L. O, N.K. Hlaing,2010 "Microcontroller-based two-axis solar
and control system for a hybrid wind-photovoltaic-battery tracking system", Proc. IEEE 2nd international conference on
renewable energy system through the web." Intelligent Systems computer research and development, pp. 436-440.
Applications to Power Systems, 2007. ISAP 2007. International
[28].Malla.S.G and C.N. Bhende,2014, "Voltage control of stand-
Conference on. IEEE, 2007.
alone wind and solar energy system", International Journal of
[12].Big data (Dec 2016) Retrieved from http://bigdata- Electrical Power & Energy Systems, vol. 56, pp. 361-373.
madesimple.com
[29].Shrihariprasath Vimalathithan Rathinasabapathy, A smart IoT
[13].Internet of things (Nov 2016). Retrieved from http://cerasis.com/ system for monitoring solar PV power conditioning unit", 2016
2015/10/20/10-things-to-know-about-the-internet-of-things World Conference on Futuristic Trends in Research and
Innovation for Social Welfare (Startup Conclave).
[14]."Internet of Things Global Standards Initiative". ITU. Retrieved
26 June 2015. [30].Charithperera chi haroldliu, and srimaljayawardena, "the emerging
internet of thing market place from an industrial perspective: a
[15]."Internet of Things: Science Fiction or Business Fact?" (PDF).
survey", December 2015, IEEE transactions on emerging topic
Harvard Business Review. November 2014. Retrieved 23 October
in computing.
2016.
[31]. Yejihua, wang wen, "research and design of solar photovoltaic
[16].Mattern, Friedemann, and Christian Floerkemeier. "From the
power generation monitoring system based continuous", august
Internet of Computers to the Internet of Things." From active
2014, 9th international conference oncomputer science education.
data management to event-based systems and more. Springer
Berlin Heidelberg, 2010. 242-259. [32].ChagithaRanhotigamage and Subhas Chandra Mukhopadhyay,
"Field Trail and Performance Monitoring Of Distributed Solar
[17].Stankovic, John A. "Research directions for the internet of things."
Panels Using Low Cost Wireless Sensor Networks", October
IEEE Internet of Things Journal 1.1 (2014): 3-9.
2010,IEEE Sensor journal.
[18].Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision,
[33].Sol Moon, Sung-Guk Yoon and Joung-Hu Park, "A New Low
architectural elements, and future directions." Future generation
Cost Centralized MPPT Controller System For Multiply
computer systems 29.7 (2013): 1645-1660.
Distributed Photovoltaic Power Conditioning
[19].Arnau Gonzalez, Jordi-Roger Riba, AntoniRius and Rita Puig, Module",November 2015, IEEE Transactions on Smart Grid
2015 "Optimal sizing of a hybrid grid-connected photovoltaic
[34].Ali HoseinArianfar, M.HoseinMehrabanJahromi, Mohsen
and wind power system", Applied Energy, vol. 154, pp. 752-
Mosalanejad and BahramDehghan "Design And Modelling
762.
Remote Monitoring System For A Solar Power Plant'' 2009,
[20].Balbheem Nadpurohit, Roopa Kulkarni, Kadappa Matager, Second International Conference on Computer and Electrical
Nagaraj Devar, Rahul Karnawadi, Edmund Carvalho, June 2017 Engineering.
'IoT Enabled Smart Solar PV System', International Journal of
[35].Ravi Tejwani, Girish Kumar, ChetanSolanki, "Remote
Innovative Research in Computer and Communication
Monitoring System for Solar Photovoltaic Systems in Rural
Engineering, Vol. 5, Issue 6.
Application Using Gsm Voice Channel" 2013, ISES Solar World
[21].Chinnammai.S, January 2013 'An Economic Analysis of Solar Congress.
Energy', Journal of Clean Energy Technologies, Vol. 1, No.1.
[36].Martín E. Andreoni Lopez, Francisco J. GaldeanoMantinean,
[22].G.M. Tina, S. Gagliano, G. Graditi, A. Merola,2012 and Marcelo G. Molina "Implementation of Wireless Remote
"Experimental validation of a probabilistic model for estimating
[37].Monitoring and Control of Solar Photovoltaic (PV) System"
the double axis PV tracking energy production," Applied Energy,
2012 IEEE Conference Publications.
vol. 97, pp. 990-998,.
[38].J. H. So, B. G. Yu, H. M. Hwang, G. J Yu and I. Y. Choi
[23].'Google Cloud Platform.' In Wikipedia. The free Encyclopaedia.
"Performance Monitoring and Analysis of Middle Scale Grid-
Wikimedia.
[39].Connected PV System'' October 2007,7th International
[24].Kabalci, Ersan, Gorgun A. and Kabalci Y., 2013."Design and
conference on power electronics.
implementation of a renewable energy monitoring system."
Power Engineering, Energy and Electrical Drives (POWERENG),
Fourth International Conference on. IEEE.
[25].Keyur K Patel, Sunil M Patel,2016, "Internet of Things-IoT:
Definition, Characteristics, Architecture, Enabling Technology,
Applications & Future challenges", IJESC, Vol 6 Issue no:5.
290 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
will result in huge communication burden when we share reconstruction algorithm can be improved to take it
image or video data at the pixel level. In fact, the topic into account.
of designing SS scheme for image data has attracted • The loss of a small fraction of the measurements
wide attention in the past fifteen years. generally results in only a minor degradation in
The secret sharing scheme was first proposed by reconstruction quality. This may be used to achieve
robustness to channel impairments without the usual
Shamir and Blakley in late 1980s. It is also called (k, n)
overhead of error protection.
threshold scheme which should meet the following three
requirements, where a secret is represented by a positive According to theory of CS, if the signal can be
integer S. (1) The secret value S is used to generate n represented by a small number of non-zero coefficients,
shadows (positive integers): D1, D2, … , Dn. (2) Any it can be converted into a limited number of incoherent
k or more shadows can be used to reconstruct the random measurements by constructing a suitable
secret value S. (3) Any k-1 shadows or fewer cannot measurement matrix. These random measurements
get sufficient information to reveal the secret value S. maintain the information of the reconstructed signal, so
Some (k, n) threshold schemes proposed by Shamir, the original signal can be accurately reconstructed from
Blakley, and Asmuth, which are applied for image a small number of measurements by solving the sparse
sharing can be found in, respectively. optimization problem.
II. RELATED WORK Assume that a real-valued signal, x∈ RN, is a k-sparse
vector on an orthonormal basis Ψ ∈ RN×N, i.e., only
Compressive Sensing (CS) has been proposed more
k(k<< N) out of the N elements of x have non-zero
than a decade ago as a method for dimensionality
values. Then
reduction of signals which are known to be sparse or
compressible in a specific basis representation. By x =Ψ (1)
"sparse" we mean that only a relatively small number of
where the coefficient can be well approximated
the coefficients of the representation are non-zero,
by k non-zero values. So, a small number of linear
whereas "compressible" indicates that the magnitude
random measurements y∈ Rm, k < m << N obtained as
of the coefficients decays quickly, according to a power
law, hence the signal can be well approximated by a y=x (2)
sparse signal. In the CS paradigm, the signal is projected where ∈ Rm×N is a measurement matrix that is
onto a low-dimension space, resulting in a incoherent with Ψ and satisfies the restricted isometric
measurements vector. If the signal is sparse, it is possible property (RIP).
to exactly reconstruct it from the measurements vector.
Then, according to the given y, we can reconstruct
A compression scheme based on CS enjoys the signal x by solving the following optimization problem.
following unique properties which are primarily different
from those of any conventional signal compression
scheme.
III. METHODOLOGY
• The encoder is of much lower complexity than the
decoder. In fact, a significant part of the encoder Input Image
processing, namely the measurements generation, can An image is taken as input in this stage for further
be done in the analog domain, e.g. by a single-pixel processing.
camera or a lensless camera.
Discrete Wavelet Transform (DWT)
• The decoder is not fully defined by the encoder.
Different reconstruction algorithms can be applied to Discrete wavelet transform is being used widely in
the same measurements vector at different situations, 1D and 2D signal processing due to its advantages in
and as more prior information becomes available the signal and image processing applications like
292 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
compression, de-noising, texture analysis and etc. Later values are not effected much and vice versa. Hence,
on, its usage is carried into high pass filter and together these are used for watermarking
can be termed as filter banks. In this work, Haar SVD is compression technique, SVD of an image
Wavelets are selected due to its simplicity in-terms of gives three matrices among these two matrices are
operations and it decomposes the signal into four sub ortho-normal matrices and one matrix is diagonal matrix.
band signals. Hungarian mathematician Alfred Haar Diagonal elements are called as singular values. The
introduced the Haar wavelets, which is similar to step equation for SVD is as
function. Original signal can be computed by inverse
operation of the decomposition filter and is symmetry
of the decomposition filter. Instead of down sampling Not all the singular values are used to reconstruct
where up-sampling will be used on the given four sub the original information; few singular values are
band inputs. All though DWT is old transform domain, reconstruct the information, there by compression is
still it has been being used in image or video achieved.
watermarking due to its advantages
Image sharing
DWT gives the relation between time and frequency
domain of signal. Applying DWT to an image gives four The secret image sharing is a technique based on
different bands among which three are high frequency secret message sharing. Each pixel value of a secret
bands and one is low frequency band. Most of the image is a secret message. We use the secret image to
information is carried by low frequency band. so any generate shadow images and only require part of these
operation/ processing on image is carried by taking the shadow images to reconstruct the secret image. The
low frequency band. shadow images should not reveal any information about
the image itself such as silhouette and smooth regions.
Two Dimensional Wavelet Transform Ideally, each shadow image should look like random
In two dimensions Wavelet transformation, the noise so that anyone without the permission won't be
wavelet representation can be computed with a able to get any information about a secret image.
pyramidal algorithm. The two-dimensional wavelet Inverse DWT (IDWT)
transform that we describe can be seen as a one In inverse DWT (IDWT) step we are applying
dimensional wavelet transform along the x and y axes. inverse DWT to the output image obtained after merging
Mathematically the wavelet transform is convolution the K shares.
operation, which is equivalent to pass the pixel values
of an image through a lowpass and highpass filters.
Singular Value Decomposition (SVD)
Singular value decomposition (SVD) is generally
used for decomposing the image into sub matrices for
removing redundant data in compression applications
and also used for watermarking. As name suggests the
Decomposition results in three matrices and they are
left, right singular vector matrix and diagonal matrix.
The diagonal Matrix consists of singular values along
its diagonal in decreasing order, where singular value
represents the energy of the given signal. These singular
values plays an important role in compression and as
well as watermarking. One peculiar property of the
Figure 1: Block Diagram of Proposed Method
singular values is small perturbation over signal, these
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 293
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
IV. RESULTS
294 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
VI. REFERENCES
[1] Shamir A. How to share a secret [J].Communication of the
Association for Computing Machinery, 1979,22(11 ):612-613.
[2] Blakley G R. Safeguarding cryptography keys[C] Proceeding of
AFIPS 1979 National Computer Conference, New York,
1979:313-317.327
[3] Emmanuel Candes. Compressive sampling [A]. In: Proceedings
of the International Congress of Mathematicians[C]. Madrid,
Spain, 2006, 3, 1433-1452.
[4] Emmanuel Candes, Justin Romberg, Terence Tao. Robust
Figure 8: output Image
uncertainty principles: exact signal reconstruction from highly
incomplete frequency information [J]. IEEE Transaction on
Information Theory, 2006, 52(2):489-509.
[5] David L.Donoho, Compressed sensing[J]. IEEE Transaction on
Information Theory, 2006, 52(4):1289-1306.
[6] Thien CC, Lin JC. An image-sharing method with user-friendly
shadow images. IEEE Transactions on Circuits and Systems for
Video Technology 2003; 13(12): 1161 -1169.
[7] Lin CC, Tsai WHo Secret image sharing with steganography and
authentication. Journal of Systems and Software 2004; 73(3):405-
414.
[8] Yang CN, Chen TS, Yu KH, Wang Cc. Improvements of image
sharing with steganography and authentication. Journal of Systems
Figure 9: Output histogram and Software 2007; 80(7): I 070-1 076.
[9] Lin PY, Lee JS, Chang Cc. Distortion-free secret image sharing
mechanism using modulus operator. Pattern Recognition
2009;42(5):886-895.
V. CONCLUSION
This paper reviews and implements three secret
image sharing algorithms. By applying the existing
schemes directly on a secret image, the silhouette and
smooth regions of an image may appear in a shadow
image. In the proposed scheme, it was extended to
secret image sharing scheme with DWT and SVD
concept. The experimental results and security analysis
indicate the potential superiority of our scheme. The
performance is measured using metrics which says that
our proposed scheme is better compared to other state-
of-art methods.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 295
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: Image dehazing plays a vital role in Because rain and snow streaks are 1000 times larger
the field of image processing. Previously, many than fog .For big debris such as raindrops and
researchers have suggested many techniques like snowflakes, analysis is extra hard. Spatially and
histogram equalization and gamma transformation temporally neighboring areas are laid low with rain and
in order to achieve the target. But these techniques
snow differently, so ought to be dealt with differently.
have many limitations like different degree of
polarization, different kind of weather conditions On this work, we will use the time period "rain? to mean
or depth information of pixel in image. The existing rain and snow collectively, due to the fact de-training
work has tried to develop a more effective and techniques can be used to remove snow and vice versa.
reliable image quality assessment method that can Maximum of de-raining algorithms do now not recollect
evaluate the quality of the proposed dehazing global motions, object motions, and/or various sizes of
algorithms. The proposed algorithm to get rid of rain streaks, and as a consequence they may fail to
rain and snow streaks from the video collection remove rain streaks in reality. The visual appearances
using temporal correlation and low-rank matrix of dynamic weather circumstance picture are given
finishing touch. We convert input video series into underneath.
number of frames and take a frame. We attain a
preliminary rain map with the aid of subtracting
temporal warped frame from present frame. Based
totally on sparse representation, we decomposing
the rain map into foundation vector. Then, we break
up the idea vector into rain map as soon as and
outlier with the aid of using SVM. Eventually, we
cast off the rain streaks with the aid of the usage of
low matrix set of rules.
Fig(a) Fig(b)
Keywords- Rain Streaks Removal, Low Rank
Matrix Completion, Sparse Illustration, And Fig 1. (a) An image of a scene taken beneath rain
Temporal Correlation situations. (b) A picture of a scene taken in snow
condition
I. INTRODUCTION
In this paper, we proposed algorithm for de -raining
In recent times, we use greater video capturing tool
video the use of temporal correlation and low-rank
inclusive of, digital cameras, smart phones, and micro
matrix algorithm crowning glory. Assuming that adjacent
virtual video cameras. Which can be used both steady
frames, warped by way of the optical flows, are almost
and dynamic weather condition. Motion pictures are
same with a present day frame besides for rain streak
large blurred by means of dynamic weather
areas, we generate a preliminary rain map via
circumstance such as snow, rain as compared to
subtracting warped adjacent body from modern-day
consistent climate condition together with fog, mist.
frame. Then, we represent the preliminary rain map the
296 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
use of sparse foundation vectors, which might be into a simple 1-dimentional vector for less computation.
dichotomized into rain streak once and outliers the use Since the dark channel basically relies on sample minima
of a help vector device (SVM). We refine the rain map because dark channels are sensitive to the outliers. The
and come across. Rain streaks by way of excluding artifacts arise during computation of the dark channel.
outlier. In the end, we update the detected wet pixels As mentioned in (algorithm 1.1), the dark channel
using a matrix crowning glory set of rules, which plays calculation focused on minima of pixel intensity that
the expectation maximization (EM) iterations for the simply selects minimum value of intensity for each pixel
low-rank approximation. in the local patch. In literature, lots of methods are
available that robustly estimate the dark channel from
dehazed image. With the help of extension of dark
channel, we have computed the transmission map that
also assumes the presence of noise. This is more
sophisticated approach that has taken by applying
stochastic approximation to locate the local minima
which is followed by the point estimate. The point
estimate is needed (for example, to estimate the
atmospheric light), this method simply denoise the entire
image by removing noise automatically with the
Fig (a)
assumption as a pre-processing step. Now, simply
compute the transmission map from dark channels, by
selecting minima of normalized dark channels. Finally
recover the scene radiance from most haze-opaque
based minima and subtracting from 1 as shown in
algorithm 1.1. In computer vision and computer
graphics, the model widely used to describe the
formation of a haze image is as follows:
Fig(b)
I(x) = R(x). t(x) + L(1 ? t(x))
Where I, R and L are the observed intensity, scene
radiance and global atmospheric light respectively.
Whereas t is the medium transmission which describes
the portion of unscattered light that reaches the camera.
The goal is to recover R, L and t from I. The first term
on the right hand side of the equation (2) is i.e. R(x).t(x)
is called direct attenuation [8] which is used to describe
Fig.2 (a) Input frame, (b) de-snowing result, and scene radiance and its decay in medium. And the second
(c) snow map. term L(1-t(x)) is called air-light [6, 16] which is the
result of previously scattered light and contributes to
II. EXISTING SYSTEM shift in scene color. In case of homogenous atmosphere,
A. Brief description of working algorithm t is defined as:
The complete haze removal procedure is Where scattering coefficient of atmosphere is
summarized in above algorithm. In the beginning, the attenuated exponentially with the scene depth d.
proposed work read a single hazed image from the Geometrically, In RGB color space, vectors L, I(x) and
dataset. After reading the image we have converted it R(x) are coplanar and their end points are collinear.
The transmission i.e. t(x) is the ratio of two line segments:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 297
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
298 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
L(:, :, dim) = L(:, :, a) + highest Intensity(:, :, a); highlights the noise removal ways for the grey scale
(iii) Resize A into 2-D image. image likewise because the color image and conjointly
to extend the bar graph of a picture that is corrupted
L (:, :) = L (:, :) + highest Intensity(:, :) ; by the salt and pepper noise. For removing the salt and
Step 4: To estimate the transmission pepper noise, noise filtering techniques area unit used
like minimum, maximum, mean, median and Gaussian.
t'(x,y) = 1 - minc (miny??(x)(Ic(y)/ Lc)) ;
However the median filter produces the proper image
(i) Transmission compared to all or any alternative filtering techniques.
t'(x,y) = 1 - w.minc (miny??(x) (Ic(y)/Lc)) ; We had implemented [8] our modified MAP-ML
algorithm which gives comparable results with the
// Dark Channel of normalized haze image. original MAP-ML algorithm performing the image
// It directly provide the estimation of transmission. segmentation. Thus from the experimental results we
had successfully shown that the modified MAP-ML
// for sky region:
algorithm takes less time to execute as compared to
Evaluate minc (miny??(x) (Ic(y)/ Lc)); when t(x) = the original MAP-ML algorithm giving nearly same
0; results as the original algorithm.
// for non sky-region:
Evaluate minc (miny??(x) (Ic(y)/ Lc)); when t(x) =
1;
Step 5: Recovering the scene Radiance:
R(x) = I(x) - L / max (t(x, y), t0) + L;
// L: estimate from most haze-opaque and R
represent the
// Fig. 3. An overview of the proposed algorithm: We
achieve an initial rain map from a picture body, which is
radiance based resulting image
then delicate based on sparse representation and
Step 6: Dehazed the image and write the image. classification. Subsequently, we reconstruct a rain free
III. PROPOSED SYSTEM body by means of exploiting the data in adjoining
frames.
We have proposed a new image processing scheme
[7] which is based on smooth 1D ordering of the pixels Discern-2 display a brief diagram of proposed
in the given image .We have shown that using a carefully algorithm. First, we locate initial map from difference
designed permutation matrices and simple and intuitive between temporal warped frame and contemporary
1D operations such as linear filtering and interpolation, frame. Then, we decompose the initial map into basis
the proposed scheme can be used for image de noising vector primarily based on sparse representation, and
and in painting, where it achieves high quality results. rent an SVM classifier to dichotomize the ones vectors
Therefore, we tend to specialize in the image de-noising, into legitimate ones and outliers. SVM manner help
the planned ways area unit utilized in order to scale vector gadget, with assist of this we acquire separate
back the unwanted data or distortion that is termed as rain and outlier. With the aid of casting off outlier, we
noise which will be caused by the external force whereas get legitimate rain streak map. Then, we replace rainy
a picture is being transmitted, whereas transmittal a pixels with rain-loose values, with the aid of formulating
picture knowledge over Associate in Nursing unsecure the rain streak removal as a matrix of entirety problem.
channel, a noise also can be other by effort. This paper Eventually, we cast off the detected rain streaks by
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 299
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
means of using a low-rank matrix final touch approach. representation, and then reconstructs the sign through
Moreover, we enlarge the proposed algorithm to stereo using decided on foundation vectors only.
video. We are able to see about element on preliminary C. Rain Streak removal
rain map detection, rain refinement and rain streak
elimination. We update the pixel fee to detected rain by means
of exploiting temporal redundancies in adjoining frames.
A. Preliminary rain map detection Particularly, we formulate the rain removal as a low-
Within the beginning, we convert sequence video rank matrix Completion trouble. We first partition the
into wide variety of the frames. Rain streaks appeared cutting-edge body K into disjoint blocks. For every
randomly and it passes throughout a pixel, the pixel block C, we seek for the l maximum comparable blocks
price come to be brighter than its authentic pixel. We from every of the 4 adjacent frames are supply through
will detect a rainy pixel, which has a larger price in a k-2, k-1, k+1, k+2.
modern-day body than in adjacent frames. This
approach, but, is liable to fake detection, for the reason Above frames are do no longer suit with modern
that equal pixel coordinates in extraordinary frames frame. That is because similar blocks within the modern-
might not represent the equal scene point. A video day body tend to be selected close to the given block c
collection may also contain dynamic items or be and affected by the same rain streak, degrading the
captured with a transferring digicams. We can hit upon de-raining performance. To measure the similarity among
preliminary rain map from subtracting temporal warped two blocks, we compute the sum of the squared
frame from modern-day body. Let we assume modern differences between rain-unfastened pixels only. Then,
frame and warped frame for gain preliminary rain map. we define a matrix F by concatenating the given block
R is a initial rain map because the difference photo b inside the modern body and its 4l most comparable
among the modern body K and the hybrid warped body blocks Ci’s in the adjacent frames, C= [c, c1,
K-1, c2,…..c4l] Blocks are represented through a column
vector. note that we subtract the mean cost from every
R(x) = max {k (x) - ((k-1) (x)), 0} block to make amends for the variations in illumination.
Where terrible differences are truncated to 0, We additionally outline the binary rain mask matrix F
considering the fact that rainy pixels are assumed to be for C, given via
brighter than their unique color’s. F= [f, f1, f2,... f4l]
B. Rain Map Refinement To discover a crammed-in matrix X from incomplete
To refine an initial rain map, we make the most the matrix C by using low rank matrix crowning glory. ǁǁXǁǁ
directional assets of rain streaks: rain streaks generally issue to regular.it need to minimize through X.
tend to have elliptical shapes, whose fundamental axes (1-F)◦ X = (1-F) ◦ C, F◦ X ≤ F◦ C
deviate little from the vertical route. In evaluation, falsely
detected outliers have arbitrary shapes or yield random In which ≤ denotes the element-sensible inequality..
instructions of major axes. Therefore, we are able to To resolve this confined optimization problem, we use
find outliers by using evaluating the horizontal the expectancy maximization (EM) set of rules. In the
components with the vertical components of detected expectation step of the t th generation inside the EM
ellipses. However, putting off elliptical areas with framework, we compose a stuffed-in matrix X (t)
massive horizontal additives may additionally omit actual through taking the factors of the enter matrix Cat rain-
wet pixels, due to the fact rain streaks and outliers arise free pixels and taking the elements of the modern
concurrently and may overlap every other. The estimate Y (t) at rainy pixels, i.e.
morphological factor evaluation (MCA) decomposes X (t) = (1-F) ◦ C+F◦ (Y (t) C)
a given sign into basis vectors based on sparse
300 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Here, denotes the detail-sensible minimal operator experimental results verified that the proposed algorithm
to return the minimal between the two factors of in removes rain and snow streaks extra effectively, at the
comparison matrices. We use the elements of (Y (t) ∧ same time as preserving scene structures more faithfully,
C), instead of Y (t), because of the constraint in that than the conventional algorithms.
rain streaks make the pixel values brighter. In the REFERENCES
maximization step, we update the estimator Y (t) to be
[1] P. C. Barnum, S. Narasimhan, and T. Kanade, "analysis of rain
a low-rank approximation of the stuffed-in matrix X and snow in frequency space," Int. J. Comput. Vis., vol. 86, nos.
(t). That is due to the fact we attempt to reduce the 2-three, pp. 256-274,Jan. 2010.
nuclear norm ǁǁXǁǁ , that's the sum of the singular values [2] X. Zhang, H. Li, Y. Qi, W. okay. Leow, and T. k. Ng, "Rain
of X. To this step, we first perform the SVD removal invideo by combining temporal and chromatic houses,"
in Proc. IEEE ICME, Jul. 2006, pp. 461-464.
X (t) = U VT
[3] L.-W. Kang, C.-W. Lin, C.-T. Lin, and Y.-C. Lin, "Self-learning-
Where, U is a rotation matrix and is a diagonal matrix, primarily based rain streak removal for photo/video," in Proc.
IEEE ISCAS, may additionally 2012, pp. 1871-1874.
composed of the singular values. Then, we update the
estimator Y (t+1) as a low rank approximation of X (t), [4] M. Shen and P. Xue, "a quick algorithm for rain detection and
removal from movies," in Proc. IEEE ICME, Jul. 2011, pp. 1-6.
given by [8] V. Santhaseelan and V. k. Asari, "A section area method for
detection and elimination of rain in video,"Proc. SPIE, vol. 8301,
Y (t+1) = U H () VT p. 830114, Jan. 2012.
Here, the operator H? truncates each singular value [5] J. Chen and L.-P. Chau, "A rain pixel recuperation set of rules for
into 0, if it's far smaller than a threshold = 2000. The films with extraordinarily dynamic scenes," IEEE Trans.
photograph system., vol. 23,no. 3, pp. 1097-1104, Mar. 2014.
general process of EM algorithm is given by way of
[6] J.-L. Starck, M. Elad, and D. L. Donoho, "picture decomposition
D. Algorithm 1 EM-based Rain Streak removal via the mixture of sparse representations and a variational
approach," IEEE Trans.picture technique., vol. 14, no. 10, pp.
Input pixel matrix C and masks matrix M 1570-1582, Oct. 2005.
Initialize t=zero and Y (1) =C [7] M. J. Fadili, J.-L. Starck, J. Bobin, and Y. Moudden, "photo
decomposition and separation the usage of sparse representations:
Repeat t=t+1 (t) = (1 - F).C + F. (Y (t) ^ C) an overview," Proc IEEE, vol. 98, no. 6, pp. 983-994, Jun. 2010
U^VT=X (t) (t+1) =U HK ^VT [8] P. C. Barnum, S. Narasimhan, and T. Kanade, "Analysis of rain
and snow in frequency space," Int. J. Comput. Vis., vol. 86, nos.
Until ll Y (t) -Y (t+1) llM<E or t=tMAX 2-3, pp. 256-274, Jan. 2010.
Output: X=X (t) [9] M. Shen and P. Xue, "A fast algorithm for rain detection and
removal from videos," in Proc. IEEE ICME, Jul. 2011, pp. 1-6.
IV. CONCLUSION
[10] V. Santhaseelan and V. K. Asari, "A phase space approach for
We proposed EM based video de-raining and de- detection and removal of rain in video," Proc. SPIE, vol. 8301, p.
snowing, which exploits temporal correlation in a video 830114 , Jan. 2012.
collection based the low-rank matrix crowning glory. [11] L.-W. Kang, C.-W. Lin, C.-T. Lin, and Y.-C. Lin, "Self-learning-
based rain streak removal for image/video," in Proc. IEEE ISCAS,
The proposed algorithm obtains an initial rain map, by May 2012, pp. 1871-1874.
subtracting temporal warping body from modern frames.
[12] J. Chen and L.-P. Chau, "A rain pixel recovery algorithm for
It then refines the preliminary rain map by means of videos with highly dynamic scenes," IEEE Trans. Image Process.,
putting off outliers based on the sparse representation vol. 23, no. 3, pp. 1097-1104, Mar. 2014.
and the category. Sooner or later, the proposed [13] T. Brox, A. Bruhn, N. Papenberg, and J. Weickert, "High accuracy
algorithm fills in rainy pixels using the EM-based low- optical flow estimation based on a theor
rank matrix final touch. We additionally prolonged the
proposed set of rules to stereo video de-raining. Whilst
in comparison with the preceding execution time and
complexity, we've got decreased them. Great
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 301
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: Skin diseases have a serious impact processing-based approach is used to diagnose the skin
on people's life and health. This an efficient diseases. This method takes the digital image of disease
approaches to identify unique skin diseases. It is affected skin area then uses image analysis to identify
necessary to develop automatic methods in order the type of the disease.
to increase the accuracy of diagnosis for multi-type
skin diseases.Image segmentation is a technique II. LITERATURE REVIEW
which aids with the detection of skin diseases.
• Lakshay Bajaj, Himanshu Kumar, Yasha Hasija
Image processing techniques like adaptive
"Automated System for Prediction of Skin Disease
thresholdedge detections are being used.
using Image Processing and Machine Learning"
Depending on the definite pattern (pertaining to a
International Journal of Computer Applications (0975
distinct disease) input image is subjected to 3d
- 8887) Volume 180 - No.19, February 2018.
conversion, and thenthe diagnosis takes place.
Morphology-based image segmentation has been • Ms Seema Kolkur, Dr. D.R. Kalbande, Dr. Vidya
used to identify the skin diseases from the given Kharkar "Machine Learning Approaches to Multi-
image set. The texture and color features of Class Human Skin Disease Detection" International
different skin disease images could be obtained Journal of Computational Intelligence Research ISSN
accurately. 0973- 1873 Volume 14, Number 1 (2018), pp. 29-39.
I. INTRODUCTION III. EXISTING METHOD
Skin diseases are more common than other diseases. A Recurrent Neural Network (RNN) is a class
Skin diseases may be caused by fungal infection, of artificial neural networks where connections between
bacteria, allergy, or viruses. The advancement of lasers nodes form a directed graph along a temporal sequence.
and Photonics based medical technology has made it This allows it to exhibit temporal dynamic behavior. In
possible to diagnose the skin diseases much more quickly existing Method there is a lack of clarity to detect the
and accurately. skin diseases must be diagnosed early hairy affected skins. Multi -class classification using
to reduce their development and spread. The diagnosis Recurrent Neural Network(RNN) was lower
and treatment of a skin disease takes longer time and compared to CNN binary classification due to the
causes financial and physical cost to the patient.In number of handled class and also due to similarity
general, most of the common people do not know the between the sub-classes.
type and stage of a skin disease. Some of the skin DISADVANTAGES
diseases show symptoms several months later, causing
the disease to develop and grow further. This is due to • Clarity of images
the lack of medical knowledge in the public. Sometimes, • Hair density detection
a dermatologist (skin specialist doctor) may also find it
• Texture
difficult to diagnose the skin disease and may require
expensive laboratory tests to correctly identify the type • Tattoo detection
and stage of the skin disease.In this project image • Remedy accuracy
302 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Gaussian Filter
Pre-processing
Image Segmentation
Classification CNN
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 303
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: Conveying information during an systems and so on and are also moving ahead with rapid
emergency situation is of utmost need from a development. The main reason for peaceful and conflict-
soldier's point of view. Nowadays communication free life is just because of the soldiers who are on the
in the military includes wireless communication, border of our nation. Life of a military man is not so
message signalling and many more. But during
easy. When there is an unexpected war the most
combat these types of communication will not be
effective. In the past combat communication
important thing needed is communication. Earlier,
consisted mostly of code words,signlanguage and numerous kinds of communication were used which
tactical communication. In these types of scenarios, include telephonic, telegraphic, photo telegraphic and
the chances of misinterpretation are high and a data transmission were carried on using wire & radio
minor mistake may risk the soldier's life. Here we equipment.
introduced a smart helmet which allows
Information regarding the enemy's capability, actions,
communication with each other by detecting the
muscle movement of the throat, lips and jaws. Silent
their intentions and their way of attacking are always
sound technology allows speech communication to unpredictable. Indeed, if it is predicted by any of the
take place while an audible acoustic sign is military troops, it is really hard to transfer that
unavailable. It works by the computer identifying information with their respective crew mates. Only when
the phonemes that an individual pronounces from the gathered information is shared promptly as well as
nonauditory sources of information about their accurately within their squads/crewmates proper actions
speech movements. Smart Helmet consists of an can be taken.
electromyography sensor which observes tiny
muscular movements that arise while we talk and The idea of using silent sound technology in helmets
convert them into electric pulses then later which will be effective in conveying the information.
converted into speech without a sound. The Generally, helmets are designed to protect from danger.
measurement system consists of electrodes, a In particular the military helmets are designed to
preamplifier of an Electromyo signal, a safeguard them from shrapnel's, attacks, injuries etc.
multichannel recorder and an AD converter. As an Since communication during battles is really difficult but
AD converter, a multichannel recorder has been with the help of our smart defending helmet which is
used, or a sound card with a software for digital based on the SILENT SOUNDTECHNOLOGY the
signal processing. Thus, this method will be communication can be done smoothly. Moreover,
innovative and an effective one.
soldiers would benefit greatly from the development of
Keywords: Smart helmet, communication, smart defencing helmets.
electromyography-signal,military,Silent Sound
technology. II. LITERATURE REVIEW
I. INTRODUCTION [1] States the need for Silent Sound Technology and
its advantages, disadvantages and various applications.
Nowadays technologies are likely to step forward The main aim of the study is to transfer the information
in reality systems, sensing systems, communication
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 305
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
without the need for vocal cords. The objective of the The main process used here is electromyography
technology is based on the process of transmitting which is used to measure the movement of muscles near
information over a phone only through lip movement's to face. Anciently, for measuring muscular movement,
and not by vocal cord. [2] Gives a clear view about they used the tiny electrodes attached to the face near
Silent Sound Technology. This technology neglects the to lips and pharynx. The EMG observes the tiny muscle
surrounding noise and transmits information by just motions when we speak which are converted into
receiving the electrical impulse from the lip movements electrical pulses shown in fig.1
and converts as sound speech at the receiver end. It is
also mentioned that this technology can be used for
languages like English, German and French. The two
methods used in SST and the applications of SST are
stated in this study. [3] Proposes the idea of SST. Brief
notes on various image processing techniques like
Fig.1
Analog Image processing and Digital Image Processing
are also discussed in this study. Moreover, the future a Electromyographic sensors such as Myo-ware
scope of this technology is also stated which refers to muscle sensor attached to the face records the electrical
the process where the electrodes will be incorporated signals produced by facial muscles, it compares that
into the cell-phones instead of being attached to the with previously recorded signal pattern if the sound
face and nanotechnology will be a major part in the matches, the sound gets transmitted to another end
SST process. [4] Silent Sound Technology is Gift for person using traducers.in order to attach to skin, the
Dumb People states the process of detecting the lip sensor requires three electrodes that snap into the
movement and the act of converting the electrical pulse sensor's snap style connectors. The EMG sensor surface
into a sound signal and then sending it to the receiver. which includes speech interface consists of
The three general steps under Digital Image Processing 1. Pressure sensor
are included in this study. Pre-processing is the first
2. Vibration sensor
process followed by Enhancement and then Information
Extraction. These are the processes under this Digital 3. Electromagnetic sensor
Image Processing. Study states that this Silent sound 4. Motion sensor
technology works 99% efficiently. This will be one of
the most useful technologies in the near future. In image processing technique, there are two
techniques:
III. PROPOSEDMETHODOLOGY
1. Analog image processing
Silent sound technology is an amazing idea for
people who lost their voice to speak but wish to 2. Digital image processing
communicate among people. This technology helps Digital image processing is used here which helps in
people to communicate without sound but by using lip the process of converting image to image or image to
movement which is converted into audio signals. The audio. The output is audio waves with minimal
electrical pulse gets converted into sound signals. corrections and calibrations. For image processing, the
In this silent sound technology,we generally using recognition interface contains ultrasound transducer, high
two things, resolution camera and lip reader. By this process, a
monitored image will be sent to the lip reader and it
1. Electromyography (EMG) gets compared with registered spoken words with
2. Image processing present lip and facial movement and compares the
image.
306 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
The main algorithm used here is CNN technology contrast. The enhancement techniques work under two
in deep learning. Deep learning models are the most factors mainly: The digital data, the objectives of
important and essential thing in extracting the complexity interpretation.
information from the input images. Convolutional neural In Information Extraction the distantly detected
networks play a dramatic role in reducing the information is exposed to quantitative analysis to
computation time taken when many networks fail to relegate singular pixels to explicit classes. It is then
utilize. grouped. It is important to assess its precision by
Digital image processing undergoes three steps: contrasting the classifications on the characterized
1. Pre-processing images with the spaces of known personality on the
ground. The eventual outcome of the analysis comprises
2. Display and enhancement guides (or images), information and a report. Then, at
3. Information extraction. that point these are changed over to comparing signals
shown in fig.2
IV. FLOWCHART
The smart defence helmet consists of electromyo
sensor and its interfacing sensors, image processing
camera/pi camera, raspberry pi, Wi-Fi module,
electromechanical transducers and Ultra-sound
transducers.
The defence military can communicate secret or
confidential matters to their team. At that time, the smart
helmet which is fixed with an Electromyo sensor
converts their lip movement to speech to other people
in the mission. First, the user makes facial movement
to speak; the sensor absorbs the facial movements
keenly,which converts to electrical pulses. The extracted
impulse undergoes digital signal processing. The
ultrasound transducer placed below the chin so that
the camera could capture the movement of tongue and
Fig.2
lips. With the help of a portable camera fixed in the
helmet, analyse the digital image processing technique. SOLIDWORK VIEW:
The impulse gets converted into an audio signal to the The three-dimensional view of the smart defence
receiver end using an ultrasound transducer. helmet is shown in fig.3
In digital image processing technique, pre-processing
takes place which consists of those operations that
prepare data for subsequent analysis that attempts to
correct or compensate for systematic errors. The digital
imageries are subjected to several corrections such as
geometric, radiometric and atmospheric, though all
these corrections might not necessarily be applied in all
cases.
Fig.3
Image Enhancement Used to improve the
interpretability of the image by increasing apparent
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 307
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Silent Sound Technology is the best solution for [6] ShehjarSafaya and Kameshwar Sharma, "Silent Sound
Technology-An End to Noisy Communication", International
various situations and it works well for different Journal of Innovative Research in Computer and Communication
languages like French, English and German. But on the Engineering, vol. 1, no. 9, November 2013, ISBN 2320-9801.
other hand, it is difficult for languages like Chinese. It is [7] International journal in multidisciplinary and Academic Research
so because different tones may hold different meanings. (SSIJMAR) Vol .2, No.2, March - April (ISSN 2278 - 5973)
VII. CONCLUSION
Thus, the idea of using SST (Silent sound
technology) permits communication without uttering a
single word. This automation will be very convenient
for soldiers in transmitting the information within their
crew mates/ squad. Significance of this helmet is to carry
out the information to their respective teammates and
not to be transferred to the opponent squad. From a
design point of view the helmet is comfortable to wear.
Additionally, this helmet is designed using simplified
components and also there should be free space to such
an extent that the helmet is convenient to use
308 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: This paper represents a Dual Mode This paper presents Dual Mode Logic (DML), a
Logic (DML) gates for low power application's. new design paradigm for digital integrated circuits. DML
DML is an alternative to the CMOS logic. DML logic gates can operate in two modes, each optimized
has a switching ability between two modes i.e., static for a different metric. Its on-the-fly switching between
mode and dynamic mode. In dynamic mode, The
these operational modes at the gate, block and system
DML circuit achieves high performance along with
increased Power dissipation, while in static mode
levels provide maximal E-D optimization flexibility. Each
DML circuit attain lower power with moderate highly detailed chapter has multiple illustrations showing
performance. Dual mode logic operates both how the DML paradigm seamlessly implements digital
modes in a single circuit, where as in CMOS logic circuits that dissipate less energy while simultaneously
it requires different types of circuits for static and improving performance and reducing area without a
dynamic mode. In this project, a digital circuit is significant compromise in reliability. All the facets of the
designed by using DML and it is designed in sub DML methodology are covered, starting Describes a
threshold region. The parameters like Power novel, promising alternative to conventional CMOS
consumption were measured. It has been compared logic, known as Dual Mode Logic (DML), with which
with existing CMOS logic with various process a single gate can be operated selectively in two modes,
techniques.
each optimized for a different metric (e.g., energy
Keywords- Micro Wind, CMOS, Dual Mode consumption, performance, size). Demonstrates several
Logic, Digital circuit, VLSI Technology. techniques at the architectural level, which can result in
I. INTRODUCTION high energy savings and improved system performance.
Focuses on the tradeoffs between power, area and
In CMOS Digital circuits there are many types of
speed including optimizations at the transistor and gate
logic families are available. The most used logics are
level, including alternatives to DML basic cells,
static CMOS and dynamic CMOS. The static CMOS
Illustrates DML efficiency for a variety of VLSI
circuits are constructed by both NMOS and PMOS
applications.
devices. The logical operation evaluated by the
combination of input values. The dynamic CMOS The methodologies which are used to achieve low
circuits are constructed by only pull down network. power consumption in digital systems span a wide range,
The keeper and header transistors are connected with from device/process level to algorithm level. Device
clock signal. But both the logics are having some characteristics (e.g., threshold voltage), device
disadvantages like charge sharing, transistor count, geometries and interconnect properties are significant
transistor ratio, clock rate etc and these are the different factors in lowering the power consumption. Circuit-level
physical structures . The proposed Dual mode logic is measures such as the proper choice of circuit design
operates between static and dynamic modes of styles, reduction of the voltage swing and clocking
operation with a single circuit. The clock signal is a mode strategies can be used to reduce power dissipation at
selecting signal for this logic. It can be a continuous the transistor level. Architecture-level measures include
clock signal or a fixed pulse signal depends on type of smart power management of various system blocks,
operating mode. utilization of pipelining and parallelism, and design of
bus structures. Finally, the power consumed by the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 309
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
system can be reduced by a proper selection of the parasitic capacitance. The interconnect lines between
data processing algorithms, specifically to minimize the the gates contribute to the second component of the
number of switching events for a given task. total capacitance. Note that especially in sub-micron
II. TYPES OF POWER DISSIPATION IN technologies, the interconnect capacitance can become
CMOS the dominant component, compared to the transistor-
related capacitances. Finally, the input capacitances are
1. Switching Power Dissipation mainly due to gate oxide capacitances of the transistors
This component represents the power dissipated connected to the input terminal. Again, the amount of
during a switching event, i.e., when the output node the gate oxide capacitance is determined primarily by
voltage of a CMOS logic gate makes a power the gate area of each transistor.
consuming transition. In digital CMOS circuits, dynamic 2. Short-Circuit Power Dissipation
power is dissipated when energy is drawn from the
power supply to charge up the output node capacitance. The switching power dissipation examined above is
During the charge-up phase, the output node voltage purely due to the energy required to charge up the
typically makes a full transition from 0 to VDD, and the parasitic capacitances in the circuit, and the switching
energy used for the transition is relatively independent power is independent of the rise and fall times of the
of the function performed by the circuit. To illustrate input signals. Yet, if a CMOS inverter (or a logic gate)
the dynamic power dissipation during switching, is driven with input voltage waveforms with finite rise
consider the circuit example given in Fig. 7.1. Here, a and fall times, both the nMOS and the pMOS transistors
two-input NOR gate drives two NAND gates, through in the circuit may conduct simultaneously for a short
interconnection lines. The total capacitive load at the amount of time during switching, forming a direct current
output of the NOR gate consists of (1) the output path between the power supply and the ground, as
capacitance of the gate itself, (2) the total interconnect shown in Fig.1
capacitance, and (3) the input capacitances of the driven The current component which passes through both
gates. the nMOS and the pMOS devices during switching
does not contribute to the charging of the capacitances
in the circuit, and hence, it is called the short-circuit
current component. This component is especially
prevalent if the output load capacitance is small, and/or
if the input signal rise and fall times are large, as seen in
Fig. 7.5. Here, the input/output voltage waveforms and
the components of the current drawn from the power
supply are illustrated for a symmetrical CMOS inverter
with small capacitive load. The nMOS transistor in the
circuit starts conducting when the rising input voltage
exceeds the threshold voltage VT,n. The pMOS
Fig1: A NOR gate driving two NAND gates through
interconnection lines. transistor remains on until the input reaches the voltage
level (VDD - |VT,p|). Thus, there is a time window
The output capacitance of the gate consists mainly
during which both transistors are turned on. As the
of the junction parasitic capacitances, which are due to
output capacitance is discharged through the nMOS
the drain diffusion regions of the MOS transistors in
transistor, the output voltage starts to fall. The drain-
the circuit. The important aspect to emphasize here is
to-source voltage drop of the pMOS transistor
that the amount of capacitance is approximately a linear
becomes nonzero, which allows the pMOS transistor
function of the junction area. Consequently, the size of
to conduct as well. The short circuit current is terminated
the total drain diffusion area dictates the amount of
when the input voltage transition is completed and the
310 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
pMOS transistor is turned off. An similar event is exceeds the threshold voltage VT,n. The pMOS
responsible for the short- circuit current component transistor remains on until the input reaches the voltage
during the falling input transition, when the output voltage level (VDD - |VT,p|). Thus, there is a time window
starts rising while both transistors are on. during which both transistors are turned on. As the
Note that the magnitude of the short-circuit current output capacitance is discharged through the nMOS
component will be approximately the same during both transistor, the output voltage starts to fall. The drain-
the rising-input transition and the falling-input transition, to-source voltage drop of the pMOS transistor
assuming that the inverter is symmetrical and the input becomes nonzero, which allows the pMOS transistor
rise and fall times are identical. The pMOS transistor to conduct as well. The short circuit current is terminated
also conducts the current which is needed to charge up when the input voltage transition is completed and the
the small output load capacitance, but only during the pMOS transistor is turned off. An similar event is
falling-input transition (the output capacitance is responsible for the short- circuit current component
discharged through the nMOS device during the rising- during the falling input transition, when the output voltage
input transition). This current component, which is starts rising while both transistors are on.
responsible for the switching power dissipation of the Note that the magnitude of the short-circuit current
circuit (current component to charge up the load component will be approximately the same during both
capacitance), is also shown in Fig.1 The average of the rising-input transition and the falling-input transition,
both of these current components determines the total assuming that the inverter is symmetrical and the input
amount of power drawn from the supply. rise and fall times are identical. The pMOS transistor
3. Short-Circuit Power Dissipation also conducts the current which is needed to charge up
the small output load capacitance, but only during the
The switching power dissipation examined above is falling-input transition (the output capacitance is
purely due to the energy required to charge up the discharged through the nMOS device during the rising-
parasitic capacitances in the circuit, and the switching input transition). This current component, which is
power is independent of the rise and fall times of the responsible for the switching power dissipation of the
input signals. Yet, if a CMOS inverter (or a logic gate) circuit (current component to charge up the load
is driven with input voltage waveforms with finite rise capacitance), is also shown in Fig.1. The average of
and fall times, both the nMOS and the pMOS transistors both of these current components determines the total
in the circuit may conduct simultaneously for a short amount of power drawn from the supply.
amount of time during switching, forming a direct current
path between the power supply and the ground, as III. EXISTING METHOD
shown in Fig. 1. 1. nMOS logic
The current component which passes through both The MOSFETs are n-type enhancement mode
the nMOS and the pMOS devices during switching transistors, arranged in a so-called "pull-down network"
does not contribute to the charging of the capacitances (PDN) between the logic gate output and negative
in the circuit, and hence, it is called the short-circuit supply voltage (typically the ground). A pull up (i.e. a
current component. This component is especially "load" that can be thought of as a resistor, see below) is
prevalent if the output load capacitance is small, and/or placed between the positive supply voltage and each
if the input signal rise and fall times are large, as seen in logic gate output. Any logic gate, including the logical
Fig. 1. Here, the input/output voltage waveforms and inverter, can then be implemented by designing a network
the components of the current drawn from the power of parallel and/or series circuits, such that if the desired
supply are illustrated for a symmetrical CMOS inverter output for a certain combination of boolean input values
with small capacitive load. The nMOS transistor in the is zero (or false), the PDN will be active, meaning that
circuit starts conducting when the rising input voltage at least one transistor is allowing a current path between
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 311
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 313
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
V. SIMULATION RESULT
VI. CONCLUSION
The proposed dual mode logic circuit is evaluated
using Full adder. It is the efficient logic family than
conventional CMOS family. It was tested under various
logic gates like nand , nor, not and results were
compared with conventional CMOS logic circuits .The
proposed design reduces the power consumption and
and also a single circuit operates as static circuit and
dynamic circuit without any physical modification. This
dual mode logic gives efficient result with low power
consumption.
Fig.9. Schematic of NAND Type B DML
314 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 315
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: The bone fracture is a common is applied on the bones.X-ray images are examined
problem in human beings occurs due to high manually, but it is time consuming and prone to errors.
pressure is applied on bone or simple accident and As X-ray images are more suspected to noise, many
also due to osteoporosis and bone cancer. The preprocessing steps to remove noise and blur from the
accurate diagnosis of bone fracture is important
image.
aspects in medical field. Medical Imaging is the
process used to promote body images for medical In medical science, a break or crack in a bone or
uses to pinpoint diseases. In this work X-ray cartilage is known as Fracture. A fracture can also be
images are used for bone fracture analysis which the result of conditions which weaken the bones, for
is obtained from hospital. In this paper GUI is example, osteomalacia (softening of the bone),
developed with Image Pre-processing, Image osteopenia (condition before osteoporosis),
Morphology and Image Classification using osteogenesis (brittle bone diseases) osteoporosis
Support Vector Machine.The processed images will
(porous bone diseases), and osteofibrosis (lack of
be further classified into fractured and non-
calcium).
fractured bone and compare the performance of the
classifier with existing methods. II. LITERATURE SURVEY
Statistical Features like Mean, Standard Anu T C et. al. have used Neural Network for image
Deviation, Contrast,Entropy,Correlation, Skew& classification, median filter for removing of noise, Sobel
Kutosis are extracted from pre-processed image edge detector was used for edge detection, K-Means
to train and test the classifier. The following Clustering technique for segmentation[1]. Image
performance parameters of classifierobtained features such as Entropy, Contrast, Correlation, and
Sensitivity, Specificity, Precision and Accuracy Homogeneity were used for training and testing of the
100%, 89.32%, 89.85% and 93.33% respectively.
classifier. The performance of the classification are
MATLAB R2020a is employed which uses the
image processing tool box.
Accuracy is 85%, Precision is 76.9%, Sensitivity is
100% and Specificity is 70%.
Index Terms -X-ray image, Support Vector
Machine, Statistical Features and Bone Fracture. Kamil Dimililer et.al.developed an intelligent
classification system that would be capable of detecting
I. INTRODUCTION and classifying the bone fractures. The developed
Bones are rigid bars that are made up of connected system comprises of two principal stages. In the first
tissues and adult consisting of 206 bones.Bones are stage, the images of the fractures are processed using
solid organs which provide strength and stability to different image processing techniques in order to detect
body.The Bones are provides shape & Support to body their location and shapes and the next stage is the
and also moment to body.Types of bones are Long, classification phase, where a backpropagation neural
Short, Flat, Sesamoid and Irregular. network is trained and then tested on processed
images. Experimentally, the system was tested on
Bone fracture is a common problem that can occur
different bone fracture images and the results show high
due to accidents or any other case in which high pressure
efficiency and a classification rate.
316 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Peruri Srinivasulu et. al. used canny edge detection The block diagram or proposed method is shown
methodology for segmentation. The canny method in Fig. 1 which uses the image processing techniques
produces perfect information from the bone image. The for pre-processing, Feature extraction and Support
main aim of this research is to detect Bone fractures Vector Machine (SVM) for classification. This
using image processing using MATLAB[3]. The proposed method effectively identifies the bone
proposed system has the following steps, namely, fractures in the images. Your goal is to simulate the usual
preprocessing, segmentation, and fracture detection.in appearance of papers in conference proceedings. For
feature excitation step, the paper uses to Hough items not addressed in these instructions, please refer
Transform technique for line detection inline-image. to the last issue of your conference's proceedings for
Feature extraction is the main task of the system. the reference or ask your conference Publications Chair
results from various experiments show that the for instructions.
proposed system is very accurate and efficient. A. Data Set
O.Ozgur et.al.have used Neural Network for image A dataset in computer vision is a curated set of digital
classification, Wavelets for Image features and Intelligent photographs that developers use to test, train and
Bone Fracture Detection System (IBFDS) for detection. evaluate the performance of the classifier.
The proposed artificial neural network has achieved
89% success rate[4]. Total No. of Images in Data Set : 275 ( X- Ray
Images)
Louisville et.al. proposed method decrease patient
morbidity include early fracture stabilization and Bone Fractured Images : 92
sequential debridement. External fixation remains the None Bone Fractured Images : 183
standard; however, early internal fixation in low grade
Data Set is divided into Two Sets i.e Training Set &
injuries may be an acceptable option. Early soft tissue
Testing Set
coverage is critical. The use of prophylactic parenteral
antibiotics has decreased the incidence of acute infection Training Set:
and chronic osteomyelitis. Supplemental use of local Total No. of Images in Training Set : 110
antibiotic polymethyl methacrylate (PMMA) beads
appear to further diminish the morbidity in high-grade Bone Fractured Images : 30
open fractures[5]. None Bone Fractured Images : 80
III. METHODOLOGY Testing Set:
Total No. of Images in Training Set : 165
Bone Fractured Images : 62
None Bone Fractured Images : 103
B. Image Resize
Fig.1 Block Diagram of Proposed Method for Identifying Image resizing is necessary when you need to
Fractures. increase or decrease the total number of pixels, whereas
In medical science, a break or crack in a bone or remapping can occur when you are correcting for lens
cartilage is known as Fracture. A fracture can also be distortion or rotating an image. Zooming refers to
the result of conditions which weaken the bones, for increase the quantity of pixels, so that when you zoom
example, osteomalacia (softening of the bone), an image.Interpolation works by using known data to
osteopenia (condition before osteoporosis), estimate values at unknown points. Image interpolation
osteogenesis (brittle bone diseases) and osteoporosis works in two directions, and tries to achieve a best
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 317
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
approximation of a pixel's intensity based on the values removed from the objects in an image depends on the
at surrounding pixels. Here image is resized to size and shape of the structuring element used to process
256X256. the image. In the morphological dilation and erosion
C. Color Conversion operations, the state of any given pixel in the output
image is determined by applying a rule to the
A pixel color in an image is a combination of three corresponding pixel and its neighbors in the input image.
colors Red, Green, and Blue (RGB). The conversion The rule used to process the pixels defines the operation
of a color image into a grayscale image is converting as a dilation or an erosion.
the RGB values (24 bit) into grayscale value (8 bit).
Various image processing techniques and software F. Feature Extraction
applications converts color image to grayscale image Feature extraction is the main step in various image
conversion of a color image into a grayscale image processing applications. Gray-Level Co-occurrence
inclusive of salient features is a complicated process. Matrix is used for feature extraction and selection.
The converted grayscale image may lose contrasts, GLCM is main tool used in image texture analysis.
sharpness, shadow, and structure of the color image. GLCM is a statistical way to indicate image texture
D. Removal of Noise structure by statistically sampling the pattern of the
greylevels occurs in relation to other grey levels. Gray
Noise is always presents in digital images during Level Co-occurrence Matrix (GLCM) method is used
image acquisition, coding, transmission, and processing to extract statistical features.
steps. It is very difficult to remove noise from the digital
images without the prior knowledge of filtering The Probability Density Function or Histogramf_z
techniques.Filtering image data is a standard process (z_i) is used to calculate the statistical features. The no.
used in almost every image processing system. Filters of grey levels in the image is varies from 0 to ( 2^n-1)
are used for this purpose. They remove noise from where n is no. of bits.
images by preserving the details of the same. Table 1 Features Extracted from image
S.No Parameter Formula Description
The median filter is used in the work to remove the Measures average
1 Mean variation of intensity
noise, It is a sliding-window spatial filter, replaces the levels
centre value in the window with the median of all the Standard
M easures majority
variations of intensity
2
pixel values in the window. The window or kernel is Deviation levels about mean
value
3x3 used. Measures shape of
3 Skew = Probability Density
E. Image Morphology Function
Measures flatness of
4 Kurtosis Probability Density
Morphology is a broad set of image processing Function
operations that process images based on shapes. 5 Contrast
Measures intensity
contrast between a
Morphological operations apply a structuring element pixel and its neighbor
Measures the
to an input image, creating an output image of the same 6 Entropy randomness of
intensity levels
size. In a morphological operation, the value of each Measures the joint
pixel in the output image is based on a comparison of 7 Correlation
= occurrence of
specified pixel pairs
the corresponding pixel in the input image with its
G. Classifier
neighbors. =
The most basic morphological operations are dilation Support vector machines (SVM) is used for
and erosion. Dilation adds pixels to the boundaries of classification, which is supervised linear classifier based
objects in an image, while erosion removes pixels on on the margin maximization principle. They perform
object boundaries. The number of pixels added or structural risk minimization, which improves the
complexity of the classifier with the aim of achieving
318 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
excellent generalization performance. The SVM Step5: Extract the image features such Mean,
accomplishes the classification task by constructing, in Contrast, Correlation, Entropy, Standard Deviation,
a higher dimensional space, the hyperplane that Kurtosis, and Skewness from all training set images
optimally separates the data into two categories. and store as vectors.
Support Vector Machine is an extremely popular Step6: Calculate the value of decision functionf(x).
supervised machine learning technique which can be Step7: If f(x) ? 0 then test image is Bone Fractured
used as a classified as well as a predictor. For Image otherwise non Bone Fractured image.
classification, it finds a hyper-plane in the feature space
that differentiates between the classes. An SVM model Step8: Repeat above steps for all test images and
represents the training data points as points in the feature calculate TN, FN, FPv& TP.
space, mapped in such a way that points belonging to Step9: Calculate performance evaluation measures
separate classes are segregated by a margin as wide as Sensitivity, Specificity, Accuracy and Precision.
possible. The test data points are then mapped into Table 2 Confusion Matrix of a Classifier
that same space and are classified based on which side
of the margin they fall.
H. Algorithm
Training of SVM Classifier:
Step1: Read image from training set and resize to
256x256.
Table 3 Classifier Output
Step2: Convert Color Image to Grey Scale
Step3: Noise Removal using 3x3 Median Filter
Step4 : Perform Image Morphology operations i.e
Dilation & Erosion
IV. RESULTS AND DISCUSSION
Step5 : Extract the image features such as Mean,
Contrast, Correlation, Entropy, Standard Deviation, The proposed system is implemented in Graphical
Kurtosis, and Skewness from all training set images User Interface (GUI) using MATLAB and Identification
and store as vectors. of Bone fracture image and non Bone fractured image
are shown in figure2 and figure 3 at different stages.
Step6: Calculate bias value, support vectors and
quadratic kernel function using training set vectors.
Step7: Calculate decision function f(x)
With this training process is completed.
Testing of SVM Classifier:
Step1: Read image from testing set and resize to
256x256. Fig.2 Identification of Bone Fractured Image.
Step2: Convert Color Image to Grey Scale
Step3: Noise Removal using 3x3 Median Filter
Step4: Perform Image Morphology operations i.e
Dilation &Erosion
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 319
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
320 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: This paper is on developing an IoT technologies, real-time analytics, machine learning,
based smart bot which will be controlled by our commodity sensors, and embedded systems. Traditional
smartphone simply by opening the IP address of fields of embedded systems, wireless sensor networks,
the network connected with the microcontroller control systems, automation (including home and
(ESP8266 12E-NODE MCU). It has an ultrasonic
building automation), and others all contribute to
sensor attached to a servo motor for rotating the
sensor. The sensor will give us the distance of the
enabling the Internet of things. In the consumer market,
nearest obstacle from the bot by rotating the servo IoT technology is most synonymous with products
motor left, right and forward. And seeing this pertaining to the concept of the "smart home", covering
distance we can move the bot in any direction devices and appliances (such as lighting fixtures,
manually. We have also installed a DHT-22 thermostats, home security systems and cameras, and
temperature and humidity sensor to monitor the other home appliances) that support one or more
temperature and humidity of the surroundings. common ecosystems, and can be controlled via devices
INTRODUCTION associated with that ecosystem, such as smart-phones
and smart speakers.
The phrase Internet of Things for future scope, we
can attach a camera module and also GPS tracking The Internet of Things (IoT) is the network of
system to make it more precise and also easy to physical objects-devices, instruments, vehicles, buildings
control.gs (IoT) refers to connecting various physical and other items embedded with electronics, circuits,
devices and objects throughout the world via internet. software, sensors and network connectivity that enables
The term IoT was firstly proposed by Kevin Ashton in these objects to collect and exchange data. The Internet
1999.The following section illustrates the basics of IoT. of Things allows objects to be sensed and controlled
It deals with various layers used in IoT and some basic remotely across existing network infrastructure, creating
terms related to it. This section also presents the opportunities for more direct integration of the physical
architecture of IoT. For example, when the household world into computer-based systems, and resulting in
devices of our daily life connect with the internet the improved efficiency and accuracy. Some preliminary
system can be called a Smart-Home in IoT environment. IoT applications have been already developed in
The IoT is not just a deep vision for the future. It is healthcare, transportation, and automotive industries.
already under implementation and is having an impact IoT technologies are at their infant stages; however,
on more than just technological development. many new developments have occurred in the integration
of objects with sensors in the Internet. The development
The Internet of things (IoT) is the extension of of IoT involves many issues such as infrastructure,
Internet connectivity into physical devices and everyday communications, interfaces, protocols, and standards.
objects. Embedded with electronics, Internet The objective of this paper is to give a general concept
connectivity, and other forms of hardware (such as of IoT, the architecture and layers in IoT.
sensors), these devices can communicate and interact
with others over the Internet, and they can be remotely
monitored and controlled. The definition of the Internet
of things has evolved due to the convergence of multiple
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 321
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Model description the microcontroller will have the request from the user
Hardware:- and trigger the gear motors to execute the action by
moving towards the desired direction. The ultrasonic
1) NODEMCU ESP8266-12E MODULE. sensor will measure the distance of the nearest obstacle
2) 9V BATTERY and show it on the webpage. We can also rotate the
3) L293D MODULE ultrasonic sensor by rotating the servo motor in three
different directions to check the obstacle distances by
4) ULTRASONIC SENSOR just clicking the buttons available on the webpage.
5) SERVO MOTOR Similarly, DHT22 sensor will detect the temperature
6) DC GEAR MOTOR and humidity in real time and also show in the webpage.
7) WHEEL
8) FREE WHEEL
9) JUMPER WIRE
10)ULTRASONIC SENSOR HOLDER
11)CHASSIS
SOFTWARE:-
1) ARDUINO IDE
Working Principle:
The main component used in the model is the Picture
microcontroller Node MCU ESP8266-12E and along
with that components used are L293D module, gear
motors, servo motor, ultrasonic sensor, DHT22 sensor
to name a few.
The circuit connections made are as follows:
Firstly, the gear motors are connected to the L293D
motor driver and the motor driver then wired to the
Node MCU. The power source which is a series of
two 9V batteries is connected with the particular slot
of the motor driver. Ultrasonic sensor's 4 pins Vcc,
trig, eco and gnd; DHT22's 3 pins Vcc, data and gnd
and also the servo motor are then connected with the
Node MCU accordingly with the exact pins mentioned
in the code. RESULTS AND DISCUSSION
After the whole connection is done the code is Using the concept of IOT and the required hardware
uploaded and after the execution of the code a IP and software components mentioned above we have
address is generated in the serial monitor in the Arduino developed the bot which will help in different industrial
IDE. When we put this IP address in our smart phone's domains, especially in green houses and plantation
web browser the five buttons: Forward, Backward, projects. We have implemented it specifically to
Left, Right and Stop appear. By clicking these buttons observe accurate temperature and humidity of different
we can move the BOT as per our choice. In this process sections of a large green house where the temperature
322 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
and humidity should be in a certain range. So, using this Future plans
bot, the user can sit in a place and he or she can monitor This paper can be enhanced with the help of more
temperature and humidity from different areas of that sensors, gyroscope, compass and so on. As for future
green house. scope, we can attach a camera module and also GPS
Same application can be implemented for different tracking system to make it more precise and also easy
industries where temperature monitoring is needed for to control.
different jobs. So, as a conclusion we can say that this Other than this on a different note we can make this
device will help a person to collect data from different bot ready for being applicable in other industrial
sectors of any industrial area or green houses where environments also by replacing or adding new sensors
temperature and humidity monitoring is needed. with different functionality which will work for collecting
In this paper we have implemented the working of different types of data in different types of other
different sensors and NodeMCU (microcontroller) and industries.
also, we have learned and implemented concepts of REFERENCES
IOT. We have faced different types of errors while
1. www.wikipedia.org
working on this paper like errors in connecting different
hardware components and compilation errors in the 2. https://circuitdigest.com/microcontroller-projects/arduino-
obstacle-avoding-robot
code sometimes. But we have resolved all those and
3. https://www.electronicshub.org/obstacle-avoiding-robot-arduino/
finally developed the paper with all specifications we
were desired to have in it. 4. https://create.arduino.cc/projecthub/chandankumarcmsn/
obstacle-avoiding-robot-using-arduino-with-ultrasonic-sensor-
af66f1
5. https://gist.github.com
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 323
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: In the Present situations Air and and keep it under control for a better future and healthy
sound pollution is one of the serious and growing living for all. Here we propose an air quality as well as
issues. Because, with increasing number of sound pollution monitoring system that allows us to
industrial units and transport vehicles the problem monitor and check live air quality as well as sound
of air and sound pollution is increasing day by day.
pollution in an area through IOT. System uses air sensors
Hence, it is necessary to monitor air quality and
keep it under control for a better future and healthy
to sense presence of harmful gases/compounds in the
living for all. Here in the proposed work an air air and constantly transmit this data. Also, system keeps
quality as well as sound pollution monitoring system measuring sound level and reports it. The sensors
is developed that allows us to monitor and check interact with raspberry pi which processes this data and
live air quality as well as sound pollution in transmits it over the application. This allows authorities
particular areas through IOT (Internet of Things). to monitor air pollution in different areas and act against
The System uses air sensors which detects (CO, it. Also, authorities can keep a watch on the noise
LPG, and Methane) to sense presence of harmful pollution near schools, hospitals and no honking areas,
gases/compounds in the air and constantly transmit and if system detects air quality and noise issues it alerts
this data to microcontroller. Also system keeps authorities so they can take measures to control the
measuring sound level and reports it to the online
issue. Some future consumer applications envisioned
server over IoT. The sensors interact with
Microcontroller which processes this data and
for IoT sound like science fiction, but some of the more
transmits it over internet. This allows authorities practical and realistic sounding possibilities for the
to monitor air pollution in different areas and take technology include: Receiving warnings on your phone
action against it. or wearable device when IoT networks detect some
physical danger is detected nearby. Self-parking
In the proposed work the system detects the
level of pollution (Air or Sound) time by time. It automobiles. Automatic ordering of groceries and other
explains the different units such as hardware and home. Automatic tracking of exercise habits and other
software used in the proposed system and also day-to-day personal activity including goal tracking and
explains the modeling and working of the basic regular progress reports. Network Devices and the
components used in the proposed system such as Internet of Things All kinds of ordinary household
Microcontroller (Arduino board) and its gadgets can be modified to working an IoT system.
architecture, Gas sensor and its features, Sound Wi-Fi network adapters, motion sensors, cameras,
sensors and its specifications. microphones and other instrumentation can be
Keywords: ATMEGA328, Air quality sensor, embedded in these devices to enable them for work in
Sound sensor, Blynk app. the Internet of Things. Home automation systems
I. INTRODUCTION already implement primitive versions of this concept for
things like light bulbs, plus other devices like wireless
The main objective of IOT Air & Sound Monitoring scales and wireless blood pressure monitors that each
System is that the Air and sound pollution is a growing represents early examples of IoT gadgets. System uses
issue these days. It is necessary to monitor air quality air sensors to sense presence of harmful gases/
324 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
compounds in the air and constantly transmit this data gases like NH3, CO, CO2 and SO2. The MQ135 is
to microcontroller. Also system keeps measuring sound used to measure the air quality of the atmosphere.
level and reports it to the online server over IOT. The Microphone sensor shows the noise value in dB. Flame
sensors interact with microcontroller which processes sensor is used to detect the presence of fire in our
this data and transmits it over internet. This allows surroundings. Here we proposed a system in which the
authorities to monitor air pollution in different areas and Arduino is the heart of the system. The atmospheric
take action against it. Also authorities can keep a watch condition is checking by the sensors all the time. When
on the noise pollution near schools, hospitals and no the sensed value reaches to the threshold point then
honking areas, and if system detects air quality and noise sensor gives that information to the Arduino. After that
issues it alerts authorities so they can take measures to Arduino check all sensor value. Arduino then process
control the issue. the values and gives the signal to the webpage. This
II. LITERATURE SURVEY system is based on the Arduino and all the processing
is takes place in Arduino only. Wi-Fi module is
Arushi Singh et al. have proposed a system which providing the network connection to the computer for
uses air and sound sensors to monitor the data sending the information to the public. This allows
constantly and then transmit the data. A raspberry pi authorities to monitor air pollution in different areas and
module interacts with the sensors and processes the act against it. Also, authorities can keep a watch on the
data thereby transmitting it to the application. noise pollution near schools, hospitals and no honking
Dr. A Sumithra et al. have proposed the concept of areas.
a smart city. Technology and communication is the basis METHODOLOGY & IMPLEMENTATION
of this smart city. Various sensors and modules have
also been used to monitor the various environmental The Atmega328 is a very popular microcontroller
parameters. This system uses air and sound sensors to chip produced by Atmel. It is an 8-bit microcontroller
monitor the data and then upload the data on the cloud that has 32K of flash memory, 1K of EEPROM, and
server as digital data. The cloud storage managers 2K of internal SRAM. The Atmega328 is one of the
analyze the data and notify accordingly. microcontroller chips that are used with the popular
Arduino boards. The Arduino board comes with either
SRM. ArthiShri et al. have proposed the idea of 1 of 2 microcontroller chips, the Atmega168 or the
monitoring the parameters using a PIC microcontroller Atmega328. Of these 2, the Atmega328 is the
which senses the atmosphere signals. Gas sensors are upgraded, more advanced chip. The Atmega328 has
used to measure the pollution level. This data is 28 pins.It has 14 digital I/O pins, of which 6 can be
uploaded on the internet and can also be viewed through used as PWM outputs and 6 analog input pins.
an app.
Seung Ho Kim et al. have designed a monitoring
system that uses an environmental parameter analyzer
and sends the results in a server through a LTE
communication network. The resulted data was
compared with the data obtained by the National
Ambient air quality Monitoring Information System
(NAMIS).
III. PROPOSED METHOD Fig 1: Block Diagram of Proposed Method
The sensor we are using here is MQ135,Flame Air quality sensor for detecting a wide gases,
sensor and Microphone sound sensor. Sensor MQ135 including NH3,NOx,alcohol,benzene,smoke and CO2.
is air quality sensor which is used to detect the harmful Idea for use in office or factory. MQ135 gas sensor
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 325
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
has high sensitivity toAmmonia,Sulfide and other harmful degree of on-chip integration allows for minimal external
gases.MQ135 alcohal sensor is a Sn02 with a lower circuitry, including the front-end module, is designed to
conductivity of clean sir.it is with low cost and occupy minimal PCB area. The ESP8266 supports
particularly suitable for Air quality monitoring APSD for VoIP applications and Bluetooth co-existance
applications. interfaces, it contains a self-calibrated RF allowing it to
work under all operating conditions, and requires no
external RF parts.
Node MCU is a low cost open source platform. It
initially included firmware which runs on the ESP8266
Wi-Fi SoC and hardware. The name "NodeMCU"
combines "node" and "MCU" (micro-controller
unit).The ESP8266 NodeMCU is a device, which
combines some features of the ordinary Arduino board
with the possibility of connecting to the internet.
The prototyping hardware typically used is a circuit
Fig 2.Interfacing of Air quality sensor board functioning as a dual in-line package (DIP) which
Sound detection sensor module detects the intensity integrates a USB controller with a smaller surface-
of the sound where sound is detected via a microphone mounted board containing the MCU and antenna.
and fed into an LM393 OP-AMP. It comprises an The design was initially based on the ESP-12 module
onboard. potentiometer to adjust that the set point of the ESP8266, which is a Wi-Fi SoC integrated with
for the sound level. The working principle of this sensor a Tensilica Xtensa core 32 bit RISC processor, widely
is related to human ears. Because human eye includes used in IoT applications.
a diaphragm is, it uses the vibrations and changes into
signals. Whereas in this sensor, it uses a microphone This RISC processor supports RTOS and operates
and the main function of this is, it uses the vibrations at 80MHz to 160 MHz adjustable clock frequency. Its
and changes into current otherwise voltage. The high processing power with in-built Wi-Fi / Bluetooth
ESP8266 WiFi Module is a self contained SOC with and Deep Sleep Operating features make it ideal for
integrated TCP/IP protocol stack that can give any IoT protocol.
microcontroller access to your WiFi network. The IV. EXPERIMENTAL RESULTS
ESP8266 is capable of either hosting an application or The proposed system was fully developed and tested
offloading all WiFi networking functions from another to demonstrate its feasibility and effectiveness. The
application processor. Each ESP8266 module comes Screenshots of the proposed work has been presented
pre-programmed with an AT command set firmware, in Figure below.
meaning, you can simply hook this up to your Arduino
device and get about as much WiFi-ability as a WiFi
Shield offers (and that's just out of the box)! The
ESP8266 module is an extremely cost effective board
with a huge, and ever growing, community.
This module has a powerful enough on-board
processing and storage capability that allows it to be
integrated with the sensors and other application specific
devices through its GPIOs with minimal development
Fig.4.Hardware component interconnection
up-front and minimal loading during runtime. Its high
326 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
homes and malls, etc. Sensors continuously sense the [2] Arnab Kumar saha " A Raspberry Pi Controlled Cloud Based
Air and Sound Pollution Monitoring System"IEEE 8th Annual
level of air or sound or flame pollution and give the Computing and communication conference, January 2018.
results in blynk app.the indication will be given through
[3] Anjaiah Guthi, "Implementation of an Efficient Noise and Air
the device by a beep sound if the air pollution increases Pollution Monitoring System Using Internet of Things (IOT)",
from a certain value (decided by the programmer) in Vol. 5, Issue 7, July 2016
case of air pollution whereas the sound pollution and [4] L.Ezhilarasi, K.Sripriya, A .Suganya , K.Vinodhini "A system
flame is monitered with respective region. By using the for monitoring air and sound pollution using Arduino controller
with IOT technology" , vol 3 issue 2 (2017), march 23, 2017.
internet of the android phone user can check air,flame
and sound pollution level in that area. This application [5] K. V. N. Kavitha, A. Bagubali and L. Shalini, "V2v wireless
communication protocol for rear-end collision avoidance on
can be used to get the knowledge regarding pollution highways with stringent propagation delay", In Proceedings of
in a particular area, and then the common people can international conference on advances in recent technologies in
take relative measures accordingly and authorities can communication and computing ARTCom '09, pp. 661-663.
warn various industries about the level of pollution. [6] Dr. Siva yellampalli, "IOT Based Air and Noise Pollution
Monitoring in Urban and Rural Areas, Important Zones like
V. CONCLUSION Schools and Hospitals in Real Time" , Volume 1, Issue 5, May
2017
The proposed work is very helpful in the Present
[7] T. Hoppe, S. Kiltz, and J. Dittmann. ?Security threats to
situations for monitoring the Air and sound pollution as automotive CAN networks-practical examples and selected short-
it is one of the serious growing issues. In this work the term countermeasures,? InternationalConference on Computer
proposed air quality as well as sound pollution Safety, Reliability and Security, pages 235-248, Newcastle upon
Tyne, United Kingdom, Sep. 2008.
monitoring system allows us to monitor and check live
air quality as well as sound pollution in particular areas [8] B. Groza, S. Murvay, A. Van Herrewege, and I. Verbauwhede,
?LiBrA-CAN: a lightweight broadcast authentication protocol
through IOT (Internet of Things). The System uses air for Controller Area Networks,? International Conference on
sensors which detects (CO, LPG, and Methane) to Cryptology and Network Security, pp. 185-200, Darmstadt,
sense presence of harmful gases/compounds in the air Germany, Dec. 2012.
and constantly transmit this data to microcontroller. Also [9] Charles Birdsong, Ph.D., Peter Schuster, Ph.D., John Carlin,
Daniel Kawano, William Thompson,"Test Methods and Results
system keeps measuring sound level and reports it to for Sensors in a Pre-Crash Detection System"in California
the online server over IoT. Polytechnic State University, San Luis Obispo, California, Paper
Number 06AE-19.
The result and analysis of this practical experiment
[10].Global Status Report on Road safety 2013 by World Health
shows the expected output and guaranteeing the Organization (WHO).
detection of air and sound pollution and it supports a
cost effective system to provide modest, flexible and
compact system.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 327
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
illegally share their own keys, and in the latter category, and Waters enlarges the practical applications by
a malicious attribute authority (AA) illegally redistributes supporting flexible number of attributes. Several systems
users' private keys to unauthorized users. In the have been proposed to obtain either of the above
conventional CP-ABE scheme, an individual user's properties. However, none of them achieve the two
private key is only associated with an attribute set. properties simultaneously in practice, which limits the
Therefore, different users with the same attribute subset commercial applications of CP-ABE to a certain extent.
may have the same decryption key. When an abused In this paper, we propose a practical large universe
private key is found, it is hard to determine the true CP-ABE system supporting white-box traceability,
owner of the abused key. This enables a dishonest user which is suitable for commercial applications.
to share his/her own key without the risk of being caught. Compared to existing systems, our new system has three
On the other hand, as the private keys of all users in the advantages: (1) The number of attributes is not
system are generated and distributed by a trusted AA, polynomially bounded; (2) Malicious users who leak
it enables AA to redistribute the keys of legitimate users their decryption keys could be traced; and, (3) The
in the system to unauthorized users with minimal risk. storage overhead for traitor tracing is constant. We also
For key escrow, a malicious AA may also use the user's prove the selective security of our new system in the
private key to illegally decrypt the cipher texts instead standard model under "q-type" assumption
of redistributing it; thus, infringing on data privacy. In a 2. Zhang Y, Zheng D, Deng R H. Security and privacy
single-authority CP- ABE scheme, the key escrow in smart health: Efficient policy- hiding attribute-based
problem is inevitable and a practical CP-ABE scheme access control[J]. IEEE Internet of Things Journal,
should reduce the trust on AA. A direct solution to 2018.
mitigate key escrow is to use multiauthority to remove
With the rapid development of the Internet of Things
the trust in a single authority.
(IoT) and cloud computing technologies, smart health
II. LITERATURE REVIEW (s-health) is expected to significantly improve the quality
1. JiantingNing, ZhenfuCao,Xiaolei Dong, of health care. However, data security and user privacy
LifeiWeiAndXiaodong Lin - Large Universe Cipher concerns in s-health have not been adequately
text-Policy Attribute-Based Encryption with White- addressed. As a well-received solution to realize fine-
Box Traceability - 2014. grained access control, cipher text-policy attribute-
A Cipher text-Policy Attribute-Based Encryption based encryption (CP-ABE) has the potential to ensure
(CP-ABE) system extracts the decryption keys over data security in s-health. Nevertheless, direct adoption
attributes shared by multiple users. It brings plenty of of the traditional CP-ABE in s-health suffers two flaws.
advantages in ABE applications. CP-ABE enables fine- For one thing, access policies are in clear text form and
grained access control to the encrypted data for reveal sensitive health-related information in the
commercial applications. There has been significant encrypted s-health records (SHRs). For another, it
progress in CP-ABE over the recent years because of usually supports small attribute universe, which places
two properties called traceability and large universe, an undesirable limitation on practical deployments of
greatly enriching the commercial applications of CP- CP-ABE because the size of its public parameters grows
ABE. Traceability is the ability of ABE to track the linearly with the size of the universe. To address these
malicious users or traitors who intentionally leak the problems, we introduce PASH, a privacy-aware s-
partial or modified decryption keys to others for profits. health access control system, in which the key ingredient
Nevertheless, due to the nature of CP-ABE, it is difficult is a large universe CP-ABE with access policies partially
to identify the original key owner from an exposed key hidden. In PASH, attribute values of access policies
since the decryption privilege is shared by multiple users are hidden in encrypted SHRs and only attribute names
who have the same attributes. On the other hand, the are revealed. In fact, attribute values carry much more
property of large universe in ABE proposed by Lewko sensitive information than generic attribute names.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 329
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Particularly, PASH realizes an efficient SHR decryption decrypt and obtain the outsourced data successfully.
test which needs a small number of bilinear pairings. There have been a number of extensions to the basic
The attribute universe can be exponentially large and CPABE schemes. For example, Lewko and Waters
the size of public parameters is small and constant. Our considered the property of a large universe and divided
security analysis indicates that PASH is fully secure in ABE into ABE for the small universe (SU-ABE) and
the standard model. Performance comparisons and ABE for the large universe (LU-ABE). In SU-ABE,
experimental results show that PASH is more efficient the attribute universe of the system is required to be
and expressive than previous schemes.. determined when the public parameters are established
III. EXISTING METHOD and no additional attribute can be added, while in LU-
ABE, the available attributes are "infinite" (super
Attribute based encryption(ABE) is a new polynomial size) and new attributes can be added any
cryptographic primitive which provides a promising tool time..
for addressing the problem of secure and fine grained
data sharing and decentralized access control. Existing IV. PROPOSED METHOD
ABE-based approaches can be further divided into key- CIPHERTEXT
policy ABE (KP-ABE) and cipher text-policy ABE Ciphertext is also known as encrypted or encoded
(CP-ABE). information because it contains a form of the original
KEY BASED ATTRIBUTE BASED plaintext that is unreadable by a human or computer
ENCRYPTION without the proper cipher to decrypt it. Decryption,
Key-policy attribute-based encryption (KP-ABE) the inverse of encryption, is the process of turning
is an important class of ABE, where cipher texts are ciphertext into readable plaintext.
labeled with sets of attributes and private keys are ADVANCED ENCRYPTION STANDARD
associated with access structures that control which (AES)
cipher texts a user is able to decrypt. KP-ABE has The algorithm described by AES is a symmetric-
important applications in data sharing on un trusted key algorithm, meaning the same key is used for both
cloud storage. However, the cipher text size grows encrypting and decrypting the data. The Advanced
linearly with the number of attributes embedded in cipher Encryption Standard (AES) is a symmetric block cipher
text in most existing KP-ABE schemes. In this paper, chosen by the U.S. government to protect classified
we describe our work on designing a KP-ABE scheme information. AES is implemented in software and
with constant size cipher text for monotonic access hardware throughout the world to encrypt sensitive data.
structures. The downside of the proposed KP-ABE It is essential for government computer security, cyber
scheme is that private keys have multiple size growth in security and electronic data protection. Symmetric, also
the number of attributes in the access structure. The known as secret key, ciphers use the same key for
proposed KP- ABE scheme is proved to be secure encrypting and decrypting, so the sender and the
under the general Diffie-Hellman exponent assumption. receiver must both know and use the same secret key.
In CP-ABE approaches, the access policy is The government classifies information in three
determined and embedded in the cipher text by the data categories: Confidential, Secret or Top Secret. All key
owner, and a private key is associated with the attributes lengths can be used to protect the Confidential and
of a data user. Such a scheme is particularly suitable Secret level. Top Secret information requires either
for cloud-related applications. For example, the access 192- or 256-bit key lengths.
policy can be specified by enterprises or individuals, The AES algorithm (also known as the Rijndael
and used to encrypt the outsourced data based on the algorithm) is a symmetrical block cipher algorithm that
attributes owned by potential users. Only users whose takes plain text in blocks of 128 bits and converts them
attributes meet the access policy of cipher text can
330 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
to cipher text using keys of 128, 192, and 256 bits. Third Party Audit: • Login their correct user name
Since the AES algorithm is considered secure, it is in and password. • View all Data User and authorized
the worldwide standard. them. • View user request to Check the Integrity
The AES includes: Auditing • Logout
• Symmetric key symmetric block cipher Key Generation Center : • Login their correct
user name and password.(KGC) •View all upload File.
• 128 bit data, 128/192/256 bit keys o View all Data User Request details then, send the
• Stronger and faster than Triple-DES Private key user mail id • Logout
• Provide full specification and design details Cloud Server: •View all registered Data Users. •
• Software implementable in C and Java.. View all Searchable History details. • View all Integrity
check Request details. • Result- Generate the result
V. SYSTEM ARCHITECTURE based on the file request counts. • No. of. Download
file:- calculate the number of download file to the cloud.
• Logout
Attacker: • Login •View all Upload file & Attacker
them. •Logout.
VI. RESULTS
Module Description Fig.1.: input image Fig.2.: File uploaded for encryption
generation center (KGC) and attribute authority (AA) [2] Wang S, Guo K, Zhang Y. Traceable ciphertext-policy attribute-
based encryption scheme with attribute level user revocation for
to collaboratively generate the private keys of system cloud storage[J]. PloS one, 2018, 13(9): e0203225.
users. Since neither KGC nor AA knows the final
[3] Zhang Y, Zheng D, Deng R H. Security and privacy in smart
private keys of users and is not able to forge a valid health: Efficient policy-hiding attribute-based access control[J].
private key, the key generation center and attribute IEEE Internet of Things Journal, 2018, 5(3): 2130-2145.
authority is not capable of illegally distributing the users [4] Lewko A, Waters B. Unbounded HIBE and attribute based
private keys to unauthorized users or decrypting the encryption[C]//Annual International Conference on the Theory
and Applications of Cryptographic Techniques. Springer, Berlin,
users cipher texts without the users authorization. We Heidelberg, 2011: 547-567.
also showed that LU-CPABE supports public
[5] Lai J, Deng R H, Li Y. Expressive CP-ABE with partially hidden
traceability, which in turn implies user key abuse access structures[J]. 2012.
resilience. In addition, we evaluated the performance
[6] Li J, Shi Y, Zhang Y. Searchable ciphertext policy attribute based
and security of the proposed scheme. The experimental encryption with revocation in cloud storage[J]. International
results show that the large universe cipher text policy Journal of Communication Systems 2017, 30(1): e2942.
attribute-based encryption is selectively secure under [7] Jiang Y, Susilo W, Mu Y, et al. Ciphertext-policy attribute-based
the decisional q-parallel BDHE assumption in the encryption against key- delegation abuse in fog computing[J].
Future Generation Computer Systems, 2018, 78: 720-729.
standard mode. It also supports multiple authorities,
large attribute domains and access policy updates. [8] Premkamal P K, Pasupuleti S K, Alphonse P J A. A new verifiable
outsourced ciphertext- policy attribute based encryption for big
Considering all the features the proposed scheme is data privacy and access control in cloud[J]. Journal of Ambient
static and traceable secure based on the state-of-the- Intelligence and Humanized Computing, 2019, 10(7): 2693-2707.
art security models. [9] Wang Q, Peng L, Xiong H, et al. Ciphertext-policy attribute-
based encryption with delegated equality test in cloud
computing[J]. IEEE Access, 2017, 6: 760-771.
[10]Ning J, Cao Z, Dong X, et al. Auditable ?-Time Outsourced
Attribute-Based Encryption for Access Control in Cloud
Computing[J]. IEEE Transactions on Information Forensics and
Security, 2017, 13(1): 94-105.
332 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: We proposed a new transform scheme scalable coding, most of the state-of-the-art
of multiplier less reversible time-domain lapped compression methods adopt 3-D discrete wavelet
transform and KL transform for lossy-to-lossless transform (DWT) [1]-[3] or DWT/Karhunen-Loève
hyperspectral image compression. Instead of transform (KLT) [4]-[6], where 9/7 floating-point filter
applying discrete wavelet transform (DWT) in the
is al-ways used for decorrelation in lossy compression.
spatial domain, RTDLT is applied for decorrelation.
RTDLT can be achieved by existing discrete cosine
Lossless compression schemes include methods based
transform and pre- and postfilters, while the on vector quantization, prediction, integer transform,
reversible transform is guaranteed by a matrix and so on. Although prediction-based methods perform
factorization method. In the spectral direction, well, they do not have the ability of realizing progressive
reversible integer low complexity KLT is used for lossy-to-lossless compression which is owned by
decorrelation. Owing to completely reversible transform-based method [9] proposed the lifting
transform, the proposed method can realize scheme for the realization of wavelet transforms (WTs).
progressive lossy-to-lossless compression from a Bilgin et al. [10] introduced reversible integer WT in
single embedded code-stream file. Numerical the application of 3-D image compression. Xiong et al.
experiments on benchmark images show that the applied 3-D integer WT in medical image compression
proposed transform scheme performs better than
and pointed out that the transform has to be unitary to
5/3DWT-based methods in both lossy and lossless
compressions, comparable with the optimal 9/
achieve good lossy coding performance. Some
7DWT Float KLT based lossy compression researchers have studied integer KLT for spectral
method. decorrelation. Hao and Shi proposed reversible integer
KLT, and Galli and Salzo improved it. However, in
Index Terms: Hypersectral image compression,
spatial domain, integer WTs are still applied as common
integer transform, Karhunen Loève transform ,
lossy-to-lossless compression, time-domain lapped methods. A drawback of a wavelet- based compression
transform, DCT. method is that 5/3DWT is usually applied instead of 9/
7DWT in lossy-to-lossless compression schemes, and
I. INTRODUCTION this will lead to performance degradation. Another
Hyperspectral images have wide applications nowa- disad- vantage of DWT is that it cannot compete with
days such as in atmospheric detecting, remote sensing, DCT due to the constraint of CPU and computer
military affairs, and so on. However, the volume of memory, particularly in real- time and low-complexity
hyperspec- tral image is so large that a 16-bit AVIRIS applications, because the computing complexity of WT
image with size of 512 512 224 will occupy 112 increases exponentially when the image size increases.
MB. Therefore, efficient compression algorithms are DCT has its own special advantages such as low
required to reduce the cost of equipment storage or memory cost, flexibility at block-by-block level, parallel
bandwidth. processing, etc. Tran et al. have designed pre- and
Lossy-to-lossless compression will be of great postfilters to improve the performance of DCT and
importance in telemedicine and satellite communications called the combination as time- domain lapped
for legal reasons or research requirements. To realize transform (TDLT). The rationale behind this method is
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 333
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
that, within the filtered block, the pixels are as A. Multiplierless Multilifting Based on Matrix
homogenous as possible, and this will be helpful for Factorization
improving transform efficiency. Although TDLT Based on matrix factorization theory, a nonsingular
performs even better than DWT does in the energy matrix can be factorized into a product of at most three
compatibility and lossy compression, it does not perform trian- gular elementary reversible matrices (TERMs).
well in the lossless compression where the reversible If the diagonal elements of the TERM are equal to one,
transform is required. In fact, for hyperspectral image the TERM can real- ize reversible integer-to-integer
compression, completely reversible transform method transform by multilifting. We should notice that the
is always required to realize lossy-to-lossless coding. factorization is not unique because there are other
In this letter, we take a practical and innovative different factorizations that affect the error between the
approach to replace integer WT with integer reversible integer approximation transform and the original
TDLT (RTDLT) in the spatial domain, and the RTDLT transform. Those factorizations will further affect the
is realized by the improved matrix factorization method. intrinsic energy- compacting capability of DCT, so the
RTDLT can realize integer re- versible transform, and error should be reduced as much as possible. Quasi-
hence, we adopted a progressive lossy- to-lossless complete pivoting is suggested in the progress of matrix
hyperspectral image compression method based on factorization [12]. In our experiments, we found that
RTDLT and reversible KLT (RKLT). Block this method was very effective in reducing the error
transforming coeffi- cients in the spatial domain would and enhancing the stability and hence achieved better
be reorganized into subband integer approximation to the original floating-point
transform. We have proposed an efficient 2-D image
coding method using reversible DCT with the help of
improved matrix factorization method.
Fig. 1. Forward and inverse multilifting method. (a) Forward Based on the aforementioned theory, it can also be
multilifting. (b) Inverse multilifting. proved that matrix A has a unit TERM factorization of
structure so as to be coded by wavelet-based coding A = PLUS, if and only if | det A| = | det P| = 1, where
methods. In addition, an improved 3-D embedded zero- L and S are lower triangular matrices, U is the upper
block coding method used to code transformed triangular matrix, and P is the permutation matrix.
coefficients is also integrated in this letter. The proposed In this letter, multilifting is used for TERM to realize
method retains the character of scal-ability in re- versible integer transform, an extension of traditional
reconstruction quality and spatial resolution, so at the dual lifting. In our proposed method, 4-stage, 8-stage,
show that the proposed method performs well in both and 16-stage lifting are used. For example, four-point
lossy and lossless compressions. To reduce complexity, reversible integer-to- integer transform Y = UX and its
our proposed method is implemented using shift and inverse transform, where U is an upper triangular matrix
addition without any multiplier with the help of multilifting. of size four, can be realized as (2), and the multilifting
II. RTDLT/RKLT implementation is shown in Fig. 1.
In the proposed method, RTDLT and RKLT are ? y0 ?
used for decorrelation in the spatial domain and spectral
direction, respectively. We will make a brief introduction
about how to re- alize reversible integer transform by The forward integer transform and its inversion
multiplierless multilifting based on matrix factorization y0 = x0 + ×u01x1 + u02x2 + u03x3|
and then present the design of multiplierless RTDLT/
y1 = x1 + ×u12x2 + u13x3|
RKLT.
y2 = x2 + ×u23x3|
334 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 335
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
approximates the floating-point filter very well. Further Fig. 4(a)-(c) shows the 38th band of Jasper Ridge,
experiments about the efficiency of multilifting based the 180th band of Cuprite, and the 180th band of Lunar
on RTDLT/RKLT when applied in lossy-to-lossless Lake, respectively. Lossless compression performance
image compression will be discussed in the next section. is compared in Table II, where two coding methods-
3DSPECK and JPEG2000- MC-have been adopted,
and transforms include asym- metric 3D-5/3DWT
(A3D-5/3DWT), 5/3DWT+RKLT, and
RTDLT+RKLT. Based on the same codec-
3DSPECK, we can see that our proposed RTDLT/
Fig. 2. Four-point filter implemented by multilifting.
RKLT performs 7.35%-8.6% better than 3-D DWT
TABLE I
and comparable to 5/3DWT+RKLT. We also
TRIANGULAR TERM MATRICES WITH DYADIC
COEFFICIENTS
compared the performance of M-CALIC [22] which
is mainly based on predicting techniques.
336 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
r
Fig. 6. Hardware implementation complexity of different
transforms.(a) Multiplication. (b) Addition.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 337
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
of its block transform characteristics. Hardware [3] P. L. Dragotti, G. Poggi, and A. R. P. Ragozini, "Compression of
mul- tispectral images by three-dimensional SPIHT algorithm,"
implementation complexity has been shown in Fig. 6. IEEE Trans. Geosci. Remote Sens., vol. 38, no. 1, pp. 416-428,
V. CONCLUSION Jan. 2000.
[4] B. Penna, T. Tillo, E. Magli, and G. Olmo, "Transform coding
In this paper, we present a new transform scheme techniques for lossy hyperspectral data compression," IEEE
of RTDLT/RKLT for the compression of hyperspectral Trans. Geosci. Remote Sens., vol. 45, no. 5, pp. 1408-1421,
images with a performance that is competitive or even May 2007.
superior to that of state-of-the-art conventional [5] B. Penna, T. Tillo, E. Magli, and G. Olmo, "Progressive 3-D
coding of hyperspectral images based on JPEG 2000," IEEE
transform-based techniques. The proposed scheme can Geosci. Remote Sens. Lett., vol. 3, no. 1, pp. 125-129, Jan.
realize reversible integer-to-integer transform, and so, 2006.
it can be applied in progressive lossy-to- lossless [6] W. Sweldens, "The lifting scheme: A construction of second
compression combined with zero-block-based bit- generation wavelet," SIAM J. Math. Anal., vol. 29, no. 2, pp.
plane coders. The new transforming scheme has some 511-546, 1997.
advantages such as multiplierless computing, flexibility [7] I. Daubechies and W. Sweldens, "Factoring wavelet transforms
into lifting steps," J. Fourier Anal. Appl., vol. 4, no. 3, pp. 247-
in processing, par- allel implementation, and so on. 269, May 1998.
Moreover, it also preserves
[8] A. Bilgin, G. Zweig, and M. W. Marcellin, "Three-dimensional
REFERENCES image compression using integer wavelet transforms," Appl. Opt.:
Inf. Process., vol. 39, no. 11, pp. 1799-1814, Apr. 2000.
[1] X. Tang, W. A. Pearlman, and J. W. Modestino, "Hyperspectral
im- age compression using three-dimensional wavelet coding," [9] Z. Xiong, X. Wu, S. Cheng, and J. Hua, "Lossy-to-lossless
Proc. SPIE, vol. 5022, pp. 1037-1047, 2003. compression of medical volumetric data using three-dimensional
integer wavelet trans- forms," IEEE Trans. Med. Imag., vol. 22,
[2] Q. Du and J. E. Fowler, "Hyperspectral image compression using no. 3, pp. 459-470, Mar. 2003.
JPEG2000 and principal component analysis," IEEE Geosci.
Remote Sens. Lett., vol. 4, no. 2, pp. 201-205, Apr. 2007. [10]P. Hao and Q. Shi, "Reversible integer KLT for progressive-to-
lossless compression of multiple component images," in Proc.
IEEE ICIP, Barcelona, Spain, 2003, pp. I-633-I-636.
338 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract papers about pirating of the tress. These trees are all
Background and Objective: This research around exorbitant. These are for the most part helpful
article has proposed that to find the smuggling in the therapeutic sciences just as beautifying agents.
activities in the thick forest area. Our life is Because of huge amount of money involved in selling
dependent upon trees. There is a long association of such tree woods and lots of incidents are happening
of man and trees. Since the hoary past man and of cutting of tree and their smuggling. This issue isn't
trees have been the two major creations of Nature. identified with India just, in China, Australia and African
In his prehistoric days man turned to trees and nations are additionally battling with same issues. Placing
plants to collect the things vitally necessary for his cost at the top of the priority list, Indian sandalwood
existence. Since that time man and trees have been
costs 12000 to 13000 INR for every kg though in global
interdependent, though man is more indebted to
market Red Sanders order a high cost of INR 10 center
trees. Amongst the variety of flora available on the
planet, "SANDALWOOD" is one of the most costly for every ton. The Indian sandalwood tree has turned
as well as less available trees. They are useful in out to be jeopardized as of late, and trying to control
medical sciences and cosmetics. From the past few its conceivable eradication the Indian government is
years, we are finding that the newspapers and news attempting to restrict the exportation of sandalwood.
channels are frequently filled with news regarding For an individual, most extreme passable buy limit isn't
the smuggling activities. Since they are costly, to surpass 3.8kg according to Govt. The tree is as of
smugglers allegedly cut down many of these trees now government controlled, and evacuation is
and transport them to their factories for commercial disallowed whether on private or sanctuary grounds
purposes. until the tree is thirty years of age. But even though
Methodology: Anti-smuggling system is a some corner of newspaper shows us the same title.
measure that has been taken to stop these
2. SYSTEM IMPLEMENTATION
smuggling activities using GSM module and Metal
Detector sensor, IR Sensor, MEMS Sensor. All Embedded system includes mainly two sections, they
these modules are interfaced with Raspberry pi. are
Keywords: Raspberry pi 3, GSM module and 1. Hardware
MEMS Sensor.
2. Software
1. INTRODUCTION Embedded System Hardware:
Forests constitute approximately 30 % of the global As with any electronic system, an embedded system
land area. They give natural surroundings to the two requires a hardware platform on which it performs the
people and a few animal types that share the profitable operation. Embedded system hardware is built with a
environment's merchandise. Dealing with woodland has microprocessor or microcontroller. The embedded
turned into an amazingly hard undertaking. Illicit logging system hardware has elements like input output (I/O)
speaks to one of the greatest difficulties of woods interfaces, user interface, memory and the display.
maintainability. For a long time we are perusing in the Usually, an embedded system consists of:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 339
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
1. Microprocessor
2. Microcontroller
3. Digital signal processor
Microprocessor
CPU on a chip.
We can attach required amount of ROM, RAM and
I/O ports.
Expensive due to external peripherals.
Microcontroller
Computer on a chip
fixed amount of on-chip ROM, RAM, I/O ports
Power Low cost.
340 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
BLOCK DIAGRAM OF THE PROPOSED • It alerts the near by control room that the tree getting
SYSTEM: smuggled.
In case of failure or any disturbance occurred to the
system the alert will be sent to control system The fig
shows the flow diagram for proposed system illustrates
that sensing module is divided into three streams
1) Metal detection
2) Motion detection.
1. Starts the process and sense the sensor inputs If the
Metal is detected (Metal Detector sensor) then it
fetches the geographical location (latitude and
longitude) using GPS tracker. Then sends the alert to
forest officials in the form of text message to their
mobile phones and captured images to Gmail. It also
updated in the IOT cloud server webpage for every
30 seconds.
2. If motion is detected (PIR sensor) then it works on
The above figure shows the block diagram ofthe the next step. It reports the tree status and also checks
project mainly consists of three blocks a tree block, a whether there is a vibration on the tree.
server and controlling data base block and web App
as shown in the block diagram. The tree block is Now with the exact geo location it sends the message
connected to all the trees where it is having a centralized alert to the mobile phone and also Captured images to
microprocessor interfaced with a Mems sensor on the Gmail and updates the data in the IOT webpage.
body of a tree.When Whenever anybody tries to cut 3. CONCLUSION
the tree then the sensor senses the variation and sends The purpose of this is to save valuable trees which
the information to processor. have high demand in market like Sagwaan, Sandalwood
Upon receiving the signal the processor track the etc. These trees are very costly as well as less available
location of that tree and the predefined ID number and in the world. These are use in the medical sciences as
send the information to server using IOT modem which well as cosmetics. Because of huge amount of money
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 341
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
342 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: To obtain hardware level Authors : Mrs. Sunitha Kumari, B. Jhansi Reddy.
approximation by introducing the partial product
3. Design of low error fixed width modified Booth
technique for designing approximate multiplication
Multiplier in the year 2015.
circuits. This approximation multiplier can
decreases the design complexity with an increase Authors : K-C Lee, K-L cho
in performance and power efficiency for error
4. Energy efficient Approximate Multiplier for Digital
resilient applications.
Signal Processing in the year 2015.
Logic complexity of approximation is varied for
the accumulation of altered partial products based
Authors : Narayana Moorthy, Moghaddam.
on their probability. 5. Design for Power and Area of Efficient Approximate
INDEX TERMS: Approximate computing, error Multipliers in the year 2019.
analysis, low error, low power, multipliers. Authors : Sandhi Naresh, Malathi Naddunooro.
I. INTRODUCTION III. EXISTING METHOD
In CMOS technology and VLSI design complexity A) Approximate Multipliers:
scale, delivering desired functionalities while managing
As mentioned in above Sub-section, there are mainly
power consumption has been a first class design
two types of approximate multipliers existing:
challenge. To remedy this energy-efficiency challenge,
approximate AND-array multipliers, which utilize AND
they designed the Array-based Approximate Multipliers
gates for partial products generation and approximate
circuits (AMC). Here two types of Approximate
Booth multipliers, which use the modified Booth
Multipliers exist i.e.,
algorithm to reduce the number of partial products.
a) Approximate AND- Array Multipliers. Constant correction and variable correction schemes
b) Approximate Booth Multipliers are proposed for approximate AND-array multipliers.
Constant correction scheme suggests adding one
Where A utilize AND gates for partial products. constant to compensate for the truncated error and
B use the modified Booth algorithm to reduce the variable correction multipliers add some signals in the
number of partial products. Here Approximate partial product table to make compensation.
Arithmetic Unit designs optimally trade-off between However, since Booth multipliers are much more
Area, Power and Energy. efficient than AND-array multipliers, approximate
II. LITERATURE REVIEW Booth multipliers have been intensively investigated. In
1. A Design technique faster for Dadda Multiplier in
particular, statistical linear regression analysis, estimation
the year 2013. threshold calculation and self-compensation approach
have been utilized to compensate the truncation error.
Authors: B. Ramkumar, Harish Kumar. Accuracy is increased by using certain outputs from
2. Design of a Approximate compressor for Dadda Booth encoders. To decrease energy consumption, a
Multiplier in the year 2014. probabilistic estimation bias (PEB) scheme is presented.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 343
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
344 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Fig. Complete designs blocks of proposed system Table: 16x16 fixed-width multipliers.
V. EXPERIMENTAL RESULTS
• The proposed 16-bit fixed-width Booth multiplier and
squarer are designed in Verilog HDL with a CMOS
technology.
• From reports, we get the delay, dynamic power,
leakage power and area.
• We also implement four additional fixed-width Booth
multipliers
a) DTM (Direct Truncated Booth Multiplier),
b) PEBM (with probabilistic estimation bias
Fig: 16x16 fixed width multipliers
compensation).
c) ZSM (Zero Significant Multiplier) FIXED WIDTH BOOTH MULTPLIERS
Table: Error metrics of 12x12 fixed-width Booth multipliers
d) PTM (Probability Truncated Multiplier)
Table: Implementation results of different 16x16 bits fixed-
width Booth multipliers.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 345
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
346 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
• The achieved reductions are 12.00%, 25.68% and method of introducing extra signatures and don't cares,
30.00% in terms of Eave, Emax and Ems, respectively, with 15.81% reduction. Significant error improvements
when compared with ZSM. have also been achieved for proposed multipliers and
• Additionally, the proposed full-width outperforms the squarers when operated in full width mode.
most accurate fixed width PTM with an error FUTURE SCOPE:
reduction of 12.00% and 12.50% for Eave
respectively, when n = 12 (bits). In large-scale forgery, this method is not stable and
has poor effect , which is also the problem will need to
solve in the future.
How to improve the detection of post-processing
forgery is also a problem will need to solve in the future.
REFERENCES:
1. Schulte, Michael J., and Earl E. Swartzlander. "Truncated
multiplication with correction constant [for DSP]." VLSI Signal
Processing, VI, 1993.,[Workshop on]. IEEE, 1993.
2. King, Eric J., and E. E. Swartzlander. "Data-dependent truncation
scheme for parallel multipliers." Signals, Systems & Computers,
1997. Conference Record of the Thirty-FirstAsilomar Conference
on. Vol. 2. IEEE, 1997.
3. Jou, Shyh-Jye, Meng-Hung Tsai, and Ya-Lan Tsao. "Low-error
reduced-width Booth multipliers for DSP applications." Circuits
Fig: Error reduction of the proposed 32x32 full width and Systems I: Fundamental Theory and Applications, IEEE
Booth multiplier over PEBM, ZSM. Transactions on 50.11 (2003): 1470-1474.
• The above figure shows the significant error 4. Min-An, S. O. N. G., V. A. N. Lan-Da, and K. U. O. Sy-Yen.
reductions of the proposed full-width multipliers over "Adaptive low- error fixedwidth Booth multipliers." IEICE
Transactions on Fundamentals of Electronics,Communications
DTM, PEBM and ZSM for n = 32. and Computer Sciences 90.6 (2007): 1180-1187.
• The achieved reductions are 27.09%, 37.09% and 5. Huang, Hong-An, Yen-Chin Liao, and Hsie-Chia Chang. "A self-
44.93% in terms of Eave, Emax and Ems, respectively, compensation fixed-width booth multiplier and its 128-point
when compared with ZSM. FFT applications." Circuits and Systems, 2006. ISCAS 2006.
Proceedings. 2006 IEEE International Symposium on. IEEE,
V. CONCLUSION AND FUTURE SCOPE 2006.
6. Cho, Kyung-Ju, et al. "Design of low-error fixed-width modified
CONCLUSION: booth multiplier." VeryLarge Scale Integration (VLSI) Systems,
IEEE Transactions on 12.5 (2004): 522-531
Our proposed 16x16 bits fixed-width Booth
multiplier consumes 44.85% and 28.33% less energy
and area compared with the most accurate fixed-width
Booth multiplier. Additionally, a 11.11%, 28.11%,
25.00% and 19.10% reduction is achieved for average
error, max error, mean square error and EDE,
respectively, when compared with the best reported
approximate design. Using the same approach, our
approximate 16-bit fixed-width squarer reduces average
error, max error, mean square error and EDEms by
more than 18.18%, 21.67%, 31.25% and 20.00%,
respectively, when compared with existing designs.
Error and cost are further reduced by utilizing the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 347
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract-This study proposes a new method for to predict the disease.The technique has obtained an
the detection of Alzheimer's Disease (AD) using minimum accuracy.
image processing in brain Magnetic Resonance
(MRI) images. This is a progressive disease and "NMF-SVM based CAD tool applied to functional
early detection and classification of AD can majorly brain images for the diagnosis of Alzheimer's disease",
help in controlling disease with machine learning Padilla p and Ramirez J. International journal of
algorithms for this purpose. The proposed method Engineering and Technology vol.8, May 2019.
uses ensemble model in the classification part of
In this paper, they proposed a novel CAD technique
the
for the early diagnosis of Alzheimer's disease based on
System to improve accuracy. In the classification non-negative matrix factorization.Thistechnique has
phase, ensemble model is used to predict the obtained an minimum accuracy.
classes AD or Healthy Control is done.
Experimental results show that the accuracy is III. EXISTING METHOD
improved compared to other techniques. This paper includes a method for detecting
Index Terms -Alzheimer's, Classification, MRI Alzheimer's Disease based on the machine learning
Image processing, Ensemble Model techniques. All the different views of slices(Axial, sagittal
I. INTRODUCTION and coronal) of grey matter and the white matter has
been used for this study. Support vector machine (SVM)
This paper proposes a new method for the detection algorithm is used to predict the disease. SVM is an
of AD in brain MR image. Alzheimer's Disease is a extremely popular supervised machine learning
neurodegenerative disorder that destroys brain memory technique which can be as a classifier as well as a
and thinking skills. In existing method the machine predictor. Support vector machine is used in the
learning algorithms are used to detect the disease, the classification part of the system. By this, the accuracy
accuracy is minimum. Here, the presented machine is not in a accurate way. An SVM model represents
learning algorithm method uses ensemble model to the training data points as points in the feature space,
classify and predict the disease. Hence, the proposed mapped in such a way that points belonging to separate
method has more classification accuracy. classes are segregated by a margin as wide as
II. LITERATURE REVIEW possible.The test data points are then mapped into that
Detection of Alzheimer's Disease with Machine same space and are classified based on which side of
Learning", Shamili and Neha Gopal. International the margin they fall.
journal for technological research in Engineering,
volume 3, May 2018.
In this they proposed a support vector machine
algorithm and image processing techniques an are used
348 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 349
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
• Train the features and split the data in to labels. Sensitivity: It defines "what proportion of actual
• Fit the ensemble model to training set. positives were predicted correctly" =[TP / (TP + FN)]
×100
• Predict the result.
Specificity: It defines "what proportion of actual
Step 6b: Testing Process of Ensemble Model negatives were predicted correctly" = [TN / (FP + TN)]
• Read the image from test set. × 100
• The image is pre-processed and resize to 227X227. V. RESULTS
• Extract the image features such as mean, entropy
and energy.
• Predicting the test results with training set.
• By confusion matrix, calculate the FP, FN, TP and
TN of the test results.
• Predict the test set result.
Table 1: Confusion Matrix of classifier Fig: a Fig: b
DATA SET TP TN FP FN
350 130 180 20 20
Fig: c Fig: d
D. PERFORMANCE PARAMETERS OF Fig. 3: Results of Normal case
a)Original Image, b) Resized image, c)Segmented image,
PROPOSED METHOD: d) Edge detected image
Crack is defined as positive class,No Crack is
defined as negative class.
True Positives(TP): Correctly predicts the positive
class.
False Positives(FP): Incorrectly predicts the positive
class.
Fig: a Fig: b
True Negatives (TN): Correctly predicts the negative
class.
False Negatives (FN): Incorrectly predicts the
negative class.
Accuracy: The percentage of number of correct
positive predictions out of total images.
= [(TP + TN) / (TP + TN + FP + FN)]×100
Fig: c Fig: d
Precision: It defines "what proportion of positive Fig.4: Results of Abnormal Case
predictions were actually correct" = [TP / (TP + FP)] a) Original image, b) Resized image, c) Segmented image,
d) Edge detected image
×100
350 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Comparision between existed method and [2] "Voxel based diagnosis of Alzheimer's disease using classifier
ensembles", Armaanzas R, Iglesias M, Morales DA, Alonso-
proposed method: Nanclares L. IEEE journal of biomedical and health informatics.
2018 Mar 4;21(3):778-84.
[3] "Improving MRI-based diagnosis of Alzheimer's disease via an
ensemble privileged information learning algorithm", Zheng X,
Shi J, Zhang Q, Ying S, Li Y. In2017 IEEE 14th International
Symposium on Biomedical Imaging (ISBI 2017) 2017 Apr 18
(pp. 456-459) IEEE.
[4]"Improving MRI-based diagnosis of Alzheimer's disease via an
ensemble privilegedinformation learning algorithm", Zheng X,
Shi J, Zhang Q, Ying S, Li Y. In2017 IEEE 14th International
Symposium on Biomedical Imaging (ISBI 2017) 2017 Apr 18
(pp. 456-459) IEEE.
VI. CONCLUSION AND FUTURE SCOPE
CONCLUSION:
In this paper, the performance factor indicates that
the proposed method provides better result by
improving accuracy.Our experimental results shows that
the proposed approach can aid in the accurate and
timely detection of Alzheimer's Disease. Thus, the
proposed approach is significant for Alzheimer's Disease
detection from MR images.
FUTURE SCOPE:
Neural network is another booming field in the
computer science and it is widely used in medical imaging
field. In the future work, to improve the accuracy of
the classification of the present work, we are planning
to use concept of deep learning like CNN in order to
better result.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 351
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
Abstract: Energy efficiency is a significant issue Introduction: The global energy footprint of cellular
in portable wireless networks since the battery life networks was 120 TWh in 2010 [1]. Approximately
of versatile terminals is restricted. Protection of 60% of the total power consumption of a legacy base
battery power has been tended to utilizing station (BS) is attributed to the power amplifier (PA),
numerous procedures. Wireless sensor networks
10% to signal processing and the remaining 30%
(WSNs), framed by various little gadgets fit for
tocooling and power supply [2]. This explains why
detecting, processing, and wireless
correspondence are arising as a progressive research has mostly focused on maximising the number
innovation, with applications in different territories. of transmitted bits per Joule consumed by the PA. The
The novel highlights of wireless sensor networks power figures of transmitter and receiver components
have carried new difficulties and issues to the field will become more balanced as cell sizes continue
of conveyed and communitari and at a preparing. shrinking and the processing complexity increasing [3].
Energy efficiency in cell networks has gotten Considering the power contributions of bothsides of a
critical consideration from both scholarly world and wireless communications link can then lead to
industry in light of the significance of lessening the considerable energy savings.
operational consumptions and keeping up the profit
ability of cell networks, not withstanding making Today's long-term evolution (LTE) BSs transmit at
these networks "Green communication". Since the the maximum allowed power and do heavy processing
base station is the essential energy shopper in the to minimise the battery drain of mobile terminals. Cuietal.
organization, endeavors have been made to examine propose adapting the modulation scheme to minimise
base station energy utilization and to discover the power consumption[4]. Miaoetal.[5] present
approaches to improve energy efficiency. The numerical methods for energy-efficient power and rate
tradeo ffs between energy utilization and adaptation for frequency-selective channels. A
throughput, under nearby just as under helpful computing efficient algorithm was later developed in[6].
detecting, are portrayed. The Energy efficient trade
Gomez-Miguelez et al.[7] derive energy-efficient link
offs have been arranged dependent on every
convention layer and examined itseffect in the
adaptation solutions, considering retransmissions,and
organization energy efficiency. analyse the outage probability and energy per bit for
different channels.
Further more, we consider that the Turbo
decoder with early stopping is the receiver This Letter considers the transmitter and receiver
component whose computational power trade offs from a system-level perspective. We
Keywords: Wireless sensor networks(WSNs), propose a methodology for dynamically weighing the
Green energy Communication, Energy efficient, power distribution among transmitters and receivers
Tradeoff with the goal of minimising the overall communications
energy footprint. Numerical results show that significant
energy savings can be achieved by coordinating the
transceiver operational parameters.
352 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
and the path loss and lower-bounded by the receiver Fig.1:Power Vs SNR
sensitivity. assume a variable transmission power pTx. ERx(x)
Single link analysis: We compare two receiver is a function of the signal processing that is performed
realisations, whose cost functions are plotted in Fig. 1. at the receiver. The processing power pRx is a function
These functions were obtained from real measurements of the wave form, the radio enviro nment and the
[10]. The transmitter and receiver are separated by 200 receiver's internal characteristics, that is, how efficiently
m.Table1 provides the remaining simulation parameters. it can decode the information. The system operates
For bigger inclusion, the tradeoff between data efficiently if the chosen link level parameters x minimise
transfer capacity efficiency and energy-efficiency has the total energy ET(x). This leads to the formulation of
been concentrated if there should a rise an occurrence the constrained non-linear optimisation problem.
of adhoc wireless organization. It has been shown that The total energy consumption can be limited by
the per hub through put limit of a specially appointed ideally picking the rate, decided from the area of
organization with n hubs diminishes with n as (1/√ n log transfers andthe start to finish distance. Accordingly,
n),without any requirements on the energy utilized at the best energy-transfer speed tradeoff can be gotten
hubs. The creators likewise build up a solitary by contrasting theabsolute energy utilization for various
measurementas transport efficiency which is the result area of transfers and a directing way. The work an
of transmission capacity efficiency and EE. As a tradeoff, energy-efficientagreeable hand-off determination
there is amajor addition in EE as indicated by the conspire that uses the transmission power all the more
techniques on the channel employment by the transmitter efficiently in helpful transferring frameworks. The hubs
and the energy consumed by the receiver. in the organization were sent with different antennas
ET(x)= ETx(x)+ ERx(x) x[X (1) and unravel and-forward transfer convention was
utilized.
We define a link level parameter space X and x as a
valid instantiation or parameter set that satisfies all Fig.1 Receiver cost functions normalised to power
system constraints. The transmitter and receiver energy consumption of 18 turbo decodingiterations for different
cost functions are evaluated for this parameter set. modulation schemes and code blockl engths L with early
stopping at biterrorrate of 10-3
ETx(x) is a function of the selected wave form
parameters. Here we
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 353
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
1800
1600
354 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
adapting the access and transmission parameters of Fig.2a, it is desirable to operate at low SNR.
These green engineering solutions showed that by APs Conversely, slower decaying cost functions allow for
to the network scenarios can have a large impact The better balancing the transmitter and receiver power
important aspects of a green communications on figures at the cost of a higher overall power consumption
improving EE of wireless s networks. However, to (Fig.2b).
include defining green metrics, bringing architectural Multi-user analysis: Forty users are uniformly
introduce energy saving in a holisticway, Het Netrequ distributed between 10 and 500m from the BS. We
base stations, network planning, and efficient maner for analyse the UL and consider two general strategies: the
ires a generic framework that enables intel-ligent and fixed SNR strategy adjusts the transmission powers so
system design [42]. EEmetricsare required to measure that all user signals are received at the same SNR. The
dynamic selection of different available strategies at flexible SNR strategy adapts the SNRs to minimise the
APs.the energy consumption of the network. total power consumption. We consider that the
The issue of EE in wireless communication networks processing power of the BS is a shared and limited
Different metrics can measuret he energy-consumption resource[12]. Different pRx, max constraints are imposed
or can be approached in two ways energy-performance on the flexible SNR strategy for this analysis: 14, 11.5
tradeo ff in a different ways and 10.002W. When each UL decoder needs only one
Several surveys available in the literature are iteration, the per-user and total power for processing
discussed These metrics have been used to measure at the BS become 250mW (Table1) and 10W (pRx,
the energy from different perspectives. Authors in [39] min).
provide a consumption in component level, equipment Figs. 3a and b illustrate the SNR and the transmitter
for shape survey on green networking research from a plus receiver power consumption per user as a function
system level, system level. This includes the of distance. The SNR decreases with distance to
measurement for design perspective. In this survey, they compensate for the additional path loss, while balancing
have considered each of the proposed techniques for the extra power that is needed between the transmitter-
reducing power into four main branches, as adaptive higher pTx-and receiver-higher pRx. The 11.5 and 14 W
link rate, interface proconsumption or enhancing energy constrained cases lead to nearly identical results
efficiency. Since, thesexying, energy-aware infrastructure because the constraint becomesinactive for pRx,max≥ 12
and energy-aware app metrics are related to enhancing W. When inactive, the optimal SNR allocation for each
energy efficiency in each locations and observed the user is computed in dependently of other users.
root causes of energy-waste in layer of communication,
altogether can be considered as a these four main
branches. In[40], authors have presented as Green
metric. On the other hand, Greenness metrics for an
overview ofthe energy y consumption problemsof are
directly involved into CO2 emission.Understanding it
wireless communication networks and described
differemetrics provide a better view on how EE can be
achieved it nt techniques in general that have been used
to improve the This metric can be reliably used to
measure the EE performance at seenergy efficiency of
these networks.
We conclude that if the slope of the receiver cost
function drops early and steeply, such as shown in
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 355
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
fixedSNR=1.3fi Results:
9 xedSNR=3
Pmax =14W
8 RX The trade-off of EE and quality of experience (QoE)
Pmax =11.5W
7 RX
Pmax =10.002W
with the principal definitions is represented. Different
RX
6 utility based quality of experience capacities are subbed
SNR,dB
5
into plan as is appeared in Figure5.1. With the
4
3 development of asset dispensed to clients, clients' quality
2 of experience and organization energy utilization will
1 build, which brings about EE diminishing with P. In this
0 way, it appears to be that EE is a ceaseless droning
0 100 200 3 400 500
0
0 diminishing capacity of quality of involvement. In any
distan case, EE is the carefully sunken capacity of QoE
ce,m
fixedSNR=1.3 whencircuit power is thought of. The bends increment
9
8
a from the outset and afterward decline immediately when
P max=14W
fixedSNR=3
7
RX
Pmax =11.5W
the utility capacity arrive at its pinnacle esteem.
RX
Moreover, the bend rises and falls all the more quickly
PT.user, W
6 Pmax =10.002W
RX
5 for BE client in view of not having unexpected
4 development in utility. The ordinary measurement of EE
3
2
or quality of involvement can scarcely consolidate the
1 attribute of client types and organization energy
0 utilization together. For instance, to amplify QoE, the
(Fig. 3b). The total power figures for the 1.3 and framework may designate a lot of asset pointless that
3.0 dB fixed SNR strategies are 84.5 and 97.2 W, has little quality of experience improvement however
which are both considerably higherthan what is harms EE harshly.
achievable with the unconstrained or lightly constrained CONCLUSIONS
adaptive SNR approach. Energy efficiency in cell networks is a rising worry
Fig.3 SNR and total power consumption per user for the versatile organization administrators (MNOs).
over distance a.SNR, b.Total power consumption per Theissues include the expense, yet additionally the
user raising CO2 levels in the climate and wellbeing concerns,
The energy-efficient solution moves away from the whichare fearing alongside the developing innovation
unconstrained minimum as the system becomes more and a relating endorser and gadget check. Wireless
constrained. The total power consumptions for the three sensornetworks additionally hold the guarantee to
constrained cases are 67.1, 68.2 and 105.9 W. The change the detecting innovation for a wide range of
105.9 W figure represents the highly constrained utilizations,including foundation checking,
case,where all 40 decoders perform about oneiteration reconnaissance and debacle the executives, where the
each, requiring very high SNR (Fig.3a) and, thus, high identification capacity ofthe WSN is essential. In light
UL transmission powers. of the force utilization model, we reason the maximum
furthest reaches of energy efficient transmission. We
Assuming unconstrained resources, the selection of show that, in a given radio climate, the furthestreaches
an SNR of 3 dB well approximates the optimal solution of energy efficient transmission power is relative to the
for distances below 275 m,whereasanSNRof 1.3dB force utilization of Tx/Rx circuits (defined by PR0 and
is the better choice beyond this point. PT0), and further more corresponding to the channel
efficiency of force speaker (Parameterized by ).
Additionally the impact of the quantity of dynamic clients
356 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
on the reach (cell breathing) and subsequently the force 6 Gomez-Miguelez,I.,Marojevic,V.,andGelonch, A.:'Energy-
efficientwater-filling with ordered statistics', Trans. Veh. Technol.,
efficiency will be researched. When there is practically 2014, 63, (1),pp.428-432
no movement nearby the base station, the base station
7 Gomez-Miguelez,I., Marojevic,V., and Gelonch,A.: 'Link
could be turned off (cell breathing). adaptation for energy-efficient transmission with receiver CSI',
Commun. Lett.,2012,16,(9),pp.1412-1415
REFERENCES
8 Gomez, I., Marojevic, V., and Gelonch, A.: 'Processing-to-
1 GSMA:'Mobile'sgreenmanifesto2012',WhitePaper,June2012 amplifier power ratio for energy effiient communications',
2 Correia, L.M., Zeller, D., Blume, O., et al.: 'Challenges and enabling Electron.Lett.,2012,48,(12),pp.732-734
technologies for energy aware mobile radio networks', 9 Gomez,I., Marojevic,V., Bracke,J.,etal.: 'Performance and over
Commun.Mag.,2010,48,(11),pp.66-72 head analysis of ALOE middle ware for SDR'.IEEE Military
3 Ge, X., Yang, J., Gharavi, H., et al.: 'Energy efficiency challenges Communications Conf., SanJose, CA, USA, 31O ctober-3
of5G small cell networks', Commun. Mag.,2017,55,(5),pp.184- November 2010, pp.1134-1139
191 10 Grover,P., Woyach,K.A.,Palaiyanur,H.,etal.:'An interference-
4 Cui,S.,Goldsmith,A.,andBahai,A.:'Energy-constrained aware perspective on decoding power'.6 th Int.Symp. Turbo
modulation optimization', Trans. Wirel. Commun., 2005,4,(5), Codes& Iterative Information Processing, Brest, France,6-10
pp.2349-2360 September 2010, pp.457-461
5 Miao, G., Himayat, N., and Li, G.: 'Energy-efficient link adaptation 11 Marojevic, V., Gomez, I., and Gelonch, A.: 'Cognitive resource
infrequency-selective channels', Trans. Commun., 2010, 58, man-agement for all wireless access layers', Veh. Tech. Mag.,
(2),pp.545-554 2012, 7, (2),pp.100-106
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P, India 357
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021),13 th & 14 th , August 2021
358 Vemu Institute of Technology, Chittoor- 517112, A.P, India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 359
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
360 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: In recent years, IoT technology has exertion of smart greenhouse different from any
become vision of the world and has given customary greenhouse that are available in market.
tremendous dependency in each and every field.
This project proposes an automated system for I. INTRODUCTION
crop growth monitoring and effective utilization of The strong correlation between agricultural growth
water resources in agriculture, using wireless and economic prosperity has demonstrated that
sensor and RF433MHz protocol. In this project,
agriculture stands as the major economic activity of India
three sensor nodes (soil moisture sensor, humidity
sensor, ultrasound sensor) are deployed in during last 50 years. The fundamental goal of this work
monitoring the greenhouse environment. The soil is to outline a basic, simple to introduce, microcontroller
moisture sensor is used to monitor the moisture - based circuit (MSP430) to screen and record the
present in the soil and when the earth is dry, and estimations of temperature, dampness, pH (hydrogen-
then the motor will be ON automatically for particle focus) of the nursery condition that are
sprinkling of water. The ultrasonic sensor is used persistently altered and controlled so as to advance
to monitor the plant growth and provides required them to accomplish most extreme plant development
amount of fertilizer through sprinkler motor. The yield[9]. The outstanding achievements and missed
insect repellent circuit is also deployed in the opportunities are mixed by the present agricultural
system for preventing the pests from affecting the scenario. Our agricultural productivity should equal
crops. The signals from the sensors are coordinated
other countries in which India has to emerge as an
manufacturers and more. The agriculture is one of
the sector which is catching up with the various economic power in the world,which are currently rated
industries. With the concept of smart farming and as economic power of the world. The productivity,
by the microcontroller and transmitted to the profitability, sustainability of our major farming systems
intermediate node through IoT communication. could improve continuously, new and effective
The Development of wireless sensor network technologies are needed. One such technology is the
technology allows us to develop a system for real green house technology. Although it is centuries old,
time environmental monitoring. In the current
scenario wireless sensor networks participates a
It is new to India. The proposed system consists of
lot in precision agriculture[12]. In this way, the microcontroller which monitor and controls the
greenhouse environment is monitored, controlled greenhouse parameter. It consists of monitoring and
and agricultural crop yield can be improved. The controlling blocks for Greenhouse management.
system reports data to the user remotely and allow
them to effectively control through IoT. Finally, an 1.2 DESIDERATUM OF THE PAPER
apt care of data acquisition from the sensors, The main aim of our project is to overcome the
increasing overall productivity by means of disadvantages produced by the existing system. In our
algorithms have been observed and performed project, an different approach for monitoring and
analysis in meticulous way, which have made the controlling the Greenhouse parameters in real time and
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 361
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
added additional applications that control the plant also ensures a supply of fresh air for photosynthesis
growth as well as prevent crops from the pests. Our and plant respiration.Vents can be accomplished by
project totally builded up with help of Embedded means of ventilation - frequently controlled consequently
System. - and distribution fans.
1.3 IOT IN AGRICULTURE: 2.2 LITERATURE REVIEW
Internet of things has been proving its mettle across An environment parameter intelligent measurement
the industries such as banking, retail, tele companies, system based on GPRS has been put forward and the
digitization, Data collection and automated farming hardware circuit and the software design of the system
techniques are offer high precision crop control with have been completed and the combining characteristics
potential before the gaining popularity. of the greenhouse and the problems existing in
theprocess of environment parameter measurement [2].
1.4 WHY DO WE NEED IOT IN The greenhouse parameter is mainly controlled main
AGRICULTURE? by this project. This project measure various
By 2050, Food and agriculture of the United Nations parameters using different sensors. Temperature sensor
(FAO) says that food production should see 70% will be used to get the temperature. Humidity to test
increase. And the experts believe that IoT could play a the moisture level in air and Soil moisture o test the soil
crucial role in meeting this need. The vital usage of condition of Wet/Dry[3]. The transmission betweenthe
agriculture in IoT is fertilizers and pesticides, monitoring wireless sensor network and the Internet is a method
the livestock,scanning storage capacities and making put forward by this article .The IOT (Internet of Things)
sure that crops are fed andwatered well. It shows an passage is utilized as a major aspect of the nursery
overall potency to increase the productivity with a observing system[4].The application demonstrates the
reduced cost. gateway is reliable, compatible, and extendible.
Because of this gateway the forest monitoring system
II. EXISTING SYSTEM
realized the real-time, and improved the ability of
2.1 INTRODUCTION monitoring the forest parameters[7].
A greenhouse is a building in which plants are grown 2.3 SYSTEM OVERVIEW
for commercial or research purposes Because of
The basic parameters of the green house control is
incoming visible solar radiation from the sun is absorbed
the main aim of this system. To measure various
by plants, soil, and other things inside the building ;
parameters, different sensors are used. Temperature
frequent glass or plastic walls heats up.. Air warmed
sensor will be used to get the temperature. Humidity to
by the heat from hot interior surfaces is retained in the
test the moisture level in air and Soil moisture o test the
building by the roof and wall.Some of the energy is
soil condition of wet/ dry. This project will be
also trapped inside the glasshouse in which the
implemented using advanced CAN protocol and ARM7
greenhouse re-radiate some of their thermal energy in
based LPC2148 32microcontroller [6].
the infrared spectrum .Convection is the primary heating
mechanism of a greenhouse is One of the most important
components of greenhouse isventilation. The plants can
become prone to problems when there is no proper
ventilation. Ventilation plays a main roll, for temperature
regulation and to ensure movement of air and thus
prevent build-up of plant pathogens (such as Botrytis
cinerea) that prefer still air conditions. Ventilation enable
important pollinators to access the greenhouse crop and
362 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
2.4 BLOCK DIAGRAM (CANH and CANL) are connected to another CAN
lines and those CAN lines are converted back to the
SPI lines by using MCP2515 again. The received data
was sent to the LPC2148. The CAN protocol was
used to display the sensor values on the LCD. The
coding was written in embedded C language and
compile using keil compiler. The relevant hex file was
dumped into the microcontroller using FLASH MAGIC
software.
III. PROPOSED SYSTEM
3.1 INTRODUCTION
The major drawback of the existing system is
FIG2.1 Transmission section of Existing system. overcome by the proposed system. In wired connection
there are many advantageous .Even though it has certain
disadvantages because in wire medium there occurs
lot of damages and may occur the entire system to get
damage. In proposed system, a wireless network is
designed to communicate through wireless medium. This
can be operated both automatically and manually. Due
to this method there will be less cause of damage in the
whole circuit. A wireless sensor network is a device
which connects the entire system without using wire. It
connects both transmitter and receiver without using
wire. The datas are being transmitted with the help of
wireless sensor network. The figure 4.1 shows the
FIG2.2 Receiver section of Existing system.
overview of the working.
2.5 WORKING
The above diagram shows the prototype model of
the existing system. The main aim of this system is to
send the sensors data from one microcontroller to
another microcontroller using CAN protocol. For this
system, made ofLPC2148 microcontroller. This
LPC2148 has USB port internally. In this system,
Temperature sensor (LM35) and humidity sensor and Fig3:1overview of the working
soil sensor are used. The sensors give the analog output A sensor node which consists of soil moisture sensor,
and these outputs are connected to the ADC pins of humidity sensor deployed in the system. In addition,
the LPC2148. The ADC converts the analog values Ultrasonic sensor is added for analysing the plant growth
into the equivalent digital values. These digital values and provides required amount of fertilizers to the plants.
are displayed on the 16*2 alphanumeric LCD and sent Insect repellent circuit is added for additional function.It
to another LPC2148 through the SPI lines of the is deployed in the system for preventing the pests from
LPC2148. The SPI lines are converted to the CAN affecting the crops.Microcontroller is mainly used to
lines by using the MCP2515 IC. The CAN lines designed to produce high performance and low cost. A
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 363
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
364 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• HUMIDITY SENSOR At 35 kHz, some pests are repels others get repelled
Humidity sensors are used to monitor the moisture at 38 to 40 kHz or even higher frequencies.
of the atmosphere and it will send the values of humidity Effectiveness, frequency of ultrasonic oscillator are
values to microcontroller for monitoring the greenhouse increased continuously varied between certain limits.
atmosphere.Temperature and air humidity are controlled Ultrasonic sound is varied by the frequency of emission
by humidity and temperature sensors and a fogger is and our product in different patterns to repel different
used to control the same [11]. insects.
At a specific frequencysound wave send out for Microcontroller are used here for monitoring the
measure distance and listening for that sound wave to parameters of the greenhouse environment and it is also
bounce back. The ultrasound sensor measures the plant used to send the monitored value to the controlling
growth and send the height value of the plant to blocks for controlling purpose
microcontroller for monitoring the greenhouse • CLOUD (IOT)
atmosphere.
The cloud gathers the monitored values of
Echolocation sonar is similar to ultrasonic greenhouse which is monitored by microcontroller and
distancesensor used by different animals. The ability to it too collects the values through microcontroller. The
detect and emit ultrasonic frequencies, which are above person monitor the values through PC or mobile phone
the human hearing range, is an essential survival tool which is uploaded in the cloud.
for many animals. Ultrasonic systems for navigation and
finding prey of rely is sensitive to nocturnal and marine • RELAY
animals. while some insects use ultrasonic hearing to A 4 channel relay is used in which 2 channel only
detect and escape predators. This ability is known as used for connecting the motor i.e., water sprinkling
Echolocation, and it is important to many animals. motor and fertilizer motor. It can be controlled directly
• ECHOLOCATION by Arduino UNO. The motor1 (Fertilizer Motor) is
connected to the channel 1 of relay through NO NC
"Echolocation is the use of sound waves and echoes pins. The motor 2 (Water sprinkling Motor) is
to determine where objects are in space "Any sound connected to the channel 2 of relay through NO and
above 20 kilohertz (20,000 hertz) is considered NC pin.
Ultrasound, and these sounds are above the range of
human hearing. Ultrasounds are not only heard by • MOTORS
animals, but to produce it. CD4047 IC,built the The motor used for water sprinkling and fertilizer
ultrasonic frequency oscillator ultrasonic signals are sprinkling. It is compatible with the Arduino UNO. The
boosted by push-pull power amplifier(with 2N3055 two motors have small direct-drive, high-efficiency
or TIP31C) and transformer. Output of transformer motors that work at 12 volts.
X1, is coupled to the power amplifier to a tweeter which
is wound over ferrite core (UU or CC core). 150 turns • ARDUINO IDE:
of 20 SWG is primary winding. while the 40 turns of It connects to the Arduino and Genuine hardware
24 SWG wire is secondary winding. Adjust to upload programs and communicate with them.
potentiometer VR1 for maximum effectiveness. "Arduino Platform" is to allow for easy and fast
prototyping
• INSECT REPELLENT CIRCUIT
Ultrasonic frequency in the range of 30 kHz to 50
kHz can repel the pest like insects ,ants, rats, mice etc.,.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 365
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• LANGUAGE: EMBEDDED C
Extensions for the C Programming language.
Embedded C uses most of the syntax and semantics of
standard C, e.g., main () function, variable definition,
data type declaration, etc Application Programming
Interface .
• PYTHON:
Python is a widely used high-level programming
language. The language provides constructs intended
to enable writing clear programs of both a small and
large scale. Python features a dynamic type system and
automatic memory management.
• UBUNTU
Ubuntu is a type of Debian-based Linux operating
system which is as Touch edition in personal computers, Fig3.5 Flow chart of proposed system
366 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 367
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
368 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- The adjustments in climate and the food creation and this undertaking has lead to the
atmosphere conditions have consistently arrangement of the Green Revolution. Through the green
influenced crop development, cultivating and upset the accompanying accomplishments have been
creature reproducing. A measure set up in some acquired:
cases comes up short. Data and intellectual
advances are inventive strategies that can be • Acquiring more land for cultivation-development.
utilized to battle these progressions by applying • Expansion of water system plans.
"precision agriculture". In this paper, conversation
is on eventual fate of precision agriculture which • Adoption of cutting edge high-yielding seeds.
has been demonstrated to work in different nations • Application of better water board strategies.
utilizing AI and computerized reasoning. The
extent of use is engaged on medium and huge scope • Plant insurance exercises through reasonable
farmers with a plan to bring up the preferences and utilization of composts, pesticides and yield
drawbacks of the procedures. Beforehand there has applications.
been a moderate development in this part yet from The above accomplishments thusly have prompted
the year 2016 onwards many new businesses have
a great ascend in wheat and rice creation. Thinking
been rising which are yielding high ventures. These
intellectual innovations have been applied in
about the quantum rise, a national Pulse Development
cutting edge nations and have come about in Program that secured right around 13 states was set
expanded yield, development in GDP, low death up in 1986 with the intend to present the improved
rates and improved expectations for everyday advancements for farmers. Across the country
comforts. The equivalent can be applied locally to Technology team was divulged in 1986 after the
help creation in the rural segment. accomplishment of National Pulse Development
Keywords: Agriculture, Machine Learning, Program to improve the oil and seeds area in India's
Artificial Intelligence, AI advancements frugality. Pulses too went under this program. This
pattern has proceeded till date and enhancements have
I. INTRODUCTION been seen ceaselessly. As per Precision cultivating or
Agriculture in India is the significant wellspring of accuracy horticulture alludes to playing out the proper
employment for 66% of the whole populace India, thing, in the correct way, in the ideal spot and at the
Service and private part represent the rest. Farming perfect time. Exactness cultivating is implied to
area involves roughly 43% of India's topographical land coordinate rural practices according to agro-climatic
spread. In the previous days, India was to a great extent conditions so as to build the exactness of utilization.
subordinate upon food imports however throughout the Over the most recent 40 years cultivating land has
years through research, the nation has accomplished contracted a little however the number of farmers had
independence in grain and seed creation. Coordinated quite recently multiplied. According to Agricultural
endeavors have been made to act naturally adequate in Registration of 2010-11, the all out number of
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 369
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
operational property (singular farmers) was assessed preliminaries; however permits plant reproducers all the
as 139.36 million and the all out worked zone was more precisely foresee the execution of yields.
158.59 million hectare. The normal size of holding had
been assessed to be 1.25 hectare. It essentially implied
that one farmer was having 1.25 hectare of land to
develop the yields. This implies there is a tremendous
degree to make a harmony between the accessible
grounds versus the land under development. To make
this suitable, accuracy farming offers an open door
adventure into this sort of cultivating for its supportability.
II. METHODOLOGY
The methodology of research focuses on the recent
Fig. 1 Machine learning approach processing for data
technologies that can be leveraged in order to provide
reasonable option for current techniques in agriculture. Data about the yield assortment to be tried is utilized
as input and gone through an AI approach that directed
The study is isolated into 3 areas
or unaided, for example, convolution neural network
1] Area 1 arrangements with AI and accuracy (CNN), Bayesian system, bolster vector machine and
agriculture:- so on. The methodology investigations the contribution
A) AI intellectual innovation. to extricate the applicable highlights and data identified
with the difficult subject. In light of the factors and
B) Effect of Precision Agriculture.
capacities set, the preparing calculation playing out the
C) AI advancements for exactness cultivating. information examination and gives a possible yield that
2] Area 2 arrangements with results and end :- is grouped, or relapsed.
A) Indian Agriculture and extension for artificial B. Effect of Precision Agriculture
insight.
Applying psychological advancements in
B) Difficulties of AI in Agricultural Sector in India. agribusiness could help in deciding the best yield decision
3] Area 3 arrangements with conclusion and future for various climatic conditions and more qualified to
scope. farmers' needs. This can be accomplished by
investigating and looking at data about seeds types,
1] Area1: Arrangements climate, kinds of soil, pervasions in a certain territory,
A. AI intellectual innovation likelihood of maladies and information about what
worked greatest, step by step results, current market
Machine Learning is the part of counterfeit patterns, costs also, buyer needs. Farmers would then
knowledge and software engineering which manages be able to settle on choices on step by step instructions
the formation of calculations that show self-learning to expand return on crops.
property. With the guide of Artificial Intelligence, precise
and productive frameworks equipped for assessing are The pace at which the AI innovation is getting created
created to illuminate the everyday errands. Researchers no doubt that the cultivating business is on the cusp of a
can utilize computerized recreations to lead early yield mechanical upheaval under artificial knowledge as its
tests to assess how a specific assortment may perform main thrust.
when confronted with various sub atmospheres, soil
types, climate designs and different variables. This
computerized testing doesn't supplant physical field
370 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 371
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
372 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- E-mail spam continues to be a big in email spam filtering such as SVM (support vector
problem on the internet. Daily we receive lots of machine), Decision tree, neural network, logical
mails which contain more useless content i.e., cash regression and Naïve Bayes. Among those naïve Bayes
back offers, irrelevant posts and many others. Due is popular in commercial and open-source filters.
to those the email users were neglecting to read
the useful or company mails. There are many II. RELATED WORK
techniques to filter the spam messages and stop
them from entering our inbox. In this paper, We
Shafi'i Muhammad Abdulhamid, et al. [1] proposed
present Naïve Bayes Classifier for email spam "Comparative Analysis of Classification Algorithms for
filtering on two datasets. Here we classify the mails Email Spam Detection", Maintaining the Integrity of the
into spam and ham based upon Naïve Bayes Specifications. Their survey indicates that a number of
algorithm which uses Bayes theorem in the back classification algorithms exist that if properly explored
end. It uses probability functions to classify a mail through feature selection then it will yield more accurate
into spam or ham. Naïve Bayes classifier is the results for email classification.
simplest technique in the classification. It is mainly
known for its simplicity, easy to implement, linear Sunday Olusanya Olatunji et al. [2] proposed
computation and accuracy. "Improved email spam detection model based on
support vector machines", in this work, support vector
Keywords-Spam Filtering, Naive Bayes
machines-based model is proposed for spam detection
Classifier, Email, Probability.
and attention is given to appropriately search for the
I. INTRODUCTION optimal parameters to achieve better performance.
In recent years, the increasing popularity and low Ismaila Idris, Ali Selamat et al. [3] proposed
cost of e-mail have attracted direct marketers. Bulk "Improved email spam detection model with negative
mailing software and lists of e-mail addresses harvested selection algorithm and particle swarm optimization",
from Web pages, newsgroup archives, and service This work demonstrates adaptive nature of unsolicited
provider directories are readily available, allowing email by the use of huge mailing tools prompts needed
messages to be sent blindly to millions of recipients at for spam detection.
essentially no cost. As a result, many unsolicited bulk Ismaila Idris, Ali Selamat,Sigeru Omatu et al. [4]
e-mails, also known as spam e-mail spread widely and proposed "Hybrid email spam detection model with
become serious threat to not only the Internet but also negative selection algorithm and differential evolution",
to society. For example, when user received large inspired by adaptive algorithm, this paper introduces a
amount of e-mail spam, the chance of the user forgot modified machine learning technique of the human
to read a non-spam message increase. As a result, many immune system called negative selection algorithm
e-mail readers have to spend their time removing (NSA). The used a fitness function to maximize the
unwanted messages. E-mail spam also may cost money distance of generated spam detectors from the non-
to users with dial-up connections, waste bandwidth, spam space.
and may expose minors to unsuitable content. There
are several machine learning algorithms are employed Samira Douzi, Feda A.AlShawan, Mouad
Lemoudden, and Bouabid El Ouahidi et al. [5]
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 373
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
proposed " Hybrid Email Spam Detection Model Using representing as the bag of its word. The bag of words
Artificial Intelligence", One of the most common is always used in methods of document classification,
representations used in spam filters is the Bag-of-Words where the frequency of occurrence of each word is
(BOW). Although BOW is very effective in the used as a feature for training classifier. These bags of
classification of the emails, it has a number of words features are included in the chosen datasets.
weaknesses.
These are the motivations of this work which can
identify the spam messages from the input dataset and
check the performance of the classifier.
III. DESIGN AND METHODOLOGY OF
EMAIL SPAM FILTERING SYSTEM
Fig 3.2 Descripting Naïve Bayes technique
A. System architecture
Naive Bayes technique uses Bayes theorem to
System architecture is the conceptual model that determine that probabilities spam e-mail. Some words
defines the structure, behavior, and more views of a have particular probabilities of occurring in spam e-
system. An architecture description is a formal mail or non-spam e-mail. By using Bayes using we
description and representation of a system, organized calculate the following probabilities. Suppose the
in a way that supports reasoning about the structures selected word is "replica" .The above fig 3.2 shows the
and behaviors of the system. Figure 3.1 shows the block diagram of how spam and ham gets classified by
architecture of Email Spam Filtering System. the classifier
The following is the formula for the probability
function.
Where,
• P (S|W) is the probability that a message is a spam,
knowing that the word is it.
• P(S) is the overall probability that any given message
is spam.
• P(W|S) is the probability that the word appears in
spam messages.
• P(H) is the overall probability that any given message
is not spam.
Fig 3.1 architecture of the Email Spam Filtering System
• P(W|H) is the probability that the word appears in
B. Methodology ham messages.
The Naive Bayes algorithm is a simple probabilistic By using the above probabilities the naïve Bayes
classifier that calculates a set of probabilities by counting classifier works.
the frequency and combination of values in a given To achieve the objective of the project, It is
dataset. In this work, Naive Bayes classifier use bag of conducted in three phases. The phases involved are as
words features to identify spam e-mail and a text is follows:
374 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• Phase 1: pre-processing are then used to calculate the probabilities and also the
• Phase 2: Feature selection classifications of data into spam or ham then the
parameters are analyzed for better performance
• Phase 3: Naïve Bayes classifier
IV. RESULTS OF THE PROPOSED EMAIL
C. Pre-Processing SPAM FILTERING SYSTEM
Today, most of the data is incomplete containing The input module takes the input of email messages
aggregate, noisy and missing values. In this phase some which are saved in a folder. All the email messages are
words like conjunction words, articles are removed read. The below figure 4.2.1 shows the spam messages
from email body because those words are not useful in present in the dataset .
classification.
D. Feature Selection
In this phase, we apply the feature selection like we
select the threshold value for classifying the mail into
spam or ham based on the probability.
E. Naïve Bayes Classifier
The Naive Bayes algorithm relies on Bayes Rule. Fig 4.2.1 input dataset consisting of spam messages
This algorithm will classify each object by looking at all Figure 4.2.2 shows the categorical representation
of its features individually. Bayes Rule below shows us of the dataset that is done in Excel based on the spam
how to calculate the posterior probability for just one and ham and is used to train the model.
feature. The posterior probability of the object is
calculated for each feature and then these probabilities
are multiplied together to get a final. Following is a data
flow diagram of E mail Spam Filtering system depicted
in Fig 3.3
Fig 4.2.4 spreadsheet of dataset Fig 4.4.1 output of the Email spam filtering model
The logic module is the implementation module which The above figure 4.4.1 shows the output the
contains the main logic. The preprocessing phase we messages which are incorrectly labeled as spam and
convert all the data into bag of words that it will be ham; it has predicted the messages based on the trained
easy for further processing. Then the bag of words is dataset.
used to calculate the required probabilities and then
based upon the probabilities the input data is trained to V. CONCLUSION
classify the mails as spam or ham. Then we provide the From the results obtained for Email Spam Filtering
testing data set to check the performance of the System we can conclude that the proposed approach
classifier. is highly based on Naïve Bayes classification technique.
The approach works using the preprocessing phase
where the datasets are converted into bag of words
and then they are passed through the Naïve Bayes
function for classifying the mails. The results indicate
that the proposed approach is a valuable approach and
can be significantly support accurate classification.
Fig 4.3.1 count of spam and ham in dataset
The fig 4.3.2 shows the messages are assigned values REFERENCES
using lambda function i.e. 1 for spam and 0 for ham [1] Shafi'i Mohammad, Maryam and Osho , "Comparative analysis
of classification algorithms spam detection ", International journal
which helps the model in prediction. of computer and information security , vol1, 2018, pp61-67.
[2] Sunday Olasunya Olatunji, "Improved Email Spam detection
model based on support vector machines", Neural Computing
and Applications,2017. pp. 691-699.
[3] Ismaila Idris Ali Selamat, Sigeru Omatu, "Hybrid Email Spam
Detection Model with negative selection algorithm and
differential evolution ", Engineering Applications of Artificial
Intelligence, 2013.
[4] Kirti Agarwal and Tarun Kumar, "Email Spam Detection using
integrated approach of Naïve Bayes and Particle Swarm
Fig 4.3.2 values 0 or 1 assigned to the messages Optimization", second international conference on intelligent
computing and control systems, 2018.
the output module, Here the dataset given is tested
[5] Samira Douzi, Feda A.AlShawan, Mouad Lemoudden, and
and it's classified into spam and ham and displays Bouabid El Ouahidi , "Hybrid Email Spam Detection Model
"SPAM" and "HAM" percentages and "spam labeled Using Artificial Intelligence", Internaional Journal of Machine
as ham", "ham labeled as spam" messages from the Learning and Computing,2020, vol. 10. pp.316-322.
dataset.
376 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Machine Learning (ML) Techniques medical decision making. Due to covid-19, this
in HealthCare are very much useful in the early paradigm change happened at a faster pace. Many
diagnosis of various diseases, discovery of new individuals are perplexed by AI and ML. AI can be
drugs for the new viruses or diseases that are understood as a machine or a technology that can act
spreading, predicting the diseases, and maintaining intelligently by making suitable decisions. ML is a subset
the huge volumes of data that is being generated -
of AI and Deep Learning (DL) is a subset of ML.
in an easily accessible manner. The accuracy of
different algorithms for the diagnosis of various In simple words, ML can be defined as making the
diseases has been compared. Drug development computer(machine) learn on its own. To do so, we will
using Support Vector Machine (SVM) and Random use a model to train the machine. The model is nothing
Forest (RF) is compared. The differences between but a mathematical formula that can be applied to the
the Electronic Medical Record (EMR) and data that is provided to the machine as input. This is in
Electronic Health Record (EHR) are discussed and
contrast to the traditional programming which requires
case studies are discussed to understand the use
us to tell the computer what to do with the data provided
of EHR. Finally, robust disease prediction
frameworks are also discussed in this paper. This by a program. Based on the problem or the application
paper will act as a readymade guide to persons who at hand an appropriate machine learning algorithm will
want to pursue using ML principles in the be chosen and will train the model by splitting the data
healthcare domain. set into two parts (generally unequal), namely training
Keywords-Healthcare, Machine Learning, Drug
and test data. There are numerous applications of ML
development, Electronic Medical Record, in the healthcare sector. These include Disease
Electronic Health Record. Identification and diagnosis, Drug Discovery and
Manufacturing, Electronic Health Records (EHR),
I. INTRODUCTION Disease Prediction, Radiology and Radiopathy, Robotic
NetFlix, Alexa, Siri and other websites that Surgery, and so on. In the present paper, we will be
recommend products/services to their customers based discussing the first four applications listed.
on their previous choices are the real-world examples II. LITERATURE REVIEW
of Machine Learning (ML). Advances in ML techniques
have skyrocketed in the recent past leading to a great Existing work done by researchers [2, 3] discussed
impact on various domains like the Finance, Media, various tools for SNP (Single Nucleotide
Travel, Retail, Healthcare sector etc. As per Gartner, Polymorphism) analysis and target discovery
the global Artificial Intelligence(AI)-based economic respectively and concluded that the Support Vector
activity will be about $4.2 trillion in 2021 with a 8.6% Machine (SVM) and Random Forest (RF) showed
increase from 2020 [1]. Advances in AI and ML better performance over other algorithms in both the
techniques help to unfold complex data patterns, thereby scenarios. In the survey paper [4], Random Forests,
providing quality solutions. When integrated with AI Ensemble models and Naive Bayes (NB) have
tools, there can be a considerable paradigm change in performed well in predicting heart disease. The
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 377
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
framework in [5] used a combined dataset with hybrid better diagnosis. Huge data will be generated for each
classifiers by combining traditional ones with the bagging and every patient which needs to be classified for the
and achieved highest accuracy of 99.05% using medical data analysis and the disease detection. First,
Random Forest Bagging Method (RFBM) and Relief the medical data will be analyzed and then used for
Feature Selection Methods for predicting diagnosing the diseases. This analyzed data will be the
cardiovascular diseases, whereas the framework in [6], input to the ML algorithm and the results will be obtained
where traditional methods like k-Nearest Neighbour by using the previously solved cases. These results will
(kNN), AdaBoost, Random Forest, Naive Bayes and be taken by the physicians to diagnose a novel patient
Logistic Regression are used, a positive prediction at a much higher speed and enhanced accuracy.
accuracy of only 94% is achieved. Using the Random
Forest, XGBoost and ResNet [7], creatinine value is A. Heart Disease
predicted with an area under Receiver Operating Various researchers have proposed different systems
Characteristic Curve (AUC) of 0.76 in classifying the for detecting heart diseases [14]. SVM gave the highest
samples for Chronic Kidney Disease. In [8], XGBoost, accuracy. The advantage of SVM over other techniques
SVM and Logistic Regression are compared and is that it constructs the classifiers correctly with less
concluded that XGBoost gave the best accuracy in over-fitting and robustness to noise. Its main drawback
predicting chronic kidney disease. In [9], the is, it is a binary classifier, with high computational cost
researchers studied the EHR's of New York City, which and its running time is also high.
has 24 cancers in total with 28 features. In [10], 366398
B. Diabetes
EHR's of 1694 colorectal cancer patients (CRC) and
3458 breast cancer (BC) patients were studied post Diabetes is due to the insufficient supply or improper
chemotherapy and observed that the patients with Type2 utilization of insulin taking place in the body. In the
diabetes showed more symptoms like anxiety, diabetes disease diagnosis, the research shows that the
depression and neuropathic symptoms. [11] has taken Naive Bayes algorithm gives better accuracy over the
a dataset with 1500 observations, built the Classification other algorithms. Naive Bayes on different data sets
And Regression Trees (CART) and RF predictive achieved 79.56% and 95% with the WEKA tool and
models to predict the variables that are responsible for MATLAB with SQL Server respectively. The Naive
chronic diabetes. Reference [12] combined K-means Bayes algorithm eliminates the unnecessary features
clustering with improved ensemble methods to diagnose thereby enhancing the performance with less
liver disease and achieved accuracy as high as 99.35%. computational time. But we need to give enormous input
The automated heart disease diagnosis system proposed to get a better output.
in [17] integrates convolutional neural networks, genetic
C. Liver Disease
algorithms, SVM and NB and achieves 85.3%
accuracy. In [13], a new improved k-means clustering Liver disease is also called Hepatic disease. The
algorithm is used by setting the seed value depending FT (Functional tree) algorithm gave better results. On
on the minimal clustering error. the UCI data set using the WEKA tool, it gave 97.10%
accuracy. The FT algorithm has a very easy
III. DISEASE IDENTIFICATION AND interpretation and also its prediction is faster. But the
DIAGNOSIS calculations involved will be complex if the values are
Major changes have come in the computer aided uncertain.
diagnosis applications because a small error can lead
D. Dengue Disease
to a wrong treatment, which in adverse cases may result
in loss of patient's life. In identifying the diseases, ML This problem is caused due to mosquitos which
algorithms can be used for pattern recognition and result into viral infection subsequently leading to serious
hence improve the perception accuracy thus leading to illness and death. RS (Rough Set) theory shows
378 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
promising results of 100% accuracy. Uncertain restricted environment, which is different from the actual
problems can be solved using Rough Set theory. behavior of the microbes. It takes around two years.
Although it is very easy to understand and applies for Step 5: In-Vivo studies: Now the compounds will
both qualitative and quantitative, it is not widely used. be tested on animal models like mice etc. Again the
E. Hepatitis Disease failure rate will be high with a completion period of one
to two yrs.
Various ML algorithms have been used to diagnose
Hepatitis disease, which is due to the inflammation of Step 6: Clinical Trials: Now that the compound
the liver. Feed Forward Neural Networks with back is showing promising results in the above stages, it will
propagation technique using the RapidMiner tool gave be tested in human settings to validate the usefulness
results with 98% accuracy. Neural Networks are and safety of the compound on humans. This takes
known for adaptive learning and self-organization. nearly six years.
Overall the NB algorithm and the SVM are mostly used Step 7: Only those drugs that complete the above
and have better results. tests will be submitted to FDA for approval. Once this
IV. DRUG DISCOVERY AND is done, the drug will be commercially available in the
MANUFACTURING market. This step roughly takes one year.
For a drug to come into the market it will take more As the overall process is taking more than 10 years,
than 10 years after extensive research with an average we need to speed up the process except for the clinical
cost of 2.6 billion dollars. Consequently, for most of trials. Lead compounds can be discovered and then
the rare diseases effective treatment is not getting done. optimized using digital techniques for studying the
Traditional approaches to drug discovery focus mainly molecular structures, their bindings, relation between
on overall treatment of the body. With the drastic the structure and the activity etc. ML techniques can
increase in the cost of the drug discovery, alternative be used in various stages of drug discovery, like in
approaches using ML techniques are being used. Now, predicting how different drugs bind with the proteins,
let us first see the various steps involved in drug discovering the optimal response of a drug, making sure
discovery and then how ML helps in speeding up the that the body responds well to a medication or
process. The steps involved in the drug discovery are treatment, and optimizing the effect of the chemical/drug
[17]: on the molecules. Various machine learning methods
can be used for the Drug Target Interaction that can be
Step 1: Target Identification: First we identify based on either the similarity/distance, deep learning,
the possible targets for the diseases. Roughly two years feature, matrix factorization, network based or hybrid
are needed for this. methods [15]. An alternative for in-vitro is to use the
Step 2: Lead Discovery: The main chemical in-silico where computer simulation will be done [16].
compound that can be used for the treatment of the Some of the companies that were using AI and ML
disease will be identified. Here, we need to narrow techniques for the drug manufacturing are Pfizer, Janssen
down to the actual potential compounds in one to two Pharmaceutica, Sanofi, Novartis, Bayer, etc.
years. The algorithms RF and SVM are widely used for
Step 3: Medicinal Chemistry: Need to test the drug discovery [17]. The RF is explicitly used for huge
potential compounds for their reactions with the targets multi-featured data sets. RF accelerates the training of
identified in step1. This step needs around two years. the model, with minimal parameters, dealing with the
missing and nonparametric data. Another version, the
Step 4: In-Vitro Studies: The optimized set of the
multi-variant RF, limits the error by various error
compounds will be tested in an in-vitro model of the
estimating techniques. RF is used to generate the
disease in which the cells and the microbes behave in a
regression tree nodes and the leaf nodes. Leaf nodes
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 379
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
will make the predictions regarding the dose-specific quicken precision medicine research, etc. EMR will
profile and also store the functional data. contain the real-world data of the patient's clinical and
SVM is used to unrelate different classes of private data, which can be either in structured or
compounds using the feature selector by getting a hyper unstructured form. Analyzing the unstructured data is
plane. The count of hyper planes is not finite. In the relatively difficult and time consuming when compared
case of linear data, depending on the selected features, to the structured data [19]. These EMRs are integrated
the classes of compounds are projected into a chemical for a long-term view of a particular patient. With a
feature space. For N dimensional space, optimal standardized EHR system, if a patient wants to switch
hyperplane is obtained by maximizing the margin to a different doctor, the patient's data can be
between the classes of compounds. SVM can separate homogeneously transferred to different hospitals. This
the active compounds from the available compounds, reduces record duplication, identifies missing data,
and give them rankings in the database etc. These thereby reducing the time spent on the clinical care and
regression models help us to find the relation between hence improving the quality of care.
the drug and the ligand. SVM can also differentiate the Statistical ML methods such as Logistic Regression,
active and inactive molecules. SVM, RF etc. are used for mining reliable predictive
Due to Covid-19 pandemic, the research community patterns using EHR data. Natural Language Processing
is forced to use ML and AI to develop vaccines. As the (NLP) approach [20] can also be used for retrieving
understanding or the knowledge about Sars-Cov2 virus useful data from EHR. Now let us take some of the
is limited, predictive modelling is used. case studies to understand the use of EHR in a better
way.
V. ELECTRONIC HEALTH RECORDS CASE 1[9]: Cancerous tumors when detected and
An Electronic Health Record (EHR) is a digital treated at an early stage, can improve the chances of
version of the patient's health/treatment data. They store the survival of the patients. Delayed detection or
the real-world data of the patient during and after the treatment may result in shorter survival periods. Even
meeting with the medical professional. The data from though machine learning algorithms are used in the
all the smart devices like the sensors on the patient's diagnosis and prediction of cancer, wrong or biased
body, smart homes, robots, etc. will be collected and data leads to a wrong prediction and hence to a wrong
shared among the authorized users for a better treatment. SVM can be used for both the linear and
diagnosis, monitoring, early detection and treatment of nonlinear relationships between the predictors and the
the patient. Smart Health System which takes data from outcomes. Generally, EHRs might contain missing data
the EHR, includes acquiring data from different sources, due to various reasons like the availability of different
interconnecting between different devices using different testing equipment, how the disease progresses and
technologies by ensuring the security and privacy issues others. Because of the missing data problems, the
and processing the data and data dissemination. accuracy in the classification and prediction of diseases
The terms EHR and Electronic Medical Record using machine learning algorithms will be reduced
(EMR) are often confused. EMR will store the medical drastically. The data is stored in the form of vectors
and treatment history of a patient from a single physician and the missing values are filled with the mean values.
in digital form. It is not shared among the various Kernels are used in SVM to manipulate the data. By
doctors. On the contrary, EHR will store the patient's plotting the testing scores for the linear kernel SVM
data from various doctors. It will give a holistic view of and RBF (Radial Basis Function) kernel SVM in K-
the patient's health [18]. fold cross-validation, it is observed that the RBF kernel
SVM is more efficient than the linear SVM.
The EMRs help us to discover the phenotype-
genotype associations, detect the adverse drug event, CASE 2[11]: As more and more data is being stored
in the enterprise databases and in the cloud storage for
380 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
the EHR, we now have to deal with big data. Big data VI. DISEASE PREDICTION USING
can be described with 4V characteristics. They are MACHINE LEARNING
Volume, Variety, Velocity and Veracity. Predictive Classical Diagnosis requires that the patients have
analysis is needed by the doctors to identify the to undergo various medical tests and based on the
admission of the patient at an early stage. The main reports obtained, the Medical Supervisor will start
challenge is to find the strong indicators for the accurate treating the patient. This is a very laborious, costly and
prediction. Predictive modelling takes help of a time-consuming process. To speed up the process
mathematical model for prediction of the future. machine learning techniques can be used. The general
Independent variables are identified and a mathematical workflow of any disease prediction system with ML
model is designed. Among the CART, RF and the starts with the user input as the symptoms the patient is
scalable RF models, the scalable RF model gave a better exhibiting, which then compared with the dataset having
accuracy of 87.5%. various diseases and their symptoms and then using
CASE 3 [21] As EHRs contain data from different machine learning techniques the disease will be
hospitals, it might not have the data in a computable predicted. Now we will be discussing a few disease
fashion. To elaborate further, a medication might be used prediction frameworks.
for various conditions, and the condition for which this SVM and the Bootstrap aggregation (Bagging) using
medication is being used for a particular patient may Reduced Error Pruning (REP) tree can be used for
not be listed in the EHR. Even if the medication and the disease prediction [22]. Minimum Redundancy and
conditions were listed in the same note, they might not Maximum Relevance (MRMR) feature selection
be linked properly. The simplest statistical method to algorithm is used for extracting only the relevant features
store the medications and the conditions is the tabulation and also with less repetition. Three datasets namely the
method. Regression is better than tabulation and can diabetes dataset, breast cancer dataset and hypothyroid
differentiate the medications for hypertension. dataset were used. The training data is classified by
Regression also gives information regarding some means of operations related to SVM and Bagging. The
medications that are preferred over the other test data will first be classified using SVM. If a positive
medications depending upon the patient's condition. output is obtained, it will be validated. Otherwise the
LASSO (Least Absolute Shrinkage and Selection remaining test data will be classified using bagging. This
Operator) logistic regression is used to reduce over tool is not specific to any disease type.
fitting with simple functions. Using LASSO, the logistic
regression will be performed by keeping the summation Apriori Association Algorithm is used to select the
of the absolute values of the regression coefficients less 10 best rules from the dataset to implement different
than the given threshold value. classification algorithms [23]. Then the performance of
the 5 classifiers namely kNN, NB, Zero R, One R and
There are few problems with EHRs in the healthcare J48 is evaluated using the WEKA tool. Their study
systems. These are significantly related to the emphasized on usage of feature selection with the
implementation and the workflow disturbances. Only classification algorithms. In WEKA, Instance Based
affordable hospitals can implement an EHR system. For Learner (Ibk) with Apriori Associative Algorithm
small scale practices implementing EHR systems is not predicted Chronic Kidney Disease with 99% accuracy.
financially viable. Also, the workflow will be disturbed
because the clinicians have to spend their valuable time ML techniques like the kNN and RF are used to
filling up the documents. Also we need to have up-to- predict whether a person has Heart disease or not [24].
date technology to store the data. Depending on the attributes like the severity of the chest
pain, cholesterol level, age of the person etc the analysis
was done. The kNN and RF have been predicted with
accuracy of 86.885% and 81.967% respectively.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 381
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
XGBoost methods are compared and observed that [2] A. Nayarisseri, R. Khandelwal, G. Thakur, and A. S Planche.
"Artificial Intelligence, Big Data, Machine Learning Approaches
the output of an accurate model does not infer a fair in Precision Medicine and Drug Discovery." last modified Jan
outcome. 2021. https://www.researchgate.net/publication/348234715_
Artificial_Intelligence_Big_data_and_ Machine_Learning_
VIII. CONCLUSION approaches_in_Precision_Medicine_ Drug_Discovery
As per Frost & Sullivan report, by the year 2025, [3] M. Elhoseny et al., "A new multi-agent feature wrapper machine
learning approach for heart disease diagnosis," Computers,
AI systems will be part of everything from population Materials & Continua, vol. 67, no.1, pp. 51-71, 2021,
health management to digital avatars that can answer doi:10.32604/cmc.2021.012632
382 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[4] V. V. Ramalingam, A. Dandapath and M. K. Raja. "Heart Disease [15]M. Bagherian et al. "Machine learning approaches and databases
Prediction using machine learning techniques: A survey." for prediction of drug-target interaction: a survey paper", Briefings
International Journal of Engineering and Technology, vol. 7, in Bioinformatics, vol 22, no. 1, 2021, pp: 247-269, doi:10.1093/
(2018): pp. 684-687 bib/bbz157
[5] P. Ghosh et al., "Efficient Prediction of Cardiovascular Disease [16]Sallieq. "Differences between in vitro, in vivo and in silico
Using Machine Learning Algorithms With Relief and LASSO studies." Jan, 09, 2019. https://mpkb.org/home/patients/
Feature Selection Techniques," in IEEE Access, vol. 9, pp. 19304- assessing_literature/in_vitro_studies#:~:text= Bacterial%
19326, 2021, doi: 10.1109/ACCESS.2021.3053759. 20sequencing%20techniques%20%E2%80%93% 20As%20an,
polymerase%20 chain%20reaction%20(PCR).
[6] E. Maini, B. Venkateswarulu, B. Maini, and D. Marwaha.
"Machine Learning- Based Heart Disease Prediction System for [17]L. Patel, T. Shukla, X. Huang, D. W. Ussery, and S. Wang.
Indian Population An Exploratory Study done in South India." "Machine Learning Methods in Drug Discovery." molecules 25,
Medical Journal Armed Force India, (2021). no.22(2020):5277
[7] W. Wang, G. Chakraborty, and B. Chakraborty. "Predicting the [18]"Understanding EMR Vs EHR". nextgen. https://www.
Risk of Chronic Kidney Disease (CKD) Using Machine Learning nextgen.com/insights/emr-vs-ehr/emr-vs-ehr.
Algorithms." Applied Sciences 11, no 1(2020):202.
[19]M. Tayefi et al. "Challenges and opportunities beyond structured
[8] H. You. "Predictive analysis of chronic kidney disease based on data in analysis of electronic health records" WIRE's
machine learning." Engineering and applied Science Letters, vol. Computational Statistics, (2021):1-19, doi: 10.1002/wics.1549
11, no. 1, pp.62, 2020.
[20]J. Zeng et al. "Natural Language Processing to Identify Cancer
[9] X. Zhang, J. Xiao, and F. Gu, "Applying Support Vector Machine Treatments with Electronic Medical Records." JCO Clinical
to Electronic Health Records for Cancer Classification," 2019 Cancer Informatics,5, (2021): pp. 379-393. doi: 10.1200/
Spring Simulation Conference (SpringSim), 2019, pp. 1-9, doi: CCI.20.00173
10.23919/SpringSim.2019.8732906.
[21]D. Backenroth, "Monitoring Prescribing patterns using regression
[10]X. Luo et al. "Analysing the Symptoms in Colorectal and Breast and electronic health records." BMC Medical Informatics and
Cancer Patients with or without Type2 diabetes using EHR data." Decision Making 17, no.17(2017):175. doi: 10.1186/s12911-017-
Health Informatics Journal, vol. 27, no.1, (2021):pp. 1-20. doi: 0575-5.
10.1177/14604582211000785
[22]M. Rathi, and V. Pareek. "Disease prediction tool: an integrated
[11]S. Rallapalli, and T. Suryakanthi, "Predicting the risk of diabetes hybrid data mining approach for healthcare." IRACST-
in big data electronic health Records by using scalable random International Journal of Computer Science and Information
forest classification algorithm," 2016 International Conference Technology & Security vol. 6, no.6,(2019): pp. 2249-9555.
on Advances in Computing and Communication Engineering
[23]Z. Wang et al. "Machine-Learning based PRediction System for
(ICACCE), 2016, pp. 281-284, doi:10.1109/
Chronic kidney Disease using Associative Classification
ICACCE.2016.8073762.
Technique." International Journal of Engineering and Technology,
[12]A. Singh, J. C. Mehta, D. Anand, P. Nath, B. Pandey, and A. vol. 7,no 4.36(2018):1161-1167. doi: 10.14419/ijet.v7i4.36.25377
Kamparia. "An intelligent hybrid approach for hepatitis disease
[24]A. Garg, B. Sharma, and R. Khan. "Heart Disease Prediction
diagnosis: Combining enhanced k-means clustering and improved
using Machine Learning Techniques." IOP Conference Series
ensemble learning." Expert Systems, (2019): doi: 10.1111/
Material Science and Engineering, vol. 1022,no. 1(2021):1757
exsy.12526
[25]M. Yuan , V. Kumar , M. A. Ahmad, and A. Teredesai. "Assessing
[13]R. T. Selvi, and I. MuthuLakshmi. "Modelling the map reduce
Fairness in Classification Parity of Machine Learning Models in
based optimal gradient boosted tree classification algorithm for
Healthcare." arXiv, last modified February 7,2021. https://
diabetes mellitus diagnosis system." J Ambient Intell Human
arxiv.org/pdf/2102.03717.pdf.
Comput 12, pp.1717-1730, 2021. doi:10.1007/s12652-020-
02242-1. [26]K. Arora, and V. Sharma. "India's top Artificial Intelligence
Organizations in Healthcare." InnoHEALTH Magazine. last
[14]M. Fathima, and M. Pasha. "Survey of Machine Learning
modified May 13, 2020. https://innohealthmagazine.com/2020/
Algorithms for Disease Diagnostic." Journal of Intelligent Learning
trends/top-artificial-intelligence-organizations-in-healthcare-in-
Systems and Applications, vol. 9, no. 1, pp. 1-16, 2017, doi:
india/.
10.4236/jilsa.2017.91001.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 383
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
384 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 385
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Integrity (Morality) follow .like ,whatever the tools and processes you want
• By adapting new techniques to reduce the errors to select must support the communication networks
caused by humans. through both operational technology(OT) and
information technology(IT) protocols. During the
• It is better to use the software which have backup implementation stage you should be aware of there will
and recovery management .because the main aim is be longer upgradation and maintain cycles in IT. But
to protect the data.
now-a-days ,there are not such a problems because
• To ensure integrity, use version control, access control, ,day-to-day technology increases .By using that there
security control, data logs and checksums. is a fast-evolution in security controls of IT .so ,IT also
become a competitor to OT. Because of its fast
Availability
evolution.
• Keep the system and applications up to date and
So there is a need to some of the implementing
applying the preventive measures like redundancy,
RAID and failover.
techniques of IT practices and some monitor options
can be used in OT to give maximum productivity.
• Use network or server monitoring systems.
But you should make sure that whatever the
• In case of any data loss,use data recovery and practices we are trying to implement have to be adapted
business continuity . to the industrial context when it will be used and we
And we have a better knowledge on how the each have to make sure that those tools must be
term in CIA triad is responsible to providing security communicate clearly without any interrupts .Now the
and how they functioned according to the requirement IT security becomes an complex field with very severe
.we need to know those things to minimize the errors threats and it is not an easy task to explain this much of
and manufacturing defects. complexity problem to OT. Because in case of
OT,people tend to have different priorities.We come
A final important principle of information security
to know as the active and passive network monitoring
that doesn't fit neatly into the CIA triad is non-
have been hired from some of the reservations which
repudiation, which essentially means that someone
are regarding IT security.
cannot falsely deny that they created, altered, observed,
or transmitted data. This is crucial in legal contexts when, Besides OT experts and their implementing
for instance, someone might need to prove that a techniques ,the successful monitoring gain more fame .
signature is accurate, or that a message was sent by the It is very important to take best practices and adapt
person whose name is on it. some best implementations to provide more security
over the information .
Let's see some other implementing Techniques:
This is the crucial task to every organization and
From information technology (IT) enterprise ,the they need to implement large networks to achieve this
operational technology(OT) and ICS are physically security concerns.
separated .so ,now theses are not vulnerable to cyber
attacks. These are experienced in many organizationlike IT
and OT practices.
In most of the situations ,this leads to a very plain
In Information Technology(IT) and cyber security,
networks where all physical subnets are connected. This
we use the triad as CIA - like confidentiality ,Integrity
situation makes difficult to secure them .so here we have
and availability . Because ,in these fields confidentiality
to choose best step carefully, sometimes it is nearly
has higher priority and the priority order of remaining
impossible to providing secure environment to them.
things are in this order .while coming to industrial cyber
Whenever you are trying to build the security security, we use the triad as AIC .Because,here we
controls,you must be aware of some things you should give high priority to availability.
386 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
combination of passive, active, and hybrid [3] Alhosani, K. E., Khalid, S. K., Samsudin, N. A., Jamel, S.,
&Mohamad, K. M. (2019). A policy driven, human oriented
tools.Everytype of tool in its element work effectively, information security model: A case study in UAE banking sector.
need to delivers the maximum amount of transparency, IEEE Conference on Application, Information and Network
and keeps the network as stable and available as Security (AINS).
possible. But the differences between the various [4] Gao, T., Li, T., Jiang, R., Yang, M., & Zhu, R. (2019). Research
network environments are too great for that solution on Cloud Service Security Measurement Based on Information
Entropy. Int. J. Netw. Secur., 21, 1003-1013.
.This is a crucial part of the process, mainly for those
[5] Horne, C. A., Maynard, S. B., & Ahmad, A. (2017).Organisational
organizations want to modeling their cybersecurity on Information Security Strategy: Review, Discussion and Future
trusted industry standards or frameworks. Research. Australasian Journal of Information Systems,https://
doi.org/10.3127/ajis.v21i0.1427.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 387
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[6] Treacy, C., &Mccaffery, F. (2017). Data Security Overview for [8] Shoufan, A., &Damiani, E. (2017). On inter-rater reliability of
Medical Mobile Apps Assuring the Confidentiality, Integrity information security experts.Journal of Information Security and
and Availability of Data in Transmission.International Journal Applications, 37, 101-111, 2017.
on Advances in Security. 9(3&4), 146-157.
[7] Tsaregorodtsev, A. V., Kravets, O. J., Choporov, O. N., &Zelenina,
A. N. (2018). Information security risk estimation for cloud
infrastructure.International Journal on Information Technologies
& Security, 10(4).
388 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- As the world gone into global user can expect in weeks and optimizes the diet by the
pandemic staying fit in quarantine is not possible poor or good following nature of the user
even for the regular gym members so to solve this
problem, this application uses Artificial Intelligence In Artificial Intelligence we use algorithms that
to get current body data to customize workout calculates complex decision making choices to make
routine according to the users given data that optimal solution to the user. It takes part in deciding a
generates unique routine that helps user to stay perfect workout and diet choices from the data it got
heathy and fit based on their regular diet and food from the performance of the user by the Machine
choices. To track and improve user's workout we Learning technology.
use Progressive Machine learning to monitor user
progression on the given routine and update the In Computer Vision we train our models to monitor
workout. To detect and recognize user's user's movement posture to ensure there is no injuries
performance during workout to ignore bad posture in the process and it can monitor and shows the error
injuries with help of Computer Vision Technology. in workout to ensure safety of the user and to achieve
Keywords: Machine Learning, Artificial the user's goal. It also counts and duration of the
Intelligence, Computer Vision, progressive exercises to calculate the calorie burn and more to
Learning, Fitness technology monitor the efficiency of the user to get the progression
data to be used in Machine Learning and Artificial
I. INTRODUCTION Intelligence.
Due to lack of physical activities at the decade of
III. SYSTEM OVERVIEW
technologies booming and accessing everywhere in this
world it can also be used to stay fit and to be healthy. This application can be done in every platform easily
In our busy world we don't have enough time to maintain now, This app can be used anytime at anywhere Indoor
our physical and mental strength. Instead of spending and outdoor butAs the world gone into global pandemic
our expenses on expensive equipment we attempt to staying fit in quarantine is not possible even for the
solve this with the application that does everything a regular gym members so to solve this problem, this
Trainer would do for you using Machine Learning, application uses Artificial Intelligence to get current body
Artificial Intelligence, Computer Vision, progressive data like the BMI and body fat percentage and the
learning. user's goal to achieve and the AI gives customize
workout routine and diet plans for every user according
II. BACKGROUND AND TECHNIQUES: to the users given data and the goals the user set that
In Machine Learning we use computer algorithm that generates unique routine that helps user to stay heathy
improve automatically throughexperience and by the and fit based on their regular diet and food choices.
use of the user's data given it progressively enhances To track and improve user's workout we use
the routine user got. It predicts the future results that Progressive Machine learning to monitor user
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 389
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
progression on the daily routine and update the workout IV. SAMPLE CODE:
by storing more trained models on the data set. To class _RenderDataArmPressState extends
detect and recognize user's performance during State<RenderDataArmPress> {
workout to ignore bad posture injuries with help of
Computer Vision Technology. Map<String, List<double>> inputArr;
It detects arm position, angle and speed to measure String excercise = 'arm_press';
calorie burn progression and to generate a report that double upperRange = 300;
shows the user's progress every day. The routines can
double lowerRange = 500;
also be modified by the user's request.
bool midCount, isCorrectPosture;
We use Tensor Flow for training program to
calculate to probability and accuracy of the user's int _counter;
progress by this application for pc and Tflite package Color correctColor;
on mobile application platform library to use computer
vision models to train the app in every possible way by double shoulderLY;
the Machine Learning Technology. double shoulderRY;
double wristLX, wristLY, wristRX, wristRY,
elbowLX, elbowRX;
double kneeRY;
double kneeLY;
bool squatUp;
String whatToDo = 'Finding Posture';
390 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 391
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
392 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 393
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
V. RESULT REFERENCES
Nowadays technology changes human lifestyle, it [1] https://www.tensorflow.org/learn
makes peoples less active on outdoor exercise and have [2] https://github.com/PeterMclay/AlignAI
no time to get out to maintain fitness and to monitor [3] https://flutter.dev/
themselves regularly. Our application monitors exercises [4] https://en.wikipedia.org/wiki/Machine_learning
and diet routine that is uniquely generated for each user [5] https://en.wikipedia.org/wiki/Artifcialintelligence
according to their current BMI, body fat and habits.
It creates huge impacts on fitness at this decade of
technology we have access internet anywhere and smart
phones. Our application works for more than 3+ billion
devices.
VI. CONCLUSION
By using our application, we can change fitness
technology the way we seen it, the advanced technology
we implemented on our application .we can completely
change a person's habit and make them adopt to simple
diets that can help achieve our user's goal.
394 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract - DNA sequencing is used to determine However, comparing these new sequences to those
the sequence of individual genes, full chromosomes with known functions is a key way of understanding
or entire genomes of an organism. DNA sequencing the biology of an organism from which the new sequence
is determining the sequence of bases with a nucleic comes. Thus, sequence analysis can be used to assign
acid molecule, is an essential problem in molecular
function to genes and proteins by the study of the
biology leading to a multitude of combinatorial
problems. The large amount of information obtained
similarities between the compared sequences.
from sequencing has deepened our understanding Nowadays, there are many tools and techniques that
and fundamental knowledge of organisms. This provide the sequence comparisons (sequence
research paper is about study the basic concepts alignment) and analyze the alignment product to
of DNA sequence global alignment and understand its biology [10][8].
implementing Needleman-Wunsch algorithm for
DNA sequence alignment. II. METHODS OF SEQUENCE
ALIGNMENT
Index Terms - DNA Sequence, Global
Alignment, Needleman-Wunsch Algorithm. First generation sequencing techniques include the
sequencing technique described by Maxam and Gilbert
I. INTRODUCTION and the dideoxy sequencing technique of Sanger et al..
Sequencing is the operation of determining the Second generation sequencing technologies include
precise order of nucleotides of a given DNA molecule. massively parallel sequencing of gene short read lengths
It is used to determine the order of the four bases of DNA. The short length sequences then require
adenine (A), guanine (G), cytosine (C) and thymine (T), extensive assembly. Sequence alignment is a method
in a strand of DNA. DNA sequencing is used to of arranging sequences of DNA, RNA, or protein to
determine the sequence of individual genes, full identify regions of similarity. The similarity being
chromosomes or entire genomes of an organism [1]. identified, may be a result of functional, structural, or
DNA sequencing has also become the most efficient evolutionary relationships between the sequences.
way to sequence RNA or proteins. In bioinformatics, Complex regions of the genome, e.g., regions with high
sequence analysis is the process of subjecting a DNA, content of repeat sequences present difficulties in
RNA or peptide sequence to any of a wide range of assembly. Third generation sequencing methodologies
analytical methods to understand its features, function, involve single molecule real-time sequencing (SMRT).
structure, or evolution [7]. Methodologies used include
A. Local Alignment
sequence alignment, searches against biological
databases, and others. Since the development of Sequences which are suspected to have similarity
methods of high-throughput production of gene and or even dissimilar sequences can be compared with
protein sequences, the rate of addition of new local alignment method. Alocal alignment is an alignment
sequences to the databases increased exponentially. of two sub-regions of a pair of sequences. It finds local
Such a collection of sequences does not, by itself, regions with high level of similarity. The two different
increase the scientist's understanding of the biology of alignment methods are mostly defined by Dynamic
organisms [9]. programming approach for aligning two different
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 395
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Closely related sequences which are of same length By comparing these alignment scores, it can
are very much appropriate for global alignment. A global determine the best sequence alignment to be the one
alignment is a sequence alignment over the entire length with the maximum score [14].
of two or more nucleic acid or protein sequences. Here, A gap in an alignment is introduced by deletion or
the alignment is carried out from beginning till end of insertion of a base. Note that in previous examples it
the sequence to find out the best possible alignment. didn't consider the gap penalties. But in real scenario,
This is suitable to compare two sequences across their the penalty for gap should be higher than mismatch
entire length. In a global alignment, the sequences are score. Because a gap shifts the reading frame. There
assumed to be homologous along their entire length. are several gap penalty functions such as constant gap
Needleman-Wunsch algorithm (1970) is used for penalty, linear gap penalty, affine gap penalty etc [16].
optimal global alignment [11].
Alignment score tells us which alignment is the best
In Global alignment, Consider the two sequences: alignment; In other words, which alignment has the
X= ATGCTAGT and Y= ATGTTAT highest alignment score, but it doesn't tell us how to
find the best alignment. It can be determined by the
equation given below,
396 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Where, C(1; 1), C(1; 2), and C(2; 1) are read from
the score matrix, and S(S; A) is the score for the S <-
> A taken from the BLOSUM62 matrix. For the score
matrix C(2; 2) =qdiag which is 1. The corresponding
cell of the traceback matrix is "diag" [3] (Figure 6).
Fig. 3 The Score and Traceback Matrices
• q = C(i; j 1) + g
left
2) Step 2 (Matrix Fill): The second and crucial step
where, S(i; j) is the substitution score for letters i of the algorithm is matrix filling starting from the upper
left hand corner of the matrix. To find the maximum
and j, and g is the gap penalty. The value of the cell C(i;
score of each cell, it is required to know the
j) depends only on the values of the immediately neighbouring scores (diagonal, left and right) of the
adjacent northwest diagonal, up, and left cells [3]. current position. From the assumed values, add the
match or mismatch (assumed) score to the diagonal
value. Similarly add the gap score to the other
neighbouring values. Thus, obtain three different
values, from that take the maximum among them and
fill the ith and jth position with the score obtained. In
Fig. 4 The Score Matrix Cells terms of matrix positions, it is important to know [M(i-
, )+S(i,j),M(i,j-1)+w,M(i-1,j)+w] [3].
The Needleman-Wunsch algorithm requires two 1 j-1
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 397
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
398 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 399
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[9] Pairwise Sequence Comparison [online], Lab of Bioinformatics, [13]Chand T. John, April 2004, CS273: Algorithms for Structure and
Institute of Computing Technology (ICT), Chinese Academia of Motionin Biology, Stanford University. Available: http://
Sciences (CAS).Available:http://www.bioinfo.org.cn/lectures/ www.stanford.edu/class/cs273/scribing/8.pdf
index-13.html
[14] DNA Sequence Comparison [online], The BioWall by Swiss
[10]Introduction to Bioinformatics - Chapter 5 - Introductory Federal Institute of Technology in Lausanne (EPFL). Available:
Sequence Analysis [online], Human Genome Mapping Project http://lslwww.epfl.ch/biowall/VersionE/ApplicationsE/
Resource Centre (HGMP-RC) by UK Medical Research Council. SequenceE.html
Available: http://portal.rfcgr.mrc.ac.uk/Courses/Jemboss_3day/
[15] Krishna N. and Akshay L. and Dr. Rajkumar B., 2002, Alchemi
Chapter5.html#Global %20sequence%20alignment
v0.6.1 Documentation [online], University of Melbourne.
[11]Rong X, Jan 2003, Pairwise Alignment - CS262 - Lecture 1 Available: http://alchemi.net/doc/0_6_1/index.html
Notes [online], Stanford University. Available: http://
[16]BioInformatics Educational Resources Documentation [online],
ai.stanford.edu/~serafim/cs262/Spring2003/Notes/1.pdf
European Bioinformatics Institute United Kingdom. Available:
[12]Bin Wang, 2002, Implementation of a dynamic programming http://www.ebi.ac.uk/2can/tutorials/protein/align.html
algorithm for DNA Sequence alignment on the Cell Matrix
[17] Chitta Baral, Computational Molecular Biology, CSE 591 Arizona
Architecture [online], Utah State University, Logan, Utah.
State University, United States of America. Available: http://
Available: http://www.cellmatrix.com/entryway/products/pub/
www.public.asu.edu/~cbaral/cse591-s03/classnotes/seq-align.pdf
wang2002.pdf
400 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: Blockchain technology, in the context Amazon, and Microsoft. To assess the feasibility of
of distributed ledger technology, is a distributed various applications, prototypes of Google App Engine,
ledger that keeps track of all transactions and Google Cloud Platform, Amazon Cloud, and the Elastic
distributes them across the network's nodes. All computing platform have been created. This payment
transactions in the system are controlled by
method allows us to operate on a pay-per-use basis
consensus procedures, and data that has been
saved cannot be changed again. The operation of
and maintain a flexible IT infrastructure that is available
Bitcoin, a well-known digital cryptocurrency, is through the internet and mobile devices. Despite the
reliant on blockchain technology. Cloud computing fact that the cloud offers a plethora of advantageous
refers to the technique of storing, managing, and services, companies are hesitant to use it due to privacy
processing data via a network of distant computers concerns. Cloud throttling has a number of significant
hosted on the internet, rather than as a local server drawbacks, the most significant of which being security
or a personal computer. It continues to face many concerns and cloud-related issues. For companies
difficulties, including data security, data wanting to improve their security and privacy,
management, regulatory compliance, and blockchain technology is the way forward. A blockchain
dependability, to name a few. In this post, we've is a decentralised ledger that maintains tamper-evident
discussed some of the most pressing problems
data in the form of a chain, obviating the need for a
confronting the cloud, as well as some possible
solutions, such as combining the cloud with
centralised authority to exercise control. Nodes are the
blockchain technology. We typically give a short individuals or pieces of equipment that form a
review of past research that focuses on how blockchain network in blockchain technology. In
blockchains interact with the cloud when showing contrast to traditional networks, blockchain technology
the advantages of blockchains in the cloud. In enables a decentralised network in which all network
addition, we created an architecture that integrates nodes engage actively in data authentication and
blockchain and cloud technologies, showing the verification. The data that will be stored on the
connection between the two. blockchain will be encrypted using cryptography. Each
Keywords: Cloud computing, Blockchain block in that series contains an encrypted hash, a
technology, data security, decentralisation, and data timestamp, and the hash of the block before it in the
management chain. As a consequence, the data contained inside the
blockchain is impervious to modification. The
I. INTRODUCTION
blockchain protects the data, and all members are
Cloud computing is a mature technology that grew verified inside the network, which alleviates participants'
out of large-scale distributed computing and is now concerns about data privacy.
widely used. Consumers gain from cloud computing
We can use blockchain technology to address data
because it lowers their processing burden. Cost savings
privacy and security issues, thus accelerating the
on hardware and maintenance, worldwide availability,
development of cloud computing. It enhances data
edibility due to the use of a highly automated process,
security and service availability, as well as the
and scalability are only few of the many advantages.
organization's capacity to manage cloud-based data.
Cloud computing has been embraced by a significant
This article's Section II provides an overview of the
number of major businesses, including IBM, Google,
basic principles of cloud computing. Section III delves
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 401
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
into the fundamentals of blockchain technology, covering cryptocurrency to utilise a blockchain-based method,
topics such as its features, blockchain types, blockchain launching in 2011.
layers, design, operation, and noteworthy applications.
Section IV delves into the underlying principles of II. RESEARCH AIM AND OBJECTIVES
blockchain technology. Section IV discusses the The aim of this research is to determine the use of
advantages of combining cloud computing with blockchain technology in the field of cloud computing
blockchain technology, as well as the suggested and to identify any possible risks or issues associated
architecture. with its adoption. The following goals are listed in order
Users who want improved data storage as a result of importance:
of recent advancements in information processing • To perform a study of the techniques utilised in
technologies have shown an interest in learning more combination with national tourist brand marketing to
about these technologies. Cloud computing is being used promote digital brands.
as an example of best practise in the current business • To characterise the scope of blockchain technology
as a utility model for cloud customers. Cloud users may and its use to the cloud computing sector.
access, share, and trade data from any location at any
• To conduct a security analysis of blockchain
time, independent of their physical location. It suggests,
technology's cloud computing application.
but does not expressly say, that cloud clients have no
direct control over the resources they upload to the • To perform a security study of the most current
cloud server. The cloud provider, according to the terms solution with respect to its ability to maintain the
and conditions, provides services "as-is" and "as- confidentiality, integrity, and authenticity of public
information.
available" on a first come, first served basis. As we go
farther into the "information era," the volume, speed III. CLOUD COMPUTING
with which information is transmitted, and diversity of
In today's Internet era, the web hosts millions of
information available on the internet will skyrocket. Data
websites. A stack of servers is needed to administer
may be collected from a variety of sources, including
the hosted site, which is prohibitively costly. The traffic
mobile devices, sensors, archives, and social media
rates of these servers must stay constant, and they must
platforms. As a consequence of this kind of data
be continuously monitored and maintained. Additional
explosion, significant research issues emerge, such as
staff will be needed to set up and manage these servers.
'how to effectively and optimally manage enormous
Each piece of data will be kept in a data centre. As a
quantities of data and find new preservation methods
result, continuing efforts to maintain the server and
for unlocking information.' Millions of transactions are
related infrastructure, as well as the employees, may
handled every day, including sensitive heterogeneous
divert our attention away from our commercial goals.
and homogenous data that does not jeopardise end-
We're using "Cloud Computing" to avoid this time-
user service quality. As a consequence of ongoing
consuming maintenance. "Cloud computing is a
problems in information processing units, the creation
technique for storing, managing, and analysing data from
of alternative financial markets for the next generation
any place on the globe through a network of remote
of financial technology will be feasible, allowing for the
computers. It functions in the same way as a local server
secure use of network technology and user
or personal PC". Cloud computing services, such as
communication. Blockchain technology has been
data storage and application delivery, are delivered over
proposed as a solution to financial security problems.
the internet to an organization's devices. Cloud
According to its creators, it is a distributed ledger system
computing provides many advantages by connecting
that enables more secure online transactions. The idea
data centres, resources, and servers through the internet.
of blockchain technology has been discussed around
Pay-per-use regulations apply to these services. The
the globe since 2008. Bitcoin was the first
services are available on a global scale and at a
402 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
significantly reduced cost, which promotes employee as well as cloud computing frameworks. The section
collaboration. The cloud's software will be automatically on blockchain and cloud computing covers several
updated, making management easy. Additionally, the theoretical frameworks and techniques in connection
client of the service will retain ownership over the cloud- to these technologies.
based documents. Additionally, it is subject to certain
limitations. Due to the adaptability of cloud data, various A. Blockchain Technology
security and privacy issues, as well as vulnerabilities to This section discusses the basic structure and
attack, must be addressed. When a large number of operation of the blockchain idea. Blockchain
users is present, the cloud may suffer downtime. architecture is being developed for a variety of
Cloud computing provides a diverse range of applications, including cloud computing, edge
services that may be roughly classified into three delivery computing, and fog computing. Additionally, it will be
modes. The last option is Software as a Service (SaaS), included into a second methods and provides for large-
which is comparable to a hosted programme that is scale modelling. It has been used in combination with
made accessible to customers through the internet for cloud computing to build a more secure system during
the purpose of doing their duties. A large number of the past few years.
individuals may access a wide variety of services when Origins of Blockchain: Blockchain technology is
an organisation manages whole programmes or projects a decentralised architecture based on cryptographically
on a single cloud-based software platform. Cloud- signed transactions. It is a block-by-block system. Each
based service customers have no control over the block is encrypted. The legitimacy of transactions should
infrastructure that hosts such services. Software as a be verified and evaluated at each point of failure. It
service providers include Amazon Web Services, incorporates many facets of the peer-to-peer (P2P)
SalesForce.com, and Google Mail. The second product paradigm. This method avoids the expenses associated
is Platform as a Service (PaaS) (PaaS). On the cloud with transaction authorisation via the use of a broker.
service provider's platform, we will be able to deploy The growth of blockchain technology is expected due
our application as well as a suite of programming to the fact that this blockchain technique offers robust
languages. SaaS and PaaS are distinguished by the fact and scalable security for its end systems. Moreover,
that SaaS hosts the whole application in the cloud, while hackers have a tough time exploiting transaction system
PaaS hosts the application's platform. Pay-as-you-go vulnerability. As a consequence, transactions become
SaaS is more costly than Pay-as-you-go PaaS. The more convenient and straightforward. The following
most well-known use of PaaS technology is Google's image 1 depicts the basic components of a peer-to-
search engine. The third service is IaaS, which enables peer (P2P) blockchain architecture.
customers to get direct network access to resources Hashes: It is a necessary component of the
like as storage, computation, and other computing blockchain idea, since it enables a diverse range of use
capabilities. Virtualization is used in IaaS to spread cases. Its main purpose is to encrypt the block's
physical resources over a large number of servers in contents. It is capable of handling data of any scale.
order to meet the resource requirements of cloud Changes to the input may result in changes to the output.
customers. To maximise the effectiveness of SHA-256 is widely used in a wide range of real-time
virtualization, it is essential to create separate virtual applications.
machines that are isolated from both the underlying
hardware and other virtual machines.
IV. LITERATURE REVIEW
It is the purpose of this part to review the literature
on the blockchain technology concept and algorithms,
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 403
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
404 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
referenced throughout the transaction. The private key B. Authentication- Cloud Computing Insights
is used to verify transaction signatures and is kept Through resource pooling and virtualization, cloud
secret. The public key validates the private key's computing enables the provision of compelling and
signature. attractive computer services. The paradigms of cloud
A. Concept of Bitcoin computing have brought a new concern: security as a
service. A business may provide its clients a range of
Bitcoin is a digital currency system in which each application services. Email and web servers are two of
digital coin is composed of a chain of digital signatures. the most prominent examples of application service
Each owner communicates with the other through digital providers. While the company may have certain
signatures and then transfers money using the hash of restrictions on its services, authorised consumers should
recent and previous transactions. According to their adhere to all offerings. This necessitates the client
ownership, a payee may verify signatures. The graphic creating a security context for each application server
depicts the bitcoin concept. and authenticating prior to using any service. When a
Bitcoin's operation is as follows: user accesses resources across several security
• All nodes are first broadcasted with new transactions. domains, a similar situation happens. If authentication
requires several security credentials, it is not considered
• Each node in the block collects new transactions. a secure, system-coordinated, or manageable
• Each block should have a proof-of-work allocated to approach. Organizations confront similar challenges
it. while migrating to the cloud. Numerous organisations
are given the opportunity to buy such services, requiring
• When a node discovers proof-of-work, a broadcast
message is sent to all nodes in that block.
the usage of a secure system. Access control
management gets increasingly complex and expensive
• Rather than being spent, only legitimate transactions as services grow. The bulk of applications are
are executed. concerned with the operation of the system and the
• Nodes accept blocks in accordance with their hashing value of the organisation. Thus, centralised management
capabilities. of security rules ensures the flexibility and scalability of
authorization systems. Additionally, with a single point
of administration for policies, changing policies becomes
a simple. Compromise of authorization systems has
become much more difficult since protection and
auditing of these systems are handled separately.
C. Blockchain technology parameters
The following factors contribute to the success of
blockchain technology:
E-Cash and its security: e-Cash is a new concept
that is reshaping the world of e-commerce. It just
replaces the previous paper and coin-based techniques.
Credit cards are one of the handiest ways to pay
electronically. This approach requires merchants and
agents to develop a trustworthy connection. The bank
Figure 3: working process of bitcoin or issuer retains the E-cash, which must be requested
by the client when making a payment. In contrast to
online electronic currency, users save offline electronic
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 405
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
406 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
results, research on blockchain-based cloud computing [13].Bonneau, J.; Miller, A.; Clark, J.; Narayanan, A.; Kroll, J.A.;
Felten, E.W. Sok: Research perspectives and challenges for bitcoin
is still in its infancy. When it comes to access restriction, and cryptocurrencies. In Proceedings of the 2015 IEEE
researchers face a variety of difficulties. Communication Symposium on Security and Privacy (SP), San Jose, CA, USA,
between multi-party computations disrupts networks 17-21 May 2015.
as they attempt to compensate for missing data, resulting [14].Christidis, K.; Michael, D. Blockchains and Smart Contracts
in an unexpected financial loss. Additionally, the creation for the Internet of Things. IEEE Access 2016, 4,2292-2303.
of bogus accounts has a detrimental effect on the [15].Huang, H.; Chen, X.; Wu, Q.; Huang, X.; Shen, J. Bitcoin-based
fair payments for outsourcing computation of fog devices. Future
system's scalability. In the future, the created model Gener.Comput.Syst. 2016.
should try to address the issues highlighted so far.
[16].Huh, S.; Sangrae, C.; Soohyung, K. Managing IoT devices using
blockchain platform. In Proceedings of the 2017 19th International
REFERENCES Conference on Advanced Communication Technology (ICACT),
[1]. W. Venters and E. A. Whitley, ''A critical review of cloud Bongpyeong, Korea, 19-22 February 2017.
computing: Researching desires and realities,'' J. Inf. Technol.,
[17].Armknecht, F.; Karame, G.; Mandal, A.; Youssef, F.; Zenner, E.
vol. 27, no. 3, pp. 179 197, Sep. 2012.
Ripple: Overview and Outlook. In Trust and Trustworthy
[2]. Y. Lu, ''The blockchain: State-of-the-art and research challenges,'' Computing; Conti, M., Schunter, M., Askoxylakis, I., Eds.;
J. Ind. Inf. Integr., vol. 15, pp. 80 90, Sep. 2019. Springer International Publishing: Cham, Switzerland, 2015; pp.
163-180.
[3]. D. Yadav and S. Behera, ''A survey on secure cloud-based E-
health systems,'' EAI Endorsed Trans. Pervas. Health Technol., [18].Vasek, M.; Moore, T. There's No Free Lunch, Even Using
vol. 5, no. 20, May 2020, Art. no. 163308. Bitcoin: Tracking the Popularity and Profits of Virtual Currency
Scams. In Proceedings of the International Conference on Financial
[4]. Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, ''An overview of Cryptography and Data Security, San Juan, Puerto Rico, 26-30
blockchain technology: Architecture, consensus, and future January 2015; Springer: Berlin/Heidelberg, Gemany, 2015.
trends,'' in Proc. IEEE Int. Congr. Big Data (Big Data Congress),
Jun. 2017, pp.557 564.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 407
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[19].Zhang, J.; Nian, X.; Xin, H. A Secure System for Pervasive [23].Jiao, Y., Wang, P., Niyato, D., & Suankaewmanee, K. (2019).
Social Network-based Healthcare. IEEE Access 2016, 4, 9239- Auction mechanisms in cloud/fog computing resource allocation
9250. for public blockchain networks. IEEE Transactions on Parallel
and Distributed Systems.
[20].Singh, S.; Jeong, Y.-S.; Park, J.H. A survey on cloud computing
security: Issues, threats, and solutions. J. Netw. Comput. Appl. [24].Zhu, L., Wu, Y., Gai, K., & Choo, K. K. R. (2019). Controllable
2016, 75, 200-222 and trustworthy blockchain-based cloud data management.
Future Generation Computer Systems, 91, 527-535.
[21].Kumar, G., Saha, R., Rai, M. K., Thomas, R., & Kim, T. H.
(2019). Proof-of-Work consensus approach in Blockchain [25].Yang, R., Yu, F. R., Si, P., Yang, Z., & Zhang, Y. (2019). Integrated
Technology for Cloud and Fog Computing using Maximization- blockchain and edge computing systems: A survey, some research
Factorization Statistics. IEEE Internet of Things Journal. issues and challenges. IEEE Communications Surveys & Tutorials.
[22].Verma, V. K. (2019). Blockchain Technology: Systematic Review
of Security and Privacy Problems and Its Scope with Cloud
Computing. Journal of Network Security, 7(1), 1-6.
408 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Body mass index (BMI) is calculated Limitations associated with the BMI are:
by solving a person's height in kilogram (kg)
divided by the square of height in meters. A high • BMI varies by age, sex and race. Hence one's BMI
BMI can indicate the high fatness in the body. BMI can only be compared to those of the same sex, age
screens for weight categories that may lead to and race.
health problems, but it doesn't diagnose the fatness • BMI does not differentiate between muscle and fat
in the body or the health of an individual. Here, we and will therefore underestimate in some and
classify BMI under 6 types such as Underweight, overestimate for others (e.g. An athlete may have a
Normal weight, Pre - obesity, Obesity class I, high BMI because of greater amount of muscle rather
Obesity class II and Obesity class III in our dataset. than fat).
In data analysis, there are several methods to
predict the patients BMI, but here we are going • Disabled or elderly people have less muscle mass
with logistic regression which is one of the several and therefore will have a lower BMI. This does not
methods of machine learning algorithms. We have necessarily mean that their weight is normal or
predicted the BMI by taking height and weight as underweight.
independent variables. Hence by using logistic • Likewise for pregnant women, it may increase during
regression the data set is analysed. Finally the pregnancy and decrease after pregnancy.
accuracy of the BMI data set is found to be 86.4
%. • BMI does not differentiate between body fat
distribution.
Keywords- BMI, Logistic Regression
TABLE I
I. INTRODUCTION CLASSIFICATION OF BMI
The BMI was invented by Belgian polymath Adolphe BMI values Classification
Quetelet in the 1800s, and consequently is sometimes <18.5 Underweight
18.5 – 24.9 Normal weight
known as the Quetelet index. The BMI is calculated 25 – 29.9 Pre – obesity
by dividing your weight in kilograms (kg) by your height 30 – 34.9 Obesity class I
in metres squared (m2). It is expressed as kg/m2. The 35 – 39.9 Obesity class II
BMI is a simple, inexpensive screening tool used to Above 40 Obesity class III
identify possible weight problems for both adults and
II. METHODOLOGY
children. BMI measurement isuseful to assess who
needs further testing to identify health risks such as heart A. Database:
disease. Individuals at risk will need further assessment. The dataset used for prediction of BMI consists
Assessments may include skinfold thickness test, diet, of 2 input variables and 1 output variable. Two input
physical activity level, family history and other variables represent height (measured in cm) and weight
appropriate health screenings. (measured in kg). The target variable is BMI Index
Being either overweight (with a BMI of 25 or above) value (see Table II).
or underweight (with a BMI lower than 18.5) can affect
your health.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 409
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
410 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
represents extreme obesity(see Table II). As compared to the graph of the train set, we
conclude that our test set is not contrasting and the
maximum coloured points are similar to the train set
graph. On performing Logistic Regression on the dataset
gives the accuracy of 86.4%.
IV. CONCLUSION
Obesity is the new global epidemic threatening
millions of people. It is found world-wide even in
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 411
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
developed countries and it is mainly due to the Western [3] J. H. Himes, "Challenges of accurately measuring and using BMI
and other indicators of obesity in children", Pediatrics, 2009.
food style and the junk food meals high in carbohydrates
and fat together with high-caloric sweets and other [4] J. S. Garrow and J. Webster, "Quetelet's index (W/H2) as a
measure of fatness", Int. J. Obes, 1985.
luxurious foods. While in developing countries, it
[5] O. B. Oluwole, O. P. Ibidapo, T. A. Adesioye and A. A. Agboola,
spreads due to the main dependence on cheap foods "Diet: Overweight and obesity", Diets and Diseases: Causes and
which are characterized with low-protein and high Prevention, 2016.
calorie content. The result of the study is found to be [6] "Body mass index: Considerations for practitioners", Cdc, 2011.
efficient to predict people's BMI using ML algorithm [7] M. Mohammed, M. B. Khan and E. B. M. Bashier, Machine
(logistic regression). Further analysis can be enhanced Learning Algorithms and Applications, CRC Press, Taylor Francis
by using various types of machine learning algorithms. Group, 2017.
[8] T. M. Mitchell, Machine Learning, McGraw-Hill Education,
REFERENCES 1997.
[1] J.H. Himes et al., "Guidelines for overweight in [9] S. Shalev-Shwatz and S. Ben-David, Understanding Machine
adolescent preventive services: Recommendations from an expert Learning: From Theory to Algorithms, Cambridge University
committee", American Journal of Clinical Nutrition, 1994. Press, 2014.
[2] Z. Mei, L. M. Grummer-Strawn, A. Pietrobelli, A. Goulding, M. [10]F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion,
I. Goran and W. H. Dietz, "Validity of body mass index compared O. Grisel, et al., "Scikit-learn: Machine Learning in Python", vol.
with other body-composition screening indexes for the assessment 12, no. 85, pp. 28252830, 2011.
of body fatness in children and adolescents", Am. J. Clin. Nutr,
2002.
412 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- In the present-day world, one of the This causes it to pile up day by day resulting in scatter
main tasks of environmental protection is the or dump in roads. These wastes are ultimately burnt
management and recycling of plastic waste. Plastics due to lack of awareness as well as ignorance,
have become an inevitable material in India in highlighting the prevalent poor waste collection
diverse forms as food packing covers, bags, sachet
mechanism. Additionally, ocean plastic litter has also
etc. Thus, remain in widespread use. The increase
in the amount of population leads to a great increase risen drastically causing threat to marine life.There are
in the production of waste. This has led to the several initiatives taken by several organizations for the
accumulation of plastic wastes from households as proper disposal of plastic wastes. But the majority of
well as shops. An automated communication people are not aware of these industries and this leads
mechanism between the household and waste to the burning or burying of wastes, causing severe
collecting organization, would help to monitor and environmental problems. Hence a study has been done
collect the plastic, for recycling or a centralized by us in the state of Kerala, India. One of the major
disposal. This article proposes an IoT based design challenges for the government is that recycling industries
for partially automating the plastic waste collection in Kerala rejects plastic waste from the municipal waste
mechanism from households. Such a system will collection department. Because it costs additional labor
help the municipality or corporation to monitor and
to segregate plastic and non-plastic waste from the
manage the plastic collection and disposal
respectively in a centralized way. The paper
houses and also for cleaning the recyclable plastic from
discusses block diagram, system architecture, the dirty plastic waste that may contain organic matter.
implementation and working of our proposed Hence it is transported to recycling industries in
model. neighboring states, which is a very costly process.
Keywords- Smart city; plastic waste; Internet Plastic recycling Industries in Kerala are willing to
of things. take plastic waste with some prior conditions: -
I. INTRODUCTION • The Plastic waste must be free of organic matter.
Proper disposal and management of wastes, • The plastic wastes must be washed, cleaned, dried
especially plastic wastes, is becoming a real problem and free from dirty waste.
to humans due to its adverse effects to all living things • Segregation should be done at source level i.e.
in nature. The waste management policy in India is not separation of plastic waste and non-plastic waste.
as effective as in developed countries, where
Improper plastic disposal affects nature dangerously
segregation & collection of plastic and non-plastic
in many ways as global warming, aquatic animal death,
materials from the source site itself is done. Earlier,
poor human health etc. Centralized management of
municipalities in towns and corporations in cities were
plastic waste in a locality can control the adverse effects
responsible for collecting these plastic wastes. But none
of improper plastic disposal. The 3R Principle i.e.
of them is providing a systematic collection and disposal
Reduce Recycle Reuse principle can solve the problem
of waste, thus resulting in the accumulation of wastes.
to certain extent. According to this principle, plastic
waste from homes can be transferred as raw materials
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 413
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
to plastic requisite industries. The primary step should III. PROPOSED DESIGN AND
be the implementation of a systematic collection METHODOLOGY
mechanism of plastic wastes from households as well This section of the paper describes about the system
as shops. Automating the communication between architecture:
households and municipal corporations will improve the
systematic waste collection mechanism. This article
proposes the design of such a mechanism, which will
definitely improve the waste collection system for a
centralized disposal management. Automated
communication is proposed using the latest technology;
Internet of Things (IoT). Recent IoT technology is
integrated to the existing solid waste management
system to make it effective and smarter. A set of things
like tags, sensors, humans etc. are connected to each
other through the internet, to extend the benefit of it
Figure 1: IoT based plastic waste collection system
through communication. It can be internetworking of
connected devices, vehicles, households etc. to store The above-mentioned figure describes the block
and exchange data. It is possible through wired or diagram of our proposed project.
wireless connection, minimizing the user intervention. Due to lack of proper disposal of plastic wastes,
This ability makes it applicable in all fields. For e.g.: most of the people in rural and urban areas are facing
continuous patient monitoring system through sensors plastic waste disposal problems. This problem can be
in the medical domain, while monitoring plant conditions solved to a greater extent by creating a smart, automated
by sensing moisture and soil contents in agriculture. and cost-effective system that enhances the collection
II. IOT IN WASTE MANAGEMENT of plastic wastes at home (with prior conditions) for a
centralized waste management in a locality; thereby
The Internet of Things (IoT) plays a major role in
reducing the improper plastic disposal methods. The
development of smart cities. Smart cities help in
proposal should be implemented on a large scale to be
increasing economic growth and make the lives of
made effective.
people easier and tension free. The rapid increase in
population, better employment facilities and The proposed design is as follows: Fig.1 shows the
industrialization results in urban development like towns design of IoT based systems. A smart and automated
and cities. This raises a severe issue of waste bin will be allocated to each residence for collecting
management to administrative authorities for providing plastic waste from each residence. This smart bin is
an effective waste collection and disposal in an eco- connected to the Internet through a WIFI module, which
friendly way. forms a network of communication between the Server
Researchers proposed certain strategies for a smart and Smart bin. As soon as a user shows his unique
and efficient waste management, as well as the methods RFID tag in front of the RFID reader in the bin, the
to implement it. Works were done for the development user will be authenticated and the lid of the bin will be
of smart garbage systems for collecting trash in opened. The user can dispose of the plastic waste in
developing countries. Even though trash collection has small covers into the Smart Bin, after which the lid
been mentioned by the authorities, governments were closes automatically. An ultrasonic Sensor calculates
not punctual in monitoring the collection and disposal the height of plastic waste in the smart bin. Infrared
system. Smart garbage system was made to solve this Sensor detects the presence of plastic waste in the sides
problem of punctuality in collecting from households, of the smart bin. The calculated height is then sent to
shops, organizations etc. the server through the internet provided through the Wi-
414 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fi Module. Server which in turn updates corresponding and centralized disposal method would control this
necessary information of all users. Server contains problem to certain extent. The proposed system enables
details of all bins and its users i.e. the bin ids, current a smart and automated plastic collection method utilizing
status, location of the bin, history of rewards of each IoT technology. This system could connect residences
bin, etc. A user can see the current status of his bin and and waste collection teams from corporations or
also history of his rewards. Organizations can also read specified organizations, for a semi-automated and fast
the information about bins, users, and reward history collection mechanism. The expected deliverable of this
of the bins in the organization's range. If the bin is full, project would be a smart and automated residential
the message is passed onto the Waste Collection Team plastic waste collection system which is IoT oriented.
who inspects the waste and empties the bin. The reward In order to encourage the use of smart bins, the common
is then sent as E-tokens i.e. money in digital form to the people are expected to reward themselves with E-
corresponding user. tokens. The value of the plastic waste received from
the organization, will motivate e individuals to use the
IV. IMPORTANCE OF PLASTIC WASTE smart bins and the effect would be a plastic free
MANAGEMENT environment in a long time. The advantages of this
There is only one environment and it must be treated project is widely open to collect any plastic oriented
with the respect it deserves. If raw materials have products, because plastic is becoming one of the most
already been extracted then it makes sense to use them dangerous threats to humanity. In future, this system
again if possible. This means that reserves last longer can be expanded to a large scale by including all business
into the future. Moreover, recycling of plastic waste units, industrials, organizations etc. Then it will be so
conserves natural resources, particularly raw materials advantageous and useful for clearing large amounts of
such as oil and energy. The more that is recycled, the plastic wastes from society. Big smart bins can be made
longer will natural resources be available for future and implemented for commercial purposes also.
generations. It means that there is less environmental
impact due to mining, quarrying, oil and gas drilling, REFERENCES
deforestation and the likes. If there are fewer of these [1] Surapaneni, P. &Maguluri, L.,P.,& M. Syamala. (2018) Solid
waste management in smart cities using IoT, International Journal
operations, the environment will be safe from continuous of pure and applied mathematics, Vol. 118, No.7, 635-640.
destruction and degradation.
[2] Joni, K., Haryanto&Rohim, D., F. (2017). Smart Garbage Based
Another positive effect of recycling on the on Internet of things, Journal of Physics: Conference Series, Vol
953, No.1, pp. 012139.
environment is that it may reduce emissions of
substances such as carbon dioxide (CO2) into the [3] Hasan, B. M., Yeazdani, A., M., M., Istiaque, L. M., &
Chowdhury, R. M. K. (2017). Smart waste management system
atmosphere. Recycling of plastic wastes will also save using IoT (Doctoral dissertation, BRAC University).
both ground and surface waters from pollution. This is
because if discarded randomly, they choke gutters and
even find their way into water bodies that serve as
sources of drinking water for communities and towns.
They also help to breed leachate that can seep into the
ground thereby contaminating groundwater bodies as
well.
V. CONCLUSION AND FUTURE SCOPE
Plastic wastes in town and rural areas are currently
burning or throwing to the environment, causing long
term hazard and pollution. Proper collection mechanism
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 415
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- The aim of the research paper is to classifier, Supervised ML algorithms, Emotion
perform Emotion Detection Sentiment Analysis on Detection Sentiment Analysis
human speech input data using Natural Language
Processing which involves Machine Learning for I. INTRODUCTION
training the ML model in order to detect the Natural Language Processing also popularly known
emotion of the real-time input of the user taken as NLP is a component of Artificial Intelligence (AI). It
through the microphone and give the final output
is a technology that enables computers to understand,
in the form of both text and speech. The final output
interpret, as well as manipulate human language. It is
will display the results of speech-to-text converted
text output recognized/predicted by the system and the ability of a computer program to understand human
its corresponding emotion that is being detected language in both the form of audible speech and the
by the trained model. In order to decide which ML text of a language. The applications of NLP can be
algorithm should be used to train and build the ML seen in many different fields today. People might not
model for performing emotion detection sentiment realize, but they have been using certain applications of
analysis the research paper will primarily do a NLP for a long now in their day-to-day lives, wondering
comparative study on four different supervised how? If you've ever asked Siri or Alexa a question,
Machine Learning algorithms for classification then there you go, you have interfaced with NLP!
namely Multinomial Naive Bayes classifier, Linear
SVM, Logistic Regression and Random Forest Sentiment analysis is a computational process for
classifier and further compare on the basis of their detecting the emotions/sentiments of the text data. It is
respective accuracies which algorithm will give a study of people's emotions through the analysis of
the highest accuracy. The algorithm that achieves text data expressed by different individuals. Sentiment
the highest accuracy would be further used to analysis can be used in various application like for finding
develop the machine learning model which would sentiments of social media tweets, products, hotels, and
be used for emotion detection sentiment analysis. movie reviews but here in this research paper it is
In order to convert speech to text and vice versa
specifically used to study and detect the emotion/
speech recognition and speech synthesis
sentiment of the text data that is converted from user's
technologies would be used for the study. The
purpose of this research paper is to put forward a speech to text using speech recognition. There are
beautiful collaboration of the newly emerging different types of sentiment analysis namely Fine-grained
technologies like natural language processing , sentiment analysis , Emotion Detection Sentiment
sentiment analysis, machine learning, speech Analysis, Aspect- based sentiment analysis and Intent
recognition and speech synthesis . analysis. In this research paper emotion detection
Index Terms-Natural Language Processing, sentiment analysis is taken up.
Machine Learning, Speech Recognition, Speech Machine learning is the ability of machines i.e.
Synthesis, Linear SVM, Multinomial Naive Bayes computers to learn and improve from their past
Classifier, Logistic Regression, Random Forest experience or data without being explicitly programmed.
416 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Machines learn from past experience, identifies patterns language(speech) into text. It is a technology that enables
(pattern recognition), and predict the output. So to be a computer to capture the words which are spoken by
precise, machine learning also known as ML is the humans with a help of a microphone. These words are
ability of machines i.e. computers or computer further recognized by a speech recognizer and the end
programs to learn from the past behavior of data and system outputs the recognized words by converting them
to predict future outcomes without being explicitly into text. The process of speech recognition is a
programmed to do so. ML algorithms are constantly combined process of different steps such as voice input,
analyzing and learning from the data to improve their digitization, acoustic model, language model, speech
future predictions and outcomes automatically. There engine. There are different libraries that can be used
are various applications of ML that we see in our day- for speech recognition in python like apiai, assemblyai,
to-day lives such as Facebook newsfeed, product google-cloud-speech, pocketsphinx, watson-
recommendation used by shopping portals, Facebook developer-cloud, wit, Speech Recognition.
photo auto-tagging feature, and many more. Over here for this research paper the Speech
The text that is generated from speech to text Recognition library is being installed in order to perform
conversion using speech recognition is now taken as speech recognition to convert speech into text. An active
input further perform sentiment analysis on it in order internet connection is required for this to work.
to classify the sentence based on its sentiments. However, there are certain offline Recognition systems
Sentiment analysis is basically a process of as well such as pocketSphinx, but the problem is it has
computationally identify and further categorize opinions a very rigorous installation process that requires several
from a piece of the text and determine the sentiments/ dependencies. That is why Google Speech Recognition
emotions of the text data. Following are the steps that is one of the easiest to use.
would be done to perform sentiment analysis : Recognizing speech requires audio input. The
Step 1 : The very first step would be the step of SpeechRecognition makes retrieving this audio input
tokenization. Tokenization is nothing but dividing your easy. Instead of having to build scripts for accessing
paragraph into different set of statements or your microphones and processing audio files from scratch ,
statement into different set of words. SpeechRecognition will to the needful job quick in few
minutes. The SpeechRecognition library support many
Step 2 : The second step would be cleaning the APIs and thus is very flexible. Hence , its flexibility and
data. It means to remove all the special characters that ease-of-use make it an excellent choice for any python
do not add value to the analytics part . project. Well, SpeechRecognition has a Recognizer
Step 3 : The third step would be of removing the class which is basically where the magic happens.
stop words (for e.g. : the , was , a ). There is no need Everything connected to speech recognition is inside
of words that do not add any meaning to the analytics this class. It contains instances which are used to
result. recognize speech and each instance contains 7 methods
that recognize speech from any audio source using
Step 4 : The fourth step is of classification. In this
various APIs.
step supervised algorithm for classification is applied.
This is where the machine learning part comes into • Recognize_bing(): this method uses Microsoft Bing
picture. One can model their data with bag of words or Speech API.
even use Lexicons which are nothing but a dictionary • Recognize_google(): this method uses Google Speech
of pre classified set of words and then further test it on API
the analyzing statement.
• Recognize_google_cloud(): this method uses Google
Speech recognition is a technology which enables Cloud Speech API.
the recognition as well as translation of spoken
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 417
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• Recognize_houndify(): this method uses Houndify PI system and uses them. The different text-to-speech
by SoundHound. synthesizers it uses are SAPI tts , NSSpeechSynthesizer
• Recognize_ibm(): this method uses IBM Speech to tts and espeak tts. The SAPI tts synthesizer is installed
Text API. on Windows XP, Windows Vista, 8,8.1 and 10
(Speech Application Programming Interface is an API
• Recognize_sphinx(): which is developed by Microsoft to allow speech
In this research paper recognize_google() is used. synthesis within windows application). NS Speech
Working with microphone: To work with Synthesizer tts synthesizer is installed on Mac OS X
microphone, we will have to install Pyaudio library in 10.5 and 10.6. espeak tts synthesizer is installed on
python. To record audio using the microphone a Ubuntu Desktop Edition 8.10,9.04 and 9.10In this
Microphone class is used. The Microphone class is used research paper the gTTS library is used for text to speech
to take the user input from microphone instead of any conversion.
audio file or any other source. So , here the microphone II. LITERATURE REVIEW
is used as the source using Microphone class. In order TABLE I
to capture the input from the microphone listen() method S.No Name of Year Name of Review
is used. author And source research
paper
1. Walaa 2014(https:/ Sentiment This research paper aims at doing
For taking the input of the user we will use speech Medhat, /www.scien analysis a survey in order to give nearly
Ahmed cedirect.co algorithms full image of sentiment analysis
recognition technology. The text is converted into Hassan, m/science/a and techniques and related fields with
speech it is called text-to-speech conversion where the Hoda
Korashy
rticle/pii/S2
090447914
applicatio
ns: A
details in brief . The major
contribution of this paper consists
input is taken in the form of text. Here first the input 000550#s00 survey of sophisticated categorizations of
1) large number of recent trend of
text is analyzed, processed, understood and then the research in the field sentiment
analysis and its related areas .
text is converted into digital audio giving the output in 2. Samar 2018 A Survey In this research paper survey the
Al- (https://ieee of Textual main focus is on textual emotion
the form of speech. This process of converting/ Saqqa, xplore.ieee. Emotion detection as a task of sentiment
Heba org/abstract Detection analysis, The research paper
generating spoken language by machine on the basis of Abdel- /document/ explores latest state of art
written input is termed as speech synthesis. In other Nabi
Arafat
, 8486405) approaches for emotion detection
in text through the survey and also
words speech synthesis (text-to-speech) is simulation Awajan discusses about their classification
according to the techniques used ,
of human speech which is computer-generated. In that emotional models used and also
the different types of datasets
text in human language is converted into human-like used. The research paper
highlights the limitations of these
speech in audio form There are many present / available recent works and suggests
possible future research in order to
to convert the text input into speech output in python 2 fulfill these gaps in this
python libraries used for speech synthesis are gTTS 3. Amanpre 2016 A review
increasingly developed field.
This research paper focuses on
and pyttsx3. gTTS text-to-speech conversion library et Singh,
Narina
(https://ieee
xplore.ieee.
of
supervised
discussing the efficiency of
supervised ML algorithms in
offers online speech synthesis and the pyttsx 3 text-to- Thakur org/abstract machine terms of the speed of learning ,
,Aakanks /document/ learning accuracy , risk of overfitting
speech conversion library offers offline speech ha 7724478) algorithms measures and complexity. The
Sharma major objective of this paper is to
synthesis. The gTTS is a python library. It is used to give a comparison with state of art
ML algorithm .
interface with Google Translate's text to speech API.
This library in order to function properly requires The table gives a brief of various works done in the
continuous internet connection and is very easy to use . field of ML and sentiment analysis.
This library supports many languages including English
III. RESEARCH METHODOLOGY
,Hindi, German and many more. On the other hand ,
the pyttsx3 (Text-to-speech x-platform) is a python Overall Incremental model approach is being
library can perform speech to text conversion offline considered. Let us first know what an incremental model
and does not require internet connection. It looks for is : Incremental Model Incremental model refers to the
the TTS engines that must be pre-installed on your process of software development wherein the
418 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
requirements are divided into multiple standalone Processing data. The term refers to converting data
modules of SDLC. In this particular model each module from a given form to a more usable and desired form
goes through different phases like : requirements, design, making the data more meaningful as well as informative.
implementation and finally testing .Every subsequent This entire process can be automated using ML
release of the module further adds functions to the algorithms , mathematical modelling and statistical
previous release. The process is continued until the knowledge .
complete system is achieved. Iterative model does not After the complete process the output can be
really need a full list of requirements before starting the obtained which would be in any form. It depends upon
process. The development process starts with the the task that are performed and the requirements of the
requirements of the functional part , which can be machine. The process needs to be performed in a
later expanded. The process is repetitive and also allows structured manner. The diagram depicts the steps to
newer versions of the product for every cycle. Each perform this:
iteration includes the development of a separate
component of the system which is added to the 1) Collection : This is a crucial part to have data of
functional developed earlier. good quality and accuracy. The data can be in two
forms : primary or secondary.
For the comparative study between the four machine
2) Preparation: The collected data can be in raw form
learning algorithms namely Multinomial Naive Bayes that can't be directly fed to the machines. The
classifier, Linear SVM, Logistic Regression and preparation can be done either manually or with an
Random Forest classifier a secondary dataset is being automatic approach.
used from Kaggle. The emotions dataset for NLP
3) Input : The prepared data now can be in the form
(https://www.kaggle.com/praveengo vi/emotions-
that might not be machine-readable, to convert this
dataset-for-nlp). It is a secondary labelled dataset which data to readable from some conversion algorithms
consists of sentences and their corresponding emotions are needed.
separated by a ";". This dataset is being used to train
4) Processing : This is the step in which algorithms
the ML models with the above mentioned algorithms
and ML techniques are required to perform the
to find out which algorithm would give the maximum
instructions give.
accuracy so that it can be used to develop a ML model
which is to be used for emotion detection sentiment 5) Output : This is the step in which the desired output
analysis . is acquired by machine in a meaningful manner which
can be understood easily by the user
In this research paper algorithms are being used.
6) Storage : This is the last step in which the obtained
These algorithms are being trained using a secondary output and all useful information are saved for future
dataset and then their accuracies are found out and on use.
the basis of accuracy the algorithm that gives the highest
accuracy will be taken to train the ML model which IV. RESULTS AND DISCUSSIONS
would be used for emotion detection sentiment analysis Now first we take a look at the machine learning
in which input is in the form of speech and output is in part .We have taken a secondary dataset for developing
the form of both speech and text which will consist of a model for performing emotion detection sentiment
user speech to text converted text output and its analysis on it. train.txt is the name of the dataset. Let us
corresponding emotion that is detected dynamically and explore the dataset first. Following is the snippets of
would be printed onto the screen. Following are the 4 code where we are exploring the dataset. The emotions
machine learning algorithms that have been used dataset train.txt is a labelled dataset. It contains target
namely: Multinomial Naïve Bayes classifier, Linear values that are category variable. The dataset contains
SVM, Logistic Regression, Random Forest Classifier. sentences which depicts different emotions. The labels
of emotions of every sentence are being labelled into
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 419
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
420 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 421
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
V. CONCLUSION
The aim of the research paper was achieved which
is raising awareness about the newly emerging
technologies in today time. Here various technologies
Fig. 7. The above figure depicts the snippet of code for like speech-to-text conversion (Speech recognition)
training supervised ML algorithms and fetching their
corresponding accuracies. along with text-to-speech conversion (Speech
Out of the four linear SVM achieves the highest Synthesis), natural language processing (Emotion
accuracy of 90.5 %. And hence this algorithm would detection Sentiment analysis), and machine learning
be used further to develop ML model using Linear SVM comes into the picture. The purpose of this research
for emotion detection sentiment analysis. Here we are paper was to put forward a beautiful collaboration of
the above newly emerging technologies.
422 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 423
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Technologies are developing rapidly on a standalone embedded system and we can use it
every day, security systems plays a major role in anywhere. In this system we are going to use Raspberry
today's world. There are various security systems pi as main controller along with web camera or Pi
which uses biometric but we proposed a system camera. This system can identify house owner and
which uses face recognition like we use in our
relatives and friends faces by training priory. If the
smart phones. We use the same concept to unlock
detected face at door is matched with existing dataset
our door using Raspberry Pi and AI where the
images of the trusted persons are trained, in it will automatically unlock the door. Otherwise it sends
addition to it we are also developing an android the captured face to owner through cloud database.
application through which the door can be Which means user can identify from anywhere who is
controlled from a remote location and also enable present at his door and also he can control the door. If
us to control home appliances too which are an unknown person is trying to unlock the door without
connected to home Wi-Fi. the permission of the owner, the system automatically
Keywords: Raspberry Pi, Facial Recognition, sends the information to the nearby police station.
Camera, Vibration Sensor, Door Lock.
II. RELATED WORKS
I. INTRODUCTION "Raspberry Pi Based Home Automation Using Wi-
Advancements in technology push us to change the Fi, IOT & Android for Live Monitoring"[1]- This
existing day to day objects into smart systems. To project mainly focuses on controlling the Devices
change and modernize any object we need to eliminate connected in the door with a Smartphone or a Remote.
its drawbacks and add extra functionality. When it The exact power consumption of a Room or a Hall is
comes to security systems, we can't blindly trust the updated to the live monitoring system happening. This,
old and conventional security methods. Some of the device is based on few Sensors and Detectors which
major drawbacks in conventional door lock are that are to be embedded with the Raspberry Pi. The updates
anyone can open that by duplicating the key and we are stored in Database server. We are using Python,
need to present over door if we want our friends and Android and Web Application or Website. The Login
family to enter our house. To overcome these type of System in the website and UI can be customized with
drawback, today lot of security systems available in additional feature to the device by the user as per the
market like fingerprint door access system, voice need.
controlled door access system. Likewise Face "Raspberry Pi based Interactive Smart Home
recognition is one of the advanced features to access Automation System through E-mail using Sensors"[3]-
the door. Today we are use facial recognition to unlock Atomization of all the devices is the main goal of this
the smart phones. Past years, we can't use camera other paper i.e. home appliances through E-mail using
than smart phone and computer. But in last few years Raspberry Pi, as well as the sensors like PIR, LPG,
presence of raspberry pi enables to access image temperature sensors are used in the system for security
processing with any portable embedded systems. With purpose. So with the help of this system the problems
use of Raspberry pi we can perform facial recognition coming in our day to day life are avoided. The algorithm
424 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
is developed by the default programming language of dynamically. It has been designed as an Android cell
Raspberry Pi (i.e)Python. The current status of the phone application, which communicates in a local
devices is E-mailed to the newly generated Email Id by network with an Arduino board. A miniaturized
the system. In the E-mail Id the output is stored. The residence was built to test it in a real case scenario for
switching action of the devices and sensors are indicated accessing the system. The findings suggested that the
by LEDs. system works relatively well; but in some instances the
"Smart Surveillance System using Raspberry Pi and system could not recognize the content or the image
Face Recognition"[6]-This paper suggest the Smart properly.
Surveillance System using Raspberry Pi and Image "MIA-My Intelligent Assistant"[2]-In this paper we
Processing. The activities based on motion is recorded can just ask our doubts, if it is a general or arithmetic,
by Traditional surveillance systems, this reduce the error no problem Mia will talk to you by replying the answer.
caused due to motion detection and serves the purpose Mia is an automatic answering machine. It is a smart
of facial recognition. To capture the image of the motion machine called Raspberry Pi which works using a smart
detected by the PIR Sensor the Raspberry Pi camera low cost SBC. We can speak to this machine which
module is used. This system will monitor when motion will be recording our speech. Based on the query given
detected by the system and checks the faces image to the machine which convert it into text and will search
captured by face recognition, and alerts if the detected for the result in the internet. The machine can be
face is not in the database. answered back to the query in speech format with the
"Voice Recognition Based Home Automation help of a text to speech converter. This makes the
System for Paralyzed People"[8]-The key objective of project smarter. For working out the project we use
our project is to design a system for physically sound card, Google API's, Python, Wolfram Alpha
handicapped persons to control and operate home Engine and Shell Scripting.
appliances by their own voice in their wheel chair. Both "Home Automation Systems - A Study"[10]-With
these features are present in our project which has the the increase in population and consumption of energy,
capability to replace current technologies. The design there is a huge need for energy conservation in every
of the low cost voice recognition based home way possible. The major reasons for loss of energy is
automation system for the physically challenged people the inability to access and control the application from
suffering from quadriplegia or paraplegia (who cannot a remote location. To give instructions to the systems,
move their limbs but can speak and listen) to control a web or an android application is used by user. A host
the various home appliances just by his/her voice of communication methods such as Wi-Fi, GSM,
commands according to their need and comfort. We Bluetooth, ZigBee can be make used by this system.
also implemented a messaging concept. In this whenever Different controlling devices and configurations can be
the patient or the person needs a help and pronounce found in existing systems. Such systems have been found
as help, a message will be sent to their family member. already in many places for a wide variety of applications.
The final system can gives a great assistance to the A survey of all such systems is given by this paper.
physically challenged people without any need of others. "Home Automation System Using Raspberry Pi"[3]-
"Voice Recognition Based Home Automation This system consists of an Messaging API which sends
System Using Android And Arduino"[9]-This paper text Messages to the user about the changes in house
proposes the development of a home automation voice and using the FTP server and he can access the
command system. The system was modelled by some raspberry pi. The system includes the monitoring and
of the UML elements in a flexible way, and towards remote controlling of home appliances and security
any residence structure is adapted. That means that, which can do as the Raspberry pi.
without the help any technician user can able to add
and remove electrical devices into the system
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 425
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
426 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 427
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[4] ShubhangKhattar,Anisha Sachdeva, Rishi Kumar, Richa Gupta, [9] Dennis Brown Germiniasi da Silveira, br Marlon José do Carmo
"Smart Home With Virtual Assistant Using Raspberry Pi" ,2019 2, "VOICE RECOGNITION BASED HOME AUTOMATION
IEEE 9th International Conference on Cloud Computing, Data SYSTEM USING ANDROID AND ARDUINO".Proceedings
Science & Engineering (Confluence) of XVIII ENMC - National Meeting on Computational Modeling
and VI ECTM -Meeting on Materials Science and Technology
[5] N.Sugumaran, G.V.Vijay, E.Annadevi, "Smart Surveillance
Salvador, BA - 13-16 October 2015.
Monitoring System using Raspberry pi and pir sensor",
International Journal of Innovative Research in Advanced [10]Satish Palaniappan, Naveen Hariharan, Naren T Kesh,
Engineering (IJIRAE) Issue 04, Volume 4 (April 2017) Vidhyalakshimi S, Angel Deborah S. "Home Automation Systems
- A Study"International Journal of Computer Applications (0975
[6] Chinmaya Kaundanya, Omkar Pathak, Akash Nalawade,
- 8887) Volume 116 - No. 11, April 2015.
SanketParode,"Smart Surveillance System using Raspberry Pi
and Face Recognition", International Journal of Advanced [11]Arpita Yekhande1, Prof. Kapil Misal2, "HOME
Research in Computer and Communication Engineering Vol. 6, AUTOMATION SYSTEM USING RASPBERRY PI",
Issue 4, April 2017. International Research Journal of Engineering and Technology
(IRJET).
[7] Senthil Kumaran Varatharajan, Viswanathan Nallasamy, "Voice
Based Home Automation Using Bitvoicer".International Journal
on Recent Researches in Science, Engineering and Technology,
Vol.5, Issue 2,February 2017.
[8] N. Prathima, P. Sai Kumar, SK. Lal Ahmed , G. Chakradhar,
"Voice Recognition Based Home Automation System for
Paralyzed People", International Journal for Modern Trends in
Science and Technology Volume: 03, Special Issue No: 02, March
2017.
428 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract : Agriculture field is the primary LR, Linear Regression; HSV, Hue, Saturation, and
resource of livelihood in country like India. Plant Value; SOM, Self-Organizing Map; DNN, Deep
are affected by diseases due to environmental Neural Network; CNN, Convolutional Neural
change or insects which adversely affect the food Network; RBF, Radial Basis Function Network.
productivity and degrade both the quantity and the
quality of food. Early detection of disease is I. INTRODUCTION
important otherwise spreadable diseases may affect The Agricultural field acts as backbone of developing
the entire farm. Late identification of disease may countries line India. Plants are very important as they
cause huge economic loss to farmers and
act as essential resource of food productivity for human
subsequently to the economy of country. Some
challenges need to face during plant disease beings. In many countries farmers use traditional
identification and classification. These are uneven methods for farming due to various reasons like lack of
background during image acquisition, awareness about recent technologies, high cost etc. It
segmentation and classification. By observing the have been observed that plants are frequently get
symptoms the infected disease get identified and affected by diseases, may be due to environmental
then only control mechanism is applied. This change or insects. These diseases are of various
survey gives detail information about plant categories like bacterial diseases, virus diseases and
diseases, disease detection and classification using fungal diseases. 80% of plants are affected by fungal
traditional method, machine learning approach and like organisms[52]. Diseases having spreadable nature
deep learning approach. This survey also conclude
may spread from one plant to other and subsequently
that traditional method and machine learning
to the entire farm. Diseases adversely affect the plant
approach are not as efficient as deep learning
approach. Machine learning approach gives better and reduce the quality and quantity of food productivity.
results compare to traditional method but deep Early detection of disease is very challenging task. Even
learning method delivers superior results compare if it is detected earlier, it is difficult to control as its
to both traditional and machine learning method. spreadable nature is varied according to environmental
conditions. Manually these diseases are identify by
Keywords: SVM, Support Vector Machine;
SIFT, Scale-invariant feature transform ; ANN, observing symptoms on plant's leaf or steam etc.
Artificial Neural Network; SURF, Speeded Up Generally, Farmers are not having deep knowledge
Robust Features; NN, Neural Network; HOG, about these plant diseases and need to search for farm
Histogram of an Oriented Gradient; KNN, K- specialist. Symptom observation is properly done by
Nearest Neighbors; BOVW, Bag of Visual Word; expert person having knowledge about this field.
DT, Decision Tree; BPNN, Back Propagation Traditional method of physical analysis and expert
Neural Network; RF, Random Forest; GLCM, opinion is time consuming. Also, for accurate advice
Gray-Level Co-Occurrence Matrix; NB, Naïve finding the farm specialist in rural area is very difficult
Bayes; PNN, Probabilistic Neural Network; ML, task. Monitoring big farm by specialist is costly and
Machine Learning; RGB, Red Green Blue; DL,
time consuming. Many time farmers prefer to use
Deep Learning; HIS, Hue, Saturation and Intensity;
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 429
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
pesticides to reduce the effect of disease without fungal disease. Leaf spot is the common symptom
confirming types of disease. Improper and unlimited found in bacterial disease infection.
use of pesticides again adversely affect the plant health, B . Viral Disease: Viral diseases are hard to identify
food productivity and subsequently to the human lives. and analyze. Symptoms of viral disease infection are
With increasingly rapid evolution of technology , it would Mosaic leaf pattern, Crinkled leaves, Yellow leaves,
be much better if we have learning based technique to Plant stunting.
identify disease in plants automatically without having C. Fungal Disease: Generally, wide range of vegetables
domain knowledge. is get affected by fungal diseases. It can cause huge
In recent years, AI based Machine learning damage of plants. Common fungal diseases are
Anthracnose, Botrytis rots, Downy mildews,
techniques gives good performance in image processing
Fusarium rots, Powdery mildews, rust, Rhizoctonia
applications [43]. Machine learning techniques are use rots, Sclerotinia rots, Sclerotiumrots etc.
to train the system so that it can learn automatically and
improve the results with its own experiences [8]. Figure shows the leaf images of disease infected
Machine learning and Deep learning based detection plants.
and classification of disease can guide the farmer to
take the necessary action to control it, without having
expertise knowledge. Machine learning and deep
learning techniques are more accurate and less time
consuming compare to traditional method. It does need
to have domain knowledge about the field. Issues faced Fig. 1 Fig. 2 Fig. 3
by researchers in this field are unavailability of dataset Bacterial Disease Fungal Disease Viral Disease
for every disease, background noise in captured image,
II. METHODOLOGY
low resolution images, texture property of plant leafs
that vary according to environmental change. A. MACHINE LEARNING TECHNIQUE :
AI is superset of Machine learning which in turn Plant disease detection and classification can be
superset of Deep learning. The deep learning provides perform into two major steps, digital image processing
extended features compared to ML. DL provides an and machine learning. First step of image processing
automatic feature extraction for computer vision tasks, consist of image capturing, noise removal, image
unlike traditional and machine learning approaches. The segmentation and feature extraction. Second step of
main advantage of deep learning is that it does not machine learning performs feature selection and
worry about domain expertise as no feature engineering classification. Machine learning model uses extracted
is required. This image based Deep learning methods feature to categorize the plant of disease based on image
delivered excellent results for disease identification and features. These two major steps are break down into 6
classification, compared to traditional methods. sub steps, represented in fig 4.
PLANT DISEASES & IT'S SYMPTOMS : Image Image Image
Acquisition Preprocessing Segmentation
Plant diseases are categorized into 3 types as
bacterial, viral and fungal diseases.
Disease Feature
A. Bacterial Diseases: These diseases are spread by Identification Classification
Extraction
bacteria. They can be splashed about by rain or
carried by wind, birds or insects. Plants affected by Fig. 4. Machine Learning Approach
bacterial diseases shows the symptoms that include
overgrowth of plant, leaf spots, scabs and cankers. Above figure shows the general approach to detect
Bacterial infection symptoms are similar to that of and classify the plant disease.
430 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
A. Image Acquisition: Pictures of leaves are capture improve the diseases control mechanism. The principal
using camera or comparative gadgets. Leaves component analysis (PCA) based algorithm disease
affected with diseases are used in the dataset. Size detection achieved 95% accuracy while the coefficient
and resolution of image are important parameter and of variation (CV) based algorithm achieved 85%
relates to efficiency of system.
accuracy. Vijai Singh proposed a soft computing
B . Image Preprocessing: Image preprocessing technique for identifying early disease detection [57].
includes the different operations like image resizing, An experiment is performed by Jobin Francis on HSV
noise removal, image filtering etc. Unwanted noises images of pepper plant and K-Means Clustering
are removed from image. Method [19] used to classify the healthy and unhealthy
C. Segmentation: Image segmentation is the process plant. Anand, R., Veni, S., & Aravinth, J. performed an
of splitting the image into several components or experiment on Brinjal Leaves to detect the leaf spot
sections. The foreground is isolated from the [3]. Sachin D. Khirade made use of Otsu Threshold
background or densely packed areas of pixels, Algorithm and Back propagation Network to detect
depending on color or shape similarities. Image diseases [34]. P. R. Rothe [55] carried out research on
segmentation can be implementing with different
and used thePattern Recognition Techniques to identify
methods like edge detection, k- mean clustering, Ostu
thresholding etc.
disease. Again, Image processing technique is used by
Ms. Kiran R. Gavhale to detect unhealthy Region of
D. Feature Extraction: It is use for extracting feature Citrus Leaf. Wan MohdFadzil performs Border
set. Feature extraction can be perform using Segmentation techniques [21] technique on orchid leaf.
Histogram of oriented gradients, Speeded-up robust
John William Orillo performed Back propagation
features, color and texture features, Local binary
patterns (LBP)etc. Artificial Neural Network on rice plant for identification
of disease [45]. Haiguang Wang proposed to detect
E. Classification: Classification is the process of grape and wheat diseases using PCA, RBF, SVM [73].
grouping data based on similarities. This step classifies
A Statistical Approach adopted by Nurul Hidayah Tuhid
the disease that the leaves are having. Different types
to identify orchid disease using RGB color [71]. Jayme
of models are available for classification purpose like
NB Classifier, Nearest Neighbor, Support Vector Garcia presented a detailed survey on plant disease
Machine (SVM), DT, Boosted Trees, RF, NN, detection using K-means clustering and Back
Logistic Regression etc. Propagation Neural Network. Diagnosis and
classification of grape leaf diseases using neural
B. A SURVEY OF MACHINE LEARNING networks is performed by Sanjeev S Sannakki [63].
TECHNIQUE Thi-Lan Le [37] proposed a fully automatic leaf-based
Nikos Petrellis developed a mobile application to plant identification method on Vietnamese medicinal
identify plant diseases like Downy Mildew, Powdery plant. Noor Ezan Abdullah proposed a work on
Mildwes [49]. Xanthoula Eirini Pantazi developed a characterization of watermelon leaf diseases using Fuzzy
model using Support vector machine and trained it using logic [4]. Chopda, J., Raveshiya, H., Nakum, S., &
8 images of training set to identify Powdery Mildew, Nakran made use of Decision Tree Classifier for Cotton
Black rot and Downy Mildew [48]. Trimi Neha Tete Crop Disease Detection.
was made use of K- means clustering and Neural
C. DEEP LEARNING TECHNIQUE :
Networks to detect the plant diseases [68]. Sourabh
Shrivastava used image retrieval concept to detect the Deep Learning given superior results compare to
plant diseases. Punnarai Siricharoen used SVM and conventional machine learning approaches. Deep
shape normalization for monitoring disease using texture learning is nothing but the subset of machine learning
andshape attribute [62]. A robotic application is which uses neural network i.e. interconnected web of
developed by Noa Schor to control the pesticides and nodes, called neuron. These are similar to neurons found
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 431
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
in brain accept input, perform complex computation ,CNN (CaffeNet) etc. It has been found that, most of
and product desired results. Unlabeled datasets are used the researchers perform an experiment on plant village
by neural network to extract the patterns from it by Dataset.
optimizing input parameters and then make predictions After Survey of hundreds of research, it is observed
by classifying them into fitting class. Deep learning that each researcher used a different way in his research
performs the process of learning the feature by using to detect and classify the diseases. By comparing the
given input. Convolutional Neural Network can accuracy parameter, we can say that GoogleNet, Cifer
automatically extract the features from given input and 10, Multi Channel CNN Models are giving better results
forward it to further layers for classification. It proven compare to other deep learning models. Based on
the significant improvement in the field of computer Dataset used, number of classes and result accuracy,
vision. CNN is composed of Convolutional, RELU and various researches are compare as shown in the Table
Pooling layer followed by fully connected layer that no.3.
enables classification. The Convolutional layer extract
features from input images based on weights and biases. During survey various research issues are found like
RELU stands for Rectifier Linear Unit, used to remove proper classification [17], Uneven Background [19],
negative pixel value of feature map by making them to Factor affecting image acquisition [23], Proper
zero. The function of pooling layer is to reduce the Segmentation [27], Accuracy [27], Reliability [30],
dimensionality of image. Deep learning can be utilized Time Consuming [49], Noise Removal [57], Designing
in agricultural field for various purposes like plant issues [65].
disease detection, weed detection, fruit detection etc. E. COMPARISON BETWEEN ML AND DL
Deep learning technique can work with large dataset APPROACH
and can produce superior results with right standards.
Machine Deep
Image Image Learning
Image Learning
Acquisition Preprocessing Approach Approach
Segmentation Input
Image
Feature
Feature Extraction
Disease Extraction & Automatic
Identif ication Categorization Feature
Categorization Extraction And
Categorization
Fig. 5. Deep Learning Approach
Result
D. A SURVEY OF DEEP LEARNING Prediction
432 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Figure 3 shows the visual representation about the and built model is used to categorize the plant name
working difference between Machine Learning and and type of infected disease. Both methods are use for
Deep Learning model. Machine Learning approach prediction of disease in plant, but Deep Learning
requires applying two separate algorithms for feature approach provides better accuracy compare to
extraction and categorization process. In Deep Learning Machine Learning approach.
approach, feature patterns are automatically extracted
TABLE I: Disease Detection and Classification Using Machine Learning Approach
Author Name Year Image Dataset Segmentation Classification Feature Extraction ClassifierAccuracy
Technique Algorithm
Reza, Z.N.(2016) 2016 Own dataset Hue Based SVM Color and texture SVM 86%
Segmentation
Sandika, B.(2016) 2016 Collected Dindori in Traditional RF,P NN,BPNN ,SV M Thresholding andimage RF 86%
Nashik district 900 appx. filling
Sarangdhar, A.A 2017 Collected form Buldhana Color transform and SVM Color moment , texture SVM 83.26%
(2017) district appx. 900 images thresholding Gabor filter
Ramesh, S.,(2018) 2018 Data set consists of 300 K-Means Clustering ANN Color and texture ANN Training 99%
images Testing 90%
Sumit Nema(2018) Self dataset creation k-means clustering SVM color, texture and edge Given in the formof
2018 Standard Deviation
Shima Ramesh 2018 Own training Dataset Not Specified RF HOG RF - 70.14%
(2018)
Budiarianto Suryo PlantVillage Not Specified K-means, DT, NB Complex genetic RF may improve if
Kusumo (2018) 2018 and Nearest Neighbor features number of tree
larger
Jayraj Chopda 2018 Training dataset Thresholding technique Decision Tree Texture, color Increased but not
(2018) Classifier Algorithm specified
Aman Sehgal Back spread is used to Traditional segmentation NN,SVM,RF,NB,DT Color and texture SVM -72.92% RF-
(2019) 2019 preparing database 71.88% NB-70.57%
DT-64%
Nikhil Shah(2019) 2019 Own dataset Traditional BPNN Texture Relative error 0.051
S.M. Jaisakthi Plant village Grab cut, Global SVM, Random Threshold, Textual,
(2019) 2019 Thresholding, Semi- Forest, AdaBoost GLCM Algorithm SVM 93.035%
Supervised technique
Eftekhar Hossain 2019 Arkansas Reddit-plant k-nearest neighbor KNN,GLCM GLCM algorithm, KNN 96.76%
(2019) datasets color, texture
Benjamin Doh 2019 Kaggle dataset K-mean ,Model-Based SVM, ANN Texture, color, Shape, SVM93.12% ANN
(2019) segmentation phenotypic Features 88.96%
Amrita S. Tulsham 2019 Own Dataset Region based K-mean SVM-Existing KNN- GLCM Algorithm SVM 97.6 % KNN
(2019) Segmentation Proposed 98.56%
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 433
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
120.00%
100.00%
80.00%
60.00%
40.00%
20.00%
0.00%
Figure 7 and Figure 8 represents the result accuracy of deep learning is far more than machine learning
obtained by Machine Learning Technique and Deep technique and its average accuracy rate ranges
Learning Technique respectively. Comparing both between85%-100%.
figures, we can conclude that accurate prediction rate
434 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
120.00%
100.00%
80.00%
60.00%
40.00%
20.00%
0.00%
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 435
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[12]Chopda, J., Raveshiya, H., Nakum, S., & Nakrani, V. (2018, [27]Huang, S., Liu, W., Qi, F. and Yang, K., 2019, August. Development
January). Cotton Crop Disease Detection using Decision Tree and Validation of a Deep Learning Algorithm for the Recognition
Classifier. In 2018 International Conference on Smart City and of Plant Disease. In 2019 IEEE 21st International Conference on
Emerging Technology (ICSCET) (pp. 1-5). IEEE. High Performance Computing and Communications; IEEE 17th
International Conference on Smart City; IEEE 5th International
[13]da Silva Abade, A., de Almeida, A.P.G. and de Barros Vidal, F.,
Conference on Data Science and Systems (HPCC/SmartCity/
2019. Plant Diseases Recognition from Digital Images using
DSS) (pp. 1951- 957). IEEE.
Multichannel Convolutional NeuralNetworks.
[28]Hossain, E., Hossain, M. F., & Rahaman, M. A (2019, February).
[14]de Luna, R. G., Dadios, E. P., & Bandala, A. A. (2018, October).
A color and texture based approach for the detection and
Automated image capturing system for deep learning-based
classification of plant leaf disease using KNN classifier. In 2019
tomato plant leaf disease detection and recognition. In TENCON
International Conference on Electrical, Computer and
2018-2018 IEEE Region 10 Conference (pp. 1414-1419). IEEE.
Communication Engineering (ECCE) (pp. 1- ). IEEE.
[15]Doh, B., Zhang, D., Shen, Y., Hussain, F., Doh, R. F., &Ayepah,
K. (2019, September). Automatic Citrus Fruit Disease Detection [29]Iqbal, Z., Khan, M. A., Sharif, M., Shah, J. H., urRehman, M.
by Phenotyping Using Machine Learning. In 2019 25 th H., & Javed, K. (2018). An automated detection and classification
International Conference on Automation and Computing (ICAC) of citrus plant diseases using image processing techniques: A
(pp. 1-5). IEEE. review. Computers and electronics in agriculture, 153, 12-32.
[16]Durmus, H., Günes, E. O., &K?rc?, M. (2017, August). Disease [30]Jaisakthi, S.M., Mirunalini, P. and Thenmozhi, D., 2019,
detection on the leaves of the tomato plants by using deep learning. February. Grape Leaf Disease Identification using Machine
In 2017 6th International Conference on Agro-Geoinformatics Learning Techniques. In 2019 International Conference on
(pp. 1-5). IEEE. Computational Intelligence in Data Science (ICCIDS) (pp. 1-6).
IEEE.
[17]Ferentinos, K.P., 2018. Deep learning models for plant disease
detection and diagnosis. Computers and Electronics in Agriculture, [31]Jhuria, M., Kumar, A., & Borse, R. (2013, December). Image
145, pp.311-318. processing for smart farming: Detection of disease and fruit
grading. In 2013 IEEE Second International Conference on Image
[18]Fuentes, A., Yoon, S., Kim, S.C. and Park, D.S., 2017. A robust Information Processing (ICIIP-2013) (pp. 521-526). IEEE.
deep- learning-based detector for realtime tomato plant diseases
and pests recognition. Sensors. [32]Kumari, C. U., Prasad, S. J., & Mounika, G. (2019, March). Leaf
Disease Detection: Feature Extraction with K-means clustering
[19]Francis, J., & Anoop, B. K. (2016, March). Identification of leaf and Classification with ANN. In 2019 3rd International
diseases in pepper plants using soft computing techniques. In Conference on Computing Methodologies and Communication
2016 conference on emerging devices and smart systems (ICEDSS) (ICCMC) (pp. 1095- 1098). IEEE.
(pp. 168-173). IEEE.
[33]Kusumo, B. S., Heryana, A., Mahendra, O., & Pardede, H. F.
[20]Fang, Y., & Ramasamy, R. P. (2015). Current and prospective (2018). Machine learning-based for automatic detection of corn-
methods for plant disease detection. Biosensors, 5(3), 537-561. plant diseases using image processing. In 2018 International
[21]Fadzil, W. N. W. M., Rizam, M. B. S., Jailani, R., & Nooritawati, Conference on Computer, Control, Informatics and it Applications
M. T. (2014). Orchid leaf disease detection using border (IC3INA) (pp. 93-97). IEEE.
segmentation techniques. In 2014 IEEE Conference on Systems, [34]Khirade, S. D., & Patil, A. B. (2015). Plant disease detection
Process and Control (ICSP2014) (pp. 168- 173). IEEE. using image processing. In 2015 International conference on
[22]Geetharamani, G., & Pandian, A. (2019). Identification of plant computing communication control and automation (pp. 768-771).
leaf diseases using a nine-layer deep convolutional neural network. IEEE.
Computers & Electrical Engineering, 76, 323-338.
[35]Khan, J. F., Adhami, R. R., & Bhuiyan, S. M. (2008). Color
[23]Gavhale, K. R., Gawande, U., & Hajari, K. O. (2014, April). image segmentation utilizing a customized Gabor filter. In IEEE
Unhealthy region of citrus leaf detection using image processing SoutheastCon 2008 (pp. 539-544). IEEE.
techniques. In International Conference for Convergence for
[36]Loey, M., ElSawy, A., & Afify, M. (2020). Deep Learning in
Technology-2014 (pp. 1-6). IEEE.
Plant Diseases Detection for Agricultural Crops: A Survey.
[24]Gulhane, V. A., &Kolekar, M. H. (2014, December). Diagnosis International Journal of Service Science, Management, Engineering,
of diseases on cotton leaves using principal component analysis and Technology (IJSSMET), 11(2), 41-58.
classifier. In 2014 Annual IEEE India Conference (INDICON)
[37]Le, T. L., Tran, D. T., & Hoang, V. N. (2014, December). Fully
(pp. 1-5). IEEE.
automatic leaf-based plant identification, application for
[25]Gröll, K., Graeff, S. and Claupein, W., (2007). Use of Vegetation Vietnamese medicinal plant search. In Proceedings of the fifth
indices to detect plant diseases. symposium on information and communication technology (pp.
[26]Gibson, G. J., Otten, W., Filipe, J. A., Cook, A., Marion, G., & 146- 154).
Gilligan, C. A. (2006). Bayesian estimation for percolation models [38] Maniyath, S.R., Vinod, P.V., Niveditha, M., Pooja, R., Shashank,
of disease spread in plant populations. Statistics and Computing, N. and Hebbar, R., 2018, April. Plant disease detection using
16(4), 391-402 machine learning. In 2018 International Conference on Design
436 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Innovations for 3Cs Compute Communicate Control (ICDI3C) [50]Pujari, J. D., Yakkundimath, R., & Byadgi, A. S. (2015). Image
(pp. 41-45). IEEE. processing based detection of fungal diseases in plants. Procedia
Computer Science, 46, 1802-1808.
[39]Molina, J. F., Gil, R., Bojacá, C., Gómez, F., & Franco, H. (2014).
Automatic detection of early blight infection on tomato crops [51]Phadikar, S., &Sil, J. (2008, December). Rice disease identification
using a color based classification strategy. In 2014 XIX using pattern recognition techniques. In 2008 11th International
Symposium on Image, Signal Processing and Artificial Vision Conference on Computer and Information Technology (pp. 420-
(pp. 1-5). IEEE. 423). IEEE.
[40]Mewes, T., Waske, B., Franke, J., & Menz, G. (2010, June). [52]Rezende, V.C., Costa, M., Santos, A. and de Oliveira, R.C., 2019,
Derivation of stress severities in wheat from hyperspectral data October. Image Processing with Convolutional Neural Networks
using support vector regression. In 2010 2nd Workshop on for Classification of Plant Diseases. In 2019 8th Brazilian
Hyperspectral Image and Signal Processing: Evolution in Remote Conference on Intelligent Systems (BRACIS) (pp. 705-710).
Sensing (pp. 1-4). IEEE. IEEE.
[41]Meunkaewjinda, A., Kumsawat, P., Attakitmongcol, K., & [53]Ramesh, S. (2018, September). Rice Blast Disease Detection
Srikaew, A. (2008). Grape leaf disease detection from color and Classification Using Machine Learning Algorithm. In 2018
imagery using hybrid intelligent system. In 2008 5th international 2nd International Conference on Micro-Electronics and
conference on electrical engineering/ electronics, computer, Telecommunication Engineering (ICMETE) (pp. 255-259). IEEE.
telecommunications and information technology (Vol. 1, pp. 513-
[54]Reza, Z. N., Nuzhat, F., Mahsa, N. A., & Ali, M. H. (2016,
516). IEEE.
September). Detecting jute plant disease using image processing
[42]Moshou, D., Bravo, C., Oberti, R., West, J., Bodria L., and machine learning. In 2016 3rd International Conference on
McCartney, A., & Ramon, H. (2005). Plant disease detection Electrical Engineering and Information Communication
based on data fusion of hyper- spectral and multi-spectral Technology (ICEEICT) (pp. 1-6). IEEE.
fluorescence imaging using Kohonen maps. Real- Time Imaging, [55]Rothe, P. R., & Kshirsagar, R. V. (2015, January). Cotton leaf
11(2), 75-83. disease identification using pattern recognition techniques. In
[43]Nazki, H., Yoon, S., Fuentes, A., & Park, D. S. (2020). 2015 International Conference on Pervasive Computing (ICPC)
Unsupervised image translation using adversarial networks for (pp. 1-6). IEEE.
improved plant disease recognition. Computers and Electronics [56]Ratnasari, E. K., Mentari, M., Dewi, R. K., & Ginardi, R. H.
in Agriculture, 168, 105117. (2014, September). Sugarcane leaf disease detection and severity
[44]Nema, S., & Dixit, A. (2018). Wheat Leaf Detection and estimation based on segmented spots image. In Proceedings of
Prevention Using Support Vector Machine. In 2018 International International Conference on Information, Communication
Conference on Circuits and Systems in Digital Enterprise Technology and System (ICTS) 2014 (pp. 93-98). IEEE.
Technology (ICCSDET) (pp. 1-5). IEEE. [57]Singh, D., Jain, N., Jain, P., Kayal, P., Kumawat S., & Batra, N.
[45]Orillo, J. W., Cruz, J. D., Agapito, L., Satimbre, P. J., & Valenzuela, (2020). PlantDoc: a dataset for visual plant disease detection. In
I. (2014, November). Identification of diseases in rice plant (oryza Proceedings of the 7th ACM IKDD CoDS and 25th COMAD
sativa) using back propagation Artificial Neural Network. In 2014 (pp. 249-253).
InternationalConference on Humanoid, Nanotechnology, [58]Sehgal, A., &Mathur, S. (2019, June). Plant Disease Classification
Information Technology Communication and Control, Using SOFT COMPUTING Supervised Machine Learning. In
Environment and Management (HNICEM) (pp. 1-6). IEEE. 2019 3rd International conference on Electronics, Communication
[46]Pourazar, H., Samadzadegan, F., & DadrassJ avan, F. (2019). and Aerospace Technology (ICECA) (pp. 75-80). IEEE.
Aerial multispectral imagery for plant disease detection: [59]Shah, N., & Jain, S. (2019, February). Detection of Disease in
radiometric calibration necessity assessment. European Journal Cotton Leaf using Artificial Neural Network. In 2019 Amity
of Remote Sensing, 52(sup3), 17-31. International Conference on Artificial Intelligence (AICAI) (pp.
[47]Prajapati, H. B., Shah, J. P., & Dabhi, V. K. (2017). Detection 473-476). IEEE.
and classification of rice plant diseases. Intelligent Decision [60]Saradhambal, G., Dhivya, R., Latha, S. and Rajesh, R., 2018.
Technologies, 11(3), 357- 373. Plant disease detection and its solution using image classification.
[48]Pantazi, X. E., Moshou, D., Tamouridou, A. A., &Kasderidis, S. International Journal of Pure and Applied Mathematics, 119(14),
(2016, September). Leaf disease recognition in vine plants based pp.879-884.
on local binary patterns and one class support vector machines. [61]Sun, G., Jia, X., & Geng, T. (2018). Plant diseases recognition
In IFIP International Conference on Artificial Intelligence based on image processing technology. Journal of Electrical and
Applications and Innovations (pp. 319- 327). Springer, Cham. Computer Engineering, 2018.
[49]Petrellis, N. (2017, May). A smart phone image processing [62]Siricharoen, P., Scotney, B., Morrow, P., & Parr, G. (2016,
application for plant disease diagnosis. In 2017 6th International September). Texture and shape attribute selection for plant
Conference on Modern Circuits and Systems Technologies disease monitoring in a mobile cloudbased environment. In 2016
(MOCAST) (pp. 1-4). IEEE. IEEE International Conference on Image Processing (ICIP) (pp.
489-493). IEEE.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 437
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[63]Sannakki, S. S., Rajpurohit, V. S., Nargund, V. B., & Kulkarni, P. [70]Tilva, V., Patel, J., & Bhatt, C. (2013). Weather based plant
(2013, July). Diagnosis and classification of grape leaf diseases diseases forecasting using fuzzy logic. In 2013 Nirma University
using neural networks. In 2013 Fourth International Conference International Conference on Engineering (NUiCONE) (pp. 1-5).
on Computing, Communications and Networking Technologies IEEE.
(ICCCNT) (pp. 1-5). IEEE.
[71]Tuhid, N. H., Abdullah, N. E., Khairi, N. M., Saaid, M. F.,
[64]Schikora, M., Schikora, A., Kogel, K. H., Koch, W., &Cremers, Shahrizam, M. S. B., & Hashim, H. (2012). A statistical approach
D. (2010). Probabilistic classification of disease symptoms caused for orchid disease identification using RGB color. In 2012 IEEE
by Salmonella on Arabidopsis plants. INFORMATIK 2010. Control and System Graduate Research Colloquium (pp. 382-
Service Science-NeuePerspektivenfür die Informatik. Band 2. 385). IEEE.
[65]Thomas, S., Kuska, M. T., Bohnenkamp, D., Brugger, A., Alisaac, [72]Wang, G., Sun, Y., & Wang, J. (2017). Automatic image-based
E., Wahabzada, M., & Mahlein, A. K. (2018). Benefits of plant disease severity estimation using deep learning.
hyperspectral imaging for plant disease detection and plant Computational intelligence and neuroscience.
protection: a technical perspective. Journal of Plant Diseases
[73]Wang, H., Li, G., Ma, Z., & Li, X. (2012, October). Image
and Protection, 125(1), 5-20.
recognition of plant diseases based on backpropagation networks.
[66]Too, E. C., Yujian, L., Njuki, S., & Yingchun, L. (2019). A In 2012 5th International Congress on Image and Signal Processing
comparative study of fine-tuning deep learning models for plant (pp. 894- 900). IEEE.
disease identification. Computers and Electronics in Agriculture,
[74]Yadav, R., Rana, Y.K. and Nagpal, S., 2018, November. Plant
161, 272-279.
Leaf Disease Detection and Classification Using Particle Swarm
[67]Tulshan, A.S. and Raul, N., 2019, July. Plant Leaf Disease Optimization. In International Conference on Machine Learning
Detection using Machine Learning. In 2019 10th International for Networking (pp. 294-306). Springer, Cham.
Conference on Computing, Communication and Networking
[75]Zhang, X., Qiao, Y., Meng, F., Fan, C., & Zhang, M. (2018).
Technologies (ICCCNT) (pp. 1-6). IEEE.
Identification of maize leaf diseases using improved deep
[68]Tete, T.N. and Kamlu, S., 2017, September. Plant disease convolutional neural networks. IEEE Access, 6, 30370-30377.
detection using different algorithms. In Proceedings of the Second
[76]Zellnig, G., Möstl, S., & Zechmann, B. (2013). Rapid
International Conference on Research in Intelligent and Computing
immunohistochemical diagnosis of tobacco mosaic virus disease
in Engineering, 10, 103-106).
by microwave- assisted plant sample preparation. Microscopy,
[69]Thangadurai, K., & Padmavathi, K. (2014, February). Computer 62(5), 547-553.
visionimage enhancement for plant leaves disease detection. In
2014 world congress on computing and communication
technologies (pp. 173-175). IEEE.
438 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-This is a project for Apparel Online Easy to pick hard to find products: Online
shopping system. The basic idea is that customers Shopping provides a great chance and helps us to find
can buy products online, the administrator can collectibles and hard to find items, due to a wide range
enter his credentials and create an account and of selection of items which online stores provide.
then generate the receipt of the products
purchased. The Online Shopping system enables No Time Limit: The customers can shop as long
vendors to set up online shops, customers to as they want unless the server of the website is crashed.
browse through the shops, and a system
Price Comparisons: The customers can easily
administrator to approve and reject bidding
requests and maintain lists of product purchases.
compare prices of products through online shopping
Also, the bidding system is also introduced in order as they need not move from one place to know the
to provide an additional chance for the customers price of other stores, this is possible through Internet.
to purchase products which are limited in stock. Reviews: Many online stores provide a facility to
Our online shopping mall will use the internet as give feedback to the products which are purchased by
the sole method for selling goods. Shopping will
them, which helps the new customer to decide whether
be highly personalized and provides lower prices
to buy the product or not. Unlimited
than most competitors. This website will be useful
for anyone who wants to purchase items Selection: Online stores provide more selection of
throughinternet. items than a normal physical shop.
Keywords: Apparel, Bidding Low Price: Online shops doesn't require any
I. INTRODUCTION buildings or warehouses and other facilities such as
workers, electricity etc. which in turn requires a lot of
Online shopping is a process wherecustomers expenditure. Hence, they sell their products at a very
directly buy goods and services over the Internet. With less price in comparison to thenormal shops.
the increase of computer usage and Internet access,
Online Shopping is becoming more popular way of A. Existing System
doingshopping. There are a good number of models existing for
Following are some of the main reasons for online Online Shopping System, but in existing systems, they
shopping to becomepopular: have only basic features of a Shopping websites and
has combination of categories 2 such as Clothing,
Shopping Convenience: These shops are available
Electronics, Sports, Grocery, Body care etc. In existing
24/7 which means customers can shop day and night
systems there is no feature of Bidding.
while relaxing at their home.
Browse instead of Driving: Travelling to different B. Proposed System
shops at different places is an expensive task and The aim of the proposed system is to give a user a
consumes time. In case of Online Shopping, customers user-friendly interface to connect with the new trend
can sit at comfort of their homes and can shop from that evolved around the world. This system is developed
many different shops even if they are located in a different using basic with web development technology and
city or a different country. hiding the essential functionalities that are not necessary
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 439
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
for the users to know. This system is administeredusing can login to the system else the user must register to the
an admin. Here the admin can add several categories system. Then can perform operations such as selecting,
or features to the Fashion Online Shopping System. bidding, order, check bid status, review, etc., The admin
The main feature of this proposed system is to give is eligible to perform operations such as uploading the
feedback and reviews by other customer to know the product, accept or reject the bid, etc.,
quality of the product. The other added feature in this
proposed system is "Bidding". By adding this feature, III. REQUIREMENTS OF PROJECT
we get a solution to the products that are not available D. Hardware Requirements
in our Online Shopping System. If the need for a product
RAM: 1 Gb or more.
is high for the customer, he/she can bid the product and
wait for the response of the admin. If the admin approves Hard disk: 100 Gb or more.
the bid value, the customer can proceed and continue Processor: Any Update Processor.
with the payment to buy the required product.
E. Software Requirements
II. DATAFLOW DIAGRAM
Operating System: Windows Environment.
Technology: Java (1.7/1.8)
Web Technologies: Html, JavaScript, CSS
Web Server: Tomcat 7/8
Server-side Lang: J2EE
Database: DB-2
IV. SOFTWARE TOOLS USED
F. Java
Java is a programming language created by James
Gosling from Sun Microsystems in 1991. The first
publicly available version of Java (Java 1.0) was released
in 1995. Over time new enhanced versions of Java have
Fig.1 Dataflow diagram been released. The current version of Java is Java 1.7
C. Dataflow Diagram Description which is also known as Java 7. From the Java
programming language, the Java platform evolved. The
Data flow diagram is a graphical representation that Java platform allows that the program code is written
depicts information flow and the transforms that are in other languages than the Java programming language
applied as data move from input to output. The basic and still runs on the Java virtual machine.
form of a data flow diagram, also known as a data flow
graph or a bubble chart. Data flow diagram may be G. JavaScript
used to represent a system or software at any level of Java Script is Netscape's cross-platform, object-
abstraction. The transformation of data from input to based scripting language for client server application.
output, through processed, may be described logically JavaScript is mainly used as a clientside scripting
and independently of physical components associated language. This means that JavaScript 4 code is written
with the system. Here the customer can perform two into an HTML page. When a user requests an HTML
operations either registering into the system or login to page with JavaScript in it, the script is sent to the browser
thesystem. If the user is an existing customer, then he and it's up to the browser to do something with it.
440 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
language. Hypertext defines the link between the web VI. CONCLUSION
pages. Markup language is used to define the text
document within tag which defines the structure of web Online shopping is becoming more popular day by
pages. This language is used to annotate text so that a day with the increase in the usage of World Wide Web
machine can understand it and manipulate text known as www. Understanding customer's need for
accordingly. online selling has become challenge for marketers.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 441
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
will help marketers to gain the competitive edge over [2] Amit, B. Sanjoy, Ghose. (2004). A latent class segmentation
analysis of e-shoppers, Journal of Business Research. Vol.57,
others. PP.758- 767.
VII. FUTURE SCOPE [3] Boudraeu, M.C and Watson R.T (2006). "Internet Advertising
Strategy Alignment" Internet Research. Vol.16 (1), PP.23-37
It is suggested to further improve the system reported [4] Cho and Jinsook. (2004). Likelihood to abort an online transaction:
in this study using more variables (e.g., Multilingual Text, Influences from cognitive evaluations, attitudes, and behavioural
Artificial Intelligence - Natural Language Processing variables. Information & Management, Vol.41, PP. 827- 838.
etc.) to get a clearer understanding of their client's needs. [5] Creswell, J.( 1994) Research design: Qualitative and quantitative
A variety of data mining techniques can also be used approaches, London Press: Sage.
by researchers to simplify customer perceptions and [6]Alba, J., Lynch, J., Weitz, B., Janiszewski, C., Lutz, R., Sawyer,
attitudes. Every day, every hour and every minute, tera- A., & Wood, S. (1997). Interactive home shopping: Consumer,
retailer, and manufacturer incentives to participate in electronic
bytes of data gets generated from millions of shoppers, marketplaces. Journal of Marketing, 61, 38-53.
yet retail managers/ business executives always grapple
with relevant information that can help retailers/
researchers design strategies to generate customer
loyalty. Some of the world's largest retailers such as
Wal-Mart, Tesco's, Carrefour etc. utilize this data to
generate certain knowledge that can help them in
modelling and predicting customer behaviour and further
in order to know their customers better.
442 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 443
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Throughput: The throughput of the encryption Table 2Times and Throughput of Encryption and Decryption
scheme is calculated as the total plain text in encrypted Data Encryption Time Decryption Time
Throughput of
Encryption
Throughput of
Decryption
(KB) (In Millisecond) (In Millisecond)
in Kbytes divided by the encryption time in milliseconds. 100 46 31
(Kb/Millisecond)
2.17
(Kb/Millisecond)
3.23
The unit of throughput is MB/Sec. More is the 200
300
62
78
62
78
3.22
3.84
3.23
3.85
throughput; more will be the performance. The 400 110 93 3.64 4.30
500 140 94 3.57 5.31
throughput of the encryption scheme is calculated as 600 141 125 4.25 4.8
700 171 141 4.09 4.96
the ratio of total plain text by encryption time. 800 219 156 3.65 5.13
900 234 171 3.84 5.26
Throughput of Encryption Algorithm = Tp (Kbytes)/ 1024 265
Avg. Time
187 3.86
3.613
5.47
4.554
Et (Milliseconds)
The result of RC6DES reading is same developed
Where; in Java. DES has key size of 56 bits, block size of 64
Tp: Total Plain Text (Kbytes) bits and 16 rounds.RC6 has key size 128 bits( variable
length), block size 128 bits and 18 rounds. So the DES
Et: Encryption Time (Milliseconds) has fixed length key size and RC6 has variable length
Experimental Result-I (DES-Blowfish) of key size. In security view the fusion of this algorithm
is less because DES has less key size. The key size
The following table 1 the Encryption and Decryption increases the security also increases [5] [6]. So we
Time and Throughput for Fusion DES-Blowfish combine Blowfish and RC6 algorithm in experiment-
Algorithm. III.
Table 1Times and Throughput of Encryption and Decryption
Decryption Throughput of Throughput
Experimental Result-III (BlowfishRC6)
Encryption
Data Time Encryption Decryption
Time (In
(KB)
Millisecond)
(In (Kb/Millisecond) (Kb/Millisecond) The following table 3 shows the Encryption and
Millisecond)
100 62 46 1.61 2.17 Decryption Time and Throughput for Fusion Blowfish
200 78 62 2.56 3.23
300 94 78 3.19 3.85
RC6 Algorithm.
400 124 109 3.22 3.66
500 141 109 3.54 4.59
Table 3Times and Throughput of Encryption and Decryption
600 141 125 4.25 4.8 Decryption Throughput of Throughput
700 188 156 3.72 4.48 Encryption
Data Time Encryption Decryption
800 202 171 3.96 4.67 Time (In
(KB) (In (Kb/Millisecond) (Kb/Millisecond)
900 218 187 4.12 4.81 Millisecond)
Millisecond)
1024 280 203 3.65 5.04 100 32 31 3.125 3.23
Avg. Time 3.382 4.13 200 46 32 4.34 6.25
300 78 62 3.85 4.84
The result of existing DES-Blowfish (Published in 400 93 78 4.30 5.13
World of Computer Science and Information 500 109 94 4.58 5.31
600 124 109 4.84 5.50
Technology Journal ISSN: 2221-0741 vol. 1 No. 3 700 156 124 4.48 5.64
800 156 141 5.13 5.67
88-91 2011) is develop in VB and above reading is 900 187 156 4.81 5.76
same developed in Java. DES has key size of 56 bits, 1024 218 172 4.69 5.95
Avg. Time 4.4145 5.328
block size of 64 bits and 16 rounds. Blowfish has key
size 128 bits (variable length), block size 64 bits and The above table 3shows the encryption and
16 rounds. So the DES has fixed length key size and decryption time is more superior to above experimental
Blowfish has variable length of key size. In security view result- I and II
the fusion of this algorithm is low level of data security Result Discussion of Fusion algorithms
because of key size [4].
The following table 4 shows throughput of encryption
Experimental Result-II (DES-RC6) and throughput of decryption of DES-Blowfish, DES-
The following table 2 shows the Encryption and RC6 and BlowfishRC6 algorithms.
Decryption Time and Throughput for Fusion DES-RC6
Algorithm.
444 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
CONCLUSION
The result suggests that the decryption time and the
throughput of decryption time for BlowfishRC6 are
better of existing than DES-Blowfish and DESRC6
algorithm. Due to its minimum encryption and maximum
decryption throughput it gives better performance. It is
shown graphically in figure 1.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 445
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Human creatures have a normal people to communicate more effectively with each other
capacity to see, tune in and connected with the and with normal people.This non-verbal language
outside environment. Tragically, there are a few contains special rules and grammar’s for expressing
individuals who are differently abled and don’t have effectively [2].
the capacity to utilize their senses to the leading
degree conceivable. They communicate with others Sign language could be a sort of dialect that uses
using their hand gestures and the facial hand movements, facial expressions and body dialect
expressions. We proposed the technique using to communicate with others. It is most important by the
glove which can change over communication via deaf and people who can hear but cannot speak
gestures to discourse yield. Some people are easily [3].Sign languages are the native languages of the
to get the information from their motions. The Deaf and dumb community and they provide full access
remaining people are not able to understand their
to communication. The impaired people sign languageis
way of conveying the message. In arrange to
overcome the complexity; the artificial mouth
encompassed by numerous myths and misinterpretations
speaker is presented for the dumb people which
are based on the movement sensor. According to
the dumb people, for every motion they have a
meaning and database stores the templates. The
template database is given it to the microcontroller
and the motion sensor is fixed in their hand. The
motion sensors get accelerated and give the signal
to the microcontroller, then it matches the motion
with the database to produce the speech signal and
displays the output in serialmonitor.
Keywords: Hand gloves, Microcontroller, LCD
display, Speaker, Sensors. Typically Sign recognition is related as image
understanding. This poses a genuine communication
I. INTRODUCTION between the deaf community and the rest of the society,
The sign language is an important way of as a problem yet to be fully solved.
communication for deaf-dumb people. In sign language II. RELATEDWORKS
each hands movement has a specific meaning. So, the
complex meanings can be explained by the help of Sign dialect plays a major role for dump people to
combination of various basic elements. Sign language communicate with ordinary people. It is very complicate
is a gesture-based language used to communicate with for mute people to convey their message to normal
the deaf and dumb people [1]. It is a non-verbal people. So, the solution for this problem is to convert
language that is commonly used by deaf and dumb the sign language into speech output[4].
446 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The Support Vector Machine paper gives a premise the handssign language into an oral language. The device
for the improvement of sign language acknowledgment is connected to a glove on the inside, with flex sensors
framework, utilizing support vector machine, where the in each finger, and data is collected and processed using
signs displayed by dumb people will be converted into a methodology that includes the following stages:
an observable format for a blind person [5]. (i) KS data adjustment, (ii) comparison of model’s
Every day we are watching many people who are choice between CHC evolutionary Algorithm and
facing illness like deaf, dumb and blind etc. They face Decremental decrease Optimization Procedure3 to
difficulty to interact with others. It explains a new characterize the finest one. Hence, the K- Nearest
technique of virtual talking without sensors. An image Neighbours (KNN) as classifier (iii) is actualized [10].
processing technique called Histogram of gradient
(HOG) along with artificial neural network (ANN)has III. EXISTINGSYSTEM
been used to train the System[6]. In existing framework, the module was created for
Impaired people face many problems in dumb person utilizing flex sensor, there user hand is
communicating with normal people with difficulties in connected with the flex sensors. On this module the
dealing with the communication technology. The goal flex sensor responds to bend each finger individually.
of this paper is to design a desktop human computer The previous system comprises of flex sensor interfaces
interface application that is used to facilitate on fingers and the message will be sent to the mobile
communication between normal people, “deaf/dumb” based on the flex sensed in each finger. Each flex sensor
and blind people[7]. will have a particular message. User can give less signs,
it is not flexible to operate, this system had some time
Sign language recognition mainly addresses to delay will happen in sending message, this system
facilitate deaf and dumb person’s life style. The proposed expense is more, sometimes, this system does not
system captures a hand gesture using camera. Image produce message correctly, and power consumption is
processing of captured gesture is done. Amplified audio high. These are some of the cons in the existing system.
corresponding to each processed gesture is the output
of this paper[8]. IV. OUR MODEL
Sign language is complex to understand but the To overcome the above problems, we proposed a
complete language which involves the hand’s movement, system, the values are obtained using MEMS sensor
facial expressions, and body movements. Sign language and Flex sensor which is more flexible and accurate for
plays an important core communication media to the measuring hand movements. By taking the value, the
people which cannot speak. It is not a universal language microcontroller starts to react with speech, each MEMS
because every country has its own sign language. Every sensor ANGLE holds unique voice stored in kit and
nation has it’s possessed language structure for their for each sign it will play unique voice output. The goal
sign language, word orders and pronunciation. The of this project is to develop a device that recognizes
issues arise when people try to communicate by using sign language and allows people with speech
their sign language with the people who are unaware of impairments to communicate with others who don’t have
this language grammar. To detect the sign language by it, as a result, the communication gap between them
using the hand gestures and then converted into textual will be narrowed.Hand gestures are significant because
or verbal form which will can be understood by any they represent the user’s views in less time than other
person i.e., recognizes the result for each sign[9]. gestures (arm, face, head, and body).Through When
compared to existing systems, users can provide more
We present an electronic glove system that is able signs, allowing for easier interaction between deaf and
to detect numbers of sign language in order to automate dumb people, it is flexible to operate and wear, these
the process of communication between an impaired systems have voice playback also, power consumption
persons and normal persons. This is done by translating
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 447
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
448 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
In fig:3, we interfaced Arduino with the MEMS [3] Channaiah Chandana K, Nikhita K, Nikitha P3, Bhavani N K,
Sudeep J, “Hand Gestures Recognition System for Deaf, Dumb
sensor and if we changed the angle mean it was showed and Blind People”. International Journal of Innovative Research
output in serial monitor. in Computer and Communication Engineering, May2017.
[4] S. Vigneswaran, “Hand Gesture Recognition and Voice Conversion
System for Dump People”, 2019 IEEE 5 th International
Conference on Advanced Computing and Communication
System(ICACCS).
[5] K. Revanth, “Comprehensive SVM based Indian Sign Language
Recognition”, 2019 IEEE International Conference on System,
Computation, Automation & Networking (ICSCAN).
[6] Hema B N, Sania Anjum, Umme Hani, “Sign Language and Gesture
Fig 3: Interface MEMS sensor with Microcontroller Recognition for Deaf and Dumb people”. International Research
In fig:4, we interfaced both the module and we Journal of Engineering & Technology (IRJET), Mar 2019.
checked it was working are not. If it is working well, [7] Reda, M. M., Mohammed, N. G., & Abdel Azeem Abul Seoud,
R. A, “SVBiComm: Sign-Voice Bidirectional Communication
the 8channel voice play back also interfaced and System for Normal, “Deaf/Dumb” and Blind People based on
checked basedon inputs of flex & mems sensor, it will Machine Learning”, 2018 1 st International Conference on
produce the voice output byspeaker. Computer Applications & Information Security(ICCAIS).
[8] Prof. SupriyaPawar, “Real Time Sign Language Recognition using
Python”. International Journal of Innovative Research in
Computer and Communication Engineering, Mar2018.
[9] Aishwarya Jawalkar, Samarth Sathe, SulaxmiRaskar, “Two Way
Communication Systems using Speech and Sign Language:
Survey”. ISSN:2321-9653; IC Value:45.98; SJ Impact
Factor:6.887 Volume 7, Issue 1, Jan 2019.
[10]Paul D. Rosero-Montalvo, Pamela Godoy-Trujillo, Edison
Flores-Bosmediano (2018) IEEE. “Sign Language Recognition
Based on Intelligent Glove Using Machine Learning Techniques”.
Fig 4: Voice playback
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 449
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[11]Geethu G Nath, Anu V S, “Embedded Sign Language Interpreter [14]Ashish G. Bairagi, Y. D. Kapse, “Survey on Sign Language to
System for Deaf and Dumb people”, 2017 International Speech Conversion”, Jan 2018 International Journal of Innovative
Conference on Innovation in Information Embedded and Research in Computer and Communication Engineering.
Communication System(ICIIECS).
[15]Rajesh George Rajan, M Judith Leo, “A Comprehensive Analysis
[12]Shivashankara Ss, “American Sign Language Recognition System: on Sign Language Recognition System”, Mar 2019 International
An Optimal Approach”, 2018 International Journal of Image, Journal of Recent Technology and Engineering(IJRTE).
Graphics and Signal Processing.
[13]Mahesh Kumar N B, “Conversion of Sign Language into Text”,
2018 International Journal of Applied Engineering Research.
450 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-Differential diagnosis of Erythmato- planus, pityriasis rosea, chronic dermatitis, and pityriasis
Squamous Diseases (ESD) is a major challenge in rubra pilaris are the six types of ESD. The disease usually
the field of dermatology. Histopathological tests and causes skin redness (also known as erythema), which
clinical tests are very much time consuming, is caused by the loss of skin cells, specifically squamous
expensive, and difficult for dermatologists to detect
cells. The most common causes are either genetic or
the disease easily. Various bioinformatics based
studies have been conducted to predict the disease
environmental factors. The disease is most common
but accuracy has remained the major challenge in during certain stages of life, such as late childhood or
all those studies. In this paper, we have proposed early adolescence. The problem of differential diagnosis
a random forest based machine learning model to is regarded as a difficult one in dermatology because
detect a particular case of Erythmato-Squamous one disease type may exhibit features of another at the
Disease more accurately. The model has been outset, but in later stages, it has its own distinct
evaluated based on different performance metrics characteristics. The problem becomes more difficult as
like Accuracy, Sensitivity and Specificity. To make they share many histopathological and clinical features
sure that model is reliable we conducted K-fold [2]. In order to perform the disease diagnosis, usually
cross validation technique. The dataset for the clinical and histopathological checks are performed on
problem has been retrieved UCI Machine
patients. Non-invasive examination of symptoms such
Learning repository maintained by Center for
Machine Learning and Intelligent Systems at the as size, location, and presence of colour, pustules, and
University of California, Irvine. The model shall of other features is used in clinical tests. Histopathological
great help to dermatologist to predict the particular tests necessitate the extraction of skin samples, i.e.,
class of the disease efficiently. biopsies, in order to identify the most likely viral sources.
Such an approach is very much time consuming,
Keywords- Machine Learning; Classification;
Random Forest; Classifier; Dermatology; expensive, and difficult for dermatologists to detect the
Erythmato-Squamous Diseases. disease easily. According to the literature, the differential
diagnosis of ESDs is widely discussed as a Machine
I. INTRODUCTION Learning problem. Machine learning in healthcare is
The skin is the largest organ in the human body, becoming more widely used nowadays. In this paper,
covering a 20-square-foot area. The skin protects us we have proposed a machine learning model based on
from heat, cold, UV radiation, infections and aids in random forest to detect a particular case of Erythmato-
the production of vitamin D and regulation of body Squamous Disease efficiently and accurately.
temperature. Among other diseases skin disease is one II. LITERATURE REVIEW
of the most common diseases these days. One such
disease which is posing a great challenge to Several studies have been done using different
dermatologists is Erythmato-Squamous Diseases machine learning techniques to predict a class
(ESD) [1]. Differential diagnosis of Erythemato- Erythmato-Squamous Diseases (ESD). The studies
Squamous Diseases (ESD) is a significant challenge in conducted are illustrated in table 1.
dermatology. Psoriasis, seboreic dermatitis, lichen
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 451
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
452 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 453
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
TABLE III [2] Maghooli, K., Langarizadeh, M., Shahmoradi, L., Habibi-
5-FOLD CROSS VALIDATION RESULTS Koolaee, M., Jebraeily, M., & Bouraghi, H. (2016). Differential
Diagnosis of Erythmato-Squamous Diseases Using Classification
Run No. Accuracy and Regression Tree. Acta informatica medica: AIM: journal of
1 99.01% the Society for Medical Informatics of Bosnia & Herzegovina:
2 99.23% casopis Drustva za medicinsku informatiku BiH, 24(5), 338-
3 98.78% 342. https://doi.org/10.5455/aim.2016.24.338-342.
4 99.10% [3] Chang CL, Chen CH. Applying decision tree and neural network
5 98.88% to increase quality of dermatologic diagnosis. Expert Systems
Average with Applications. 2009 Mar 1; 36(2):4035-41.
99.00%
Accuracy [4] Polat K, Güne? S. A novel hybrid intelligent method based on
C4. 5 decision tree classifier and oneagainst-all approach for
V. CONCLUSION multi-class classification problems. Expert Systems with
Applications. 2009 Mar 1; 36(2):1587-92.
In this study, a prediction model based on random
forest for the prediction of a particular case of [5] Übeyli ED. Combined neural networks for diagnosis of
erythemato-squamous diseases. Expert Systems with
Erythmato-Squamous Disease has been proposed. The Applications. 2009 Apr 1; 36(3):5107-12.
dataset used in the current study for the examination of
[6] Übeyli ED, Do?du E. Automatic detection of erythemato-
skin diseases and to classify various types of squamous diseases using k-means clustering. Journal of medical
Erythematous-Squamous diseases (ESD) was obtained systems. 2010 Apr 1; 34(2):179-84.
from the UCI Machine Learning. The proposed model [7] Lekkas S, Mikhailov L. Evolving fuzzy medical diagnosis of
efficiently and accurately predicts the particular case of Pima Indians diabetes and of dermatological diseases. Artificial
Intelligence in Medicine. 2010 Oct 1; 50(2):117-26.
ESD. The model achieved an accuracy of 99.13% on
the test dataset. The robustness of the proposed model's [8] Xie J, Wang C. Using support vector machines with a novel
hybrid feature selection method for diagnosis of erythemato-
robustness as well as overfitting and underfitting was squamous diseases. Expert Systems with Applications. 2011
evaluated using repeated 5-fold cross-validation May 1; 38(5):5809-15.
technique and an average accuracy of 99.00% was [9] Amarathunga AA, Ellawala EP, Abeysekara GN, Amalraj CR.
recorded. Expert system for diagnosis of skin diseases. International Journal
of Scientific & Technology Research. 2015 Jan; 4(01):174-8.
REFERENCES [10]Vikas Chaurasia, Saurabh Pal. Skin Diseases Prediction: Binary
[1] A. M. Elsayad, M. Al-Dhaifallah and A. M. Nassef, "Analysis Classification Machine Learning and Multi Model Ensemble
and Diagnosis of Erythemato-Squamous Diseases Using CHAID Techniques. Research J. Pharm. and Tech 2019; 12(8):3829-3832.
Decision Trees," 2018 15th International Multi-Conference on Doi: 10.5958/0974-360X.2019.00656.5.
Systems, Signals & Devices (SSD), 2018, pp. 252-262, doi: [11]Dua, D. and Graff, C. (2019). UCI Machine Learning Repository
10.1109/SSD.2018.8570553. [http://archive.ics.uci.edu/ml]. Irvine, CA: University of
California, School of Information and Computer Science.
454 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: Machine learning is an application of It is the learning in which machine can learn by its
Artificial intelligence that provides systems the own without being explicitly programmed. It is an
ability to automatically learn and improve from application of AI that provide system the ability to
experience without being explicitly programmed. automatically learn and improve from experience. Here
It focuses on the development of computer
we can generate a program by integrating input and
programs that can access data and use it learn for
themselves. If programming is automation, then
output of that program.
machine learning is automating the process of ML is a subset of AI. ML refers to systems that can
automation. It consists of Supervised learning, learn by themselves. ... Deep Learning is ML but applied
unsupervised learning, semi-supervised learning to large data sets. Most AI work now involves ML
and reinforcement learning . In this paper because intelligent behavior requires considerable
discussed about 5 essential Machine Learning
knowledge, and learning is the easiest way to get that
techniques. The main role of Machine Learning
algorithms use historical data as input to predict
knowledge.
new output values. Artificial intelligence as a field actually includes a lot
Keywords: Machine Learning, Deep Learning, more than machine learning, it's just that recently a lot
Supervised learning, unsupervised learning, semi- challenges that were considered very hard have been
supervised learning, Reinforcement learning solved using ideas from machine learning. Machine
learning is actually used for many applications that might
I. INTRODUCTION not be thought of as artificial intelligence. It is also one
Machine learning automates analytical model of the principal technologies underpinning *data
building. It uses methods from neural networks, science*.Machine learning (and deep learning) definitely
statistics, operations research and physics to find hidden helps to develop "AI," however, AI doesn't necessarily
insights in data without being explicitly programmed have to be developed using machine learning - although,
where to look or what to conclude. A neural network machine learning makes "AI" much more convenient
is a kind of machine learning inspired by the workings network.
of the human brain. It's a computing system made up of Machine learning is an application of artificial
interconnected units (like neurons) that processes intelligence (AI) that enables systems to learn and
information by responding to external inputs, relaying advance based on experience without being clearly
information between each unit. The process requires programmed. Machine learning focuses on the
multiple passes at the data to find connections and derive development of computer programs that can access
meaning from undefined data. data and use it for their own learning.
Machine learning is an application of artificial Artificial Intelligence and Machine Learning are much
intelligence (AI) that provides systems the ability to trending and also confused terms nowadays. Machine
automatically learn and improve from experience without Learning (ML) is a subset of Artificial Intelligence. ML
being explicitly programmed. It focuses on the is a science of designing and applying algorithms that
development of computer programs that can access are able to learn things from past cases. If some
data and use it learn for themselves. behaviour exists in past, then you may predict if or it
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 455
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
can happen again. Means if there are no past cases There are four types of machine learning:
then there is no prediction. Supervised learning: (also called inductive
Artificial Intelligence and Machine Learning are much learning) Training data includes desired outputs. This is
trending and also confused terms nowadays. Machine spam this is not, learning is supervised.
Learning (ML) is a subset of Artificial Intelligence. ML Unsupervised learning: Training data does not
is a science of designing and applying algorithms that include desired outputs. Example is clustering. It is hard
are able to learn things from past cases. If some to tell what is good learning and what is not.
behaviour exists in past, then you may predict if or it
can happen again. Means if there are no past cases Semi-supervised learning: Training data includes
then there is no prediction. a few desired outputs.
ML can be applied to solve tough issues like credit Reinforcement learning: Rewards from a
card fraud detection, enable self-driving cars and face sequence of actions. AI types like it, it is the most
detection and recognition. ML uses complex algorithms ambitious type of learning.
that constantly iterate over large data sets, analyzing Supervised learning is the most mature, the most
the patterns in data and facilitating machines to respond studied and the type of learning used by most machine
different situations for which they have not been explicitly learning algorithms. Learning with supervision is much
programmed. The machines learn from the history to easier than learning without supervision.
produce reliable results. The ML algorithms use
There are mainly 3 major areas of ML:
Computer Science and Statistics to predict rational
outputs. Supervised Learning
In supervised learning, training datasets are provided
to the system. Supervised learning algorithms analyse
the data and produce an inferred function. The correct
solution thus produced can be used for mapping new
examples. Credit card fraud detection is one of the
examples of Supervised Learning algorithm.
Unsupervised Learning
Unsupervised Learning algorithms are much harder
because the data to be fed is unclustered instead of
datasets. Here the goal is to have the machine learn on
its own without any supervision. The correct solution
of any problem is not provided. The algorithm itself
finds the patterns in the data. One of the examples of
supervised learning is Recommendation engines which
are there on all e-commerce sites or also on Facebook
friend request suggestion mechanism.
Reinforcement Learning
This type of Machine Learning algorithms allows
software agents and machines to automatically determine
the ideal behaviour within a specific context, to maximise
its performance. Reinforcement learning is defined by
456 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
characterising a learning problem and not by Logistic regression is considered the simplest and
characterising learning methods. Any method which is most basic classification algorithm. A logistic regression
well suited to solve the problem, we consider it to be algorithm can take more than one input, and use the
the reinforcement learning method. Reinforcement data to estimate the probability of an event occurring.
learning assumes that a software agent i.e. a robot, or a An interesting use of this algorithm can be seen in
computer program or a bot, connect with a dynamic predicting university admittance results. The algorithm,
environment to attain a definite goal. This technique in this case, analyzes two test scores to estimate the
selects the action that would give expected output university admittance probability.
efficiently and rapidly. The output is a probable number between zero and
5 Essential Machine Learning Techniques are : (I) one. The number 'one' represents absolute certainty in
REGRESSION, (2)CLASSIFICATION, (3) the admittance of the student, but any number greater
CLUSTERING, (4) DECISION TREES,(5) than 0.5 predicts the student will be accepted by the
NEURAL NETWORKS university.
II. REGRESSION IV. CLUSTERING
Regression methods are used for training supervised Clustering algorithms are unsupervised learning
ML. The goal of regression techniques is typically to methods. A few common clustering algorithms are K-
explain or predict a specific numerical value while using means, mean-shift, and expectation-maximization. They
a previous data set. For example, regression methods group data points according to similar or shared
can take historical pricing data, and then predict the characteristics.
price of a similar property to retail demand forecasting. Grouping or clustering techniques are particularly
Linear regression is considered the simplest and most useful in business applications when there is a need to
basic method. In this case, a dataset is modeled using segment or categorize large volumes of data. Examples
the following equation: include segmenting customers by different characteristics
(y=m*x+b) to better target marketing campaigns, and
recommending news articles that certain readers will
It is possible to train a regression model with multiple enjoy. Clustering is also effective in discovering patterns
pairs of data, such as x, y. To do this, you need to in complex data sets that may not be obvious to the
define a position, as well as the slope of the line, with a human eye.
minimal distance from all known data points. This is the
line that best approximates the observations in the data, V. DECISION TREES
and can help make predictions for new unseen data. The decision tree algorithm classifies objects by
III. CLASSIFICATION answering "questions" about their attributes located at
the nodal points. Depending on the answer, one of the
Classification algorithms can explain or predict a branches is selected, and at the next junction, another
class value. Classification is an essential component for question is posed, until the algorithm reaches the tree's
many AI applications, but it is especially useful for "leaf", which indicates the final answer.
eCommerce applications. For example, classification
algorithms can help predict if a customer will purchase Decision tree applications include knowledge
a product, or not. The two classes in this case are "yes" management platforms for customer service, predictive
and "no". Classification algorithms are not limited to pricing, and product planning.
two classes and can be used to classify items into a A typical example of decision trees is identifying the
large number of categories. insurance premium that should be charged based on an
individual's situation. The decision tree can define a
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 457
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
458 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Network security has become more prevent and monitor unauthorized access, modification
important to computer users, organizations and the in system, misuse, or denial of a computer network and
military. With the advent of the internet, security network-accessible resources.
became a major concern and the history of security
allows a better understanding of emergence of II. IMPORTANCE OF NETWORK
security technology. The entire field of network SECURITY
security is vast and in an evolutionary stage. The
range of study encompasses a brief history dating System and network technology is a key technology
back to internet's beginnings and the current for a wide variety of applications. Security is crucial to
development in network security. This paper aims networks and applications. Although, network security
to provide a broad review of network security and is a critical requirement in emerging networks, there is
also elaborates the literature study on network a significant lack of security methods that can be easily
security. implemented.
Keywords - Network Security, Cloud Computing, There exists a "communication gap" between the
Sensor Networks, Internet of Things, developers of security technology and developers of
Authentication, Confidentiality. network. The protocols of different layers can be easily
I. INTRODUCTION combined to create stacks which allow modular
development. The implementation of individual layers
The world is becoming more interconnected with can be changed later without making other adjustment.
the advent of the internet and new technologies. There allowing flexibility in development Network security
is a large amount of personal, commercial, military and does not only concern the security in the computers at
government information on networking infrastructures each end of the communication chain When. developing
worldwide. Network security is becoming great a secure network, the following need to be considered:
importance because of intellectual property that can be
easily acquired through the internet. 1. Access:
Network Security is a broad term that covers a Authorized users are provided the means to
multitude of technologies, devices and processes. In its communicate to and from a particular network.
simplest term, it is a set of rules. Basically network
2. Confidentiality:
security involves the authorization of access to data in
a network, which is controlled by the network admin. Information in the network remains private.
It has become more important to personal computer
3. Authentication:
users, and organizations. If this authorized, a firewall
forces to access policies such as what services are Ensure the users of the network are who they say
allowed to be accessed for network users. So that to they are.
prevent unauthorized access to system, this component
4. Integrity:
may fail to check potentially harmful content such as
computer worms or Trojans being transmitted over the Ensure the message has not been modified in transit.
network. Network security consists of the provisions
and policies adopted by a network administrator to
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 459
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
2. Modification: When malicious node performs some 2. Eavesdropping: This is a passive attack, which
modification in the routing route, so that sender sends occurred in the mobile ad-hoc network. The main
the message through the long route. This attack cause aim of this attack is to find out some secret or
communication delay occurred between sender and confidential information from communication. This
receiver. secrete information may be privet or public key of
sender or receiver or any secrete data.
3. Wormhole: This attack is also called the tunnel
attack. In this attack an attacker receives a packet 3. Monitoring: In this attack in which attacker can
at one point and tunnels it to another malicious node read the confidential data, but he cannot edit the data
in the network. So that a beginner assumes that he or cannot modify the data .
found the shortest path in the network.
IV. ATTACKS ON AUTHENTICATION
4. Fabrication: A malicious node generates the false
routing message. This means it generate the incorrect
Authentication is the process of verifying the identity
information about the route between devices. of a given user or client. In other words, it involves
making sure that they really are who they claim to be.
5. Denial of services: In denial of services attack, At least in part, websites are exposed to anyone who
malicious node sending the message to the node and
is connected to the internet by design. Therefore, robust
consume the bandwidth of the network. The main
aim of the malicious node is to be busy the network
authentication mechanisms are an integral aspect of
node. If a message from unauthenticated node will effective web security.
come, then receiver will not receive that message There are three authentication factors:
because he is busy and beginner has to wait for the
receiver response. • Something you know such as a password or the
answer to a security question. These are sometimes
6. Sinkhole: Sinkhole is a service attack that prevents referred to as "knowledge factors".
the base station from obtaining complete and correct
information. In this attack, a node tries to attract the
460 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• Something you have, that is, a physical object like a 1. Access control:
mobile phone or security token. These are sometimes
If threat actors can't access your network, the
referred to as "possession factors".
amount of damage they'll be able to do will be extremely
• Biometrics or patterns of behaviour. These are limited. But in addition to preventing unauthorized
sometimes Something you are or do, for example, access, be aware that even authorized users can also
your referred to as "inherence factors". be potential threats. Access control allows you to
increase your network security by limiting user access
and resources to only the parts of the network that
directly apply to individual users' responsibilities.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 461
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
5. Data loss prevention (DLP): segmentation allows you to grant the right access to the
Often, the weakest link in network security is the right traffic, while restricting traffic from suspicious
human element. DLP technologies and policies help sources.
protect staff and other users from misusing and possibly 11. Security information and event management
compromising sensitive data or allowing said data out (SIEM):
of the network.
Sometimes simply pulling together the right
6. Email security: information from so many different tools and resources
As with DLP, email security is focused on shoring can be prohibitively difficult - particularly when time is
up human-related security weaknesses. Via phishing an issue. SIEM tools and software give responders the
strategies (which are often very complex and data they need to act quickly.
convincing), attackers persuade email recipients to 12. Virtual private network (VPN):
share sensitive information via desktop or mobile
device, or inadvertently download malware into the VPN tools are used to authenticate communication
targeted network. Email security helps identify between secure networks and an endpoint device.
dangerous emails and can also be used to block attacks Remote-access VPNs generally use IPsec or Secure
and prevent the sharing of vital data. Sockets Layer (SSL) for authentication, creating an
encrypted line to block other parties from
7. Endpoint security: eavesdropping.
The business world is becoming increasingly bring 13. Web security:
your own device (BYOD), to the point where the
distinction between personal and business computer Including tools, hardware, policies and more, web
devices is almost non-exist. Unfortunately, sometimes security is a blanket term to describe the network
the personal devices become targets when users rely security measures businesses take to ensure safe web
on them to access business networks. Endpoint security use when connected to an internal network. This helps
adds a layer of defence between remote devices and prevent web-based threats from using browsers as
business networks. access points to get into the network.
462 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 463
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
464 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 465
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
also for storing data it is very useful. Asaresult,in the communicatingapplications, high developed software's
field of medical also the use of cloud computing is at and also by the ideologicalthoughts spread through
high range. It is used by the specialists for surgery worldwideweb.
purpose for therapy, operations, etc. With the help of
cloud computing the internal structure of body could
be display in easy manner and which helps the doctors
to do their task more specifically and appropriately.
Many of the companies are using cloud computing for
their operation and as per the study the level of
healthcaresectorwouldalsobeincreasedinupcomingdays.
There are two ways of building IOT:
1. Form a separate internetwork including only physical
objects.[1]
Figure 2: cloud Data
2. Make the Internet ever more expansive, but this
requires hard-core technologies such as rigorous cloud III. MAIN APPLICATION OF IOT IN
computingandrapidbigdatastorage(expensive).[1] MEDICALFIELD
II. CLOUD & HEALTHCARE In the hospitals and also in various other field of
health sector the main challenge faced is the storing of
medical data, at the most for X-ray, images and other
related pictorial data. At the date many of the Healthcare
locations are having their own Picture Archival and
Communication Systems (PACS) due to this they are
archiving the records related to any of patient. As it is
beneficial but it also consists of one drawback namely
the high cost for storage, it goes up to billions of
terabytes of the records. As the solution for this issue
have also been discovered that is the cloud which
provides storage-as-a- service. As a result, many of
the specialists can see the x-rayof their patient at any of
Figure 1: Common IOT HEF platform including local storage
the location viaINTERNET.
and cloud storage platforms
466 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
without any specific implications is going to be counter submitted in easy and simple manner. Due to IOT it
productive in the healthcare Industry. The two examples has made the specialist to be more careful and to be in
mentioned are just a minute part which has been utilized contact with their patients and to keep them always
but for sure in the upcoming duration there would be active regarding their health and services. The collection
more sectors in healthcare would access this (cloud) in done by the IOT appliances made it easier to the
the healthcare. The main motive of healthcare physicians to study the patient's problem and to give
organizations is to provide a proper care, high them the best treatment to receive the best result in the
technology in short, the business for the betterment of patients'health.
the people.
C. IOT for Hospitals
Rather than offering the cloud as a cover to just earn
money in healthcare industry they should provide a time Rather than monitoring patients' health, there are
to spend of its beneficial part which can help to develop many other areas where IOT devices are very useful in
the healthcare system and should offer in that manner hospitals. IOT devices attached with sensors which are
or else the cloud accessing level would be low only in used for tracking real time location of medical
the healthcare sector as compare to other service equipment like wheelchairs, defibrillators, nebulizers,
sectors. oxygen pumps and other monitoring equipment.[1]
Efficiency of medical staff at different locations can also
IV. USE OF IOT IN HEALTHCARESECTOR be analysed at the time.
A. IOT forPatients The spread of infections is a major issue for patients
in hospitals. IOT-enabled hygiene monitoring devices
Devices in the form of wearables like fitness bands help in preventing patients from getting infected. IOT
and other wirelessly connected devices like blood devices also help in asset management like pharmacy
pressure and heart rate monitoring cuffs, glucometer inventory control, and environmental monitoring, for
etc. give patients access to modified attention. These instance, checking refrigerator temperature, and
devices can be tuned to remind calorie count, exercise humidity and temperature control [1].
check, blood pressure variations, heartbeat rate and
much more. D. IOT for Health InsuranceCompanies
IOT has changed the lifestyle of the people's The various types of chances are given and operated
especiallyelderly ones; it provides the quick respond by the health insurers e.g. IOT connected intelligence
to their problems and to be solving them in convenient devices. Insurance companies can influence data
duration. With the help of IOT if there occurs any of captured through health monitoring devices for their
mis-match to the regular health treatment then an alert underwriting and claims operations.[1] This data will
mechanism is been delivered to the family members and enable them to detect fraud claims and identify
also to the health providers due to which the situation prospects for copywriting. IOT devices bring direct
could be taken under cover easily and also by saving connectivity between insurers and customers in the
thetime. underwriting, pricing, claims handling, and risk
assessment processes. In the light of IOT-captured
B. IOT forPhysicians data-driven decisions in all operation processes,
With the help of the various equipment's mentioned customers will have appropriate visibility into underlying
by the IOT such as home monitoring and other wearable thought behind every decision made and process
devices it has become easy to the physicians to handle outcomes.
their patient more easily and conveniently. The patient's The insurers might offer the reward for the customers
loyalty can be seen by the physicians regarding their for using the IOT appliances to keep their regular
treatment any if any sudden help require could be activities on the right track and to follow all healthcare
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 467
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
treatments properly. Due to which the claims of the performance of the specialists and patient experience
insurers get reduce easily and significantly. Due to the for healthcare.
information stored by the insurers with the help of IOT The major advantages of IoT in healthcare consist
helps the company to increase their claims. of as followspoints:
• Price Reduction: IOT provides patient monitoring
in real time, thus significantly cutting down
unnecessary visits to doctors, hospital stays andre-
admissions
• Modified Treatment: It enables physicians to make
evidence-based informed decisions and brings
Figure 4: Format of Data Science absolute change in the patients'health.
468 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
VI. FUTURE SCOPES OF IOT connectivity software's or functions in the devices allow
INHEALTHCARE hospital personnel to spot early signs of illness in the
patients.
A. RemoteMonitoring
Customized software and devices will read data from C. Data Analysis
medical cards of patients in real time and help doctors IOT devices can collect report and analyses the
in conducting a better analysis of patient's health [4]. extensive data collected in short time, deleting the need
of its storage. Which would allow healthcare providers
B. Wearables in focusing on exact data required to treat the patient?
Different gadgets that can regularly monitor for daily Due to this data driven signs it would speed up and
activities of the patients and store the data that is make it easy for the doctors to do the decision-making
available in the market. These devices inform patients task for their patient.
about their physical activities. They can also help in
preventing emergency, as patient's information would D. Alerts andTracking
be sent to the doctor immediately [4]. Timely alerts can be critical in case of life-threatening
circumstances. IOT allows medical devices to gather
C. High QualityMonitoring essential data and transfer it to doctors in real time.
Due to an IOT can help in providing functions and The reports provide perfect opinion on the patient's
controllers to various important equipment in the condition, irrespective of location or time [4].
hospital. As the equipment are critical while treatment,
any defect in them can be fatal. Connecting these devices E. LowerCosts
will enable the staff to monitor their working easily. The connected devices and wearables will allow
Defects in the devices can also be figured out in real patients to connect with doctors from their homes. The
time; thus, reducing the chances of improper regular visit for different tests and check-ups will be
treatment[4]. minimized. This will save cost and time of patients on a
daily basis.
VII. FUTURE BENEFITS OF IOT
INHEALTHCARE F. Medication Management
A. Better Supervision and Reporting With the help of smart wireless pill bottles, tracking
medication schedule will become easy. This will help
Real-time supervision through IOT devices can save people who forget to take their medications on time.
lives in medical emergencies such as asthma attacks, The IOT enabled medication management processes
heart failures etc. [4]. The connected device can collect will also provide doctors with analytics for offering better
important data on patient's health and transfer it to the care to the patients.[4]
physician in real time. A study conducted by Centre for
Connected Health policy suggests that there was a 50% VIII. FUTURE CHALLENGES OF IOT IN
reduction in re-admission rate of patients due to remote HEALTHCARE Healthcare IOT is not without
supervision[4]. challenges.IOT-enabled connected devices capture
B. End-to-End Connectivity huge amounts of data, including sensitive information,
giving rise to concerns about data security.
IOT can operate the workflow of patient care with
the help of healthcare mobility solutions. It provides IOT explores new dimensions of patient care through
interoperability, machine-to-machine communication, real- time health monitoring and access to patients'
and data movement and information exchange while health data.This data is a goldmine for healthcare
making healthcare delivery more productive. Different stakeholders to improve patient's health and experiences
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 469
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
470 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract - In today's world communication plays technology and are using it daily. We can use this
a vital role through speech and text. To access the technology to assist them in recognizing obstacles and
information, vision plays a significant role. In our help in navigation. Our project proposes a wearable
paper the implementation of Smart Guiding System system that uses an android phone and a camera which
for visually challenged. The vision-less people can
will generate instructions which, within the sort of audio
gather information through hearing ability. Instead
commands transmitted through headphones, will assist
of reading through them, the smart glass allows
them to hear the contents of the text images and the user in taking appropriate actions. However, there's
helps them to overcome with travelling difficulty. no primary method to calculate foot clearance. Recently
Where we use ETA [Electronic Travel Aid], there has been an increased interest the evolution of
Augmented Reality, Optical Code Recognition portable sensor devices for measuring critical
[OCR] and Text to Speech Synthesizer [TTS] parameters of human movement. This project is made
techniques for system integration. We also use to assist the blind in order that they'll walk easily in stair
Obstacle Avoiding Algorithm ,Ultrasonic sensors areas and avoid obstacles using special detection
and Vibration sensing for detecting small and sensors. The system is fitted with an ultrasonic sensor.
transport obstacles while navigating the user while The ultrasonic sensors fitted with the shoe this system
travelling .This OCR and TTS techniques helps to provides obstacle data to the blind person. And camera
read the text easily and helps to identify the objects
also we used its works for finding the text element and
like bus name and bus number in bus stand. Thus,
we serve a consumer device for helping the visually that content convert to audio using by frequency. Blind
impaired people to travel safely. people not find out Path identification, so we
implemented IOT system for find location like Google
Index Terms - ETA [Electronic Travel Aid],OCR
map. Thus, the system provides complete guidance and
[Optical Code Recognition], TTS[Text to Speech
protection to a visually impaired person under various
Synthesizer], Pi camera, Ultrasonic sensor.
circumstances.
I. INTRODUCTION
II. RELATED WORKS
Globally, it is estimated that at least 2.2 billion people
have a vision impairment or blindness, of which at least A. Literature Survey
1 billion of them have a vision impairment that could Jinqiang Bai, Shiguo Lian, Zhaoxiang Liu, Kai
have been prevented or addressed yet. These people Wang, Dijun Liu "Smart Guiding Glasses for
include those with moderate or severe distance vision Visually Impaired People in Indoor
impairment due to unaddressed refractive error, Environment"
cataract, glaucoma, corneal opacities, and diabetic
retinopathy and near vision impairment caused by This paper proposes the smart guiding device in the
unaddressed presbyopia. Population growth and ageing shape of a pair of eyeglasses for visually impaired people
will increase the risk of vision impairment. Now a days by using ETA (Electronic Travel Aids).In this paper
everyone and even blind people are familiar with the multi-sensor fusion based obstacle avoiding algorithm
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 471
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
is proposed, which uses both the depth sensor and This paper proposes the incorporates signboard
ultrasonic sensor for detecting small obstacles, and detection, face detection and surface texture detection
transparent obstacles before them. The prototype to address issues related to mobility of a visually
consisting of a pair of display glasses and several low- impaired people. Localization module implemented using
cost sensors is developed to improve the blind people's GPS and IMU helps to support navigating the people.
travelling experience their surroundings This paper In this paper, they explained their initial implementation
presents a smart guiding device for visually impaired of various image processing tasks. They focused on
users, which can help them move safely and efficiently the exploration for the choice of algorithms, design
in complicated environment. The depth image and the decisions, and various implementation decisions. They
multi-sensor fusion based algorithms were used for explained the challenges and results of implementing
detecting of small and transparent obstacle avoiding for the applications on an embedded platform (Zed board)
navigating the visually impaired people. for prototyping.
Rithika.H, "Image Text To Speech Conversion Shripad Bhatlawande, Manjunatha
In The Desired Language By Translating With Mahadevappa, Jayanta Mukherjee, Mukul
Raspberry Pi" Biswas, Debabrata Das and Somedeb Gupta
This paper proposes the device basically can be used "Design, Development and Clinical Evaluation
by visually impaired people who do not know English of the Electronic Mobility Cane for Vision
and want it to be translated to their native language. Rehabilitation"
The main propose in this paper is the speech output This existing system provides obstacle detection and
which is available in 53different languages translated way-finding assistance to the visually impaired people
from English. This paper implements the prototype which by using Electronic Mobility Cane (EMC).This paper
helps user to hear the contents of the text images in explains about the cane which constructs the logical
their desired language. It involves extraction of text from map of the surrounding environment to deduce the
the bare image and converting the captured text to priority information. This paper conveys the priority
translated speech in the user desired languages. This information to the visually impaired people by using
paper explains the system done with Raspberry Pi and intuitive vibration, audio or voice feedback. The other
a camera module by using the concepts of Tesseract features of the EMC are staircase detection and also
OCR [optical character recognition] engine, Google provide information about the floor status. It consists
Speech API [application program interface] which is of a low energy embedded system with ultrasonic
the Text to speech synthesis and the Microsoft translator sensors and safety indicators. In order to verify its
to the device. This relieves the visually impaired people design and to assess its ability to assist the people in
as they can use this device to hear the English text in their daily-life mobility the EMC was exposed to series
their own desired language by hearing it through of clinical evaluations
speaker. This device helps users to hear the images
being read in their desired language for exact visually Hsueh-Cheng Wang, Laura Giarre?, Daniela
impaired people. Rus "Enabling Independent Navigation for
Visually Impaired People through a Wearable
Rajesh Kedia, Yoosuf K K, Pappireddy Vision-Based Feedback System"
Dedeepya, Munib Fazal,"MAVI: An Embedded This paper proposes the wearable system to provide
Device to Assist Mobility of Visually Impaired" awareness for visually impaired people .This paper
This paper proposes the concept that device uses includes some system with a camera, an embedded
an RGB camera and image processing techniques to computer and a hepatic device to deliver feedback to
recognize the surrounding objects around them and the visually impaired people when an obstacle is
inform or alarm the visually blind people accordingly. detected. In this paper some of the techniques like
472 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
computer vision, motion planning or capturing for Code Recognition [OCR] and Text to Speech
identifying walk able space, plan step-by-step a safe Synthesizer [TTS] techniques for instead of reading
motion trajectory in the space, recognize and locate through them, the smart glass allows them to hear the
certain types of objects around them. The components contents of the text images and also helps them to
communicate using the LCM (Lightweight overcome with travelling difficulty. We also use Obstacle
Communications and Marshaling) package. The Avoiding Algorithm, Ultrasonic sensors and Vibration
algorithms are implemented in C++ with OpenCV and sensing for detecting small and transport obstacles while
the Point Cloud Library (PCL). These descriptions are navigating the user while travelling.
communicated to the visually impaired person wearing
the device through vibrations through vibrators. They A. System Architecture:
presented results from generic feedback on obstacles In this architecture diagram, the smart glass obtain
and descriptions of identified useful objects. image text as input through camera which is affixed or
mounted and pass the input text image to the ADC
B. Existing System [Analog to Digital Convertor] transmits the signal inputs
In existing system, a front ultrasonic sensor detector to the hardware components. The received signal from
is a device that senses foot clearance when the visually camera processes through Text to Speech conversion
impaired people going upwards typically and back technique and produces voice as output to the user
ultrasonic sensor that senses foot clearance when they through speaker or headphones. Navigation is possible
are going downwards typically as an indicating blind for the visually impaired person through Ultrasonic
person. But here there are many other new techniques sensors by providing navigating voice system to the
used to find foot clearance identified.In Existing system user.
no way does this system guarantee if a blind person
use this, he will be able to walk similar to a normal
person because system requires time to process the
sensor values and guide them so they need to be walking
at an appropriate speed so as to allow the system to
process and guide them, it won't be similar to a normal
person. The visually impaired person should normally
be on its straight path, as per their feeling, until system
guides them to turn in any direction, otherwise it was
noticed that some kind of avoidance of an obstacle may
happen to them.
III. PROPOSED SYSTEM
In proposed system, the communication between
blind people is possible using the camera for finding
text elements that content convert to speaker using by B. Modules
frequency so easily studied for blind people. Blind
1) Pi Camera for Text Capturing:
people not find out Path identification, so we
implemented IOT system for find location like Google
map. Navigating and Text to Speech Conversion are
highly aimed in this Project. All information is sending
to audible device, so it is easy to find everything.
Navigating the visually impaired people we use ETA
[Electronic Travel Aid], Augmented Reality, Optical
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 473
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
474 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 475
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Breast cancer is a global health existing diagnostic methods. Present diagnostic methods
concern, with approximately 30 million new cases range from breast examination, mammography,
projected to be reported by 2030. While efforts are ultrasound, magnetic resonance imaging (MRI) to
being channeled into curative measures, histopathology. Histopathology is based on the
preventive and diagnostic measures also need to
morphological changes in hematoxylin and eosin (H &
be improved to curb the situation. Convolutional
Neural Networks (CNNs) are a class of deep
E) stained tissue . Though deemed the gold standard in
learning algorithms that have been widely adopted cancer diagnosis, it is still not absolute, as it is subject
for the computerized classification of breast cancer to bias, oversight, and even misinterpretation by the
histopathology images. In this work, we propose a attending pathologist . Since there exist clinical audits
set of training techniques to improve the in ensuring minimum diagnostic errors, these require
performance of CNN-based classifiers for breast inputs from several other pathologists which makes
cancer identification. We combined transfer verification of diagnosis expensive and time-consuming.
learning techniques with data augmentation and More so, audits are mostly done on randomly selected
whole image training to improve the performance reports due to the large volumes of patients ; as such,
of the CNN classifier. Instead of conventional realizing a perfect diagnostic accuracy is challenging.
image patch extraction for training and testing, we
Advanced machine learning algorithms such as deep
employed a high-resolution whole-image training
and testing on a modified network that was pre-
convolution neural networks (CNNs) have the potential
trained on the Imagenet dataset. Despite the to overcome these issues by learning the complex
computational complexity, our proposed classifier features of cancer morphology and perform automated
achieved significant improvement over the classification between benign and malignant tumors
previously reported studies on the open-source The underlying idea behind machine learning is to
BreakHis dataset, with an average image level
train computer-based models to recognize patterns in
accuracy of about 91% and patient scores as high
as 95%.
the training data and make sound predictions on future
data. Among the various machine learning algorithms,
Clinical Relevance- this work improves on the CNNs have, in recent times, proven to be efficient in
performance of CNN for breast cancer image segmentation, recognition, and classification. The
histopathology image classification. An improved
major advantage of CNNs is their ability to learn inherent
Breast cancer image classification can be used for
the preliminary examination of tissue slides in
patterns in the input data devoid of feature engineering.
breast cancer diagnosis. CNNs, in the basic sense, consists of several stages of
learnable filters that are convolved with the input data
I. INTRODUCTION (image, audio, or video) followed by a multilayer
The global trend in reported breast cancer-related perceptron (MLP) network. The convolutional filters
deaths and cases has increased significantly in recent and the MLP are interfaced by non-linear activation
years. About 2.1 million new cases and 627,000 deaths functions such as rectified linear unit (ReLU), sigmoid,
were reported in 2018 as against 1.7 million new cases or hyperbolic tangent. Training CNNs from scratch
and 521,900 deaths in 2012. While it is important to more often tends to be time- consuming and requires
improve preventive and therapeutic methods to reverse several modifications to the hyperparameters and the
this deleterious trend, it is equally essential to improve overall network architecture. More so, the requirement
476 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
of large amounts of labeled datasets can be challenging seventeen pre-trained layers were imported from the
in the medical field; thus, pre-trained networks on other AlexNet, of which five are learnable. The imported
recognition tasks are employed. This approach to layers were appended with three fully connected layers
training is referred to as transfer learning. and a dropout layer, as shown in Figure 1. In all the
network contains 7,949,444 learnable parameters out
II. METHODS of which about 1,288,192 are imported from the pre-
A. The Proposed CNN Architecture trained AlexNet. The images in the BreakHis dataset
were high-resolution images of size 460 x 700. We
Our network's architecture was obtained by
chose to supply the whole images at the input of the
importing pre- trained layers from the AlexNet , which
network. Despite the computational complexity this
was designed and trained to classify 1.2 million natural
imposes on the network, it gives the network a better
images into 1,000 classes as a part of the ImageNet
overview of the image to be able to make a sound
challenge . The rationale here is to be able to teach our
decision on the type of tumor involved in each case,
network to finetune and appropriately apply the
thus improving the overall classification accuracy.
previously learned weights to our task. A total of
Figure 1. A schematic of the proposed CNN network architecture and its components.
The BreakHis dataset consists of 7,909 microscopic level accuracy of 89.6 ± 6.5 by extracting smaller image
biopsy images (2,480 benign and 5,429 malignant) at patches from the original high-resolution images in the
four magnification levels (40x, 100x, 200x, and 400x) dataset for training a CNN and then combining these
obtained from 82 patients who were referred to the patches for the final classification. N. Bayramoglu et al.
P&D lab. The patients who consented to their [12] employed a magnification invariant approach in
participation in this study approved by the institutional training a multitask CNN to predict the magnification
review board had their breast tissue samples taken and levels in addition to the task of discriminating benign
processed as described in . From a classification from malignant tissue images. They reported that mixing
standpoint, the images in the BreakHis dataset are different magnification levels did not degrade the
characterized by large interclass similarity and intraclass network performance (83.25% and 82.13%
variability, as illustrated in Figure 2. Images in panels A recognition rate for single and multitask networks,
and B appear to be similar but are from different classes. respectively). Zahangir et al. also proposed an Inception
whereas images in panels C and D are from different Recurrent Residual Convolutional Neural Network
classes but appear to be similar. A and C are from the approach for binary and multi-class classification and
same class, while B and D are also from the same class produced accuracies between 92% and 96% and
but appear to be different. These images further highlight patient scores between 94% and 96.76%. This
the challenges in accurately classifying them. approach, however, did not separate the training and
The dataset has been used in several notable machine test data at the patient level; hence the algorithm could
learning studies that attempt to classify the images into have learned features peculiar to a patient tissue other
malignant and benign tumors. Spanhol et al. achieved a than breast cancer.
patient-level accuracy of 88.6 ± 5.6% and an image-
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 477
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
478 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
respectively. Our model was able to achieve an average TABLE I. MAGNIFICATION LEVEL ACCURACY ACHIEVED
BY OUR CNN CLASSIFIER FOR FIVE RANDOM TRIALS
magnification level accuracy of 91.6% which, to our
knowledge, is the highest reported classification Magnification Level Accuracy (%)
Trials 40x 100x 200x 400x
accuracy in the studies performed using the BreakHis trial_1 97.85 87.50 95.35 88.83
dataset based on the used protocol to date. trial_2 91.94 82.59 91.63 86.17
trial_3 96.24 90.63 94.42 94.68
The patient scores for 8 randomly selected patients
trial_4 95.16 88.39 94.88 87.23
from the dataset; 4 from each class were computed. trial_5 95.16 93.75 91.16 88.83
This performance metric measures the accuracy with MEAN 95.27 88.57 93.49 89.15
which a new patient's image obtained through the same DEVIATION 1.18 2.41 1.40 1.84
or similar preparation process will be classified by our
model. Our network recorded accuracies ranging from
100% to 65%. Further probing into the poor performing
patients revealed that the specific stage of tumor class
from which this test case was drawn was
underrepresented in the dataset. This means that if the
dataset is enlarged to give a better representation of
this class based on tumor stages, we could improve on
the performance further. Table II provides the patient
Figure 3. A chart comparing the magnification level
scores aggregated at the magnification level. From the accuracies of our classifier with previous studies on the
table, it can be observed that the network records a BreakHis dataset.
patient score of about 96.35% on the 40x images, TABLE II. MAGNIFICATION LEVEL PATIENT SCORES
OBTAINED BY OUR CNN CLASSIFIER FOR FIVE RANDOM
83.46% on the 100x, 93.27% on 200x and 85.58% TRIALS
on the 400x images. Figure 4 shows the comparison of
Magnification Level Patient Score %
the outcome of our model to that of previously reported trial 40x 100x 200x 400x
efforts based on patient scores. Compared to previously trial_1 97.86 79.39 94.51 84.77
reported efforts, our model improved the patient score Trial_2 91.96 74.22 90.82 81.10
for the 40x and 200x images by 6.3% and 6.9%, trial_3 96.07 87.76 94.24 93.17
respectively. trial_4 98.61 86.10 95.22 83.67
trial_5 97.25 89.83 91.56 85.18
B. Discussion MEAN 96.35 83.46 93.27 85.58
Deviation 1.87 5.33 1.66 3.04
We presented a practical strategy to improve the
outcome of CNN-based classifier for differentiating
malignant breast cancer tumors from benign ones using
histopathology images. Unlike traditional approaches
that extract patches to augment the dataset, we
employed simple reflection operations to augment our
dataset and trained a pretrained model using high
resolution (large 460x700) breast cancer histopathology
images.
Figure 4. A chart comparing magnification level patient
scores of our classifier with previously published efforts.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 479
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
large images provided the network with a better hyperparameters may further improve the performance
overview of global features needed to perform the of our classifier which remains the topic of future
classification task. As a result, our classifier achieved investigations.
an average magnification level accuracy of 91.62% and
an average patient score of 89.66 which is a 6% REFERENCES
improvement in magnification level accuracy and a 2% [1] American Cancer Society. Breast Cancer Facts & Figures 2019-
2020. Atlanta: American Cancer Society, Inc. 2019.
improvement in terms of patient scores.
[2] L. A. Torre, F. Bray, R. L. Siegel, and J. Ferlay, "Global Cancer
We believe that the significant improvement in the Statistics , 2012," vol. 65, no. 2, pp. 87-108, 2015.
performance of our model can be attributed to the [3] M. Veta, J. P. W. Pluim, P. J. Van Diest, and M. A. Viergever,
network training process that utilizes whole images other "Breast cancer histopathology image analysis: A review," IEEE
than patches. Extracting patches from an image to train Trans. Biomed. Eng., vol. 61, no. 5, pp. 1400-1411, 2014.
the network, as presented in, may be helpful from an [4] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina
Toutanova BERT: Pre-training of Deep Bidirectional
architecture complexity point of view. However, this Transformers for Language Understanding (2018).
approach introduces inconsistencies into the dataset as
[5] Seonhoon Kim, Jin-Hyuk Hong, Inho Kang and Nojun Kwak:
a malignant image might contain regions that are benign Semantic Sentence Matching with Densely-Connected Recurrent
or regions that do not carry any information regarding and Co-attentive Information, (2018).
the type of tumor. These regions when extracted will [6] Diederik P. Kingma and Jimmy Ba: Adam: A Method for
be labeled with the label of their source and might Stochastic Optimization, (2014)
adversely affect the features the model associates with [7] Shen Li, Zhe Zhao, Renfen Hu, Wensi Li, Tao Liu, and Xiaoyong
each class. Du: Analogical Reasoning on Chinese Morphological and
Semantic Relations. In Proceedings of the 56th Annual Meeting
Despite the significant improvements in the of the Association for Computational Linguistics (Vol 2: Short
Papers) Association for Computational Linguistics, 138-143.
performance, we do not wish to overlook the fact that
this performance is not satisfactory from the clinical [8] Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean:
Efficient Estimation of word Representations in Vector Space,
perspective. It is, in fact, possible to further improve (2013).
the outcome of classification based on the selection of
several optimal hyperparameters. However, considering
the complexity of the network and the number of
parameters involved, finding the optimal
hyperparameters is very challenging and warrant a more
systematic approach.
IV. CONCLUSION
In this work, we presented a more efficient training
strategy that involves a combination of transfer learning
data augmentation and high-resolution whole-image
training. This approach resulted in a magnification level
classification accuracy of upto 95.27% and upto
96.35% accuracy in terms of patient scores. These
results indicate a significant 6% improvement of average
classification accuracy over the existing methods. Our
proposed network is an important step forward
towards a more reliable and high-fidelity automated
diagnosis of brast cancer histopathology images. We
believe that a more appropriate choice of critical
480 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 481
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
482 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: This paper proposes an efficient The system design depends on the type of energy
energy management system for battery-based conversion system and the type of converters used at
hybrid wind-solar- microgrid. The wind and solar different locations in the system; this needs a lot of
energy conversion systems and battery storage technical attention and has attracted research in this area
system have been developed along with power
[7-9].
electronic converters, control algorithms and
controllers to test the operation of hybrid microgrid. A hybrid energy system was simulated and the
The power balance is maintained by an energy performance for different practical load demand profile
management system for the variations of renewable and weather data was studied [10]. The simulation
energy power generation and also for the load system of a coordinated control for microgrid energy
demand variations. This microgrid operates in management in standalone and grid connected modes
standalone mode and provides a testing platform is discussed [11]. A hybrid wind-solar-battery ESS
for different control algorithms, energy
system is simulated to test the state of charge (SOC)
management systems and test conditions. A real-
time control is performed by rapid control control [12].
prototyping to test and validate the control A scaled hardware prototype with battery SOC
algorithms of microgrid system experimentally. The control scheme to improve the DC grid voltage control
proposed small-scale renewable energy based for stand-alone DC microgrid was developed. [13].
microgrid can be used as a test bench for research
and testing of algorithms in smart grid applications. A hardware prototype of a low-cost hybrid stand-
alone power generation system was developed [14].
Index Terms Energy management system,
hybrid system, microgrid, solar energy, standalone
The objective of this research work is to design and
system, wind energy. develop a small-scale wind-solar-battery renewable
energy based microgrid. An energy management system
I. INTRODUCTION is proposed to maintain the power balance in the
There have been global initiatives for the promotion microgrid and provides a configurable and flexible
of self-sufficient renewable energy systems. This initiative control for different scenarios of load demand variations
has led to the development of renewable power and variations in the renewable energy sources. The
generating systems which are capable of providing self- proposed system can be tested in real time environment
sufficient power generation with the use of more than with the use of rapid control prototyping. This test bench
one renewable source of energy [1-2]. The most allows the validation of control algorithms in real time
commonly used hybrid renewable energy sources are and therefore develop efficient renewable energy
solar and wind energy [3-4]. management systems.
Both these sources of energy are intermittent in The rest of the paper is organized as follows; Section
nature; therefore, the use of an energy storage system II illustrates the complete system design, converter
(ESS) is standard in stand-alone applications [5-6]. In topologies and control techniques in detail. Section III
hybrid renewable energy systems; there are multiple describes the hardware setup and the rapid control
control techniques to provide an efficient power transfer. prototyping. Following that, the experiments on the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 483
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
microgrid and various results are discussed in Section irradiance is shown in Fig. 3. The characteristics are
IV. Lastly, this paper ends with conclusions and shown for different values of irradiance ranging from
discussions in Section V. 400W/m2 to 1200W/m2 at a constant temperature of
250C. For 1000 W/m2, the power reaches a maximum
II. SYSTEM DESCRIPTION of 66Wp at 17.6 V.
The proposed system is shown in Fig. 1. It can be The power at the PV panel is
divided into three parts; i) solar and wind based
renewable energy sources supported by a battery Ppv = VI (1)
storage system along with their converters connected where, V is the voltage across the terminals of the
to the DC bus, ii) the load side inverter and single- PV panel and I is the current through it. The flow chart
phase load, iii) real time controller implementing the of the MPPT algorithm is shown in Fig. 4.
energy management system. The wind energy
conversion system consists of a permanent magnet
synchronous generator (PMSG) based wind turbine.
The solar photovoltaic (PV) panel is operated with
maximum power point tracking (MPPT) when the
power generated by both PV and wind are less than
the load demand. When the power generated is more
than the demand, the excess power is supplied to the
battery and when it is no longer safe for the battery to
be charged, the MPPT is turned off. The battery storage
system is used to maintain the energy balance in the
Fig 2. Solar energy conversion system with controller.
system. An energy management system is used to control
the power flow under different conditions in order to
supply to the load through a single-phase inverter.
484 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fig 5. Mechanical characteristics of wind turbine for different D. Load Side Control
wind speeds.
The DC microgrid is connected to a single-phase
The three-phase output of the generator is rectified resistive load through a single-phase inverter with a
using a diode rectifier and then the voltage level is controller shown in Fig. 8. A R-L filter is used at the
increased with the help of a DC-DC boost converter inverter output to filter the undesired harmonic content.
as shown in Fig. 6. The outer loop PI controller is used to regulate the
C. Battery Storage System (BSS) voltage and the inner loop PI controller regulates the
current.
The BSS consist of a lead acid battery and a
bidirectional DC-DC buck-boost converter. This
converter is responsible in maintaining the DC bus
voltage through a PI controller as shown in Fig. 7. The
state of charge (SOC) [16] is given as
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 485
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
486 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 487
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
environment, both the controller design and would not occur in a practical situation. But the load is
implementation is executed and also the storage and kept fixed in order to observe the performance
plotting of results is done. The stored results can also operation of the renewable energy conversion systems
be analysed at a later time. and the battery storage system for the variations in the
power generated from the renewable energy sources,
this will be difficult to observe if the load is constantly
changing.
The objective of the first case is to deliver a constant The power at different locations of the microgrid is
power to the load for different generating conditions. shown in Fig. 15, till 10s, the battery is charged as the
The solar irradiance is varied by switching the lamps power generated by both the solar and wind energy
on/off and thus providing different irradiance levels. The conversion systems exceed the load demand, after 10s
wind speed is varied by varying the speed of the fan the discharging starts and the level of discharge varies
blower. The irradiance is varied by 1000W/m2, 800W/ at different instants depending on the difference in the
m2, 400W/m2 and 600W/m2 at the start, 20s, 30s and power deficit from the renewable energy sources.
50s respectively, the wind speed was varied by 12m/s,
8 m/s, 11m/s, 7 m/s and 11 m/s at the start, 10s, 20s,
40s and 60s respectively as shown in Fig. 12.
Though the variations in the wind speed and solar
irradiance are only step variations which can never
Fig 14. PMSG speed for constant load with variable renewable
happen in the real world as the meteorological conditions energy sources.
are always changing. These values are selected in such The power deficit is met by the battery, and the state
a manner that they vary between the possible maximum of charge of the battery clearly shows the charging and
and minimum range of operation of the PV panel and discharging rate in Fig. 16. The voltage is kept at
WT in order to check the system operation for these constant at the load terminal as shown in Fig. 17; for
variations. Also, in this case, the load is kept fixed which
488 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 489
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fig 18. Wind speed and solar irradiance levels. (b) PV Power
Fig 19. DC bus voltage for constant renewable energy sources (c) Battery Power
with variable load.
The load is varied at every 10s and the performance The microgrid operates for a variable load but the
of the microgrid is tested for a variable load demand. voltage is kept constant at the load terminal as shown
The power at different location of the microgrid is shown in Fig. 22. For both lower load demands and higher
in Fig. 21. Initially the load demand is 100W and the load demands, the energy management system
power generated from the renewable sources is slightly maintains the power balance when the power from the
less than the demand and this is met by the battery. renewable energy sources is constant. For lower load
After 10s until 40s, the demand is lower and during this demands, the battery is charged and for higher load
time the battery is charged from the excess power demands, the battery discharges and the variations in
generation. After 40s, the demand is more than the the SOC of the battery is shown in Fig. 23.
supply and the battery supplies the additional power
required.
490 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fig 22. Load Voltage for constant renewable energy sources [6] A.A. Jamali et al., "Energy storage systems and their sizing
with variable load. techniques in power system- A review" IEEE Conference on
Energy Conversion (CENCON), 2015, pp.215-220.
[7] Caisheng Wang et al., "From hybrid energy systems to microgrids:
Hybridization techniques, configuration, and control", IEEE PES
General Meeting, USA, pp. 1-4, Jul. 2010.
[8] Saroja Kanti Sahoo et al., "Control Techniques in AC, DC, and
Hybrid AC-DC Microgrid: A Review", IEEE Journal of Emerging
and Selected Topics in Power Electronics, vol. 6, iss. 2, pp. 738-
Fig 23. State of charge of battery for constant renewable 759, Jun. 2018.
energy sources with variable load [9] Venkata Yaramasu et al., "High-power wind energy conversion
systems: State-of-the-art and emerging technologies", Proceedings
V. CONCLUSIONS of the IEEE, vol. 103, iss. 5, pp. 740-788, May, 2015.
A small-scale experimental hybrid solar-wind-battery [10] Caisheng Wang and M. Hashem Nehrir, "Power Management of
renewable energy based microgrid with energy a Stand-Alone Wind/Photovoltaic/Fuel Cell Energy System",
IEEE Trans. Energy Conversion, vol. 23, no. 3, pp. 957-967,
management system is developed and implemented. Sept. 2008.
Experiments were conducted to test the effectiveness [11] Quanyuan Jiang, et al., "Energy Management of Microgrid in
of the proposed energy management system for different Grid-Connected and Stand-Alone Modes", IEEE Trans. Power
variations in the renewable energy sources and different Systems, vol. 28, no. 3, pp. 3380-3389, Aug. 2013.
variations in the load demand. The energy management [12]Xiangjun Li, et al., "Battery Energy Storage Station (BESS)-
system and control algorithms were implemented using Based Smoothing Control of Photovoltaic (PV) and Wind Power
Generation Fluctuations" IEEE Trans. Sustainable Energy, vol.
rapid control prototyping in DSPACE controller. The 4, no. 2, pp. 464-473, Apr. 2013.
experimental results show that the system is flexible and [13 Byung-Moon Han, "Battery SoC-based DC output voltage control
accommodates the different variations in the renewable of BESS in stand-alone DC microgrid" 2016 IEEE Region 10
energy sources and in the load. The controller allows Conference (TENCON) 22-25 Nov. 2016, pp. 1445-1449.
the effective implementation of the energy management
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 491
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
492 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-Compared to the traditional LC-type (EPS), dual phase shift (DPS), and triple phase shift
dual active bridge (DAB) series resonant (TPS) [3]. In addition, the PWM plus phase-shift
converter, the DAB series resonant converter with modulation was often used to improve the efficiency of
dual tanks has a larger power transmission range, the converter [7]. Besides, a direct current slew rate
wider voltage gain, and broader soft switching
control method was proposed in [8], which was verified
range. However, this new proposed converter has
to be effective than the PWM plus phase-shift method.
a larger reactive power than the traditional one, so
its efficiency is affected. Therefore, the model of Besides, different kinds of resonant tanks were added
the reactive power is first derived, the control to the DAB topology to extend the soft switching region,
object is defined as the minimum reactive power, and thus, kinds of resonant DAB converters were
and then, a new control scheme for reactive power proposed. Among those, dual active bridge series
optimization based on function monotonicity is resonant converter (DBSRC) is the most attractive,
proposed in this article. At the same time, all which is referred to as conventional DBSRC for short
switches operate with the zero voltage switching, here, as shown in Fig. 1(a). Compared with the DAB
so the efficiency of the converter is improved. At converter, the conventional DBSRC enables the
last, a 500-W prototype is built, and the simulation inductor current close to sinusoid by adding a capacitor
results and experimental results verify the
in series with the inductor, so the dc component of the
feasibility of the optimal control scheme.
transformer is reduced and the eddy loss is relatively
Index Terms-Dual active bridge (DAB), reactive smaller [9].
power optimization, series resonant converter, zero
voltage switching (ZVS).
I. INTRODUCTION
BIDIRECTIONAL dc-dc converters are widely
used in fuel cell system [1], [2]. Among all of the
bidirectional con- verter topologies, the dual active
bridge (DAB) dc-dc converter has got wide attention
due to its advantages of galvanic isolation, high power
density, bidirectional power flow, and symmetrical
structure [3], [4]. Improving power transmission
efficiency and power density of the DAB converter is
of great significance for reducing nonrenewable
resource consumption [5], [6]. In order to broaden the Fig. 1. Two kinds of DBSRC. (a) Topology of the conventional
DBSRC. (b) Topology of the dual-tank DBSRC.
soft switching range of the DAB converter and to reduce
circuit loss, many studies introduced the in-bridge However, this type of converter faces the same
phase-shift angle based on single phase shift (SPS), problems as the traditional DAB converter. For
and thus proposed various phase-shift modulation example, the soft switching range becomes narrow when
methods successively, such as extended phase shift the converter operates under light load conditions, and
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 493
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
the reactive power becomes large when the Since reactive power significantly contributes to
transformer's primary and secondary voltages do not circuit loss, many studies about reactive power
match. optimization control for DAB converters have been
An LC-type DBSRC with dual tanks was proposed conducted. DPS and EPS modulations are introduced
in [10], which is referred to as dual-tank DBSRC, as to reduce the reactive power or backflow of the
shown in Fig. 1(b). The dual-tank DBSRC exhibits better converter in [12]-[14]. In [18], the nonactive power
characteristics than the traditional one based on same based on extended DPS modulation is used as
phase-shift modulation, such as a larger power optimization object, and the phase-shift trajectory for
transmission range, wider voltage gain, and soft switching minimum nonactive power loss was obtained with the
range. There exhibit a substantial reactive power in the method of lookup table. In [20], a reactive power
majority of resonant converters [11]. Since the dual- optimization control algorithm based on three-level
tank DBSRC has two resonant tanks, the reactive modulation was presented. The core of the control
power processed in resonant tanks will be increased strategy is using the Lagrange multiplier method to obtain
inevitably. Once the reactive power transmitted the conditional extreme value. However, when the model
becomes large, the current peak value flowing through of the converter is more complicated, the Lagrangian
the switches will become large, so the power loss of function obtained by this method will be more
the converter will increase, and its efficiency will complicated, and the analytical solution of the
decrease inevitably. conditional extremum may not be obtained. Harrye et
al.[21] provided an idea for reactive power optimization
The definition of reactive power varies in many control algorithm based on TPS. It is only necessary to
articles. In [12]-[14], reactive power was calculated use a control flowchart to perform phase-shift angle
by the port voltage and the inductor current, which were searching point by point in the control range and
usually in different phases in a switching period. It was compare them to determine the control point
defined as backflow power to the source. In [15], the corresponding to the minimum reactive power. Using
apparent power of the inductor in the DAB was defined this method, the control point with minimum reactive
as its reactive power since the inductor did not consume power can be easily found, which is less difficult than
active power. In [16], the reactive power was more the method mentioned in [20]. Because searching the
accurately defined as the apparent power of the inductor optimization points is not in the direction that reactive
without fundamental frequency assumption, which was power declines, the searching speed is not the fastest.
seen as the total reactive power consumption at the Inspired by the abovementioned optimization methods,
converter bridges. a new control scheme for reactive power optimization
In [17], [18], reactive power was defined as the at a given active power output is proposed in this article.
power that was delivered back to the source and from II. OPERATION PRINCIPLE
the load. In [18], nonactive power was regarded as
more accurate than reactive power since current and The topology of the dual-tank DBSRC is derived
voltage were both nonsinusoidal shapes in the DAB. from the traditional DBSRC. The dual-tank topology
Reactive power or nonactive power is caused by the is shown in Fig. 1. A, B, C, and D are, respectively, the
phase difference between the primary/secondary voltage midpoints of four bridge legs, and they are called leg A,
and current of the transformer. Under sinusoidal leg B, leg C, and leg D here. Cin1 and Cin2 are two
conditions, complex power is defined as the product voltage-dividing capacitors with the same capacitance
of voltage and current phasor. Therefore, active power value and connected in series in the Vin side. The central
is the real part of the complex power and reactive power tap from the primary winding of the transformer is
is the imaginary part [19]. In this article, the complex connected to the midpoint O of Cin1 and Cin2. Lr1 and
power method will be adopted. Cr1 constitute resonant tank 1, and Lr2 and Cr2 constitute
resonant variables as AD and AB. The upper and lower
494 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
switches in the same bridge leg operate complementally characteristics. Therefore, it will be analyzed in detail
with 50% duty ratio. Taking into account the need for below.
bidirectional power flow, the phase-shift angle AD According to (12), the relationship between
between the bridges is defined as the phase difference normalized active powers with the phase-shift angle
between the driving signals of S1 and S7, and its range under different tap coefficients is shown in Fig. 4. It
is < AD < ; The phase shift angle AB is defined as can be seen that as AB increases from 0 to , the
the phase difference between the driving signals of S1 active power curves under different tap coefficients will
and S3, and its range is 0 < AB < 2. between point A get closer. When SPS control is used, that is, when
and O, and u2 represents the voltage between point O AB = , the active curves under different tap coefficient
and B. u3 represents the voltage of point D and C. will completely overlap. In addition, the more the tap
i1, i2, and i3 represent the currents flowing through the coefficient x deviates from 0.5, the larger the
resonant tank 1, the resonant tank 2, and the secondary transmittable range of active power is. Since the
side of the transformer; iin represents the current flowing normalized voltage gain is consistent with the normalized
out of Vin; and iT represents the current flowing along active power, the more x is deviated from 0.5, the wider
the transformer tap. iC in1 and iC in2 represent, the voltage gain range is.
respectively, the charging currents of the capacitors Cin1
and Cin2. The operation modes have been described in According to (13), the reactive power curves of the
[10], and will not be described here. dual-tank DBSRC under different tap coefficients are
shown in Fig. 5 when Qpu is 0.1, 0.3, and 0.5. From
III. STEADY-STATE ANALYSIS Fig. 5, the following conditions hold:
The fundamental analysis method is applied to this 1) When the reactive power is taken as a certain fixed
converter, and only the fundamental components of value Q0, the reactive power curve will gradually
voltages and currents shrink when the degree of asymmetry of the
transformer tap increases, that is, the |x 0.5| increases.
2) When the transformer tap coefficient x takes a certain
fixed value, the smaller the reactive power, the smaller
the range of phase-shift angles covered by the
reactive curve.
3). A fixed active power value corresponds to a curve in
the AD AB plane, and the intersection of the active
power curve and the reactive power curve determines
the steady-state operating point of the circuit.
Therefore, the contraction of the reactive curve is
not conducive to the intersection of the two curves.
The tap coefficient x close to 0.5 is undoubtedly
Fig. 2. Steady-state waveforms of the dual-tank DBSRC.
advantageous for providing a sufficient phase-shift
angle range for the control strategy.
A. Power Transmission Characteristics
From (10), it is found that the input voltage Vin, the
resonant reactance X, the voltage gain M, the
transformer tap coefficient x, and the two phase-shift
angles AD and AB together determine the magnitude
of the power and the direction of transmission. Among
Fig. Relationship between reactive power and the tap
them, the tap coefficient x related to the topology is an coefficient x.
important parameter affecting the power transmission
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 495
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Thus, region1 represents an area that the ZVS implemented by iterative optimization, that is, the
condition of legs A and B are both satisfied, where the control point is gradually moved in the direction of
voltage gain is less than 1. Also, it can be found that the reducing the reactive power. First, it needs to be
four bridge legs could not satisfy the ZVS condition in determined whether the objective function is an
(17) at the same time. If the parameters M and x are increasing function or a decreasing function. According
selected in region 1, ZVS of both leg A and leg B can to (27), the increasing or decreasing feature of the
be guaranteed, and leg C and leg D can realize ZVS by interval in which the control point (AD and AB) is
adjusting phase-shift angles. Therefore, only the third located can be judged.
inequality in (16) needs to be considered in designing There are a few questions that need to be explained.
the control scheme at this time. The design process is First, PI regulator is used to make the output voltage
greatly simplified. track the reference value, so it is necessary to ensure
that the output voltage has reached the given value
before entering the loop process for the reactive power
optimization control. Second, in order to reduce the
hard switching loss of the converter during the transient
process, the initial operating point of the converter should
be moved into the ZVS range as soon as possible.
Therefore, it needs to be judged whether the initial
496 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
phase-shift pairs (AD0 and AB0) of the converter satisfy amplitude and phase information of voltage and current.
the ZVS condition. If ZVS is met, go directly to the Especially, the control signal generated by optimal
process of finding the minimum reactive power value; if control algorithm will produce a certain delay.
the ZVS condition is not met, according to Fig. 7, it is Therefore, in order to improve the response speed and
known that AD0 should be moved to the right until control effect of the converter, the look-up table method
ZVS is satisfied, and therefore a new phase-shift pairs can be used for control during the experiment. The
(AD1 and AB1) are obtained, which will act as the optimal control point corresponding to the minimum
initial phase-shift angle of the reactive power value of reactive power is calculated in advance and
minimization flow. Then the derivative value of reactive recorded in the look-up table. During the experiment,
power corresponding to AD1 (here, Q J ( AD ) the controller can query the table according to the real-
represents the derivative of reactive power) is used to time working condition, and the required control angle
judge the monotonicity of the function, and thereby find can be quickly obtained.
the optimal control point along the decreasing direction.
V. SIMULATION VERIFICATION
In order to verify the feasibility of the proposed
control strategy, MATLAB is used for simulation and
analysis. First, according to the reactive power
minimization algorithm given in Fig. 9, the corresponding
M function is written to simulate the reactive power
minimization process. Then, an initial value AD0 of
phase-shift angle and a normalized active power value
P0,pu are given as the input quantities of the M function,
Fig. 11. System control block diagram
and the function performs optimization process and
B. System Control Scheme outputs the final optimized control angle (AD and AB).
The complete system control block diagram is given Finally, the optimal control point obtained is plotted in
in Fig.11. First, the difference between the output the same coordinate plane with the normalized active
voltage Vo and the reference value Vo-ref is sent to the power value, the reactive power con- tour, and the soft-
PI regulator, and the steady-state output of the regulator switching boundary, and it is judged whether the point
is used as the initial value AD0 of the phase-shift angle satisfies the original design intention.
between the bridges. Then, this initial value AD0 is sent The dynamic process of the reactive power during
to the flowchart for the reactive power minimization the execution of the optimization controller is observed
control described in Fig. 9. At the same time, using the under a fixed voltage gain and a fixed active power. An
input voltage Vin, the output voltage reference value initial phase-shift angle AD0 is assumed, and this point
Vo-ref , the sampled output voltage Vo, and the sampled is used as the starting point.
output current Io, the voltage gain M, and the normalized Then, the control point moves in the direction of
active power P0, pu at this time can be calculated, and decreasing reactive power from the starting point. After
these calculation results are also used for reactive power setting the searching step, the program will automatically
minimization control. Finally, the phase-shift angles AD execute the optimization process, and output the optimal
and AB generated by the reactive power minimization control point (AD, AB) and the corresponding
algorithm are sent to signal generator to generate trigger minimum reactive power at that time. At the same time,
signals for the dual-tank DBSRC. the minimum normalized reactive power Qm and the
Since the circuit operates in the high-frequency number of cycles n are recorded at each time. Here,
switching state, even if the sampling period is set to be taking M = 0.5, P 0,pu = 0.5 as an example, the
very short, the digital controller cannot obtain real-time corresponding.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 497
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
VII. CONCLUSION
Compared with the conventional DBSRC, the dual-
tank DBSRC adds two resonant elements and two
voltage-dividing capacitors, which will increase the
Fig: Simulation circuit
circuit cost. However, for the switches of the tap-side
bridge legs of the dual-tank DBSRC, the voltage
OUTPUT WAVE FORMS stresses are reduced by half and the soft-switching range
is significantly enlarged. More importantly, the output
power of the dual-tank DBSRC is much higher than
the traditional one under same phase-shift modulation.
Although the dual-tank DBSRC exhibits larger reactive
power, the reactive power can be limited to a minimum
by the optimization algorithm proposed above.
Therefore, reducing the reactive power of the dual-tank
DBSRC is taken as the research object in this article.
Fig: Voltage 1 output Based on EPS modulation, an optimal control scheme
for minimizing reactive power is proposed. Based on
the mathematical model of active power and reactive
power, a new optimization control algorithm based on
function monotonicity is introduced and verified by
498 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 499
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- The combination of multilevel inverter sources [3]. The graphical representation of
with renewable energy source power generation photovoltaic and wind power conversion is shown in
is paid more attention among the researchers, figure 1 and figure 2 respectively.
because multilevel inverters are widely accepted
power converters in for high-power applications. The two-level inverters are mostly used in utility
The conventional multilevel inverters are highly applications and small-scale industries. For high-power
implemented in industries, and the success of this applications, two-level inverters are not suitable, and it
has motivated to create newer topologies with the produces high voltage stress, high temperature, and low
reduced overall power electronics components. In efficiency. Multilevel inverters are the best choice for
this paper, recent multilevel inverter topologies high-power and large-scale grid-connected renewable
with reduced number of switches are taken into energy system, and it produces low total harmonics
account and to find a suitable topology for
distortion and low maintenance [4]. From DC voltage
photovoltaic (PV) and wind energy applications.
source to various levels of inverter and corresponding
Finally, this paper gives a pathway for the upcoming
researchers to consider the design issues and output voltage waveforms are shown in figure 3 (a)-
challenges in the development of new multilevel (d). The first multilevel inverter is a patent on 1974 by
inverter topologies. a baker (author of the multilevel inverter), and the
cascaded connection of H-bridge produce synthesized
Keywords-Multilevel inverter, Photovoltaic
system, Wind energy power conversion, Reduced
staircase waveform as explained [5]. The series
switches, Pulse width modulation, Control connection of isolated dc sources can be added together
techniques, Reduced switch topology, Grid to generate stepped waveform that is detailed in, and
integration, Renewable energy the same author has introduced a new configuration
that uses a single dc source with splitting capacitors
I. INTRODUCTION and clamped diode to generate a stepped waveform
The present fossil fuels power generation is not able which is presented in the patent on 1981 [6]. Followed
to meet power demand due to limitations of high fuel by this, Nabae has introduced a new multilevel inverter
cost, environmental pollutions (CO2 emission), lower which replaced clamped diode with clamped capacitor
generation efficiency, and unavailability of fuels. In order [7].
to resolve these problems, renewable energy source-
based power generations are encouraged by developing
and developed countries [1]. The photovoltaic (PV)
and wind energy power conversion systems are
considered as alternative energy sources due to their
natural ambiguity in climate variations [2]. The several
power converter topologies, control techniques, and Fig. 1. Representation of various power conversion stages for
maximum power tracking methods are introduced to photovoltaic system
harvest the highly efficient power from renewable energy
500 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 501
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
concept of MLI topology was first introduced in the and cost of the inverter are reduced, and also observed
early 1975 followed by different variations of it [21]. that capability of extension to generate more levels in
These MLIs continue to receive more and more the output voltage using fewer power switches are
attention because of their high voltage operation verified with symmetrical and asymmetrical
capability, low switching losses, high-efficiency and low configurations for simulation and experimental results.
electromagnetic interference [22]. MLIs have the ability Ajoya Kumar Pradhan et.al (2019), Investigation
to meet the increasing demand of power rating with on "Design and Simulation of Cascaded and Hybrid
improved power quality through subsequent reduction Multilevel Inverter with reduced number of
in the harmonic distortion [23]. MLIs are capable of semiconductor switches", they main focused on higher
producing a high-quality staircase ac voltage from number of level with reduced switches associated with
different connection of power semiconductor switches gate driver circuit and analyised the number of switches
and single/several dc voltages through low switching in the proposed topology is reduced there by the cost
frequency operation and thus mostly preferred for of the inverter is reduced, switching loss and the
medium and high power conversion systems [24]. The conduction loss also reduced. To get the power quality
input dc sources can be a battery, fuel cell, must be lowered slightly inorder to ensure that the
supercapacitor, renewable energy system, etc. A current drawn from transformer/rectifier sources remain
generic block diagram with possible integration of positive and verified with symmetrical and asymmetrical
different sources with MLI is shown in figure 4 MLIs configuration for simulation and experimental results.
are widely used in various applications such as large
electric drive, renewable energy conversion, traction, Lei Wang et.al (2017), has studied about "Novel
electric vehicle, active power filter, HVDC, and FACTs. Cascaded switched a Diode Multilevel Inverter for
Renewable Energy Integration", the objective of their
research work is Two stage Cascaded switched diode
multilevel inverter is proposed for medium voltage
renewable energy integration to reduce the number of
switches along with its gate drivers. They observed that
the installation space, circuit size, cost of a multilevel
inverter are reduced and control complexity. They
concluded that simulation and experimental results
demonstrate that the control multilevel inverters for
Renewable Energy Integration with improved control
performances.
Kishor Thakre et.al (2019), studied about "A
Fig. 4. Possible Energy Sources with reduced switch MLI
Modified Circuit for Symmetric and Asymmetric
based system Multilevel Inverter with reduced Components Count",
they mainly focused to generate a large number of
II. LITERATURE REVIEW
voltage levels with less number of components to
Seyed Hadi Latifi Majareh et.al (2019), conducted minimize the power loss and improves the efficiency of
Investigation on "Design, Analysis and Implementation the inverter. They proved that large number of voltage
of a generalised Topology for Multilevel Inverters with levels with minimum possible switches and they
reduced Circuit devices", and proposed a new summarized simulation and experimental results are
configuration of Multilevel Inverters by increasing the analyzed to validate the performance of investigated
number of output levels and by decreasing the number topology.
of power switches, power diodes, driver circuits and
DC voltage sources and found that the installation space
502 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Vishal Anand & Varsha Singh (2020), investigated consists of four switches S1-S4, four complimentary
on "Compact Symmetrical and Asymmetrical Multilevel switches S11-S41 and clamping diodes D1-D6. Here the
Inverter with reduced Switches", they concentrated on phase voltage is calculated between points a and n.
design of hybrid multilevel inverter topology and Every switch of the leg is connected to the clamping
identified that increases the power quality of the inverter diodes D1-D6 which decreases voltage rating. It
at reduced THD as well as DC sources can easily generates five voltage levels -Vdc/4 to +Vdc/4 as well
replaced by Renewable Energy Sources with the proper as -Vdc/2, 0, +Vdc/2. Voltage / high power applications.
controller to maintain adequate voltages for each voltage
source. Finally concluded that efficiency is increased
and THD is reduced, Validated by both simulation &
experimental setup.
III. CONVENTIONAL MULTILEVEL
INVERTER TOPOLOGIES
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 503
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
504 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Table 5 Classification & features of Conventional MLI The phase output voltage is synthesized by the sum
Diode Flying Cascaded of four inverter outputs, Van=Va1+Va2+Va3+Va4.
Parameters Clamped Capacitor H-Bridge Each inverter level can generate three different voltage
MLI MLI MLI
outputs, +V_dc, 0, and -V_dc, by connecting the dc
Switch
Count in source to the ac output side by different combinations
terms of 2(Ni-1) 2(Ni-1) 2(Ni-1) of the four switches, Sa1,Sa2, Sa3,and Sa4.
Number of
level (Ni) V. PWM TECHNIQUES
Number of
1 1 (Ni-1)/2 Figure 10 shows the Pulse width modulation (PWM)
DC Sources
Number of (Ni- control strategies development concerns the
0 0
diodes 1)*(Ni-2) development of techniques to reduce the total harmonic
Number of Ni*(Ni- distortion (THD). It is generally recognized that
(Ni-1) 0
capacitors 1)/2
Clamping Clamping
increasing the switching frequency of the PWM pattern
Only reduces the lower-frequency harmonics by moving the
Zero level diodes capacitors
semiconductor
generation and and
switches/diode
switching frequency carrier harmonic and associated
switches switches sideband harmonics further away from the fundamental
IV. CASCADED MULTILEVEL INVERTER frequency component. While this increased switching
frequency reduces harmonics, resulting in a lower THD
A cascaded multilevel inverter consists of series by which high quality output voltage waveforms of
single phase H-bridge inverter units. The general desired fundamental R.M.S value and frequency which
function of this multilevel inverter is to synthesize a are as close as possible to sinusoidal wave shape can
desired voltage from several separate dc sources which be obtained.
may be obtained from batteries, fuel cells, or solar cells.
The ac terminal voltages of different level inverters are
connected in series. Unlike the diode-clamp or flying-
capacitors inverter, the cascaded inverter does not
require any voltage-clamping diodes or voltage-
balancing capacitors as shown in figure 9.
Fig. 9. Three Phase- Three leg Cascaded H-bridge Fig. 10. PWM carrier technique (triangular carrier)
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 505
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The quality of the output waveform will develop with VI. SIMULATION RESULT
increase in switching frequency. Higher switching The proposed method has been tested in simulation
frequency can be employed for low and medium power (MATLAB/SIMULINK) results are shown Fig. 13.
inverters, whereas, for high power and medium voltage
applications and switching frequency is of the order of
1 kHz.
To compare the performance of phase and level-
shifted modulation schemes, it is assumed that the
average switching frequency of the solid-state devices
is the same for both schemes. One of the most important
problems in controlling a VSI with variable amplitude
and frequency of the output voltage is to obtain an output
waveform as much as possible of sinusoidal shape
employing simple control techniques. Harmonics caused
by non-sinusoidal voltage feeding involve power losses,
electromagnetic interference (EMI), and pulsating Fig. 13 Simulation Circuit for Cascaded H - Bridge Five Level
torques in ac motor drives. Harmonic reduction can Inverter
506 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
CONCLUSION IEEE Trans. Power Electron., vol. 32, no. 2, pp. 1070-1087,
Feb. 2017.
In the application of Renewable energy sources [9] S. S. Lee, M. Sidorov, C. S. Lim, N. R. N. Idris, and Y. E. Heng,
Cascaded H-bridge Inverters are the most suitable one. "Hybrid cascaded multilevel inverter (HCMLI) with improved
In photovoltaic power systems or Hybrid power symmetrical 4-level submodule", IEEE Trans. Power Electron.,
vol. 33, no. 2, pp. 932-935, Feb. 2018.
systems having multiple sources by using a cascaded
H-bridge Inverter all the sources are connected to single [10]N. Sandeep and U. R. Yaragatti, "A switched-capacitor-based
multilevel inverter topology with reduced components"' IEEE
Inverter since this topology require different DC sources Trans. Power Electron., vol. 33, no. 7, pp. 5538-5542, Jul. 2018.
for achieving Multilevel output. Since the component [11]M. A. Memon, S. Mekhilef, M. Mubin, and M. Aamir, "Selective
required is less so losses are reduced and cost is also harmonic elimination in inverters using bio-inspired intelligent
reduced thereby the efficiency is increased. Increasing algorithms for renewable energy conversion applications: A
review,'' Renew. Sustain. Energy Rev., vol. 82, pp. 2235-2253,
the levels reduces Total Harmonic distortion so at higher Feb. 2018.
levels the THD is reduced and the power quality is
[12]N. Arun and M. M. Noel, "Crisscross switched multilevel inverter
improved. using cascaded semi-half-bridge cells,'' IET Power Electron., vol.
11, no. 1, pp. 23-32, Jan. 2018.
REFERENCES
[13]A. Kshirsagar, R. S. Kaarthik, K. Gopakumar, L. Umanand, and
[1] Seyed Hadi Latifi Majareh, Farzad Sedaghati, Majid Hosseinpour K. Rajashekara, "Low switch count nine-level inverter topology
and Seyed Reza Mousavi Aghdam, "Design, Analysis and for openend induction motor drives", IEEE Trans. Ind. Electron.,
Implementation of a Generalised Topology for Multilevel vol. 64, no. 2, pp. 1009-1017, Feb. 2017.
Inverters with reduced circuit devices", IET Power Electronics,
Vol. 12, Issue 14, PP. 3724-3731, 2019, DOI: 10.1049/iet- [14]V. N. R., A. R. S, S. Pramanick, K. Gopakumar, and L. G.
pel.2019.0405. Franquelo, "Novel symmetric six-phase induction motor drive
using stacked multilevel inverters with a single DC link and neutral
[2] Ajoy Kumar Pradhan, Sanjeeb Kumar Kar, Mahendra Kumar point voltage balancing,'' IEEE Trans. Ind. Electron., vol. 64, no.
Mohanty and Navneet Behra, "Design and Simulation of 4, pp. 2663-2670, Apr. 2017.
Cascaded and Hybrid Multilevel Inverter with reduced number
of Semiconductor Switches", International Journal of Ambient [15]W. Zhao, Z. Chen, D. Xu, J. Ji, and P. Zhao, ``Unity power
Energy, Taylor & Francis, PP. 1-11, 2019, DOI:10.1080/ factor fault-tolerant control of linear permanent-magnet vernier
01430750.2019.1583127 motor fed by a floating bridge multilevel inverter with switch
fault,'' IEEE Trans. Ind. Electron., vol. 65, no. 11, pp. 9113-
[3] Lei Wang, Q.H.Wu and Wenhu Tang, "Novel Cascaded Switched 9123, Nov. 2018.
- Diode Multilevel Inverter for Renewable Energy Integration",
IEEE Transactions on Energy Conversion, Vol. 32, No. 4, PP. [16]B. Ge, Y. Liu, H. Abu-Rub, and F. Z. Peng, ``State-of-charge
1574-1582, 2017, DOI:10.1109/TEC.2017.2710352 balancing control for a battery-energy-stored quasi-Z-source
cascaded-multilevelinverter-based photovoltaic power system,''
[4] Kishor Thakre, Kanungo Barada Mohanty, Aditi Chatterjee and IEEE Trans. Ind. Electron., vol. 65, no. 3, pp. 2268-2279, Mar.
Vinaya Sagar Kommukuri, "A Modified Circuit for symmetric 2018.
and asymmetric Multilevel Inverter with reduced components
count", International Transactions on Electrical Engineering [17]A. Kumar and V. Verma, ``Performance enhancement of single-
System, Wiley, Vol. 29, Issue 6, PP. 1-17, 2016, DOI: 10.1002/ phase grid-connected PV system under partial shading using
2050-7038.12011 cascaded multilevel converter,'' IEEE Trans. Ind. Appl., vol. 54,
no. 3, pp. 2665-2676, May/Jun. 2018.
[5] Vishal Anand and Varsha Singh, "Compact Symmetrical and
asymmetrical Multilevel Inverter with reduced switches", [18]M. Hammami and G. Grandi, ``A single-phase multilevel PV
International Transactions on Electrical Engineering System, generation system with an improved ripple correlation control
Wiley, Vol. 30, Issue 8, PP. 1-20, DOI: 10.1002/2050-7038.12458. MPPT algorithm,'' Energies, vol. 10, no. 12, pp. 20-37, Dec.
2017.
[6] U. Akram, M. Khalid, and S. Shafiq, "An innovative hybrid wind
solar and battery-supercapacitor microgrid system Development [19]J. S. M. Ali and V. Krishnasamy, ``Compact switched capacitor
and optimization", IEEE Access, vol. 5, pp. 25897-25912, 2017. multilevel inverter (CSCMLI) with self-voltage balancing and
boosting ability,'' IEEE Trans. Power Electron., vol. 34, no. 5,
[7] S. S. Lee, "A single-phase single-source 7-level inverter with pp. 4009-4013,May 2019.
triple voltage boosting gain", IEEE Access, vol. 6, pp. 30005-
30011, 2018. [20]S. Rahman, M. Meraj, A. Iqbal, and L. Ben-Brahim, ``Novel
voltage balancing algorithm for single-phase cascaded multilevel
[8] R. R. Karasani, V. B. Borghate, P. M. Meshram, H. M. inverter for post-module failure operation in solar photovoltaic
Suryawanshi, and S. Sabyasachi, "A three-phase hybrid cascaded applications,'' IET Renew. Power Gener., vol. 13, no. 3, pp. 427-
modular multilevel inverter for renewable energy environment", 437, Feb. 2019.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 507
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[21]M. S. Irfan, A. Ahmed, and J.-H. Park, ``Power-decoupling of a [23]K. Yang, X. Lan, Q. Zhang, and X. Tang, ``Unified selective
multiport isolated converter for an electrolytic-capacitorless harmonic elimination for cascaded H-bridge asymmetric multilevel
multilevel inverter,'' IEEE Trans. Power Electron., vol. 33, no. 8, inverter,'' IEEE J. Emerg. Sel. Topics Power Electron., vol. 6, no.
pp. 6656-6671, Aug. 2018. 4, pp. 2138-2146, Dec. 2018.
[22]Z. Yang, J. Sun, X. Zha, and Y. Tang, ``Power decoupling control [24]M. Sharifzadeh, H. Vahedi, R. Portillo, L. G. Franquelo, and K.
for capacitance reduction in cascaded-H-bridge-converter-based Al-Haddad, ``Selective harmonic mitigation based self-elimination
regenerative motor drive systems,'' IEEE Trans. Power Electron., of triplen harmonics for single-phase five-level inverters,'' IEEE
vol. 34, no. 1, pp. 538-549, Jan. 2019. Trans. Power Electron., vol. 34, no. 1, pp. 86_96, Jan. 2019.
508 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: One of the most serious problems with and dynamic states, the distribution system has poor
electrical distribution networks is the deterioration power quality. These issues are typically caused by the
of power quality. The employment of non-linear existence of reactive and imbalanced loads. A VSC
devices such as switching devices and power STATCOM provides a reliable and efficient technique
electronics converters is one of the primary causes
of providing shunt compensation in a line, which can
behind this. Non-linearity has a negative impact on
the utility of the power supply, system efficiency,
assist improve power quality. Various control
power factor decrease, and so on. Because the approaches, such as the synchronous reference frame
reactive power increases as the power factor theory, are available to determine the reference currents
decreases and it makes no contribution to energy for the DSTATCOM (SRFT). The ANN and ANFIS-
transmission, it must be compensated. The control based approaches may detect and model nonlinear
techniques for a Three-Phase Distribution Static systems, resulting in a better source current waveform
Compensator (DSTATCOM) based on Artificial and, as a result, higher power quality.
Neural Network (ANN) and Adaptive Neuro Fuzzy
Inference System (ANFIS) are proposed in this The SRFT approach is compared to ANN and
study. This is used to compensate for reactive ANFIS-based algorithms in this research. The ANN-
power as well as current-related power quality based control approach is efficient and feasible because
concerns such as harmonics. The SIMULINK it can recognize and simulate such nonlinear systems.
toolbox is used to simulate these control However, the ANFIS-based technique outperforms the
approaches in the MATLAB environment. The ANN-based technique in terms of producing a superior
simulation results adequately show the performance source current waveform. When compared to the other
of these approaches, and it is discovered that mentioned techniques, the step size calculated by
ANFIS achieves source current waveforms with ANFIS learns quicker and has a lower static error in
less distortion than ANN.
the estimation of the basic weights. The comparison
Keywords: Power Quality Compensation findings of ANN and ANFIS are evaluated, and it is
MATLAB DSTATCOM Synchronous Reference discovered that ANFIS performs better than ANN.
Frame Theory; Adaptive Neuro Fuzzy Inference
System; Artificial Neural Network; II. SYSTEM CONFIGURATION
I. INTRODUCTION The circuit diagram in Fig. 1 is that of the
DSTATCOM system. A three-phase three-wire
Power quality is still one of the most important distribution system has a reactive load linked to it. A
features of any power distribution system. It must adhere Voltage Source Controller connects the DSTATCOM
to IEEE 1547 standards throughout the several levels to a DC bus (VSC). Three insulated-gate bipolar
of the power system, which include generation, transistors (IGBTs) with diodes coupled anti parallel
transmission, distribution, and use. Power quality issues are used to produce the VSC. The alternating current
have significantly risen as a result of the widespread and direct current sides are linked to a point of common
usage of autonomous and power electronic-based coupling and loads. For supplying pulses, a Pulse Width
equipment in an electric distribution system. Because Modulating controller was employed.
of insufficient reactive power throughout both the steady
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 509
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
= (2)
= (1)
510 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
200001 data points were acquired from the SRF benefit over ANN is that ANFIS has a substantially
control algorithm, with 70% of this data being utilised superior learning ability.
for training, 15% for testing, and 15% for validation. A fuzzy inference system is made up of four parts: a
The performance of the network is analyzed by its fuzzification interface, a rule base, an inference
mean square error (MSE). Its equation is as follows: mechanism, and a defuzzification interface. It is further
subdivided into five levels, as seen in Fig. 5. Layer 1
(3) represents the load currents and delivers the input to
where xfi represents the calculated output and xoi Layer 2, which executes the fuzzification process by
denotes the desired output and N signifies the number making sharp numbers fuzzy. Layer 3 is the layer that
of training samples compares output to input. Layer 4 defines the
normalization layer, which is used to calculate the
The best validation performance Mean Square Error normalization firing strength for a given rule. Layer 5
(MSE) obtained is 5.98251e-8. The data samples used defines the defuzzification layer, which is responsible
for the process of training is shown in Table I. for turning fuzzy data to crisp ones and providing the
TABLE I. DATA USED TO TRAIN ANN necessary output direct current. As a result, accuracy
improves. The ANFIS structure was trained using
epochs of 10 and triangular membership functions.
There are 78 nodes with 27 linear and 27 non-linear
characteristics. There are a total of 200001 training data
pairs. For the training, 27 fuzzy rules were employed.
The MSE achieved during training is 0.000041.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 511
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
512 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
THD =
Fig.10. Waveforms obtained using ANFIS control algorithm
Vn_rms is the RMS voltage of the nth harmonic.
The outcomes of the traditional approach, SRFT
Vfund_rms is the RMS voltage of the fundamental control algorithm, and the artificial intelligence-based
frequency control algorithms, ANN and ANIFIS, were compared.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 513
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
REFRENCES [5] Bhim Singh and Sabha Raj Arya, "Back-Propagation Control
Algorithm for Power Quality Improvement using DSTATCOM,"
[1] Bhim Singh and Jitendra Solanki, "A Comparison of Control IEEE Transactions on Industrial Electronics, vol. 61 ,No. 3 , pp.
Algorithms for DSTATCOM," IEEE TRANSACTIONS ON 1204 - 1212, March 2014.
INDUSTRIAL ELECTRONICS, VOL. 56, NO. 7, pp. 2738 -
2745, JULY 2009. [6] B. Singh, A. Chandra and K. Al-Haddad, Power Quality: Problems
and Mitigation Techniques, John Wiley and Sons, U.K., 2015.
[2] Alka Singh and Bhim Singh, "Power Quality Issues related to
Distributed Energy Source Integration to Utility Grids,"Annual [7] Ankita Arora and Prerna Gaur,"Comparison of ANN and ANFIS
IEEE India Conference (INDICON), December 2010. based MPPT Controller for grid connected PV systems," Annual
IEEE India Conference (INDICON), December 2015.
[3] R. Deepak Singh, T. Praveen Kumar, Dr.K.Sumanth," Simulation
of SRF Based DSTATCOM With Grid Connected PV Generation [8] Manoj Badoni, Alka Singh and Bhim Singh, "Adaptive Neuro
System Using Fuzzy Logic Controller For Reactive Power Fuzzy Inference System Least Mean Square Based Control
Management," International Journal of Advanced Research in Algorithm for DSTATCOM," IEEE Transactions on Industrial
Electrical, Electronics and Instrumentation Engineering, Vol 5, Informatics, vol. 12, no. 2, pp. 483 - 492, April 2016.
NO.7, pp 6493-6501,July 2016. [9] Yang Xiao-ping, Zhong Yan-ru and Wang Yan," A Novel Control
[4] H. Prasad and T. D. Sudhakar, "Power Quality Improvement by Method for DSTATCOM Using Artificial Neural Network,"
Mitigation of Current Harmonics using D - STATCOM," Third CES/IEEE 5th International Power Electronics and Motion
International Conference on Science Technology Engineering & Control Conference, August 2006.
Management (ICONSTEM), March 2017.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 515
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: - The analysis and modification of a turning the room light ON. The people in the place are
smart light and movement regulator is presented. counted using sensors and immediately displayed on 7
The main purpose of the study was to create a segment display at the entrance door. The continuous
controller-based system that would count the
requirement of automatic home appliances in today's
amount of guests as well as turning the room light
world is very important because it helps to create safety
ON each time a visitor comes in. This system
calculates how many persons going into a room like consciousness and awareness. As a result, the need
offices and classrooms per time. This function is developing a device that would ensure that whoever
implemented using PIR and LDR. Seven-segment comes in and goes out of a place is monitored,
display unit is placed outside the room to show all necessitated this research. This also helps to ensure that
the persons that entered the place. This visitor the room is not heavily congested per time. If the counter
counter indicates an additional person whenever is entered by someone, the lights in that particular room
someone enters the room and at the same time will be switched ON. The lights would automatically
turns the lights in the room ON. And in a reverse go OFF whenever the room is empty. These tasks are
way, visitors counter will decrease whenever done by the program coded in the microcontroller 8051
someone exits the room using LDR sensor. and shown on the 7 segments show unit. The sensors
Whenever there is nobody inside, the relay
send signals to the microcontroller and these signals
interface which is smart, turns off the light.
are controlled by the software which is stored in ROM.
Keywords: Arduino, sensor, visitor counter, Bio- Microcontroller 8051 simultaneously scanning the
directional, Microprocessor. Passive Infrared Ray receivers, anytime there's a
I. INTRODUCTION movement across the passive infrared ray collector, then
the Passive Infrared will send a signal to the receiver
The necessity to have a system which will and be obstructed, this obstacle is sensed by the
spontaneously control the lighting arrangement of an Microcontroller. [1] The operation sequence is
area and capable of checking the amount persons in a controlled by a program which is a set of instructions
room on its own is has over stayed. Fire outbreaks that coded in the microcontroller so that the system can read
occur in various homes originate when the occupants and interpret them. The light-dependent resistor (LDR)
are either sleeping or not around the house. The sensor does the work of reducing the amount of persons
designed system can check every person present in such allowed to enter per time. Also, whenever a visitor
places like; offices, conference hall, sports venue, etc. passed through the door (where the LDR is installed)
The whole circuit has been designed to be user-friendly the number of visitors is restricted according to the
with its operation and the working principle self- number of people that left the house or room. The
explanatory. This project would be useful to both obstruction is sense and communicated to the
technology developers and the general public at large. microcontroller through the LDR transmitter. [2] The
The work which was aimed at using a controller-based microcontroller will then signal to the relay to switch
algorithm that will count the figures coming in as well as OFF the lights whenever there are no persons present.
516 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 517
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Where Vp is the primary voltage, Np is the number PIR sensing efficiency (E) =
of loop in primary coil. Where E is the sensing efficiency
Analysis and Design of the Power Supply Unit MD = sensor measured detection, and ED = sensor
To calculate the value of the filter capacitor, we expected detection.
apply the equation: Sensing error = measured detection - expected
detection
LDR Sensing distance covered is calculated using
Fr = Frequency of ripples = 100Hz (50Hz + 50Hz) equation (12) =
RL = Minimum Load resistance for the output B. For Sensor Height
The expected detection is 110cm
To achieve the desire accuracy, error is calculated
The design display interface is a seven segment
using equation (a)
display (SSD) the calculation is obtained as follows:
Table 1: Sensor Height
For SSD, Rs= R1 to R4
Measured Expected Error in
detection in (cm) detection in (cm) (cm)
250 110 140
200 110 90
150 110 40
IS = IF 100 110 -10
50 110 -60
Where Vcc (voltage common collector) is the higher
voltage with respect to the ground; VF (forward voltage)
voltage required to activate the LED and produce an
output; VS (supply voltage), IS (supply current), IF
(forward current).
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 519
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
REFERENCES [8] Y. w. Bai, C. F. J and Y. T. taipei and Ku, "Automatic room light
intensity detection and control using a microprocessor and light
[1] G. Smith, "Introduction to Arduino," 2011. sensors," Automatic room light intel, pp. 34-40, 2013.
[2] C. &. A. C. Subhankar, "Bidirectional Visitor Counter system [9] Dr.S.Deepa, Y.R.Saravanakumar, P.Kirubakaran, K.Vijaykumar
with Automatic Room Light Controller and Arduino as the master and M.Tharun, "Bidirectional Visitor Counter with Automatic
controller.," International Journal of Scientific and Research, pp. Room Light Controller," International Research Journal of
20-25, 2016. Engineering and Technology (IRJET), vol. 08, no. 04, p. 3, 2021.
[3] G. Waradkar, H. Ramina, V. Maitry, T. Ansurkar and A. r. a. P. [10] c. thomas, "Automatic room controller with bidirectional visitor
Das, "automatic room light controller using a bidirectional visitor counter," International journal of current engineering and scientific
counter.," Imper j. Interdisc, vol. 4, no. 2, 2016. research (ijcesr), vol. 6, no. 2, p. 5, 2019.
[4] M. Umar, F. Aamna, Shakoor and A. Siddique, "Automated room [11] P. D. S. P. Rasal, "Implementation of Visiting Counter,"
light controller with visitor counter uising arduino," Advances in International Journal of Emerging Trends in Electrical and
science technology and engineering systems, pp. 10-15, 2016. Electronics (IJETEE - ISSN: 2320-9569, vol. 7, no. 2, p. 6, 2013.
[5] S. e. a. A. Dey, "Design of controllable bidirectional visitor [12] Anon, "solar led street lights using ultrasonic sensor," 2017.
counter," Int. J. Innov. Res. Elct Electro, Instru. Cont. Engg., pp. [Online]. Available: https://www.researchgate.net/publication/
133-136, 2016. 317649190_Solar_Led_Street_Lights_using_Ultrasonic_Sensor.
[6] K. S. N. A. mathur, "bidirectional visitor counter electronics for [Accessed 06 01 2021].
you," 2016. [Online]. Available: http://www.scribd.com/doc/ [13] C. P., "PIR sensor basics and applications," 2011. [Online].
49533576/BiDirectional-VisitorCounter. Available: https://www.elprocus.com/pir-sensor-basics-
[7] P. K. Shah and M. P. Savaliya, " Automatic room light controller applications/. [Accessed 4 3 2021].
with bidirectional visitor counter," Int. J. ICT Res. Develop,
2015.
520 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: In our ecosystem mostly Gasoline Electric Cars instant torque, creating strong and smooth
engine cars are used by the public which have high acceleration. They are also around three times as
cost of refueling that cause emission of greenhouse efficient as cars with An Internal Combustion Engine.
gases. In this way to reduce the automotive
emission which causes the Greenhouse gases, an Electric Cars are significantly quieter than
alternative technology is needed. The most conventional internal combustion engine automobiles.
convenient way is to use renewable energy They do not emit harmful pollutants, giving a large
sources. In this scenario we provide an alternative reduction of local air pollution, and, can give a significant
fuel for vehicles by using renewable energy reduction in total greenhouse gas and other emissions.
resources. Among the various resources available, They also provide for independence from foreign oil,
we design a solar power controlled motor device which in several countries is cause for concern about
for automotive application.
vulnerability to oil price volatility and supply disruption.
In this project, the Electric Car is the way to
alter the energy source. Sunlight is the main source
Electric Vehicles (EVS) like the nissan leaf, chevy
of energy to obtain light energy which is converted volt, and tesla model s are becoming more and more
into electricity. Amount of energy obtained from popular because of their high mpg ratings, their
the source may vary from time-to-time. The vehicle convenient ability to be plugged-in and recharged, and
chosen for the experiment is Marathi Omni. The the frustrating and unpredictably wild increases in the
solar panels are placed on the top of the car. Energy price of a gallon of gasoline. The cost of filling up your
obtained from the solar panel is given to the charge tank is decreased to charging your vehicle's batteries
controller. Charge controller can prevent with electrical energy, and the savings are even more
overcharging and also the over discharging of the dramatic when that energy comes from your own solar
battery. Output of the charge controller is given to power system.
the Valve Regulated Sealed Lead-Acid Battery.
Then the Valve Regulated Sealed Lead-Acid The first practical electric cars were produced in
Battery is given to the Motor through Driver the 1880. Electric cars were popular in the late 19th
circuit which controls speed of the Motor. century and early 20th century, until advances in internal
Battery charging time through charge controller combustion engines, electric starters in particular, and
is four to five hours and the Electric Car travels mass production of cheaper gasoline vehicles led to a
for the distance of about 150Km with the speed of decline in the use of electric drive vehicles. The energy
30 to 40 Km/hr. Thus the proposed system of crises of the 1970 and 1980 brought a short-lived
automotive vehicle helps to achieve zero pollution, interest in electric cars although those cars did not reach
zero noise effect and fuel consumption. the mass marketing stage, as became the case in the
INTRODUCTION 21st century.
A solar car is a solar vehicle used for land transport.
1.1 ELECTRIC CAR Solar cars only run on solar power from the sun. Solar
An Electric Car is an Automobile that is propelled thermal energy which converts solar energy to heat, pv
by one or more Electric Motors, using electrical energy cells directly convert sunlight into electricity.
stored in rechargeable batteries. Electric Motors give
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 521
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
To keep the car running smoothly, the driver must The first solar family car was built in 2013 by
monitor multiple gauges to spot possible problems. Cars students in the netherlands. This vehicle is capable of
without gauges almost always feature wireless telemetry, 550 miles on one charge during sunlight. It weighs 850
which allows the driver's team to monitor the car's pounds and has a 1.5kw solar array. Solar vehicles
energy consumption, solar energy capture and other must be light and efficient. 3,000 pound or even 2,000
parameters and thereby freeing the driver to concentrate pound vehicles are less practical. Stella lux the
on driving. predecessor to stella broke a record with a 932 mile
Solar cars combine technology used in aerospace, single charge range. The dutch are trying to
bicycle, alternative energy and automotive industries. commercialize this technology. During racing stella lux
The design of a solar vehicle is severely limited by the is capable of 700 miles during daylight. At 45mph stella
amount of energy input into the car. Most solar cars lux has infinite range. This is again due to high efficiency
have been built for the purpose of solar car races. Some including a coefficient of drag of 16.
solar cars are designed also for public use list of The average family who never drive more than 200
prototype solar-powered cars miles a day would never need to charge from the mains.
They would only plug in if they wanted to return energy
Solar cars depend on a solar array that uses
to the grid. Solar cars are often fitted with gauges and/
Photovoltaic Cells (PV Cells) to convert sunlight into
or wireless telemetry, to carefully monitor the car's
electricity. Unlike solar thermal energy which converts
energy consumption, solar energy capture and other
solar energy to heat for either household purposes,
parameters. Wireless telemetry is typically preferred as
industrial purposes or to be converted to electricity,
it frees the driver to concentrate on driving, which can
PV Cells directly convert sunlight into electricity. When
be dangerous in such a small, lightweight car. The solar
sunlight strike pv cells, they excite electrons and allow
electric vehicle system was designed and engineered
them to flow, creating an electric current. PV Cells are
as an easy to install (2 to 3 hours) integrated accessory
made of semiconductor materials such as silicon and
system with a custom molded low profile solar module,
alloys of indium, gallium and nitrogen. Crystalline silicon
supplemental battery pack and a proven charge
is the most common material used and has an efficiency
controlling system.
rate of 15-20%.
As an alternative, a battery-powered electric vehicle
The design of a solar car is severely limited by the may use a solar array to recharge; the array may be
amount of energy input into the car. Solar cars are built connected to the general electrical distribution grid.
for solar car races and also for public use list of prototype
solar-powered cars. Even the best solar cells can only A solar vehicle is an electric vehicle powered
collect limited power and energy over the area of a completely or significantly by direct solar energy.
car's surface. This limits solar cars to ultralight Usually, Photovoltaic (PV) cells contained in solar
composite bodies to save weight. Solar cars lack the panels convert the sun's energy directly into electric
safety and convenience features of conventional vehicles energy. The term "solar vehicle" usually implies that solar
energy is used to power all or part of a vehicle's
Chinese solar panel manufacturer hanergy plans to propulsion. Solar power may be also used to provide
build and sell solar cars equipped with lithium-ion power for communications or controls or other auxiliary
batteries to consumers in china. Hanergy says that five functions.
to six hours of sunlight should allow the cars' thin-film
Solar vehicles are not sold as practical day-to-day
solar cells to generate between 8-10kwh of power a
transportation devices at present, but are primarily
day, allowing the car to travel about 80km on solar
demonstration vehicles and engineering exercises, often
power alone. Maximum range is about 350km (217
sponsored by government agencies. However, indirectly
mi.).
solar-charged vehicles are widespread and solar boats
are available commercially.
522 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Recharging can take a long time and in many places to promote the introduction and now adoption in the
there is a patchy recharging infrastructure. For long mass market of new electric vehicles depending on
distance driving, many cars support fast charging that battery size and their all-electric range.
can give around 80% charge in half an hour using public The world's all-time top selling highway-capable
rapid chargers. While battery cost is decreasing fairly electric car is the nissan leaf, released in December
rapidly, it is still relatively high, and because of this, most 2010, with more than 250,000 units sold worldwide
electric cars have a more limited range and a somewhat through december 2016. The tesla model s, released
higher purchase cost than conventional vehicles. Drivers in June 2012, ranks second with global sales of over
can also sometimes suffer from range anxiety- the fear 158,000 units through December 2016. The model s
that the batteries will be depleted before reaching their has been the world's top selling plug-in car for two years
destination. in a row, 2015 and 2016.
The dell-winston school solar car challenge is an The first solar family car was built in 2013
annual solar-powered car race for high school students. researchers at case western reverse university, have
The event attracts teams from around the world, but also developed a better solar car which can recharge
mostly from american high schools. The race was first more quickly, due to better materials used in the solar
held in 1995. Each event is the end product of a two- panels.
year education cycle launched by the winston solar car
team. In japan, kaiton ii from the goko high school was
built for 2013 world solar challenge and owl was built
In odd-numbered years, the race is a road course for the 2015 world solar challenge in the cruiser class
that starts at the dell diamond in round rock, texas the by kogakuin university.
end of the course varies from year to year. In even-
numbered years, the race is a track race around the As of december 2015, there were over 30 models
texas motor speedway. Dell has sponsored the event of highway legal all-electric passenger cars and utility
since 2002. vans available for retail sales, mainly in the north
america, china, japan, and western european countries.
There are other distance races, such as suzuka, Cumulative global sales of highway-capable light-duty
phaethon, wgc (wsr/jisfc/wsbr) and the world solar rally pure electric vehicles passed the one million unit
in taiwan. Suzuka and wgc is a yearly track race in milestone in September 2016. About 61% of the global
japan and phaethon was part of the cultural olympiad stock of 2 million light-duty plug-in electric vehicles by
in greece right before the 2004 olympics. the end of 2016 were pure electric cars and vans.
Venturi eclectic is a ventri automobiles built the Venturiastrolab is a venturiautomobiles is building
flanking not closed three seater eclectic as prototype in the open two seater astrolab since 2006. Range with
2006. Range with solar charging only in 7 kilometers solar charging only in 18 kilometers per day. Range
per day. Range with fully charged accumulator is 50 with fully charged accumulator is 110 kilometers. Top
kilometres. Top speed 50km/hr. Price middle of the speed 120 km/hr.
road was announced but serial production never started.
There is also a small electric car with the name eclectic The world solar challenge features a field of
2.0 from the same company existing. competitors from around the world who race to cross
the australian continent, over a distance of 3,000
Since 2008, a renaissance in electric vehicle kilometres (1,900 mi). Speeds of the vehicles have
manufacturing has occurred due to advances in batteries steadily increased. So, for example, the high speeds of
and energy management, concerns about increasing oil 2005 race participants led to the rules being changed
prices, and the need to reduce greenhouse gas for solar cars starting in the 2007 race and 2014 also.
emissions. Several national and local governments have
established tax credits, subsidies, and other incentives
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 523
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
In italy, p-mob with an eu project led by fiat from 500 metres (1,600 ft) stretch, and is the average of
May 2010 to April 2013 a complete solar car with two runs in opposite directions.
three seats was developed. This small car have four In germany, hochschule bochum is a solar vehicle
wheel drive. Range with solar charging only is 20 built in 2015 to cross the desert of tanami in australia.
kilometers per day. Range with fully charged Range with fully charged accumulator is 50 kilometers.
accumulator is 120 kilometers. The car have a solar roof with 160 wp and in a box
In australia, solar spirit 3 with three seat was built below the roof 1943 wp solar panels for extension
by tafe south australia for the 2011 world solar during driving breaks.
challenge. Sun swift v (eve) from the university of new Power core suncruise with 2 seats was built by
south wales was built for the 2013 and 2015 worls hochschule bochum for 2015 world solar challenge.
solar challenge. Maximum power created on its 3m2 solar roof is 870
The american solar challenge, previously known as wp. Car is equipped with two wheel hub electric engines
the 'north american solar challenge' and 'sunrays usa', and comfort electronics. Top speed is 120km/h. Range
features mostly collegiate teams racing in timed intervals with solar charging only is up to 600 kilometers per
in the united states and canada. This race also changed day. Range with fully charged accumulator is up to 1100
rules for the most recent race due to teams reaching kilometers.
the regulated speed limits. The most recent american The four seater stella lux was built as successor of
solar challenge took place on July 21-28, 2014 from stella for the 2015 world solar challenge by eindhoven
austin, texas to minneapolis, minnesota. university. With a top speed of 125 km/h and an
The south african solar challenge is an epic, bi-annual, european range of 1000 kilometers it is substantial
two-week race of solar-powered cars through the length achievement with respect to common electric vehicles.
and breadth of south africa. Teams will have to build
their own cars, design their own engineering systems 1.2 OBJECTIVE OF PROJECT
and race those same machines through the most • To evaluate the energetic feasibility of an electric car
demanding terrain that solar cars have ever seen. The automatic charging system. At what speed the car
2008 race proved that this event can attract the interest can contribute electricity of power the automatic
of the public, and that it has the necessary international charging the car battery during operation in the
backing from the fia. specification.
Guinness world records recognize a land speed • To evaluate the electricity generation of an electric
car system in comparison to an automatic recharge
record for vehicles powered only by solar panels. This
system.
record is currently held by the sky ace tiga from the
ashiya university. The record of 91.332 km/h (56.75 1.3 ORGANIZATION OF PROJECT
mph) was set on 20 August 2014 at the shimojishima
Chapter 2: Deals with electric car and solar system.
airport, in miyakojima, okinawa, japan. The previous
record was held by the university of new south wales Chapter 3: Deals with charge controller, battery,
with the car sunswift iv. Its 25-kilogram (55 lb) battery driver and differential motor.
was removed so the vehicle was powered only by its Chapter 4: Deals with proposed system.
solar panels.
Chapter 5: Deals with electric car using solar system
The record of 88.8 km/h (55.2 mph) was set on 7 and it's benefits
january 2011 at the naval air base hmas albatross in
nowra,breaking the record previously held by the Chapter 6: Deals with conclusion and future scope
general motors car sunraycer of 78.3 kilometres per
hour (48.7 mph). The record takes place over a flying
524 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
2.1 Block Diagram In this project, the electric car is been charged
We decided to do something that would be benefited through renewable energy. Energy obtained from the
to the world environment. The greater importance of solar panel is given to the charge controller. Instead of
the environment in the world lead to an opportunity for internal combustion engine, solar car uses the
students. With the economy trying to get out of the worst combination of solar panel and electric motor powered
depression, there are plenty opportunities for us to help by stored battery system. In our project, we are using
out. This is our opportunity to contribute a greener and a vrsla ( valve regulated sealed lead acid battery). The
more efficient planet. The main aim of our project is to motor used here is the differential motor. The motor
save our environment from pollution. gets supply from batteries and vehicles moves. The
battery is discharging upto 90% and the battery is been
charged through solar and it is used to run the motor
and at the same time battery can be charged from solar.
An extra benefit to building the electric car is that, it
can also show how much it is cheaper it would be to
convert regular car into an electric car rather than
driving in the gasoline engine.
2.2 Valve Regulated Sealed Lead-Acid
(VRSLA) Battery
Vrsla battery stands for valve regulated lead-acid
battery commonly known as sealed lead-acid battery,
Figure 2.1 block diagram of proposed system gel battery or maintenance free battery which is a type
For that, electric car would be the best fit. This of lead-acid rechargeable battery. There are three
electric car has zero pollution, zero noise effected and primary types of vrsla batteries such as sealed vr wet
no fuel consumption. In the recent years, india has cell, agm (absorbed glass mat) and gel. Due to their
increasing encouraged a cleaner environment and less construction the gel and agm types of vrsla can be
dependence on foreign oil. Block diagram of proposed mounted in any orientation and do not require constant
system is show in figure 4.1 maintenance. Maintenance free batteries are used in
The price of fuel has increased significantly over the large portable electrical devices and off-grid systems
past few years and there seems to be no turning back. even though they require regular functional testing. The
In our ecosystem, most gasoline cars are used by the outer view of vrsla battery is shown in the figure 4.2
public which have high cost of refuelling that causes
emission of greenhouse gases. To reduce the automotive
emission, an alternative technology is needed. The
environment has also been more focus throughout the
worlds in past few years and it seems that cleaner
alternative have been steadily on the rise with no end in
sight.
In our project, the electric car is the way to alter the
energy source. In this project we are using solar panel,
charge controller, vrsla battery, driver circuit and
differential motor. Source of energy obtained from light Figure 2.2 valve regulated sealed lead acid battery
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 525
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
2.3 Driver Circuit braces and can be moved by these braces. When the
Driver is an electrical circuit or electronic component same load "w" placed on each rack then braces (shackle)
used to control another circuit, such as a high-power is pulled up the second rack would be lifted at the same
transistor, liquid crystal display (lcd). They are used to distance, this will prevent the pinion gear does not rotate.
regulate current flowing through a circuit. Often used, But if a greater burden placed on the left rack and pinion
for a specialized integrated circuit that controls high- buffer will then be drawn up along the gear rack rotates
power switches in switched-mode power converters. the load gets heavier, which is attributed to differences
in prisoners who are given the pinion gear, so the smaller
An amplifier can also be considered a driver for the burden will be lifted. The raised rack spacing is
loudspeakers, or a constant voltage circuit that keeps proportional to the number of turns pinion gear. in other
an attached component operating within a broad range words that rack gets custody larger still and while
of input voltages. The driver stage of a circuit requires prisoners who received a smaller load will move. This
different characteristics to other circuit stages. For principle is used in the planning of differential gears.
example in a transistor power amplifier, the driver circuit
requires current gain, for the ability to discharge, and CONCLUSION
low output impedance to avoid distortion. 3.1 Conclusion
2.4 Differential Motor The solar cell based electric vehicle has developed
A differential is a gear train with three shafts that has and validated through hardware model. The solar cell
the property that the angular velocity of one shaft is the produces 1000 Watts power which is applied to
average of the angular velocities of the others, or a fixed differential dc motor. The differential dc motor rating of
multiple of that average. 1250w, 2500 Rrpm is controlled by driver circuits. The
driver circuit perform with high ripple rejection which
is controlled by pulse width modulation technique. In
battery simultaneously, both charging and discharging
takes place. When the battery of the vehicle is fully
charged, it can run continuously at an average speed of
30-40 km/h.. The electric vehicle has been satisfactorily
completed the prototype that vehicle can run in normal
surface with an entire power of 660kg. Through this
project, we increase the mileage of the vehicle. Our
Figure 2.4 differential motor
project is eco-friendlily and causes no air pollution.
Table 2.1 specification of differential motor
REFERENCES
S.No Specification Range
1 Power 3hp, 1500w 1. G.G.Acosta,R.J.Delavega,. A.Gachenr.C.Leegstra, R.E.Romero,
2 Rated Voltage 60v S.R.Rossi, G.Santillán, M.A.Spina, C.Verucchi, and "some issues
3 Rated Current 12a on the design of a solar vehicle based on Hybrid Energy System",
4 Rated Speed 2500rpm International Journal of Energy Engineering, Vol 2(1) Pp 15-
21,2012.
5 Rated Torque 112w, 210nm
6 No Load Current 1.6a 2. I.Arsie,M.Marotta, C.Pianese, G.Rizzo and M.Sorrentino,
"Optimal Design of a Hybrid Electric Car with Solar Cells" IEEE
The basic principle of the differential gear unit can Transactions on Vehicular Technology, Vol. 48, No. 6, November
be understood by using equipment that consists of two 1999.
gears pinion and rack. Both rack can be moved in the 3. G.Rizzo*, "Automotive Applications of Solar Energy" IEEE
vertical direction as far as the weight rack and slip Control Systems Magazine, Vol. 27, No. 2, Pp. 60-70,2007.
526 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
4. Ms. Bhusaripriyagovind, Ms. Chavandeepikalimchan, Ms. 10. Giannouli M and Yianoulis P, "Study on the Incorporation of
Kadam Pratibhadattatray, Mr.A.B.Vitekar, "A Hybrid Photovoltaic Systems as an Auxiliary Power Source for Hybrid
Piezoelectric-Solar Based Power Generation System", and Electric Vehicles", Journal of Solar Energy 86, Pp 441-451,
International Journal of Advanced Research in Computer and 2012.
Communication Engineering Vol. 4, Issue 3, March 2015.
11. Xiang-Yu Kang snd Zhi-Junguo, "Modeling and Analysis of
5. T.Balamurugan, Dr.S.Manoharan*, "Design of Solar/Electric Vehicle with Wind-Solar Photovoltaic Hybrid Generating
Powered Hybrid Vehicle (Sephv) System With Charge Pattern System", IEEE Transactions on Vehicular Technology, Vol. 48,
Optimization for Energy Cost", International Journal of No. 6, November 1999.
Engineering and Technology (Ijet),Vol.95(4), Pp. 746-765,2007.
12. Gianfranco Rizzo, Ivan Arsie and Marco Sorrenti, "Hybrid Solar
6. S.Lalouni, E.Matagne, D.Rekioua and T.Rekioua, "Fuzzy Logic Vehicles "in Proceeding of the IEEE and Vol. 95, No. 4, April
Control of Standalone Photovoltaic System with Battery Storage", 2007.
Journal of Power System, Volume 193, Issue 2, , Pp 899-907, 5
13. Algeri La Neuve, and Belgiquefuzzy Logic Control of Stand-
September 2009.
Alone Photovoltaic System with Battery Storage Electrical
7. Gianfranco Rizzo, Ivan Arsie and Marco Sorrentino "Solar Energy Engineering, IEEE Trans. On Energy Conversion, Vol. 17, No. 2,
for Cars: Perspectives, Opportunities and Problems"Certified Pp. 285-294, June 2002.
Journal, Volume 3, Issue 1, January 2013.
14. Chandra Shekharmalvi, Manoj Kumar Gaur and Ranjeet Singh, ,
8. Raghumangu, Krishna Prayaga, Bhavanandanadimpally and Sam "A Study and Design Based Simulation of Hybrid Solar Car" Vol:
Nicaise, "Design, Development and Optimization of Highly 50pp. 243-249,1-4 January 1998.
Efficient Solar Cars IV" in Proceeding of the IEEE , Vol. 95, No.
4, April 2007.
9. Amstutz A and Guzzella L, "CAE Tools for Quasi-Static
Modeling and Optimization of Hybrid Poweretrains", IEEE
Transactions on Vehicular Technology, Vol. 48, No. 6, November
1999.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 527
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
528 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 529
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Wind Turbine:
Fig Block diagram of a typical distributed generation using
renewable and alternative power sources. Converting the kinetic energy in wind into clean,
This block diagram explains about the process of renewable electricity. The majority of wind turbines
using renewable and alternative sources of energy. We consist of three blades mounted to a tower made from
are taken two renewable sources one is solar energy tubular steel. There are less common varieties with two
and other is wind energy. blades, or with concrete or steel lattice towers At 100
feet or more above the ground, the tower allows the
For solar energy the output is dc so that we connect
turbine to take advantage of faster wind speeds found
to interleaved boost converter it setup the dc voltage
at higher altitudes.
into high dc voltage and also reduce the ripple currents.
So we can use to dc loads. On the other hand we have Turbines catch the wind's energy with their propeller-
wind energy we get the output as ac hence we need a like blades, which act much like an airplane wing. When
rectifier to convert ac to dc. After connecting to IBC the wind blows, a pocket of low-pressure air forms on
for set up high voltages and we use inverter for one side of the blade. The low-pressure air pocket then
converting dc to ac for ac loads pulls the blade toward it, causing the rotor to turn. This
is called lift. The force of the lift is much stronger than
COMPONENTS AND ITS EXPLANATION the wind's force against the front side of the blade, which
Solar Power: Solar power that converts sunlight is called drag. The combination of lift and drag causes
(Solar radiation) into electricity by using the rotor to spin like a propeller.
semiconductors. When the sun hits the semiconductor
within the PV cell, electrons are freed and bus bars
collect the running electrons which results in electric
current. Solar panels are made up of many solar cells.
Solar cells are made of silicon, like semiconductors
installed in a metal panel frame with a glass casing. They
are constructed with a positive layer and a negative
layer, which together create an electric field, just like in
a battery.
When photons, or particles of light, hit the thin layer
of silicon on the top of a solar panel, they knock
electrons off the silicon atoms.
530 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
nacelle. Sitting atop the turbine tower, some nacelles secondary winding Ns1, a third winding Ns2, and a
are large enough for a helicopter to land on. Another leakage inductor Lk.
key component is the turbine's controller that keeps The gate-driving signals of the two power switches
the rotor speeds from exceeding 55 mph to avoid are inter- leaved with a 180° phase shift, and the
damage by high winds. An anemometer continuously theoretical waveform of the proposed converter
measures wind speed and transmits the data to the operating in (CCM) Continuous conduction mode is
controller. A brake, also housed in the nacelle, stops shown in Figure and Figure shows the corresponding
the rotor mechanically, electrically or hydraulically in operational modes of the equivalent circuit. There are
emergencies. ten main operational modes in one switching period.
Rectifier: Due to the completely symmetrical inter- leaved
topology, operating modes 1-5 and 6-10 are similar.
A rectifier is an electronic device that converts an
In order to simplify the analysis of the proposed
alternating current into a direct current by using one or
converter's operating principle, only modes 1-5 are
more P-N junction diodes. A diode behaves as a one-
analyzed and discussed.
way valve that allows current to flow in a single
direction. This process is known as rectification. VOLTAGE GAIN
Before the development of silicon semiconductor Voltage gain is defined as the ratio of the output
rectifiers, vacuum tube diodes and copper oxide or voltage to the input voltage in DB (or) The difference
selenium rectifier stacks were used. Early radio between the output signal voltage level in decibels and
receivers, called crystal radios, used a "cat's whisker" the input signal voltage level in decibels; this value is
of fine wire pressing on a crystal of galena (lead equal to 20 times the common logarithm of the ratio of
sulphide) to serve as a point-contact rectifier or "crystal the output voltage to the input voltage. The voltage gain
detector". of the proposed converter is described as, It confirms
Inverter: that the proposed converter has a high step-up voltage
gain without an extremely high duty cycle or large turn's
An inverter can be defined as it is compact and ratios for the transformer. The curves of the voltage
rectangular shaped electrical equipment used to convert gain related to the duty cycle in the proposed converter,
direct current (DC) voltage to alternating current (AC) under different turns ratio levels for the built-in
voltage in common appliances. The applications of DC transformer, are shown in Fig.
involve several small types of equipment like solar
power systems. Direct current is used in many of the All of the voltage stresses on the semiconductor
small electrical equipment such as solar power systems, components can be derived by the known voltages of
power batteries, power-sources, fuel cells because the capacitors. The voltage stresses of the power
these are simply produced direct current. switches S1 and
DESCRIPTION AND ANALYSIS OF THE S2 are clamped, and are derived from:
PROPOSED HIGH STEP-UP INTERLEAVED
BOOST CONVERTER
The proposed high-step-up interleaved boost The voltage stresses on diodes D1, D2, D3, and D4
converter is shown in Fig. 2, where L1 and L2 are the are, respectively, given by
energy storage inductors, S1 and S2 denote the power
switches, C1 and C2 are the clamp capacitors, Co is the
output capacitor, D1 and D2 are the clamp diodes, and
D3 and D4 are the rectified diodes. The built-in
transformer consists of a primary winding Np, a
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 531
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
532 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 533
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract - Now a days, due to the continuous systems, we can get the continuous Electric energy in
improvements in the energy received from the the periods of peak demand Now a days, grid receive
renewable energy systems It is essential to employ the electric energy from the suppliers and consumers
the battery charging and discharging topologies get the required supply from the grid, there is no energy
with the grid connected system to achieve stability
storage systemToday's electricity grid -- the
and reliability of electrical supply. For this the
bidirectional converter is correct choicefor
interconnected network that delivers electricity from
Charging and discharging of Batteries. In this suppliers to consumers -- has virtually no storage[1].
paper, a bidirectional DC-DC converter for The storage facilities that do exist use pumped
charging and discharging applications by using a hydropower, a system that pumps water uphill to a
PI controller is illustrated. PI controller is reservoir when excess electricity is available and then
connected with the bi directional DC-DC converter lets the water flow downhill through turbines to generate
to obtain both current control and voltage control. electricity when it is needed. While pumped hydropower
The simulation is carried out in MATLAB/Simulink storage works well, it can only be located in very limited
environment. The results obtained are included in areas of the country. The 12 ARPA-E projects that
this Paper and analysed make up the Grid-Scale Ramp able Intermittent
Keywords - Renewable Energy ,Energy storage, Dispatchable Storage (GRIDS) program are aimed at
Lithium ion battery, Bi directional DC-DC developing new energy storage technologies that are
converter comparable in reliability and cost to pumped
I. INTRODUCTION hydropower and are deployable at any location in the
country. These new technologies could enable the
Energy storage system plays important role in storage of vast amounts of electricity anywhere on the
electricity grid. It helps to increase the Electric energy grid across the country. Improved methods for storing
generation from the renewable energy resources. and dispatching electricity would enable the increased
InIndia renewable electric energy system mainly use of renewable electricity generation while maintaining
depends on the availability of solar and wind energy. high reliability in electric supply.Beyond enabling the
Even though both the wind and solar energy are clean increased use of renewable electricity generation,
and renewable, these are un reliable in nature hence improved energy storage technologies have several
we can not get continuous power supply from these benefits:Security: A more efficient grid that is more
resources. As these renewable energy sources become resistant to disruptions.Environment: Decreased carbon
more valuable to our energy economy, more attention dioxide emissions from a greater use of clean
is given in the renewable technologies and its storage electricity.Economy: Increase in the economic value of
systems. Fig1 shows the Single-Phase Full-Bridge wind and solar power and strengthened U.S.
Bidirectional Isolated Buck-Boost DC-DC Converter competitiveness in the clean energy race. Jobs: New
Due to the recent development in energy storage income sources for rural landowners and tax revenues
534 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
for wind and solar development areas. More jobs in particularly with the demand from electric-powered
supporting sectors such as manufacturing, engineering, vehicles(Fig. 1). It is expected that almost 100 GW
construction, transportation and finance. hours ofLi-ion batteries are required to meet the
requirements from consumer utilization and electric-
powered vehicles with the later takes about 50% of
Li-ion battery sale by 2018 [3].in addition, Li-ion
batteries will also be workingto buffer the alternating
and variable green energy supply from renewable
resources, like solar and wind, to even the difference
between energy supply and demand. For example,
additional solar energy producedthroughout the
Figure 1Single-Phase Full-Bridge Bidirectional Isolated daytime can be stored in Li-ion batteries that will supply
Buck- Boost DC-DC Converter
energy at night when sun light is not accessible. Large-
II. LITHIUM-ION BATTERY scale Li-ion batteries for grid application will need next-
generationbatteries to be created at low cost.
In comparing with various types of Batteries, lithium
ion battery has more advantages and it has fast charging
and discharging characteristics.This type of batteries
are attracting morenotice in the past fewdecades. They
are presently the leading mobile powersources for
portable electronic devices, completely usedin cell
phones and laptop computers [1].Li-ionbatteriesare
well thought-out the powerhouse for the personal
digitalelectronic revolution starting from about two
decades ago,generally at the same time when Li- Figure 2 Projection of worldwide lithium demand for
batteries from 2019 to 2030, by type(in metric tons of lithium
ionbatteries were commercialized.Everybody has carbonate equivalent)
already noticed from his/her daily life, the growing
III DESIGNING BIDIRECTIONAL DC-DC
functionality of mobile electronicsalways require for
CONVERTER
better Li-ionbatteries[2]. Forexample, to charge the cell
phone with risingfunctionalities lesscommonly as the Single-phase full-bridge bidirectional isolated buck-
current phone will get better quality of one's life. Another boost DC-DC converter topology (Figure 2) consists
important increasingmarket for Li-ion batteries is of high frequency isolated transformer to give smooth
electric and hybrid vehicles, which need next-generation current, the transformer is usually has the turns ratio
Li-ion batteries with not only more power, more 1:1. entirely 8 IGBTs are turned on using cosine signals.
capacity, more charging rate, extended life, but These signals are having various 1 or 0 according to
alsonoticeablyenhancedsecurityconcert and less cost. direct method algorithm that is shaped to execute the
In India, It is planned to set a very ambitious goal to working requirements. Fig 3 shows the Bidirectional
have one million plug-in hybridvehicles on the road in buck-boost converter circuit Moreover, conditions of
future. There are like plans around the word in switches are denoted by power flow ways. In case of
endorsement of electric and hybrid vehicles as well. power flow 1, A1 and B2 should be turned on, A2 and
The demand for the Lithium ion battery is shown in B1 should be turned OFF. At the same time in case of
Figure 2.The Foreign Policy magazine even available power flow 2, A1 and B2 are in OFF condition, A2 and
an article entitled "The great battery race" to emphasize B1 are in ON condition. The value of resistors R1 and
the worldwide attention in Li-ion batteries [2].The R2 is equal, ie 20ohm. In this work, consequence of
demand for Li- ion batteries increases quickly, snubber capacitors is analysed at the system[4]. The
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 535
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
effect of the snubber capacitors reduces switching across DC source and Lithium ion battery. in the
losses. Thus, performance value of the system is superior beginning it is assumed that, battery has been charged
when the snubber capacitors are employed to 43% and main supply is switching on. consequently
the load is fed from the main supply as well as the battery.
Design of Inductor: After a certain time period, the main supply is switched
The inductor design has a considerable impact on a off and now the load gets the supply from the battery.
system working, such as understanding of balancing From the results wave form we can easily understand
control Zero Voltage Resonant Transition soft switching, that the highestpermissible current in both current control
device switching loss, system volume, inductor power and voltage control scheme is 22 A. At 80% state of
loss, etc… It is essential to optimize the inductance with charge of battery, the value of open circuit voltage is
all the design considerations[3]. The relationship 25.98 V. The Proportional Integral controller (PI)
between inductor peak current Ipeak, minimum current controller has been connected to calculate the reference
Imin, and inductor RMS current IRMS can be written battery current. The main purpose of using the PI
using the following equations . where Ts is the switching controller is to reduce the error between reference
period, ILoad is load current, P is the load power and andmeasured value. When the DC source is connected,
I is the inductor current ripple. battery is in charging mode. The current through battery
??? = 0.5 ??????????? ???? ?????? (1) is 17.6 A, and voltage is 25.98 V. The load voltage is
48 V. when the At the time of disconnecting the DC
source battery starts to supply power to load. The Load
current and load voltages are 16.2 A and 25.6 V. Figure
6-9 shows the simulated results during charging and
discharging of battery is shown in figure the state of
IV. MODELLING OF BIDIRECTIONAL charge of battery during charging and discharging mode
DC- DC CONVERTER of operation is shown in current flow through the battery
and reference current are shown in. Figure illustrates
The circuit diagram of the bidirectional DC-DC
the Battery voltage characteristics. wave form of the
power converter connected with the Lithium ion battery
load voltage is shown in figure 9.
is shown in figure 4 as a simulation model The two
Table :1
Power semiconductor switches(Power MOSFETs) are
turned on in such a way that the converter is working in Parameter Value Parameter Value
steady state mode[6]-[9]. An perfect switch is coupled VH 330-440 V Lf 0.42 µH
VL 24-30 V Lr 5.7 µH
to make or break the main supply during simulation.
fs1 50 KHz Cf 100 µH
The battery employed in model is Lithium-ion type with 20 KHz 45mH
fs2 CH
the voltage rating of 24 V and rated capacity is supposed Np :Ns 8:1 Ci 100µF
to 50 Ah. Discharging parameters are calculated Dd Ts 500 ns CL 390µF
through the nominal parameters of the batteryIt is LB 1 mH Cr1 =Cr2 0.94µF
known that the batteries are charging through following
two modes namely , constant current and constant
voltage. Figure 5 explains the current and voltage control
strategies for charging and discharging.
V. SIMULATION RESULTS
The circuit diagram is simulated using MATLAB/
Simulink platform and the results are obtained. In the
simulink diagram a common load has been connected
536 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
VI. CONCLUSION
The role of bi directional DC-DC converter in
battery charging and discharging was analysed. the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 537
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
corresponding simulated wave forms using MATLAB [4] K. Suresh and R. Arulmozhiyal, "Design and Implementation of
Bi-Directional DC-DC Converter for Wind Energy System,"
were included in this Paper. From this analysis ,we can Circuits Syst., vol. 7, no. 11, pp. 3705-3722, 2016.
easily understand the importance and ability of
[5] D. Ravi, B. M. Reddy, S. L. Shimi, and P. Samuel, "Bidirectional
bidirectional converter in sharing the power with the dc to dc Converters : An Overview of Various Topologies ,
supply and with the battery. This new algorithm can be Switching Schemes and Control Techniques," Int. J. Eng. Technol.,
implemented in many utilizations like uninterrupted vol. 7, pp. 360-365, 2018.
power supplies (UPS), integrationof renewable energy [6] X. I. E. Jun, Z. Xing, and Z. Chongwei, "Research on Bi-
Directional DC-DC Converter For a Stand-Alone Photovoltaic
with the grid and dc motor speed control Hybrid Energy Storage System," in 2010 Asia-Pacific Power and
Energy Engineering Conference, 2010, pp. 1-5.
REFERENCES
[7] J. Li-jun, Y. Guang-yao, and J. Miao-Miao, "Study of Bi-
[1] E. O. Ogunniyi and H. Pienaar, "Overview of Battery Energy directional DC-DC Converter of Micro-grid Hybrid Energy
Storage System Advancement for Renewable ( Photovoltaic ) Storage System," in 2015 IEEE 10th Conference on Industrial
Energy Applications," in 2017 International Conference on the Electronics and Applications, 2015, pp. 1166-1169.
Domestic Use of Energy (DUE), 2017.
[8] A. Aroliya, S. Gautam, A. Kumar, and V. Shrivastva, "Analysis
[2] W. E. Council, "Energy Storage Monitor Latest trends in energy of Energy Storage System for Wind Power Generation with
storage: 2019," 2019. application of Bidirectional Converter," in 2016 Second
[3] B. Bryant and M. K. Kazimierczuk, "Small-signal duty cycle to International Conference on Computational Intelligence &
inductor current transfer function for boost PWM DC-DC Communication Technology Analysis, 2016, pp. 419-423.
converter in continuous conduction mode," in 2004 IEEE [9] H. R. Karshenas, H. Daneshpajooh, A. Safaee, P. Jain, and A.
International Symposium on Circuits and Systems, 2004,pp.7- Bakhshai, "Bidirectional DC-DC Converters for Energy Storage
10. Systems," in Energy Storage in the Emerging Era of Smart Grids,
2011, pp. 161-178.
538 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 539
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
tracker (MPPT), battery system and charger, solar The maximum power that can be drawn from the
tracker, energy management software, solar PV array depends on the operation point of the I ? V
concentrators or other equipment. curve. As it is shown in Figure 2.4, the maximum power
output of one PV array usually occurs around the knee
point of the curve.
MAXIMUM POWER POINT TRACKING
METHOD
The change of environment condition would affect
the output power of the PV array. This characteristic
curve would change for different environment
Fig. Photovoltaic Hierarchy
conditions. Then the core idea of the MPPT technique
is to automatically adjust its output voltage and current
PHOTOVOLATAIC MODULES in terms of VMPP and IMPP under which the PV array
Due to the low voltage of an individual solar cell can output the maximum power.
(typically ca. 0.5V), several cells are wired (see: Copper
in photovoltaic power systems) in series in the
manufacture of a "laminate". The laminate is assembled
into a protective weatherproof enclosure, thus making
a photovoltaic module or solar panel. Modules may
then be strung together into a photovoltaic array.
P&O Method
In Perturbation & Observation method, the
Fig. A photovoltaic Array is a Linked Assembly of PV modules
operating voltage of the PV array is the value which is
PHOTOVOLATIC ARRAYS to be increased or decreased in the MPPT. In Figure,
A photovoltaic array (or solar array) is a linked it can be seen that when the operating points are on the
collection of solar panels. The power that one module left side of the MPP, increasing the operating voltage of
can produce is seldom enough to meet requirements of the PV array would increase the output power and
a home or a business, so the modules are linked together decreasing the operating voltage would decrease the
to form an array. Most PV arrays use an inverter to output power.
convert the DC power produced by the modules into INVERTERS
alternating current that can power lights, motors, and
other loads. Inverters are the power electronic circuit, which
converts the DC voltage into AC voltage. The DC
source is normally a battery or output of the controlled
rectifier. The output voltage waveform of the inverter
can be square wave, quasi-square wave or low
distorted sine wave. The output voltage can be
controlled with the help of drives of the switches.
Fig.I-V Characteristic Curve under Different Environment
Conditions
540 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
String Topology
The string inverter is a reduced version of the
centralized inverter. In this topology, a single PV string
is connected to the inverter. This improves the MPPT
and the total generated power. Moreover, this
technology also increases the modularity since additional
strings can be added into the system without changing
the inverter dimensions. However, depending on the
Fig. Voltage Source Inverter
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 541
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
542 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• The control method is easy for a back to back intertie Simulation Results
system.
Disadvantages:
• Excessive clamping diodes are being required when
the number of levels gets high.
• It is hard to do a real power flow control for individual
converter.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 543
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fig. THD Analysis without Filter [5] Erwin Kreyszig Advanced Engineering Mathematics, 9th Edition,
Wiley, New York, 2006.
[6] James Ward Brown and Ruel V. Churchill, Fourier Series, Mc
Graw - Hill International Edition, 7th Edition, New York, 2008.
544 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 545
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
546 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
to the best run in each case. Table 3 shows un-optimized optimization", Soft Computing for Problem Solving-Advances
in Intelligent Systems and Computing, 816, 2018, pp. 257-272.
and optimized values of the customer and energy based
[12]Aditya Tiwary, "Reliability evaluation of radial distribution
indices. system - A case study", Int. J. of Reliability: Theory and
Applications, 14, 4(55), 2019, pp. 9-13.
VI. CONCLUSION
[13]Aditya Tiwary, "Customer orientated indices and reliability
Customer and energy based reliability indices are evaluation of meshed power distribution system", Int. J. of
of great significance in predictive reliability performance Reliability: Theory and Applications, 15, 1(56), 2020, pp. 10-
19.
assessment of a distribution system. In this paper an
[14]Rajesh Arya, S.C. Choube, L.D. Arya, D.P. Kothari, "Reliability
algorithm for enhancement of reliability of engineering
enhancement of a radial distribution system using coordinated
system using Social Learning Particle Swarm aggregation based particle swarm optimization considering
Optimization (SL-PSO) for optimum modifications for customer and energy based indices" Applied soft computing, 12
(2012) 3325-3331.
failure rate and repair time is proposed. Different
statistics parameters such as average value, standard [15]R. Cheng, Y. Jin, "A social learning particle swarm optimization
algorithm for scalable optimization", Information Sciences, vol.
deviation has been obtained. Optimized values of failure 291, (2015) 43-60.
rates and repair times by the Social Learning Particle Table 1- Statistics of best fitness function values as obtained
Swarm Optimization (SL-PSO) is also obtained. using SL-PSO based on 30 numbers of runs.
Various customer and energy based indices were also Average value of best fitness function 19.0405
calculated based on the optimization technique. values
Standard deviation 0.0251
REFERENCES Minimum value of best fitness 19.0207
[1] D. Elmakias, New Computational Methods in Power System function
Reliability. (Springer International Edition, 2000). Maximum value of best fitness 19.1235
[2] I. Gertsbakh, Reliability Theory with Applications to Preventive function
Maintenance. (Springer International Edition, 2000). Table 2- Optimized values of failure rates and repair times as
[3] M.W. Gangel, R.J. Ringlee, Distribution system reliability obtained by SL-PSO techniques.
performance. IEEE Trans. PAS-1968 87(7), 1657-1665 (1968).
Variables Magnitudes as obtained by SL-PSO
[4] IEEE Committee Report, Bibliography on the application of 1 0.2381
probability methods in power system reliability evaluation. IEEE 2 0.0971
Trans. Power Appar. Syst. PAS-91, 649- 660 (1972).
3 0.2004
[5] IEEE Committee Report, Bibliography on the application of 4 0.1832
probability methods in power system reliability evaluation, 1971- 5 0.1973
1977. IEEE Trans. Power Appar. Syst. PAS-97, 2235-2242,
6 0.1000
(1978).
7 0.1000
[6] R.N. Allan, E.N. Dialynas, I.R. Homer, Modelling and evaluating
r1 6.9290
the reliability of distribution systems. IEEE Trans. PAS-98, 2181-
2189 (1979).
r2 7.7864
r3 8.1587
[7] R. Billinton, R.N. Allan, Reliability Evaluation of Engineering
r4 11.7020
Systems. (Springer International Edition, 1992).
r5 11.6380
[8] R. Billinton, R.N. Allan, Reliability Evaluation of Power System.
r6 7.9993
(Springer International Edition, 1996).
r7 11.9930
[9] R.N. Allan, R. Billinton, Probabilistic assessment of power Objective 19.0210
systems. Proc. IEEE 88(2), 140-162 (2000).
function
[10]Aditya Tiwary, "Inspection-Repair-Based Availability
Optimization of Distribution System Using Bare Bones Particle Table 3- Current and optimized reliability indices
Swarm Optimization", Chapter in Book Series Computational Current Optimized Threshold
Intelligence: Theories, Applications and Future Directions - S. No. Index
values values values
Volume II, Advances in Intelligent Systems and computing 799,
1 SAIFI 0.7200 0.4128 0.5
Springer, 2019.
2 SAIDI 8.4500 3.3020 4
[11]A. Tiwary, "Inspection-Maintenance-Based Availability
3 CAIDI 11.7361 7.9954 8
Optimization of Feeder Section Using Particle Swarm
4 AENS 26.4100 10.000 10
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 547
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-In this paper, DC micro grid fed with conversion; these converters are often used for low and
solar having the facility of bidirectional power flow medium power applications but for high power
has been proposed. The whole system works in applications, isolated converters are used [1]. One of
islanded mode supplying power to three-phase load the most commonly used isolated bidirectional converter
and to the single-phase load. Therefore, power
is Dual active bridge. The DAB is also known as the
electronics converters which supports the
bidirectional power flow is connected to the system.
solid-state transformer. The solid- state transformer
Among the various types of dc-dc converters, the consists of high frequency transformer and has many
dual active bridge is generally used in transferring applications [2]. DAB is a bidirectional DC-DC
the large power. This is the reason that is why it converter having a high frequency transformer in between
has been used in the proposed system. Because of [3]. A high-frequency inverter is found on the main side
constant utilization and over dependence on non- of the transformer, while a high-frequency rectifier is
renewable energy sources for power generation, found on the secondary side. There are various
vehicles, enterprises, the fossils fuel stores are configurations of these high frequency inverter and
exhausting at a disturbing rate. It won't be long rectifier. These may either be half bridge, full bridge or
when these sources will be wiped out. In this way, push-pull configuration [4]. In dual active bridge, the
there is a wide new enthusiasm towards the
voltage phases at both ends of the high frequency
sustainable power sources. Sustainable power
sources guarantee best alternative to handle the
transformer control the flow of energy. The modulation
issue of future demand of power without relying on technique which may be used for switching the switches
coal, oil, diesel and other conventional sources. of the dual active bridge may be either SQM (Square
There are numerous kinds of sustainable power HFL modulation), TRM (Triangular HFL modulation)
sources like sun-oriented resources, wind energy, or SIM (Sine HFL modulation). Among these
hydel energy, geothermal energy, tidal energy modulation technique SQM is most efficient in
which can be used as an alternative for conventional transferring large amount of power through the DAB,
sources. Index Terms-DC to DC Converter, DC but it suffers from the problem of high circulating current
to AC Converter, DC Micro-grid, Renewable [5]. The different modulation techniques utilised include
Energy Sources, PWM. modulation of single phase shifts, extensive phase shift
I. INTRODUCTION modulation, double phase shift modulation and three
phase shift modulation [6]. SPS is the most widely used
The whole world is shifting towards the usage of modulation technique used in DAB as it has got several
nonconventional energy sources, but due to uncertainty attractive features such less inertia, easy implementation
in the generation by these sources, there is a need for of soft switching techniques, better dynamic
the backup which can be in any form, it may be either performance but when the voltages at both the primary
be a simple rechargeable battery or any fuel cells. These side and secondary side of transformer is not matched
storage devices require the power electronics which a high circulating current flows through the circuit [7].
facilitates the bidirectional power flow. A bidirectional The DAB facilitates the bidirectional power flow which
converter such as the isolated and non-isolated may be is used for both the battery charging as well as
utilized for any application that requires DC-DC
548 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
discharging. DAB is connected to the DC micro grid Ratings of battery and solar array are decided
whose voltage needs to be maintained constant, the accordingly.
voltage balancing control technique is used so that
whatever be the conditions and varying loading A. PV array details
conditions, the controller tries to maintain the DC micro Solar module ratings: - VOC = 38.23, ISC =
grid voltage constant at 750 V [8]. The solar PV is 8.67A, IMPP = 8.2A, VMPP = 29.9V, PMAX =
connected to the DC micro grid which provides the 245.1W, Number of parallel strings = 15, Quantity of
power to both the load as well as charge the battery series-connected modules per string = 06, Quantity of
when it has surplus power. In other situations, when it cells in each module = 60, Let the power produced by
does not provide enough power the battery discharges the PV array be P watts and let sunlight falling is for 6
itself to meet the load demand [9]. The closed loop hours a day. Battery watt-hours to be supplied = (P-
control technique used for switching the switches of 10000) x5 +(P-2000) x1
dual active bridge manages the direction of power flow Average power supplied PV array to battery = ((P-
via DAB by changing the phase shift angle between the 10000) x 5
voltages at both the ends of transformer. The adequate
power flow through the DC micro grid maintains its + (P-2000) x 1) / 6 Watts
voltage constant at 750V. The three phases as well as Current flowing through the battery =((P-10000) x
the single-phase loads are connected through the 5 + (P- 2000) x 1) /(96 x 6) A
inverter, both single phase and three phase inverters
Charging current through the battery = Total ampere-
are working in the closed loop so that better rms voltage
hours of battery/6 hours = 3500/6 = 583.33((P-10000)
is maintained at the output of the inverter.
x 5 + (P-2000) x 1) /(96x 6) = 583.33, P = 57.99 kW.
II. PROPOSED METHODOLOGY
B. Battery bank details
The system proposed in this paper is for the remote
Battery used: - Lead acid battery, Rated Ampere
locations where there is no availability of the grid. In
hours capacity of the battery = 3500Ah, Nominal
villages the loads are generally of two types i.e. lighting
voltage = 96V, Initial SOC of battery taken = 50
loads which operates almost 24 hours a day, and other
percentage, Battery response time = 0.00001sec.
load is water pump load which generally operates 5
hours a day. The lighting loads are small single-phase C. Load details
loads generally of ratings equal to 1000W or 2000W
Water pump load: - 10kW, 400V, 50Hz, 3-phse
whereas pump load is used for irrigation purpose by
squirrel cage induction motor, Time of operation of load
the farmers. The motor which are used most frequently
= 5 hours per day Single phase load: 1. 3kW, 230V,
is 3 phase squirrel cage induction motor. The solar
50Hz, R-L load 2. 2kW, 230V, 50Hz, R-L load, Time
powered system with battery backup is very suitable
of operation each load = 24 hours.
system for such remote locations. The battery bank is
being attached to the bidirectional dc-dc converters D. Schematic diagram of the system proposed
which allows the flow of power in both the direction. In
The schematic diagram of the proposed system is
general lead-acid battery is used to store extra power
shown in the Fig. 1. The proposed square wave DAB
provided by the solar cells. The maximum number of
is shown in the Fig.
days when there will not be solar power is known as
the days of autonomy, depending upon the days of 1. It has two-level square wave inverter on the high
autonomy and keeping in mind that the battery needs voltage side which is connected to the solar array. This
to get charged within one day, the battery bank is PV array serves as the primary source of energy for
needed to be designed and the solar array must be the system, since it is linked to the inverter on the input
capable of providing that much amount of power. side. In order to maximize the power output of the PV
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 549
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
array, the solar PV is linked to the MPPT method. The priority. The control technique used is in such a way
MPPT technique used here decides the duty ratio of that under any unbalance conditions whether load is
the boost converter. The MPPT technique that has been getting changed or the irradiance is getting changed,
used in the proposed system is P and O i.e. Perturb the flow of power is always such that it maintains the
and Observe method. On the low voltage side of the constant voltage of 750V at the DC capacitor link. The
high frequency transformer a rectifier is connected which power produced by the solar array flows both to loads,
converts the square wave AC voltage to the DC voltage. and also to the battery, and if the power produced via
On the output side of the rectifier battery is connected. the solar array does not correspond to that required by
On the high voltage side an inductor of appropriate charging the battery will be charged, in this case, the
value is also connected which is main element in the battery will provide the leftover power. In the case when
DAB which helps in the flow of power via the dual there is almost zero generation by the solar array, then
active bridge. complete power will be delivered to the load by the
battery. To maintain the constant voltage at the dc link
a proper control technique is used which is being
discussed in further sections. Since both gravimetric
density as well as volumetric density of the lead acid
battery is high as compared to the other battery, in
general lead acid battery is used in most applications.
E. CLOSED LOOP CONTROL OF DAB
The control of dual active bridge is shown in the
Fig. 2. Where, Vref = 750V; Vdc:- dc micro grid voltage;
Pi: Input
Fig. 1. Simplified diagram of the system proposed.
flow via the dual active bridge. There are three modes is also a three phase water pump load. The dc link
of functioning, depending on the direction of power capacitor voltage is kept constant at 750V, during this
flow: (1) If the power of the array is higher than the mode SOC of battery increases, the phase shift between
load requested; (2) If the power of the array is lower the high voltage side and low voltage side in this case
than the load power required; (3) if the power of the will be positive i.e. VHV will lead VLV. Fig. 3 through
PV array is zero. MODE 1: When the power of the Fig. 14 shows the simulation results for this scenario.
PV array exceeds the power of the load The PV system In both Fig. 3(a) and Fig.3(b), the voltage across an
produces sufficient electricity to supply the load and inductor is displayed while the current is shown in Fig.
charge the battery during this operating mode. Fig. 2 3. (c). The difference in the phase shift of the voltage
shows the schematic diagram of the system functioning
in this mode. MODE 2: When power of the PV array
is lower than power of load. The PV array generates
electricity from this mode to the DC micro grid and the
remaining power required by load is sent via the battery.
MODE3: When PV array has zero generation. In this
mode the complete power demanded by the load is
given by the battery itself, during this mode the battery
discharges itself to provide the power demanded by
the load as well as maintains the DC micro grid voltage Fig. 3. (a) Primary side voltage (b) secondary side voltage (c)
constant at 750V. The rate of discharge of the battery Current through inductor.
in this case will be faster as compared that in the second across the inductor which is positive in this case
mode. facilitates the power flow through the DAB. The
F. SIMULATION RESULTS outgoing voltage and output currents shown in Fig. 4(a)
and Fig. 4(b) are shown as sinusoidal as shown in the
The power produced by the solar PV array is graph in a single phase load 1. In Fig. 4(c) and Fig.
uncertain i.e. it depends upon the environmental 4(d), the active and reactive power that passes through
conditions. In case of solar powered system, it depends the load is displayed. The system is working such that
upon the temperature and irradiance on the solar panel. it is providing the power as per demanded by the load
With this uncertainty there is a need of backup for as can be seen from the graph. The exit voltage and
ensuring the continuous power flow to the load. Also, output current is shown in Fig. 5(a) and Fig. 5(b) by
the battery needs to be charged as well as the single stage load 2 as shown in the graph. The load is
discharged, this requires the power electronics sinusoidal In Fig. 5(c) and Fig. 5(d), the active and
converters which facilitates the bidirectional power flow. reactive power flowing through the load is illustrated.
The system developed here consist of DAB which is Fig. 6(a) and Fig. 6(b) shows the active power and
intermediate between the DC micro grid and battery. reactive power demanded by the three-phase load, as
DAB controls the energy flow to the load by the battery can be seen from the graph both the wave-forms are
depending upon the power generated by the PV array. constant which shows the proper functioning of the
The simulation results of all the above discussed modes system. The output voltage of the three-phase inverter
are shown as follows. The solar generates electricity, in is shown in the Fig. 6(c), the output voltage is sinusoidal
this instance it supplies the leftover power, to feed the with very less total harmonic distortion (THD) value.
demand as well as the batteries. This mode of operation
is known as the buck mode. The power is balanced
among the solar power, battery power and load power.
There are three loads connected to the system, two
single phase loads are connected in parallel, and there
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 551
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fig. 5. (a) Output voltage (b) Output current (c) Active power
(d) Reactive power of single phase load 2.
Fig. 6. (a) Active power (b) Reactive power (c) Output voltage
of the three phase load.
Fig. 8. (a) Primary side voltage (b) Secondary side voltage (c)
CASE 1: If the energy is less than the energy of the Current through inductor.
solar system. If this is the case, the power provided by
the photovoltaic array is lower than that needed for Fig. 9(a), and Fig. 9 (b) illustrates a single phase
charges, so the battery supplies the balance power, if load, which is sinusoidal as shown in the graph, the
power flows from the side of the low voltage to the output voltage and output current. Fig. 9(c) and Fig.
552 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
9(d) illustrate the active and the reactive power through the voltages at the primary and secondary side of the
the load. The system is working such that it is providing transformer is negative ensuring the flow of power from
the power as per demanded by the load as can be seen battery to load via dual active bridge. The voltage across
from the graph. Fig. 10(a) and Fig. 10(b) shows the DC capacitor link is maintained at 750V. The simulation
output voltage and output current through the single- results of the system working in this mode is shown in
phase load 2 which is sinusoidal as can be seen from the Fig. 12 to Fig. 14. The power produced by the PV
the graph. The active and the reactive power flowing array is shown in the Fig. 12(a), except for the some
through the load is shown in the Fig. 10(c) and Fig. transient as can be seen from the graph, the power
10(d) respectively. The system is working such that it delivered by the solar array is zero here. Fig. 12(b)
is providing the power as per demanded by the load as shows the power flowing via DAB from the battery
can be seen from the graph. which is constant as expected. The power flowing
through the different components of the system
maintains the constant voltage across the capacitor.
Fig. 9. (a) Output voltage (b) Output current (c) Active power
(d) Reactive power of single phase load 1.
Fig. 11. (a) Output voltage (b) Output current (c) Active power.
Fig. 10. (a) Output voltage (b) Output current (c) Active power
(d) Reactive power of single phase load 2. Fig. 12. (a) Power given by PV array (b) Power delivered by
battery.
Fig. 11(a) and Fig. 11(b) shows the active power
The output voltage and output current is shown in
and reactive power demanded by the three phase load,
the graph Fig. 13(a) and Fig. 13(b) via single-phase
as can be seen from the graph both the waveforms are
load 1 which is sinusoidal. In Fig. 13(c) and Fig. 13(d)
constant which shows the proper functioning of the
are the active and the reactive power which flows
system. The output voltage of the three phase inverter
through the load. The system is working such that it is
is shown in the Fig. 11(c), the output voltage is sinusoidal
providing the power as per demanded by the load as
with very less THD value. CASE 2: When solar power
can be seen from the graph. Fig. 14(a) and Fig. 14(b)
is zero Here the PV generated is zero. This situation
depicts the output voltage and output current through
may arise on cloudy days when there is no sunlight. In
the single phase load 2 which is sinusoidal as can be
this case the whole power that is required by the load
seen from the graph. The active and the reactive power
is being provided by the battery itself. Here the battery
flowing through the load is shown in the Fig. 14(c) and
will get discharged at very fast rate as can be seen from
Fig. 14(d) respectively. The system is working such
the SOC graph of the battery. The phase shift between
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 553
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
that it is providing the power as per demanded by the for control of power flow via DAB is SPS (Single-
load as can be seen from the graph. phase shifted) modulation technique. Single-phase shift
modulation technique is the simplest among all the
modulation technique. The control technique has been
used compares the power input to the dual active bridge
and the grid power and depending upon the difference
of the power, proper gate signals are generated which
creates the phase shift between the voltages at the two
ends of the high frequency transformer. The whole
system has been studied and simulated under varying
irradiance conditions. The varying irradiance generates
different power which is either equal to, greater than or
less than the load power. Accordingly, phase shift
changes and ultimately the power required by the load
Fig. 13. (a) Output voltage (b) Output current (c) Active power is maintained and voltage across the dc micro grid is
(d) Reactive power of single phase load 1.
kept constant. The closed loop single-phase and three-
phase inverter has been developed which mitigates the
voltage fluctuation at the input side of the inverter and
maintains the constant rms voltage at the output of the
inverters feeding the single-phase and three-phase AC
load.
REFERENCES
[1] K. Tytelmaier, O. Husev, O. Veligorskyi and R. Yershov, "A
review of non-isolated bidirectional dc-dc converters for energy
storage systems," 2016 II International Young Scientists Forum
on Applied Physics and Engineering (YSF), Kharkiv, pp. 22-28,
Fig. 14. (a) Output voltage (b) Output current (c) Active power
2016.doi: 10.1109/YSF.2016.7753752.
(d) Reactive power of single phase load 2. [2] X. She, A. Q. Huang and R. Burgos, "Review of Solid-State
Transformer Technologies and Their Application in Power
III. CONCLUSION Distribution Systems," in IEEE Journal of Emerging and Selected
Topics in Power Electronics, vol. 1, no. 3, pp.186-198,
In this paper, DC micro grid fed with solar having Sept.2013. doi: 10.1109/JES TPE.2013.227791.
the facility of bidirectional power flow has been
[3] H. Qin and J. W. Kimball, "Solid-State Transformer Architecture
proposed. The whole system works in islanded mode Using AC-AC Dual- Active Bridge Converter," in IEEE
supplying power to three-phase load and to the single- Transactions on Industrial Electronics, vol. 60, no. 9, pp.3720-
phase load. There are various form of energy storage 3730, Sept. 2013. doi: 10.1109/TIE.2012.2204710.
system like mechanical, thermal etc., among these the [4] W. Jing, C. Hung Lai, S. H. W. Wong and M. L. D. Wong, "Battery-
super capacitor hybrid energy storage system in standalone DC
electrical form of energy storage is the most suitable microgrids: a review," in IET Renewable Power Generation, vol.
form. The battery connected to the system is the 11, no. 4, pp. 461469, 3 15 2017.doi: 10.1049/iet-rpg.2016.0500.
rechargeable, this needs to be charged at regular interval. [5] B. Zhao, Q. Song, J. Li, Y. Wang and W. Liu, "High-Frequency-
Therefore, power electronics converters which supports Link Modulation Methodology of DC-DC Transformer Based
the bidirectional power flow is connected to the system. on Modular Multilevel Converter for HVDC Application:
Comprehensive Analysis and Experimental Verification," in IEEE
Among the various types of dc- dc converters, the dual Transactions on Power Electronics, vol. 32, no. 5, pp. 3413-
active bridge is generally used in transferring the large 3424, May 2017.doi: 10.1109 /TPEL.2016.2586196.
power. This is the reason that is why it has been used in
the proposed system. The modulation technique used
554 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[6] B. Zhao, Q. Song, W. Liu and Y. Sun, "Overview of Dual Active- [8] M. A. Moonem, T. Duman and H. Krishnaswami, "Capacitor
Bridge Isolated Bidirectional DC-DC Converter for High voltage balancing in a neutral-point clamped multilevel dc-dc
Frequency-Link Power-Conversion System," in IEEE dual active bridge converter," 2017 IEEE 8th International
Transactions on Power Electronics, vol. 29, no. 8, pp. 4091- Symposium on Power Electronics for Distributed Generation
4106, Aug. 2014.doi: 10.1109/TPEL.2013.2289913. Systems (PEDG), Florianopolis, pp. 1-7, 2017.doi: 10.1109/
PEDG.2017.7972484.
[7] V. Karthikeyan and R. Gupta, "Zero circulating current modulation
for isolated bidirectional dual-active bridge DC-DC converter," [9] V. Karthikeyan and R. Gupta, "Varying phase angle control in
in IET Power Electronics, vol.9, no. 7, pp. 1553-1561, 6 8 isolated bidirectional DC-DC converter for integrating battery
2016.doi:.10.1049/iet-pel.2015.0475. storage and solar PV system in standalone mode," in IET Power
Electronics, vol. 10, no. 4, pp. 471-479, 31 3 2017.doi: 10.1049/
iet- pel.2016.0162.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 555
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract:Distribution feeder protection could condition. Generally, the distribution feeder is the one
before long be convoluted by non-radial flows of which carries/transmits electricity from the generating
real and reactive power accessible from high station (or) substation to the distribution system. In these
infiltration disseminated age and conceivably from feeders there are no tapings are taken at the any ends,
miniature frameworks. Distinguishing ground
so the total current that is flowing in the feeder remain
issues in power circulation frameworks is a testing
same from the start to end. Some time because of the
task. The test comes from framework establishing
setup, load association, and accessible flaw current fault conditions these feeders may prone to the overload
from deficiencies with issue impedance. Because conditions. These over load conditions can be achieved
of the closeness of force appropriation lines to by the use of electromagnetic relay for the tripping of
homes and structures, ground flaws can represent the circuit breaker.By the use of these conventional
a danger through likely electrical contact or fire methods of using the electromagnetic relays, Latching
starting. The dangers expect utilities to reevaluate relays, Electronicrelays.etc may take some time and
the test of dependably distinguishing a ground issue also does not give the accurate value of the current
to limit the perils of a brought-down power line. which causes the over current. Also, by using these
This paper will exhibit the limits of non directional conventional methods the accurate Earth fault detection
over current assurance and the entanglements of
is very tough. This can achieved by using the micro
an inappropriately arranged directional component.
controller based circuit to detect the current and type
A novel arrangement utilizing directional over
current components further got by a heap of faults say the current that is causing in the phases or
infringement capacity can take care of these issues. due to earth fault.
This methodology has been approved in
1.1 Necessity of this paper
sustainable plant authority circuit assurance
applications over a wide scope of working By the increase in demand of electricity the protection
conditions. List Terms-Directional over current, also increased. This leads to the continuous supply of
circulated age, conveyance insurance, feeder electricity. The main aim of this paper is to protect the
assurance, future dissemination feeder, load bus bar from the over load current condition in a very
infringement, inexhaustible feeder security, Smart accurate way. Also, serving the Earth faults is also
Grid, VAR controls.
necessary for the smooth operation of the system.
1. INTRODUCTION Whenever the fault occurs and the protection is not
done in the times within recovery time, the devices may
Now a days continuous usage of electricity has
get damaged. In order to prevent the damage of the
become a necessity with the improvement in modern
feeders in the systems accurate tripping is required. The
life style. Continuous supply of electricity need to be
replacement of the faulty bus bar with the new one is
achieved by reducing the fault conditions in the various
time taking and not economical.
sections of the generation, Transmission and distribution.
One among them for the continuous distribution of By using this paper we can protect the circuit from
electricity is protecting the feeder from the fault over current faults in phases and ground by taking
556 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
minimum time to disconnect the fault circuit and also it consists of feeder.The right side of the paper is feeder.
provides the accurate tripping. It also provides the trip The feeder is the combination of three phase terminals
current at which the over load condition occurred and and neutral, three phase fuses and three phase circuit
it is displayed on the LCD. breakers. The three phase circuit breaker is connected
to three phases and has current transformers. This three
2. BLOCK DIAGRAM current transformers are connected to the R, Y, B phase
and one current transformer is connected to neutral.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 557
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
558 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Trip of alarm indicator card and Indicators: These inputs calculations will be done by
trigonometrically in microcontroller by program.
Outputs of microcontroller will be connected to trip
alarm card to trip the three phase circuit breaker.
Liquid crystal display:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 559
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
560 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
controlling the home appliances High voltage current value then it trips the over load current which is
transformer as a backup protection. called over load fault.
Transformer protection is designed to limit the
damage and system disturbance caused by fault that
occurs in power transformer. Vey often the transformer
protection system must provide backup protection for
bus bars connected to the transformer sometimes the
transformer protection system is main protection for
bus bars connected to the transformer. In many cases
the transformer protection system provides backup
protection for power lines connected to these bus bars.
The transformer protection has to detect and determine
if it is shall operate on abnormal conditions and external
fault. In case of internal fault, the transformer protection
has to detect the fault and initiate the tripping of circuit
breakers. The transformer protection has to limit damage
to the transformer at overload and at low frequency.
The protection has to disconnect the consumers if
voltage becomes too high. Figure5.1:- Over load phase fault
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 561
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
562 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract:-This work deals with the design and researcher is required. Certain efficacious control
implementation of a new charger for battery strategies need to be developed to integrate them with
operated electric vehicle (BEV) with power factor the existing distribution system. Some of the above
improvement at the frontend. In the proposed mentioned strategies are correlated with the power
configuration, the conventional diode converter at
quality issues addressed by the EV chargers that
the source end of existing electric vehicle (EV)
battery charger, is eliminated with modified
associate with the charging process of battery packs
Landsman power factor correction (PFC) converter. [4-5]. Therefore, an efficient power factor correction
The PFC converter is cascaded to a flyback (PFC) technique, which eliminates the adverse effects
isolated converter, which yields the EV battery of input DBR as well, is needed at the front-end of the
control to charge it, first in constant current mode conventional DBR fed charger.
then switching to constant voltage mode. The
proposed PFC converter is controlled using single
sensed entity to achieve the robust regulation of
DC-link voltage as well as to ensure the unity power
factor operation. The proposed topology offers
improved power quality, low device stress, low
input and output current ripple with low input
current harmonics when compared to the
conventional one. Moreover, to demonstrate the
conformity of proposed charger to an IEC 61000-
3-2 standard, a prototype is built and tested to
charge a 48V EV battery of 100Ah capacity, under
transients in input voltage. The performance of the
charger is found satisfactory for all the cases.
INTRODUCTION
Fig. 1 Conventional E-Rickshaw Battery Charger: (a)
With the strict supervision on emissions, fuel savings, Configuration (b) Measured input current, input power and
THD in input current
global warming issues and limited energy resources, the
contribution of electric mobility is significant towards
the development of sustainable and efficient alternative
in the transport sector [1-2]. Regarding this, a survey
based on the present scenario and future technologies
for the propulsion of electric vehicle (EV), are presented
in [3]. The electric mobility provides several advantages
over the conventional petrol- and diesel-powered
vehicles. However, to incorporate the transportation
electrification thoroughly, deep attention of the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 563
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
TABLE I. SPECIFICATION OF E-RICKSHAW UNDER Fig. The two circuit configurations of a buck converter: On-
CONSIDERATION state, when the switch is closed, and Off-state, when the
switch is open
CONVERTERS
BUCK CONVERTER
A buck converter is a step-down DC to DC
converter. Its design is similar to the step-up boost
converter, and like the boost converter it is a switched-
mode power supply that uses two switches (a transistor
and a diode), an inductor and a capacitor.
The simplest way to reduce a DC voltage is to use a Fig Naming conventions of the components, voltages and
current of the buck converter.
voltage divider circuit, but voltage dividers waste energy,
since they operate by bleeding off excess power as
heat; also, output voltage isn't regulated (varies with
input voltage). Buck converters, on the other hand, can
be remarkably efficient (easily up to 95% for integrated
circuits) and self-regulating, making them useful for tasks
such as converting the 12-24 V typical battery voltage
in a laptop down to the few volts needed by the
processor.
Theory of operation
564 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 565
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
566 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
data. This is because derivative action is more capability. Simulink is a tool used to visually program a
sensitive to higher-frequency terms in the inputs. dynamic system (those governed by Differential
• Without derivative action, a PI-controlled system is equations) and look at results.
less responsive to real (non-noise) and relatively fast
CONCEPT OF SIGNAL AND LOGIC FLOW:
alterations in state and so the system will be slower
to reach setpoint and slower to respond to In Simulink, data/information from various blocks
perturbations than a well-tuned PID system may be. are sent to another block by lines connecting the relevant
blocks. Signals can be generated and fed into blocks
METHOD FOR TUNING PI CONTROLLER
dynamic / static).Data can be fed into functions. Data
PI-controllers have been applied to control almost can then be dumped into sinks, which could be scopes,
any process one could think of, from aerospace to displays or could be saved to a file. Data can be
motion control, from slow to fast systems. With changes connected from one block to another, can be branched,
in system dynamics and variation in operating points multiplexed etc.
PI-controllers should be retuned on a regular basis.
Adaptive PI-controllers avoid time-consuming manual
tuning by providing optimal PI-controllers settings
automatically as the system dynamics or operating points
change. There are various conventional methods used
for tuning of PI-controller such as
1. Trial and error
2. Continuous cycling method (Ziegler Nichols method)
3. Process Reaction Curve Methods (Ziegler-Nichols
and Cohen-Coon methods)
Fig4.1 Simulink library browser
4. Ziegler-Nichols method (both types of responses)
5. Cohen-Coon method (self regulating response only) Connecting blocks:
MATLAB SOFTWARE
Matlab is a high-performance language for technical
computing. It integrates computation, visualization, and
programming in an easy-to-use environment where
problems and solutions are expressed in familiar
mathematical notation. Typical uses include Math and
computation Algorithm development Data acquisition
Modeling, simulation, and prototyping Data analysis,
exploration, and visualization Scientific and engineering
graphics Application development, including graphical Fig 4.2 Connecting blocks
user interface building. To connect blocks, left-click and drag the mouse
from the output of one block to the inputof another
SIMULINK:
block.
Simulink is a software add-on to matlab which is a
mathematical tool developed by The Math works,(http:/ SOURCES AND SINKS:
/www.mathworks.com) a company based in Natick. The sources library contains the sources of data/
Matlab is powered by extensive numerical analysis signals that one would use in a dynamic system
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 567
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
simulation. One may want to use a constant input, a difficult to arrive at an analytical solution for a system
sinusoidal wave, a step, a repeating sequence such as having non-linearity's such as saturation, signup function,
a pulse train, a ramp etc. One may want to test limited slew rates etc.
disturbance effects, and can use the random signal
generator to simulate noise. The clock may be used to
create a time index for plotting purposes. The ground
could be used to connect to any unused port, to avoid
warning messages indicating unconnected ports.
Mathematical operations:
Fig Sources and sinks Mathematical operators such as products, sum,
logical operations such as and, or, etc. .can be
CONTINUOUS AND DISCRETE SYSTEMS: programmed along with the signal flow. Matrix
All dynamic systems can be analyzed as continuous multiplication becomes easy with the matrix gain block.
or discrete time systems. Simulink allows you to Trigonometric functions such as sin or tan inverse (at
represent these systems using transfer functions, an) are also available. Relational operators such as
integration blocks, delay blocks etc. 'equal to', 'greater than' etc. can also be used in logic
circuits
Non-linear operators:
A main advantage of using tools such as Simulink is
the ability to simulate non-linear systems and arrive at
results without having to solve analytically. It is very
568 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 569
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-This paper presented the use of Recently, new control technique and technological
artificial intelligent based neural network control have appeared suggesting that new approaches could
tracking systemfor better harnessing of sun's be found on thebasis of intelligent mechatronic
energy. The sun tracking aalgorithm is developed systems.Since the maximumamount of solar energy,
to track sun position to receive maximum solar
captured by the solar cell, is related to the accuracy for
radiations. Robotic arm with four degreeof freedom
tracking sun'sposition,then a high efficient sun tracking
was used as a mechanical structure to position the
solar cell under the sun for greater flexibility. The controller should be considered. In previous years
implementation of the artificial intelligent control several methods have been proposed to improve
solar tracking system was done while the testing tracking systems for following the trakectory of the sun
was conductedthrough experimental measurement. basedon orientation and tilt motion control. These
From the result, the power output of solar cell methods includes: optimizing tilt and orientation angles
placed on artificial intelligent robotic arm tracking of solar usinggeographical latitudes information.In this
system produced twenty percentincrease when paper, the most relevant prominent control method, in
compared with that of fixed position solar cell. solar applications have been introduced in the field of
Keyword-solar tracking, solar cell, neutral artificial intelligent which include; robotic arm tracking
network sunposition systems using neural network control based on light
sensors, ambient temperature and electric load
1. INTRODUCTION
variations. The characteristic of the solar radiation are
The world demand of electrical powerhas been constantly variable. The atmospheric conditions, climate,
increasing rapidly every day. In Nigeria, the major the geographiccharacteristics, among others, are the
source of electricity generation is through Hydro and most important to parameters thatdetermine the solar
thermal. The fact that theproduct ofpetroleum products radiation quantity that is received on a given point of
and gases were convertedintoelectricitymakesthe cost the earth. The characteristics above were considered
of petroleumproductsexpensive in Nigeria. Thesun in the implementation of the robotic arm sun tracking
beingarenewable andunlimited source of energy has system. Experimental resultsvalidate the performance
been found to be vital alternative. Extracting of the tracking system.
usableelectricity from the sun was made possible by
the discovery of the photoelectric effect and subsequent 2. SUN POSITION MODEL
development of solar cell, a semi-conductivematerial The position of a point P on the earth's surface with
that convert visible light into electricity directly. respectto the sun's rays is known at any instant if the
Researchers in the field of photovoltaic are faced latitude, l, and hour angle, h, for the point, and the sun's
with thetask of looking for solutions that can make solar declination angle, d, are known. It is explained in Figure.
cells moreefficient.One of reliable ways that can 1
enhance the poweroutput of solar is the use of solar
tracking systems Although our conventional tracking
systems have their own limitation.
570 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
(a) Latitude
Latitude, l, is the angular distance of the point P north
(or south) of the equator. It is the angle between OP
and the projection of OP on the equatorial plane
Armstrong S. (2005). The centre of the earth is denoted 3. CALCULATION OF CLOCK TIME AND
by O. North latitudes are considered positive and south SOLARTIME
latitudes are considered negative.
Calculation of sun position must be made in terms
(b). Hour Angle of solar time. In order to know sun position, we are to
convert local clock time into solar time. The conversion
The hour angle, h, is the angle measured in the earth's
between solar time and clock time requires knowledge
equatorial plane between the projection of OP and the
of the location, the day of the year, and the standards
projection of a line from the centre of the sun to the
to which local clocks are set. Time of Greenwich
centre of the earth. It is measure from local solar noon,
meridian (zero longitude) is knownas Greenwich Civil
being positive in the morning and negative in the
Time or Universal Time.Such time is expressed on an
afternoon. Onehour of time is represented by 360/
hour scale from zero to 24.
24=15 degrees of hour angle.
Local Civil Time is found from the precise longitude
(c) Delination Angle of the observer. On any particular meridian, Local Civil
The plane that includes the earth's equator is called time is more advanced at the same instant than on any
the equatorial plane. If a line is drawn between the center meridian further west and less advanced than on any
of the earth and the sun, the angle between this line and meridian further east. [Armstrong .S (2005). The
the earth's equatorial plane is called the declination. difference amounts to 1/15 hour (4 minutes) of time for
Henry .S. (2014).The declination is positive when the each degree difference in longitude.
sun's rays are north of the equator and negative when Clocks are generally set to give the same reading
they are south of the equator. At the time of dry season, throughout an entire area with a span of about 15
the sun's rays are 23.5 degrees south of the earth's degrees of longitude. The time kept in each such area
equator and the sun's rays are 23.5 degrees north of or zone is the Local Civil Time of a meridian near the
the earth's equator. At the time of the canney season, centre of the area.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 571
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Such time is called Standard Time. In many parts of After calculating Local Solar Time, the solar hour
the world, clocks are advanced beyond Standard time angle, h can be calculated. As hour angle varies by 15
in Daytime and such time is called Daylight saving time. degrees per hour and as it is zero at solar noon, and
Time measured with respect to the apparent diurnal negative before solar noon, the equation for the hour
motion of the sun is called Apparent Solar time, Local angle can be given by
Solar Time, or simply Solar time. A solar day is slightly Suugur B (2007)
different from a 24 hours civil day due to irregularities h = 15(LST - 12)………………………… (3)
of the earth's rotation, obliquity of the earth's orbit and
some other factors. The difference between Local Solar 4. MODELLING OF SOLAR CELL
Time, LST and Local Civil Time, LCT is known as the The simplified equivalent circuit of a solar cell consists
equation of time. of a diode and a current source connected in parallel
The solar time and the clock time can be related as (Fig. 2.). The current source produces the photocurrent
LST = G+ (1 15) (L STD -L loc ) + EOT - Iph, which is directly proportional to solar irradiance.
DT……… (1) The two key parameters often used to characterize a
solar cell are its short-circuit current and its open-circuit
Where, voltage which are provided by the manufacturer's data
LST= Local solar time [hr] sheet. The equation ofthe current voltage Ipv-Vpv
simplified equivalent circuit is derived from Kirchhoff's
CT= Clock Time [hr] law.
L STD = Standard meridian of the local time zone. We have
Lloc= Longitude of actual location [degrees west] Ipv = Iph - Id--------------------------. (4)
EOT= Equation of time [hrs]. Where
DT= Daylight Savings Time correction, ( DT=0 if Id = I0
not on
-
Daylight savings time, otherwise DT is equal to the
number of hours that the time is advanced for daylight 1 …………………………………......(5)
savings time, usually 1hr). Thus
Values of the Equation of Time, E, are calculated as IPV = Iph - I0
[2] -
-
E=0.165 sin 2B - 0.126 cos B - 0.025 sin B
……..(2) 1 ……………………….….................(6)
572 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Figure : Test Bed for Measurement Set Up 7. Henry S. (2014): "Maximum Power Tracking for Photovoltaic
Power System: Development and Experimental Comparison of
two algorithms. Renewable Energy, 35, 2381-2387.
8. Hughes R.O. (2004): "Robust Tracking and Model following the
certain dynamic Delay systems by Memoryless Linear
Controllers". IEEE Transactions on Automatic Control, page
1473-1481.
9. Romanaova P. (2012): "Theoretical Investigation of Energy Gain
by Absorption of Solar Radiation in Clouds pergamon Press
England.
10. Suugur B. (2007): "A Modified Tracking Algorithm for Maximum
Power Tracking of Solar Array. Energy.
574 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: The purpose of this paper is to acquire security. A powersystem consists of components such
the remote electrical parameters like feeders as generators, lines, transformers, loads, switches, and
status ON, OFF along with these it sends the values compensators. However, widely dispersed power
of current or voltage in the form of alerts to control sources and loads are the general configurations of
room / personnel through the WIFI. This paper is
modern power systems. Today electricity still suffers
also designed to protect the electrical circuitry by
from power outages and blackouts due to the lack of
operating a relay. This relay gets activated
whenever the electrical parameters exceed the automated analysis and poor visibility of the utility over
predefined values. This system can be designed the grid. As the complexity of the distribution network
to send alerts whenever the relay status on and off has grown, automation of substations has become a
or whenever the voltage or current exceeds the need of every utility company to increase its efficiency
predefined limits. This paper makes use of a and to improve the quality of power being delivered.
microcontroller, in this paper ESP32 Micro Monitoring the status of the feeder can be done in May
controller is used it having built in WIFI. The was, but here we are considering the GSM module for
controller can efficiently communicate with the monitoring in the form of SMS tomobile. Supply Circuit,
different sensors being used and it is programmed Current and voltage sensing circuit, Current
with C++ language. This system also can
Transformer, a relays circuit, and a usermobile better
automatically send the real-time electrical
known as a cellphone.
parameters when the status is changed in the form
ofSMS. This system can be designed to send SMS II. BRIEF OVERVIEW OF THEPAPER
alerts whenever the feeder status changes on, off
or whenever the current exceeds the predefined The purpose of this paper is to acquire the remote
limits. electrical parameters like voltage, current, and real- time
status of the feeder in a substation or factory and send
Keywords:ESP 32 Microcontroller, Relay,
Feeder,LCD,IPOP Card, Current sensing Card, these real-time values over the network using theWIFI
current transformer. module. This paper is also designed to protect the
electrical circuitry by operating an Electromagnetic relay.
I. INTRODUCTION (FIRST This relay gets activated whenever the electrical
LEVELHEADING) parameters exceed the predefined values. The relay can
Electricity is an extremely handy and useful form of be used to switch off the electrical supply to the outgoing
energy. It playsanever-growing role in our moderni feeder of a substation. Here mainly we are monitoring
ndustrialized society. The electrical power systems are three conditions, those are whether the Circuitbreaker
highly non-linear, extremely huge, and complex is in an off state, on, or tripped. This system can be
networks. Such electric power systems are unified for designed to send alerts whenever the relay trips or
economic benefits, increased reliability, and operational whenever the voltage or current exceeds the predefined
advantages. They are one of the most significant limits in the form of SMS to mobile.
elements of both national and global infrastructure, and
when these systems collapse it leads to major direct
and indirect impacts on the economy and national
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 575
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
576 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 577
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Figure shows the interfacing of microcontroller with In this paper 220KV feeders are used. Feeders
LCD,pin26 i.e. SDA and pin 29 SCL, VCC, Ground transmits electrical energy from substation or generating
pins are connected to LCD. LCD takes information station to distribution. Feeder is also known as switch
from the ESP32 Microcontroller through the above gear unit. Switch gear is a combination of busbar,
mentioned pins. isolator toggle switch .12v supply is given to the switch
gear from the step down transformer. Current
VII. COMPONENTS USED IN PROPOSED transformer is connected to the incoming feeder which
PAPER will continuously sense the Current to the current sensing
Basically, we classify the components of our card based on the program in the microcontroller itsend
proposed paper into two categories they are Electrical signals of feeder status along with current or voltage
Components and Electronic Components as shown in values. circuit breaker and earth switch is connected to
figure 4 the feeder. That circuit breaker and earth switch is
interlocked witheach other.
In this 2 pole PLA relay will act as the circuit breaker.
when we switch on the power supply then the circuit
breaker beon and then switch on the load in this paper
40W choke be acts as aload. If one is on i.e. circuit
breaker is on state then Earth switch should be in Off
state for this purpose interlocks are provided between
the circuit breaker and Earth switch. In this 2 pole
change over relay will acts as a Earth switch.
2. ESP32 Microcontroller:
Figure 5:ESP32Microcontroller:
578 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
4. IPOP Card: Power supply card is used to supply the power i.e.
5VDC to the ESP32 Microcontroller. It is the
IPOP Card stands for input and output card .it takes combination of SMPS, step down transformer, full wave
supply from the SMPS 12V DC for functionality of bridge rectifier. when step down transformer input is
IPOP card. Since all the electronic devices works on 230v and it gives 12v AC from this full wave bridge
DC supply. In this paper rectifier is used to convert ac to dc and it fed to the
5. LCD Display: capacitor for smoothening the dc voltage . Here, in this
paper power supply card supplies dc power i.e. 12v
LCD stands for Liquid Crystal Display it is used the dc to the circuit breaker and earth switch. And it supplies
display the status of feeder along with this it displays 5v dc to the ESP32 Microcontroller because the
current or voltage values of the feeder. ESP32 microcontroller takes 5v dc for functionality.
Microcontroller is communicates the LCD. IPOP takes
inputs from the feeder and gives signals to the ESP32 Explanation of proposed paper:
microcontroller through the output card. The main theme of this paper is to monitor the status
of the feeder through mobile at any remote location
through the WIFI. In this paper ESP 32 microcontroller
is used.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 579
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
VIII. SCHEMATIC DIAGRAM AND ITS When 12v dc supply is connected to the IPOP card
OPERATION i.e. input and output card. It is a combination of terminal
connectors,diodes, 4N 35optocouplers, resistors,
2N22A transistors and LEDs. The function of this card
is input of HMI is given to IPOP card then further it will
be connected to ESP32 Microcontroller. and the output
of the ESP 32 is connected to IPOP card since the
output generated by the ESP32 is not sufficient to Drive
the electromagnetic relays i.e. circuit breakers so, the
output of the ESP 32 is amplified by a transistor 2N22A
and the amplified voltage is given to the electromagnetic
relays which acts asa circuit breaker and Earth switch
coming to the feeder or switch gear unit it is a
combination of current transformer, toggle switch, trip
indicator, circuit breaker and earth switch at last load is
used. The output of the current transformer is fed to
the current sensing card this card continuously sensing
the current and it convert the current into voltage and
Fig 7: Schematic Diagram
voltage is connected to ESP32.
Figure shows the schematic diagram of this paper.
When circuit breaker is on and close the earth switch
This schematic can be divided into two parts one is
so, that the residual voltage discharged to the
electrical and another one is electronics. Electrical parts
ground.since this feeder .finally ESP32 microcontroller
consists of AC system, Feeder and coming to the
it takes inputs from the IPOP card and C.S card based
electronics part it consists of IPOP,ESP32
on the program in the microcontroller it will work. And
Microcontroller, current sensing card, circuit breaker,
it sends alert message to the control room and
earth switchetc.
respective substation engineer. And also it displays
And four push buttons are used, two push buttons information on the LCD display i.e. liquid crystal display.
are used to control the circuit breaker and another two
push buttons are used to control the earthswitch. IX. RESULT
When power supply is on ac system takes power The main objective of this paper it continuously
supply from the terminal blocks i.e. 220V AC and this monitors the status of feeder whether it is ON, OFF
power is flow through the SMPS i.e. switch mode .and also it monitors the current flow through the feeder
power supply and this converts 220v ac to 12v dc. line if any over current are occurred it sends alert
And this 12v dc is flow through the IPOP Card. And messages to the control room and also respective
again the power supply is given to the step down substation engineer. What ever the information is send
transformer , this step down transformer takes 220v in the form of SMS same will be displayed on LCD.
ac and it step down that voltage into 5v ac .since the X. CONCLUSION
electronic components functions with dc supply. So,
the secondary 5v ac is fed to the full wave bridge rectifier Monitoring means acquiring significant parameters
, it is used to convert the ac voltage to dc voltage so, it from the assets of interest. The acquired data is feasible
converts 5v ac to 5v dc and output of this regulated by to be used for analyses and diagnose the condition of
the 7805 Mosfet regulator again capacitor is connected the assets which is of great use for maintenance
to smoothen this dc supply voltage and this 5v dc is scheduling, failure management and controlling system
flow trough the ESP32Microcontroller. and this method minimizes time contact between human
580 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
and high voltage device. As it is known, most substation 3) D. Pal, R. Meyur, S. Menon; M.J.B. Reddy; D.K. Moha, "Real-
time condition monitoring of substation equipment using thermal
devices have high voltage and generate electromagnetic cameras", Published in: IET Generation, Transmission &
that can harm human health. This proposed system is Distribution, (Volume: 12, Issue: 4, 2 27, 2018)
specially designed for monitoring of substation feeder 4) D. Hanafi, M.N. Ribuan, I.A. Wibowo, H. Hashim, M.I. Ismail
which are deployed at dispersed locations There are "Simulation of substation integrated monitoring system using
many parameters to be quantified and monitored LabVIEW", Transaction on Power System Distribution, ISSN:
2229-8711 Online Publication, June 2011.
periodically. It is quite costly and difficult to monitor
5) J. Singh, Y. R. Sood, R. K. Jarial and P. Verma,"Condition
the parameters by appointing a person at all locations Monitoring of Power Transformers", Bibliography Survey, vol.
and furthermore the data would also be error prone if 24, no. 3, pp. 11-25,2008
the monitoring is manual. The greatest issue is to have 6) Mr. S. S. Ghodhade, Dhiraj D. Patil, Ajay kumar, S. Pujari, Sachin
all the feeder data at a single sink when the data is S. Ayarekar, Prakash B. Bandgar, AshwiniS.
collected manually. Through our proposed system all 7) Waghmare, "Substation Monitoring and Control System",
the problems discussed above can be reduced to some International Journal of Scientific Research and Review,Volume
7, Issue 3, 2018, ISSN NO: 2279-543X
great extent.
8) AmitSachan,"Microcontrollerbasedsubstationmonitoring and
XI. REFERENCES control system with GSM modem" ISSN: 2278-1676 Volume 1,
Issue 6 (July-Aug. 2012), pp13-21
1) L. Velásquez, R. Villafáfila-Robles, P. Lloret, L. Molas- Balada,
A. Sumper, S. Galceran-Arellano, A. Sudrià- Andreu, Oct. 2007, 9) Dr. GhousBukshNarejo, Engr. Shahyan Pervez Bharucha, Engr.
"Development and implementation of a condition monitoring Danny ZarirPohwala, "Remote Microcontroller Based
system in a substation", 9th International Conference on Electrical Monitoring of Substation and Control System through GSM
Power Quality and Utilisation, EPQU2007 Modem",International Journal of Scientific &Engineering .
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 581
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: The aim of this project is to develop a The swell condition will occur when RMS voltage or
high voltage tripping mechanism to protect the load current rise between 1.1 and 1.8 pu at the power
from damage. Fluctuations in AC mains supply are frequency for durations of 0.5 to 1 minute. And above
frequent in homes and industries. The abnormal the 1.8pu and below 0.9pu is called over voltage and
over voltages may be caused due to various
under voltage respectively. Voltage sags and under
reasons such as sudden interruption of heavy loads,
lightening impulses, switching impulses etc. The
voltage conditions are caused by abrupt increases in
sensitive electronic devices in these conditions can loads such as short circuits and faults or it is caused by
get easily damaged. It is preferable to have a abrupt increase in source impendence, abruptly caused
tripping mechanism to protect the load. Our project by loose connection. Voltage swells and over voltage
aims at protecting the electrical equipments from conditions are almost always caused by an abrupt
abnormal voltages using arduino. The main purpose decrease in load on a circuit with a poor or damaged
of this protection system is to isolate the load from voltage regulator, although they can also be caused by
abnormal voltage conditions by controlling the a damaged or loose neutralconnection.
relay tripping coil with an arduino. It detects any
voltage greater and less than 230v (preset value).If a) Objective: the objective of the system is to
the voltage is greater or less than the preset value, provideprotection to electrical and electronic
it initiates a trip signal which in turn is given to the equipments andtheir failure due to abnormal voltage
circuit breaker. Than the circuit breaker isolates conditions.
the load from the source. If the voltage come backs b) Power quality:
to the presetvalue(230v) than the relay rests.This
project can be further extended to overcurrent Power quality refers to working voltage and current
relay. under specified range and perfection in the shape of
waveform in terms of pure sinusoidal and minimum
1. INTRODUCTION distortion. The term power Quality is defined by two
Actually sudden fluctuation in voltage is very big and characteristics, first, reliability, i.e. continuity of supply,
serious problem in industries and home appliances and second, rapid restoration of service. The specifications
it causes losses in electrical circuits. These losses causes for good power quality are as follows:
low power factor in the supply and by much amount of 1. Variation of electrical quantity should be within
power is going to be wasted. These fluctuations may guaranteed tolerance limits.
significantly impact the power quality as well as the
2. Pure sinusoidal wave with limited distortion.
reliability of other voltage controlling devices. Therefore
due to this fluctuation various costly and precious 3. Balanced three phase voltages.
equipments may get damaged. 4. Reliable supply.
When RMS voltage or current drops between 0.1 5. Earthing system should serve its purpose properly.
and 0.9 pu at the power frequency for durations of 0.5
Power Quality problems can be detected by
cycles to 1 minute then it is said to be sag condition.
following observations:
582 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1. A part of equipment mis-operates at the same time d) Electrostatically induced over voltages because of
of the day. availability of the charged clouds nearby.
2. Circuit breakers get tripped without actually being II. Internal Over voltages: These overvoltages arise
overloaded. because of change in operating conditions of the
network. Internal overvoltages are grouped into two
3. Failure of equipment during bad weather conditions.
categories as follows:
4. Automated system stops working for no genuine
1. Switching overvoltage: These over voltages are
reason.
caused by transient phenomena which appear due to
c) Necessity: switching of load and they cannot be avoided. These
over voltages are generally oscillatory and take the
Now day's high quality power is basic need of highly form of a damped sinusoid.
automated industries and home appliances. So this high
quality power may be got by the help of this circuit and 2. Temporary Over voltages: These over voltages
are the steady-state voltages of power system
it will improve the power factor and thus power can be
frequency may result from the disconnection of load,
fully utilized. In this way, we can remove our sag, swell, particularly long transmission lines cases.
over and under voltage problems and get benefited.
Table 1: Classification of over voltages(Swell) according to
Protection against sudden overvoltage's in IEEE 1159.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 583
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Table 2:Classification of under voltages according to IEEE with salt. This salt formation acts as a good conductor
1159.
of electricity and fault occurs.
Types ofunder Duration Magnitude
Voltage 2. PROPOSED PROTECTION SYSTEM:
Instantaneous 0.5 – 30 cycles 0.1 – 0.9 pu
Momentary 30 – 3 sec 0.1 – 0.9 pu a) Components used in the proposed system:
Temporary 3 sec – 1 min 0.1 – 0.9 pu
2. Due to the fault: Under voltage due to the fault can The components of the proposed protection system
be critical to the operation of a power plant. The are divided into two parts:
magnitude of under voltage can be equal in each phase
I. Electrical components
or unequal respectively and it depends on the nature
of fault. II. Electronic components
3. Due to motor starting: Under voltage due to motor I. Electrical components:
starting are symmetrical since induction motors are
balanced three phase loads, this will draw 1. AC supply unit: It is the combination of SMPS,
approximately the same high starting current in all terminal block, ON/OFF switches, fuse, toggle
the phases. switch(T.S). It will take the supply from T.B 230V
AC through SMPS to get 12V DC output.
4. Due to transformer energizing: there are mainly two
causes, one is normal system operation which includes 2. Switchgear unit: It is the combination of busbar,
the manual energizing of a transformer and another voltage transformer, circuit breaker, load, ON/OFF
is the reclosing actions. These under voltages are switch, control feeder, relay, control feeder.
unsymmetrical in nature. voltage transformer(230V/4.5v ) measures the load
5. Equipment failure: It is due to the insulation breakdown voltage.
or heating or short circuit.
II. Electronic components:
6. Bad weather: Lightning strikes in the power lines
causes a significant number of under voltages. 1. Power supply card: It consists of fullwave bridge
rectifier 12V and 9V. A filter capacitor also added to
7. Pollution: Flash over takes place when there is a storm smooth DC and regulator of 12V and 9V also added
in the coastal regions, where the power line is covered in this card to get constant DC output. four terminal
584 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
connectors are used two for input and the other two “Uno" means one in Italian and is named to mark
for output. the upcoming release of Arduino 1.0. The Uno and
9V DC is fed to arduino, 12V DC is fed to TAI version 1.0 will be the reference versions of Arduino,
card and control circuit of the feeder. moving forward UNO is the latest in a series of USB
arduino boards.
2. Voltage sensing card: It measures the stepped down
load voltage and this measured voltage is fed to Memory:
arduino. It consists of zener diode and resistors.
The AT mega328 has 32 KB (with 0.5 KB used for
The zener diode further drops some % of voltage in the bootloader). It also has 2 KB of SRAM and 1 KB
the measured value in order to ensure that the input of of EEPROM (which can be read and written with the
microcontroller shouldn't exceed 5V. EEPROM library).
3. ARDUINO AT MEGA 328:
Overveiw:
The Arduino Uno is a microcontroller board based
on the ATmega328 (datasheet). It has 14 digital input/
output pins (of which 6 can be used as PWM outputs),
6 analog inputs, a 16 MHz ceramic resonator, a USB
Fig 2: Arduino Atmega328
connection, a power jack, an ICSP header, and a reset
button. It contains everything needed to support the The microcontroller compares the measured value
microcontroller; simply connect it to a computer with a with preset value and generates the command signal.
USB cable or power it with a AC-to-DC adapter or 4. Trip and indication card(TAI): It consists of opto-
battery to get started. couplers, 5V DC change over relay and resistors.
The Uno differs from all preceding boards in that it The weak command signal is strengthen by the opto-
does not use the FTDI USB-to-serial driver chip. coupler to operate the relay in the TAI card.
Instead, it features the Atmega16U2 (Atmega8U2 up
to version R2) programmed as a USB-to-serial b) Table 3: Specifications of the test system:
converter. Revision 2 of the Uno board has a resistor
pulling the 8U2 HWB line to ground, making it easier
to put into DFU mode.
Revision 3 of the board has the following new
features:
• Pinout: added SDA and SCL pins that are near to the
AREF pin and two other new pins placed near to the
RESET pin, the IOREF that allow the shields to adapt
to the voltage provided from the board. In future,
shields will be compatible both with the board that
use the AVR, which operate with 5V and with the
Arduino Due that operate with 3.3V. The second one
is a not connected pin, that is reserved for future
purposes.
• Stronger RESET circuit.
• Atmega 16U2 replace the 8U2.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 585
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
c) Block diagram of the proposed protection a) Schematic diagram and its operation:
system:
Connections:
Fig 3: Block diagram 230V AC from the mains is fed to SMPS via fuse
3. Explanation of the proposed protection and T.S. SMPS converts 230V AC to 12V DC. 12V
system: DC is fed to Power supply card. Power supply card
generated two different DC outputs 12V and 9V. 9V
The objective of the system is to provide the is fed to arduino, 12V is fed to TAI card and the control
protection to the electrical and electronic equipments circuit of the feeder.
and avoid their failure due to abnormal conditions. The
theme of the protection system is to isolates the load Primary of the voltage transformer is connected
during abnormal voltages by controlling the control parallel to load and secondary is connected to voltage
circuit of the feeder by using arduino. sensing card. The output of the voltage sensing card is
fed to arduino. The output of the arduino is connected
to TAI card.
Operation:
Under abnormal voltage conditions: Voltage is not
within the belowmentioned limits:
Vref - 10% of Vref ≤ Vload ≤ Vrefef + 10% of Vref
Here Vref is adjusted by varying the potential knob.
586 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 587
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[5] EPRI Project Manager R. Schainker, System Compatibility [9] Mohammad Shah Alamgir and SumitDev, "Design and
Research Project, "EffectsofTemporary Overvoltage on Implementation of an Automatic Voltage Regulator with a Great
Residential Products", 1008540 Final Report, March 2005 Precision and Proper Hysteresis", Vol.75, year 2015, pp,
"IJAST".
[6] Hopkinson, R. H., "Ferroresonant Overvoltage Control Based
on TNA Tests onThree-Phase Delta-Wye Transformer Banks," [10]Endeavour Energy Power Quality& Reliability Centre, "Voltage
IEEE Transactions on Power Apparatus and Systems,vol.86, Sag Mitigation", Technical Note 11, August 2012.
pp. 1258-65, October 1967.
[11] Math H. J. Bollen, "Understanding Power Quality Problems -
[7] Article, "Over voltage Under voltage load Protection", website: Voltage Sags and Interruptions", 2000, New Jersey, John Wiley
http://www.nevonprojects.com/Over-voltage-Under-voltage- & Sons.
load-protection.html, last Accessed 27 September2015.
[8] LAMARCHE, Paper, "Controlled Ferroresonant Technology",
Volume 1, Issue 2, November 2006.
588 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: One of the essential requirements for network networks will go far to improve socio-
financial improvement in any country on the planet economy lives of individuals.
is the arrangement of solid power supply
frameworks. This work is an advancement of a 1. INTRODUCTION
native innovation cross breed Solar - Wind Power A hybrid inverter is a new technology U.P.S
framework that saddles the sustainable power (Uninterruptable Power Supply) which incorporates
sources in Sun and Wind to produce power. Here,
renewable energy resources i.e., solar and wind to meet
electric DC energies created from photovoltaic and
wind turbine frameworks are moved to a DC-AC
the load demand. Usually, electricity from solar panels
coast charging-inverter framework that gives is generated only during the day, with a peak production
charging flow to a substantial stockpiling bank of around midday. This power is fluctuating and is not
Battery and simultaneously delivers rearranged AC synchronized with the electric utilization of households.
capacity to AC loads. Inverters are broadly utilized To overcome the differences between load and demand
in the homegrown just as modern conditions to fill during the night, it is important to store energy for later
in as second line of source if there should arise an utilization.
occurrence of force cut from the power utility
lattices. In any case, because of low limit of the The security and reliability of the electrical energy
battery the inverter vanishes with the utilization of infrastructure is of vital importance today more than
weighty burden apparatus. This paper is planned ever, given the degree to which electric-powered
so that it defeats this constraint utilizing sun technology has become embedded in all human
oriented energy. It comprises of a 12V Battery, activities. Protecting the electrical power supply system
which gets charged from two sources, first being against interruptions due to various faults is thus a main
simply the principle supply. On the off chance that research concern. One of the components involved in
the primary force supply is accessible, the hand- power-system protection is the circuit breaker, which
off changes to the association utilizing mains power is responsible for closing the system when a fault or
supply to supply to the heap. This force likewise
anomaly occurs in order to protect the electrical
charges the battery for utilizing it as reinforcement
equipment.
the following time there is no blackout. The
utilization of different sources gives extra benefit (i). Overview
of excess force on account of dragging out blackout.
This inverter holds for long span to give continuous The worldwide usage of renewable power sources
force supply to client. This paper likewise is expanding quickly, especially the usage of solar and
comprises of electrical switch which works wind power sources, as illustrated by U. Fesli et al.
consequently on account of over-burdening. The [1]. Renewable energy counted for around 19% of the
electrical switch will work through web of things energy consumption worldwide in 2012 and continued
which will likewise give data of over-burdening to rise during the year 2013 as per 2014 renewable
inverter. It is feasible and that advancement of global status report. The report highlighted the PV
mixture wind-close planetary system for off-
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 589
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
installation system, hence energy storage system In this paper, two renewable energy sources i.e.,
becomes essential to guarantee continuous power solar and wind are used. As the voltage obtained from
supply. a wind turbine is AC, hence it is rectified to DC, while
As solar and wind energy sources are fluctuating in voltage obtained from solar panels is already in DC. A
nature, therefore a buck-boost converter is used for microcontroller is used that compares the voltages
solar panels to fix the voltage at a specific level, as obtained from solar and wind power sources. It checks
mentioned by M.H. Rashid.By incorporating both the availability of both power sources and therefore it
renewable sources, the reliability of power continuity shifts load to the power source, available at that time.
increases. This paper focuses on the difficulties and In case, if there is unavailability of both power sources,
arrangements of incorporating both, solar and wind then the load will be shifted tosupply. A battery is also
energy sources. Voltages and high frequency harmonics connected to the system so that if there is a complete
are significant factors of power quality for both, multiple power outage, the load will be shifted to the battery
power sources operating in parallel or a single power bank. In this way, continuity of electric supply is ensured.
source operating alone, as mentioned by Z. Sen [3]. Moreover, if both renewable energy sources are
available, then the solar power source will be used to
In today's world, the technological trend of supply the load while the wind power source will be
implementing "smart" technologies, fostered by the used to charge the battery. A smart city also embeds in
emergence of Cloud Computing and the Internet of the urban landscape computers, sensors, cameras and
Things (IoT), led to a transfiguration of ordinary devices other sensitive equipment operating in the background.
and environments to "smart" entities. In this context, In these circumstances, protecting the power supply
traditional electrical protection devices also tend to grid against faults becomes even more important, given
transcend and become "smart", and consequently offer the increasing number of sensitive devices connected
improved fault-detection and protection, remote in the emerging Smart world. Moreover, the traditional
monitoring and event notification. By becoming smart, electrical protection for residential, office and industrial
a home is embedded with ubiquitous computing buildings is based on classic circuit breakers tripping
equipment that connects all the household devices to or fuses being blown when an overload happens, thus
one another and the Internet. The demand of electrical offering limited protection and warning.
energy is constantly increasing and the non-renewable
energy resources i.e., oil, coal and natural gas are (ii). Theoretical Base
diminishing, as mentioned by R. Madhumitha et al. [4]. In this paper, there are three types of sources i.e.,
Moreover, the cost of these resources is high, which solar, wind and WAPDA. Wind and WAPDA supplies
motivates us to design a hybrid inverter that incorporates are in AC, therefore bridge rectifier is used to convert
renewable energy resources i.e., solar and wind. The AC into DC while solar is in DC. These three DC inputs
objective of this paper is to design an inverter that can are compared by using microcontrollers built in
be operated by a 12V battery and can be used to drive comparator. Comparator will select the best available
AC loads while minimizing the conventional inverter cost source, operates its corresponding relay and indicates
and complexity by using a microcontroller. by using the LEDs. We will use the selected in putto
The objective of this paper is to provide an alternate charge the battery for backup. Inverter will convert DC
power supply for remote locations such as small villages. into AC by using PWM and MOSFETs.Smart Hybrid
Also, the system can be used as a temporary power Inverter uses renewable energy sources to charge the
supply for locations affected by natural disasters. In system storage battery which can be used to provide
order to achieve these objectives, the product must be the electricity, in absence of either or both energy
economical and easy to manufacture. sources.By integrating the two renewable sources i.e.,
solar and wind, the impact of variable nature of solar
and wind power sources can be resolved and the overall
590 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
system would become more reliable and economical. architecture monitoring is being improved continuously.
From consumer's perspective, the installing cost of a Data communication is safe and encrypted, as Microsoft
hybrid system is still a problem.The main objective of Azure hosts its data.
this paper is to provide an alternative power supply for
remote locations such as islands and small
villages.Inverters have wide range of applications, like
in household and industry as well.This paper describes
the design, implementation and experimental validation
of the ELSA (Electrical Safety) power-system
protection device with built-in support for IoT-based
integration in smart environments like a Smart City or a
Smart Home.
Fig 1: Red Back Smart Hybrid Inverter System
• The rest of the paper is organized as follows: section
II provides background and related work on this topic, (ii). Solar hybrid inverter
section III describes the system architecture detailing Hybrid inverter is a new type of uninterruptible power
the three components (hardware, software and
supply (UPS) which supplies electrical energy for
communication network and data concentrator),
household items. Maximum production from solar
section IV presents the experimental validation of the
system while section V draws conclusions and panels is produced around midday. Electricity produced
underlines future research directions. from solar is not enough, therefore MPPT charger is
used to yield the output at a desired voltage level, as
2. TECHNOLOGIES RELATED TO illustrated by S. Bandawar et al. [8]. Smart hybrid
INVERTER. inverter stores maximum energy during daytime and then
(i). Red back technology later, this stored energy can be utilized during night.
Red back technology is a company that aims in The output of solar panel changes with the movement
changing the way of electrical household usage. Hybrid of sun. If the sun is directly above the solar panel, we
system of this company stores solar energy at daytime will get maximum possible voltage, but if the sun is away
up to the maximum level by using batteries so that when from the panel, then voltage will not be sufficient.
there is unavailability of solar energy, power can be Therefore, for making its output voltage constant, we
provided to the household items that operates on use MPPT (Maximum Power Point Tracking) charge
electricity. This initiative can help power authorities in control. Basically, MPPT is a buck-boost converter
many ways, for example, owners can sell electricity which maintains the output voltage of solar panel. If the
produced by solar panels to the national grid. sun is directly above the solar panel and the output
voltage is high, the buck-boost converter will act as a
Although many companies are manufacturing hybrid buck converter, and it will step down the voltage to a
inverters, but red back technology is the only company desired level. Similarly, if the sun is away from the panel
that is popular in Australia, for manufacturing a hybrid and the output voltage is low, the converter will act as a
system that is economical to use.According to Y. Zhang boost converter, and it will step up the voltage to a
et al. [12], red back hybrid inverter costs 30 percent desired level.
less than other hybrid inverter products. Other than low
cost, new safety measures are taken by red back Hybrid inverters can operate during off grid and on
technologies, as all switchgears are prewired and are grid conditions. During on grid, both energy sources
tested in industry, before releasing the product in market. i.e., solar and WAPDA are used, whereas during off
grid condition, stored energy in battery is used to power
Red back system is more adaptable and dynamic, up household items, as mentioned by T. Mallick et al.
from the software perspective. Red back system
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 591
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
(iii). Studies related to hybrid systems. product within a few Lua script lines. It includes
firmware which runs on the ESP8266 fig.3.Wi-Fi SOC
PV hybrid systems from Espressif Systems, and hardware which is based
Hybrid PV systems are the combination of on the ESP-12 module ESP8266EX offers a complete
photovoltaic systems and wind turbines or generators. and self-contained Wi-Fi networking solution.
Mostly they are used on islands, but they can also be
installed at other places. Largest PV system is present
on island in Germany, named as Pell worm. Other large
hybrid systems are also installed on different islands, as
on Canary Island. In Figure 2-8, the model of one of
the largest hybrid systems is shown.
Wilpena pound
This power system has a PV system of 100 kW,
battery storing capacity of 400 kWh, an inverter of 125
kW and a diesel generator of 440 kW. Energy from
battery and diesel generators are used simultaneously
during night, which is automatically selected through
smart controller in power system.
3. HARDWAREREQUIREMENTS
(i). NODE-MCU (ESP8266-12E)
The Node MCU is an open-source firmware and
development kit that helps you to Prototype your IOT
Fig 4: Pin diagram of Node MCU
592 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The ESP8266 has seen a wide adoption as a cost- over-current protection circuits, battery chargers,
effective solution for IoT and Wi-Fi-capable devices. switching mode power supplies, digital watt meters,
The ESP8266 was developed by Shangai-based programmable current sources, etc. Today, we will talk
Espressif systems, as a Serial (UART) to Wi-Fi SoC about ACS712 current sensor fig.5 device which
(System on a Chip) based around a Tensilica provides an economical and precise way of sensing AC
XtensaLX3DPU. This tiny IC includes an RF front end, and DC currents based on Hall-effect. This discussion
RAM, and (usually) an onboard TCP/IPstack that is divided into two parts. The first part will provide a
allows it ready to connect to a nearby Access Point, to brief overview of the ACS712 sensor and its
act as an Access Point itself, or both. characteristics. In the second part,a test experiment will
The connector gave access to the pins used for serial be carried out to interface the sensor with a PIC
communication, namely RX and TX, as well as 4 control microcontroller to measure a dc current.
pins, GPIO0, GPIO2, CH_PD and RST (reset), along Features:
with VCC and GND.However, other ESP-NN boards
offer access to a wider variety of pins, although their • 100 mV/A output sensitivity
packaging is of a custom Surface-Mount Device, with • 5.0 V, single supply operation
castellated pins as seen in the documentation page • Output voltage proportional to AC or DC currents
linked above. From the different ESP-NN boards, we
began to experiment with the ESP-12E. • Factory-trimmed for accuracy
For starters, different firmware options have been • Extremely stable output offset voltage
ported to run on the ESP8266, effectively taking it from • Nearly zero magnetic hysteresis
a simple Serial to Wi-Fi adapter into a fully functional
• Ratio metric output from supply voltage
microcontroller with access to its GPIO and hardware-
based functions like PWM, I2C, 1-Wire • Low noise analog signal path
communication, and ADC; all this, of course, in addition • Device bandwidth is set via the new FILTER pin.
to maintaining its Wi-Fi capabilities.
• µs output rise time in response to step input current
Features:
• 80 kHz bandwidth
• Low cost, compact and powerful Wi-Fi Module
• Total output error 1.5% at TA = 25°C
• Power Supply: +3.3V only
• Small footprint, low-profile SOIC8 package
• Current Consumption: 100mA
• I/O Voltage: 3.6V (max) Working Principle:
• I/O source current: 12mA (max) The Allegro ACS712 current sensor is based on
• 512kB Flash Memory the principle of Hall-effect, which was discovered by
Dr. Edwin Hall in 1879. According to this principle,
• Can be used as Station or Access Point or both when a current carrying conductor is placed into a
combined.
magnetic field, a voltage is generated across its edges
• Supports Deep sleep (<10uA) perpendicular to the directions of both the current and
• Can be programmed using Arduino IDE or AT- the magnetic field. It is illustrated in the fig. 3.15 shown
commands or Lua Script. below. A thin sheet of semiconductor material (called
Hall element) is carrying a current (I) and is placed into
(ii). Hall Effect Sensor a magnetic field (B) which is perpendicular to the
Sensing and controlling current flow is a fundamental direction of current flow. Due to the presence of Lorentz
requirement in a wide variety of applications including, force, the distribution of current is no more uniform
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 593
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
across the Hall element and therefore a potential Sensitivity & Output:
difference is created across its edges perpendicular to The ACS712-05B can measure current up to ±5A
the directions of both the current and the field. This and provides output sensitivity of 185mV/A (at +5V
voltage is known Hall voltage and its typical value is in power supply), which means for every 1A increase in
the order of few microvolts. The Hall voltage is directly the current through the conduction terminals in positive
proportional to the magnitudesof I and B. So, if one of direction, the output voltage also rises by 185mV. The
them (I and B) is known, then the observed Hall voltage sensitivities of 20A and 30A versions are 100 mV/A
can be used to estimate the other. and 66 mV/A, respectively. At zero current, the output
voltage is half of the supply voltage (Vcc/2). It should
be noted that the ACS712 provides ratio metric output,
which means the zero current output and the
devicesensitivity are both proportional to the supply
voltage, VCC. This feature is particularly useful when
using the ACS712 with an analog-to-digital converter.
The precision of any A/D conversion depends upon
the stability of the reference voltage used in the ADC
operation. In most microcontroller circuits, the reference
Fig 5: Hall Effect sensor working principle. voltage for A/D conversion is the supply voltage itself.
The ACS712 device is provided in a small, surface So, if the supply voltage is not stable, the ADC
mount SOIC8 package. It consists of a precise, low- measurements may not be precise and accurate.
offset, linear Hall sensor circuit with a copper conduction However, if the reference voltage of ADC is same as
path located near the surface of the die. When current the supply voltage of ACS712, then the ratio metric
is applied through the copper conductor, a magnetic output of ACS712 will compensate for any error in the
field is generated which is sensed by the built-in Hall A/D conversion due to the fluctuation in the reference
element. voltage.
Now, if the supply voltage drifts and becomes Vcc
The output of the device has positive slope when an
= 4.5V, then, due to the ratio metric nature, the new
increasing current flow through the copper conduction
output of the ACS712 sensor will be 4.5/2 = 2.25V,
path (from pins 1 and 2, to pins 3 and 4). The ACS712
which will still be digitized to 512 by the ADC as its
device comes in three variants, providing current range
reference voltage is also lowered to 4.5V.
of±5A (ACS712-05B), ±20A (ACS712-20B), and
±30A (ACS712-30A). Similarly, the sensitivity value will also be lowered
by a factor of 4.5/5 = 0.9, which means if the ACS712-
05B is powered with a 4.5V supply, the sensitivity is
reduced to 166.5 mV/A, instead of 185mV/A.
This concludes that any fluctuation in the reference
voltage will not be a source of error in the analog-to-
digital conversion of the ACS712 output signals. The
curve below fig. 2.8 shows the nominal sensitivity and
transfer characteristics of the ACS712-05B sensor
powered with a 5.0V supply. The drift in the output is
Fig 6: Functional block diagram of ACS712[26] minimum for a varying operating temperature, which is
attributed to an innovative chopper stabilization
technique implemented on the chip (read ACS712
datasheet for detail).
594 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
596 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Step 8: Successful controlling and monitoring of electric utility company, therefore we designed three
appliances. independent power supplies which represents the three
power sources i.e., solar, wind and electric power from
6. RESULT utility company. In order to select the best available
In this paper we presented the hybrid inverter power source, a microcontroller is used which compares
advantages i.e., Inverter safe operation and voltages of the three power sources. The step was to
Uninterrupted Power supply. These are being achieved design an inverter, therefore we used MOSFETs, as
by the availability of different sources in this inverter they can carry large amount of current, as compared to
and protection provided by the IoT.By this inverter we BJTs and FETs. We used a total of 8 MOSFETs in
can provide continuous power supply up to 1 A in single parallel, so that current passing through them can be
phase. In this paper we presented the value at which divided. For PWM (Pulse Width Modulation), we used
protection relay is operated is 1.1A. By doing some another microcontroller instead of using a complex
changes in programming we can set the current limit circuit. At the output we observed a 12 Volts, 50 Hz
from inverter to load at which relay is operated. AC voltage on oscilloscope. To make this 12 Volts, 50
Hz AC voltage useable for household consumption, we
a. Recommendations
used a 350 Watts transformer which step up the voltage
A hybrid system should be intended for the power level from 12 Volts to 220 Volts.
that can be generated from two power sources.
Moreover, the charge controller should have a 8. FUTURE SCOPE
programmed electrical detach circuit that will prevent Automation for residences become common place,
batteries from being over charged. the market will eventually be crowded with several
Other suggestion incorporates: players, multiple product offerings and competitive
pricing with low margins. The products themselves will
1. The wind turbine blades should be installed to a reach a 'plug and play' type of usability.
protected pole, as high as possible.
As a future aspect, we can enhance the output
2. The solar panels should not be hindered by shadows.
voltage by reducing total harmonic distortion and high
3. During any repair work, whole system should be frequency harmonics, by utilizing extra components.
turned off. Moreover, power rating can also be enhanced by using
4. The wire should be of good quality, to carry maximum more MOSFETs in parallel combination. But due to
load current by the two sources. the shortage of time and other limitations we designed
the inverter up to 350W rating. As a future aspect,
7. CONCLUSIONS
inverters can be synchronized with supply at the same
This paper described the design, implementation, frequency and voltage level.
and functional validation of an advanced power-system
protection device with IoT-based support for REFERENCES
integration in smart environments like Smart Homes or 1) Yuan W, Zhao L, Zeng B. Optimal power grid protection through
a defender- attacker-defender model. Reliability Engineering &
Smart Cities. The protection device ensures the safety System Safety. 2014; 121:83- 89.
of electrical consumers connected to the public power
2) Liu J, Huang GM, Ma Z, Geng Y. A novel smart high-voltage
supply grid by disconnecting the electrical supply in the circuit breaker for smart grid applications. IEEE Transactions on
event of fault : overcurrent. The system also provides a Smart Grid. 2011; 2(2):254-264.
Web-based interface for monitoring the network of 3) Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani
operating devices and real-time event notification O. Network-level security, and privacy control for smart-home
IoT devices. In: Wireless and Mobile Computing, Networking
through e-mail and SMS messages.We are and Communications (WiMob), 2015 IEEE 11th International
incorporating three power sources i.e., solar, wind and Conference on. IEEE; 2015. p. 163-167.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 597
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
4) Ferna ´ndez-Carame ´s TM. An intelligent power outlet system 8) Z. Sen, "Solar Energy Fundamental and Modelling Techniques",
for the smart home of the Internet of Things. International Journal 1st ed., vol. 2, Springer, pp. 58- 125, 2008.
of Distributed Sensor Networks. 2015; 11(11):214805.
9) A.Menon and R.Madhumitha, "Design and simulation of solar
5) Mrazovac B, Bjelica MZ, Teslic N, Papp I. Towards ubiquitous micro- inverter with multiple loads," International Journal of
smart outlets for safety and energetic efficiency of home electric Advanced Research in Electrical, Electronics and Instrumentation
appliances. In: Consumer Electronics-Berlin (ICCE-Berlin), 2011 Engineering, vol. 3, no. 5, pp. 9612-9620, 2014.
IEEE International Conference on. IEEE; 2011. p. 322-326.
10) G. Masters, Renewable and Efficient Electrical Power System,
6) U. Fseli, R. Bayir and M. Ozer, "Design and implementation of 3rd ed., A John WileySons, Inc., Publication, pp. 205-214, 2004.
a domestic solar and wind hybrid energy system," International
11) M. Muralikrishna and V. Lakshaminarayna, "Hybrid solar and
Conference on Electrical and Electronics Engineering, vol. 1, no.
wind energy system for rural electrification," ARPN Journal of
2, pp. 29-33, 2009.
Engineering and Applied Sciences, vol. 3, no. 5, pp. 50-58, 2008.
7) M.H.Rashid, "Power Electronics: Circuit, Devices and
Applications", 3rd ed., Prentice Hall, pp. 226-287, 2004.
598 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Hemp is a variety of the Cannabis Hemp is declared as environmentally friendly for the
sativa plant. Hemp is a type of psychoactive plant, production of batteries and other items. They use less
it contains Tetrahydrocannabinol (THC) and land as compared to other plants and leave no
Cannabidiol (CBD). The THC contains ecological footprints.
phytochemical compositions. Hemp is refined into
a variety of commercial items like- Paper, Rope, Hemp based carbon structures perform better than
Textiles, Clothing, Biodegradable plastics, Paint, Graphene based structures when used as an electrode
Insulation, Biofuel, Food, Animal feed, Fibre, Seed in a Supercapacitor or battery.Hemp fibres are
oil, Shoes, Mulch, Animal bedding, Litter, Creams, extracted from hemp plants and undergoes through a
Bird feed, Recreation, etc. A device needs a source process to produce carbon electrodes, which holds as
of energy to keep it running, mostly a battery. Now much energy as graphene-based electrodes and is used
this battery has graphite in it which basically is
in regular batteries or ultracapacitors. Hemp based
carbon. This carbon is the fuel source of for almost
natural fibres are harnessed into sheets, which provide
every single battery. Hemp as a plant contains
carbon in it as stored energy, when processed it cost affordable, environmentally sustainable alternative
can be used as a source of fuel. Scientific studies to graphene-based sheets.
show that hemp is better than Lithium and other
graphene-based batteries. Hemp batteries
generate good amount of power, portable to use,
easy to manufacture and not dangerous as the
conventional batteries available in the market.
Keywords- Hemp, Supercapacitors, Hemp
battery, Current collector, Electrolyte, Active
material, Separator, Graphene
I. INTRODUCTION
Fig 1. Prototype of a Hemp Battery
Technology has a limit of power storage or delivery.
We need more power-dense materials for improved II. WORKING MECHANISM
efficiency. The current technologies need raw materials Hemp fibres are extracted from hemp plants, turned
to produce batteries, which are not easily available into cellulose, then into carbon and then into flexible
everywhere. Current battery technology increases the electrodes. Since these are biodegradable, when
cost of manufacturing and production and are not disposed, they return back to the Earth. Thus, hemp
feasible enough to give amazing products and solutions. helps in stabilizing the natural carbon cycle and stores
Conventional batteries need mining of raw materials, carbon for up to 1000 years. So, its termed as "Green
which leads to environmental degradation. Most Battery".
batteries are a Lithium-ion based, and degrades the Two current collector plates are coated with hemp
environment during the mining and production. Batteries based activated carbon material. They are separated
need carbon as their electrodes, which is produced by by a porous membrane separator. Electrolyte is
burning trees causing a lot of pollution. squashed in between them. It is then charged and ready
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 599
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
to deliver power. Though it's a capacitor, but the Hemp battery is a non-graphene-based battery
working mechanism is similar to that of a battery. technology, operates at low cost and better than
graphene-based battery. Soaking 0.1g (50mm x 50mm)
of hemp based active material in electrolyte for 24hrs
gives better results as compared to Lithium-ion
batteries. Increasing the surface area increases the
power in the battery. A typical hemp supercapacitor
has 250mA on the size of a stamp and is 98% efficient
and stable as compared to Lithium-ion batteries. The
supercapacitor is rechargeable, has millions of charge
and discharge cycles and is biodegradable. Hemp
supercapacitors are cost-effective and gives identical
technical value as Lithium batteries. More industries and
Fig 2. Extracted Hemp-bast-fibre
firms are opening and scaling up the production of hemp
There are different materials that are used in a hemp batteries.
battery. Each one of the materials gives different
capacitance, voltage, current, efficiency, performance,
etc.
600 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 601
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
602 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
VIII. APPLICATIONS
Fig 12. Lithium vs Hemp Performance
Hemp is a wonder crop. Hemp battery can be used
Scientists are starting to discover more and more
for a wide range of purposes.
uses for hemp, with recent studies suggesting that hemp
batteries may be more powerful than lithium. Some • Hybrid or Electric Vehicles
geniuses have discovered a way to use hemp fibre as a • Alternative to graphene
supercapacitor. Scientists explain that the fibre from
hemp can be transformed to produce high-performance • Mobile devices
devices to store energy. • Medical devices like Defibrillators
• Computers
• Portable media players
• Photovoltaic systems
• Digital cameras
• Electric tools
• Grid power buffer
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 603
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• Uninterrupted Power Supply (UPS) information and suggestions for the validation of this
• Voltage stabiliser paper.
604 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract : It is specifically important to focus lessening in power transference capability and increase
on voltage stability analysis of the power system in losses. Low VAR levels may result in voltage sag.
to avoid worst case scenarios such as voltage Therefore, suitable levels of reactive power are to be
collapse. The purpose of this dissertation is to sustained for improving the voltage stability of the power
identify methods for enhancing the steady-state system. The bases of reactive power such as
voltage stability using FACTS devices and
conventional devices which are built out of resistance,
determining their impact on real and reactive
power losses, improvement of bus voltage
inductance or capacitance together with transformer,
magnitude and transmission line loadability. To and Flexible AC Transmission System (FACTS)
achieve this, FACTS devices are used in IEEE 5, strategies offer adequate reactive power to the system.
IEEE 9 and IEEE 30 test bus systems. The results FACTS devices offer reactive power compensation,
obtained assist in drawing conclusions on the and improve voltage stability, transmission ability, power
effectiveness of FACTS devices at generator, load flow control, and working tractability of the power
and swing buses in terms of matrices such as system.
voltage magnitude profile, PV curves, and active
and reactive power losses. II. SYSTEM MODEL
Keywords - FACTS, Steady state voltage
stability, reactive power compensation techniques,
flexible AC transmission systems.
I. INTRODUCTION
Voltage Stability examination is vital as voltage
instability may result in the partial or complete
disturbance in the power system. For voltage stability
examination, a number of steady-state examination III. PREVIOUS WORK
methods such as standard power flow methods, After surveying different literatures available in IEEE
continuation power flow methods, nodal methods and transactions, journal and conference proceedings on
dynamic simulation methods are being used by the the topic "Power system stability enhancement by using
electrical utilities. facts controller" it is found that improve voltage stability,
The reactive power plays an important role in a transmission ability, power flow control, and working
power system. Basically, an electric power is generated, tractability of the power system.
transmitted and then distributed to the consumers.
IV. PROPOSED METHODOLOGY
Transformers, transmission and distribution lines, cables
and many common load devices such as motors swing The following method is proposed to study the
the relationship between current and voltage due to their effectiveness of FACTS devices in improving the voltage
inherent characteristics. This swing is measured in volt- stability of a power system. For this purpose, an IEEE
ampere reactive (VAR). High VAR levels may result in 5, IEEE 9 and IEEE 30 bus test system has been taken
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 605
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
as a test system. First, the IEEE 5 bus test system is and the maximum loadability point. The same FACTS
built in MATLAB then IEEE 9 and then IEEE 30. Then, device is included in the system at a generator bus and
continuation power flow analysis is performed on the later at the swing bus and the metrics are obtained as
system built by using MATLAB. The metrics such as given above. The comparison of the metrics between
voltage magnitude profile, active and reactive power the no facts case, the facts at load bus case, at generator
losses, p-v curves, and maximum load ability point are bus case and at the swing bus case provides us the
used to have an understanding of the voltage stability necessary information in determining the effect of the
of the system. In the next step FACTS devices such as facts device used on each of the buses and if it is
SVC, STATCOM, and TCSC are included in the improving the system from the no facts case. This
system built in MATLAB, one at a time. Again, the process is repeated for SVC, STATCOM and TCSC
continuation power flow analysis is performed for each and the metrics obtained are compared with each other
of the cases individually and the metrics are obtained and also with the no FACTS case.
for each of them. The metrics are to be compared
between the each device along with the initial case where V. SIMULATION/EXPERIMENTAL
no facts device is used. The effectiveness of each device RESULTS
is drawn out from the results obtained from comparing In this section author need to describe experimental/
the metrics. simulation results with graphs and appropriate tables.
Thus, this study helps in understanding the most Table 1. With Compentation
606 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
REFERENCES
[1] Nidul Sinha, Sambit Karan and Santosh Kr. Singh "Modified DE
Figure 5.2 Voltage at IEEE 9 Bus With Compensation of 10 Based ATC Enhancement Using FACTS Devices" International
MVAR Conference on Computational Intelligence & Networks IEEE
2015
[2] Rahul Dubey, Shishir Dixit and Ganga Agnihotri "Optimal
Placement of Shunt FACTS Devices Using Heuristic
Optimization Techniques: An Overview" Fourth International
Conference on Communication Systems and Network
Technologies IEEE 2014
[3] Mohammed Amroune, Hadi Sebaa, Tarek Bouktir "Static Voltage
Stability Margin Enhancement Using SVC and TCSC"
International Journal of Electrical, Computer, Energetic, Electronic
and Communication Engineering Vol:7, No:10, 2013
[4] Tarik Zabaiou, Louis-A Dessaint and Innocent Kamwa
"Preventive control approach for voltage stability improvement
using voltage stability constrained optimal power flow based on
static line voltage stability indices" Generation, Transmission &
Distribution IET 2014
[5] H. Kazari, A. Abbaspour-Tehrani Fard, A. S. Dobakhshari, A.
M. Ranjbar "Voltage Stability Improvement through Centralized
Figure 5.3 Voltage at IEEE 30 Bus With Compensation of 10 Reactive Power Management on the Smart Grid" IEEE PES
MVAR Innovative Smart Grid Technologies (ISGT), 2011
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 607
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
608 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-Under non-uniform solar irradiance The energy produced by this type of system seems
levels, the P-V characteristic of a photovoltaic array the most promising, non-polluting, inexhaustible and with
has several maximum power points, and one of a low installation cost. Nevertheless, the production of
them is the global maximum power point, which this energy is non-linear and it varies according to the
leads to an optimization problem. This paper
irradiation and the temperature.
presents an algorithm for tracking the maximum
power point of a photovoltaic array under partial If the PV panels received a uniform irradiation level,
shading conditions (PSC), based on particle swarm the non-linear I-V and P-V characteristic curves have
optimization. Simulation results show that the only one MPP at the knee of the curve. Therefore, the
applied MPPT technique can reach the global operating point of the photovoltaic (PV) array does
maximum power point and not stagnate at the first not always coincide with the maximum power point. In
power peak even if it is a local maximum power this case, a tracking mechanism called "Maximum
point, a thing that cannot be achieved through
Power Point Tracking" (MPPT) is used to ensure that
classical MPPT techniques such as Increment
Decrement (IC) or Perturbation and Observation the maximum power is always generated[2].
(P&O). But practically, it is impossible for the photovoltaic
Keywords-Partial shading; Local maxima; array to have a uniform irradiation permanently because,
Global maximum power point; PV system; Global sometimes, it is eclipsed completely or partially, by the
maxima; particle swarm optimization (PSO); passage of trees, buildings, clouds or telephone poles.
In addition, most solar modules come in solar cells
I. INTRODUCTION connected in series, which means that each cell must
The unsustainable global consumption of energy has have the same amount of current, or when solar panel
significantly increased the pressure on fossil fuel locations receive lower radiation intensity, the unshaded
resources, which has increased the effects of global cells will cause the shaded cells to produce a higher
warming and climate change problems. As a result, the current than their short circuit current, so the shaded
global ambient temperature is predicted to increase cells will operate at a negative voltage. Which means
approximately 2°C by 2050 due to polluting emissions the shaded cells absorb energy instead of producing
caused by non-renewable energy resources [1]. energy for the system [3].
This growing demand for energy and the pollution In addition, the reference [4] mentioned that for
caused by the use of fossil fuels are pushing the partially shaded PV systems, the (P-V) characteristics
population to use renewable energy. In this regard, become more complicated and shows a multi-peak
photovoltaic energy is one of the important sources of curveFig 1, In other words, it might emerge several
renewable energy that provides a solution to our energy local maximum power points (LMPP), and in which
production problems. only the highest peak will be considered as the global
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 609
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
610 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 611
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
612 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
However,in the PSC framework, the P-V curve has configurations. Its topology is shown in Fig 11, An input
multiple LMPPs and a single GMPP, as shown in Fig capacitor (Cf-in) is connected to limit the high frequency
7, so it becomes essential to distinct GMPPs and harmonic components, the inductor function (L) is to
LMPPs. Note that when the bypass diode is removed suppress the current ripple, while the capacitor function
the PV array will have only one peak, while the output (Cf-out) is to reduce the output voltage ripple.
power will drop dramatically. Therefore, the bypass The relationship between the output and input
diode should always be connected in parallel with the voltages (Vout and Vpv) respectively, is given by (2),
PV module to increase the output power under PSC. where ? is the duty cycle.
(2)
Parameter Value
Resistor R (load) 50 ?
Inductor L 120 µH
Capacitor Cf-in 330 µF
Capacitor Cf-out 330 µF
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 613
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
(3)
(4)
614 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 615
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
source not found..Fig 10 display the simulation results Fig 10:Simulation results of the PV system under partial
shading condition and at 25°C.
of V-pv, P-pv,duty cycle and P-V under PSC.
V. CONCLUSION
Comparedthe results in Fig 7 and Fig 10 , the results
proved that the proposed algorithm is able to track the In this paper, the results indicate that the proposed
GMPP under PSC with 99% efficiency and a fast- controller offer a number of advantages: it has a faster
tracking speed around 0.14 s. tracking speed, it is efficient and can localize the GPPM
for all environmental variations i.e. under normal
irradiation or partial shading condition. , despite the
presence of some oscillations in the PPM..
616 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 617
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: In olden days we used to provide transformer is a high efficiency piece of electrical
lamps for fault identification with relay logic. These equipment and its losses are very low because there
circuits are costly and have limited time and poor will be no mechanical friction involved in its operation
reliability. To overcome the said, we are introducing
a microcontroller which will handle all relay logics 2. Three phase transformer
and display the message in LCD and this
conventional (indicators) will be used as backup.
Three phase transformers are more economical for
The microcontroller has been recognized as a supplying large loads and large power distribution. Even
general-purpose building block for intelligent though most of the utilization equipment are connected
digital systems. A microcontroller is a by the single-phase transformers, these are not preferred
microprocessor system built on a single chip. for large power distribution in the aspect of economy.
Major features of amr2560 microcontroller are 8- Three phase power is used in almost all fields of
bit CPU optimized for control applications. electrical power system such as power generation,
transmission, and distribution sectors, also all the
1. INTRODUCTION
industrial sectors are supplied or connected with the
A transformer is one of the most common devices three-phase system. The advantages of three phase
found in electrical system that links the circuits which transformer are smaller and lighter to construct and
are operating at different voltages. These are commonly better operating characteristics.
used in applications where there is a need of AC voltage
Extensive Boolean processing capabilities, on-chip
conversion from one voltage level to another. It is
flash program memory, on-chip data RAM, Bi-
possible to decrease or increase the voltage and current
directional and individual addressable input and output
by use of transformer in AC circuits based on the
lines, multiple 8-bit timer or counter, UART, multiple
requirements of the electrical equipment or device or
source/Vector/Priority interrupt structure, on-chip
load. Various applications use wide variety of
oscillator and clock circuitry, on-chip EEPROM, SPI,
transformers including power, instrumentation, and
Watchdog Timer. In this project we can detect multiple
pulse transformers.
faults of a single-phase transformer and we can also
Based on the power supply transformers are monitor the temperature and current on the LCD. This
classified into two types. project is applicable for the railway high voltage
transformer 132kv/25kv.
1. Single phase transformer
There are three main transformer faults.
A single-phase transformer is an electrical device
that accepts single phase AC power and outputs single 1. open circuit conditions
phase AC. This is used in the distribution of power in 2. Over heating conditions
non-urban areas. They are used as step-down
transformer to decrease the home voltage to a suitable 3. Winding short circuit conditions
value without a change in frequency. A single-phase
618 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1. Open circuit conditions disadvantages such as occupies more space, not reliable
The open circuit in the transformer can cause an , high cost and has less durability. The proposed method
abnormal heat inside the transformer which cause which is a microcontroller-based system overcomes the
transformer in dangerous conditions. when open circuit drawbacks of the existing system. In the proposed
conditions or fault occurs it is essential to disconnect system microcontroller takes the required action as soon
the transformer from the system. as the fault is detected and gives command to trip the
circuit breaker and hence transformer gets protected
2. Over heating conditions from the damage.
Over heating of transformer fault can mainly cause 3. BLOCK DIAGRAM
from two conditions such as overload conditions and
short circuit conditions of the transformer. COMPONENTS FOR THE PROPOSED
SYSTEM
3. Winding short circuit conditions
This fault condition is also known as internal faults
and this kind of faults are mainly occurring due to winding
disorientations, over heating of the internal parts of the
transformers and mechanical injuries. When this type
of fault occurs, it is necessary to immediate shut down
of the transformer before gets damage.
Different transformers demand different schemes of
transformer protection depending upon their
importance, winding connections, earthing methods and
mode of operation etc. It is important to practice to
provide Buchholz relay protection to all 0.5 MVA and
above transformers. While for all small size distribution Fig: 1 : Power supply card, MSI card, Conventional logics
transformers only high voltage fuses are used as main card, Arduino pro mini 2560, power transformer, current
transformer, circuit breaker, Trip and indicator, indicators
protective device. For all larger rated and important and LCD
distribution transformers, over current protection along
with restricted earth fault protection is applied. Working model of the system
Differential protection should be provided in the
transformers rated above 5 MVA. Depending upon the
normal service condition, nature of transformer faults,
degree of sustained over load, scheme of tap changing,
and many other factors, suitable transformer protection
schemes are chosen.
The transformer is costly equipment and highly
reliable pieces of the equipment of the substation. So,
the protection of the transformer is the vital. Different
Fig: 2 :Working model of the system
types of faults may occur in the transformer, if the fault
sustains for a long time, the transformer will damage. The above figure shows the arrangement for the
Therefore, it is required to trip the transformer as soon transformer multiple faults detection by microcontroller
as possible when any fault occurs. The existing and conventional methods. Working can be explained
transformer protection methods has some of the as follows
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 619
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
620 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
microcontroller. Microcontroller will give output to trip 2. Udoh, Benjamin E., "The Restricted Earth Fault Relay
Operation_Impact of Current Transformer Knee Voltages,"The
and indicator to trip the circuit breaker and message is International Journal Of Engineering And Science (IJES), Volume
displayed on the LCD. This project is also designed in 2, Issue 12, 2013.
such a way that it will completely free from human errors, 3. J. Robertson, "Use of Silicon Carbide Varistors in the Prevention
the system control by the microcontroller, if by mistake of Overvoltages in Electrical T&D ProtectionSystems", 10th IET
human try to ON the switch in wrong way it cannot International Conference onManchester, 2010
turn ON. By implementing this technology safe and 4. High Impedance Restricted Earth Fault Protection, Technical
Guidance Notes,SIEMENS Protection DevicesLimited, 2012.
quick operation performed
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 621
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-This paper presents an efficient and heuristic [17]-[26]. The analytical method known as
fast-converging optimization technique based on a the "2/3 rule" was proposed in [3] for optimal installation
modification of the traditional big bang-big crunch of a single DG, two analytical methods for optimal
method for optimal placement and sizing of voltage location of one DG in radial and meshed power systems
controlled distributed generators. The proposed
were introduced in [4]. Reference [5] presented a non-
algorithm deals with the optimization problems
incorporating multiple distributed generators for
iterative analytical method to minimize power loss by
the sake of power as well as energy loss the optimal placement of DG in radial and meshed
minimization in balanced/unbalanced distribution systems. Analytical expressions for finding optimal size
systems. The proposed algorithm is implemented and power factor of different types of DGs were
in MATLAB environment and tested on the 33- suggested in [7]. In [8] the authors proposed an
bus feeder system and the IEEE 37-node feeder. improved analytical method for allocating four types of
Validation of the proposed method is done via DG units for loss reduction in primary distribution
comparing the results with published results networks along with an approach for optimally selecting
obtained from other competitive methods. the optimal DG power factor. Linear Programming was
INTEGRATION of distributed generators with the used to solve optimal DG power optimization problem
distribution networks sparked broader interest in the in [9] and [11] for achieving maximum DG penetration
last two decades. Distributed generators (DGs) are and maximum DG energy harvesting, respectively. The
connected to the distribution network for different authors in [10] identified the optimal sizing and sitting
purposes: improving the voltage profile, reducing the of CHP-based DG based on urban energy network by
power loss, enhancement of system reliability and solving the nonlinear programming problem. A
security, improvement of power quality by improving multiobjective performance index, taking into account
supply continuity, relieving transmission and distribution the time-varying behavior of both demand and
congestion, reduction in health care costs due to generation, when optimized by an exhaustive search,
improved environment, reducing the system cost and was suggested in [12]. An optimization method was
deferral of new investments [1] and [2]. Optimal location developed in [13] for specifying the locations and sizes
and capacity of DGs plays a pivotal rule in maximizing of multiple DGs to achieve DG capacity maximization
the benefits gained from them, on the other side non- and loss minimization. A probabilistic-based planning
optimal placement or sizing of DGs may cause technique was proposed for determining the optimal
undesirable effects. The search space of optimal location fuel mix of different types of renewable DG units in
and capacity of DGs is roomy. Different optimization order to minimize the annual energy losses in the
strategies have been presented in recent literature with distribution system is presented in [14]. In [15] another
objective functions aiming to power loss minimization, probabilistic-based planning technique was presented
cost reduction, profit maximization and environmental to determine the optimal capacity and location of wind-
emission reduction. The optimization methods are based DG units to minimize the annual energy losses in
classifies into analytical [3]-[8], numerical [9]-[16] and the distribution system. A multi-period optimal power
622 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
flow was solved using nonlinear programming in [16]. Given: the input data comprises the distribution
Genetic algorithm (GA) and optimal power flow were feeder structure, series impedances, mutual impedances,
combined to solve the optimization problem in [17], shunt capacitances, feeder loads values and load types.
and GA was applied to solve a DG optimization problem Required: to determine exactly the optimal DG
with reliability constraints in [19] and for maximizing capacity and optimal DG location for the sake of
the profit by the optimal placement of DGs in [20] and minimizing the distribution feeder active power loss as
[21]. The DG optimal power was evaluated by the Tabu well as energy loss using (1) and (2) without violating
Search (TS) method for the case of uniformly distributed the system constraints:
loads [22]. A continuous stochastic DG model optimal
power was evaluated by a GA as well as by a combined
TS and scatter search [23]. Reference [25] proposed
a method that integrates constant power factor DG units
in balanced distribution networks for minimum power
loss. In [26] artificial bee colony (ABC) algorithm was
implemented to determine the optimal DG size, power where fis feeder number, Nf is total number of
factor, and location in order to minimize the total system feeders, Ploss, fis the power loss at certain feeder f , h is
real power loss is proposed. Big Bang-Big Crunch (BB- the hour number and Ploss, his the total system power
BC) optimization method was firstly presented by Erol loss at certain hour h. The system constraints are as
in [27]. The method was successfully applied to follows:
nonlinear multidimensional functions and showed good
• Voltage limits: voltage at each bus should be within
convergence speed [28]-[31]. The BB-BC method was a permissible range usually
applied to solve power flow problem with continuous
and discrete control variables in [28], the method was
tested on the IEEE 30-bus feeder and results were
• DG power limits: active, reactive and complex powers
compared to genetic approach. In [29] the BB-BC
of the DG unit are constrained between minimum
algorithm for optimal selection of the control parameters and maximum value and this range should not be
for minimizing the fuel cost of generators was presented. violated:
This paper presents a supervised BB-BC method for
finding the optimal location and capacity of dispatchable
DGs connected to unbalanced distribution feeders for
power/energy loss minimization without violating the
system constraints. The DG in the proposed algorithm
is modeled as voltage controlled (PV) node with the
flexibility to be converted to constant power (PQ) node
in case of reactive power limit violation. The proposed In the proposed method DG maximum active power
algorithm is implemented in MATLAB and tested on is limited by
the 33-bus feeder and the IEEE 37-node feeder. The
results obtained are compared with published results
for validation. The comparison proves the effectiveness,
and the speed of convergence of the proposed method. The previous relation is bounded by the thermal
capacity limit of the feeder lines. The DG power factor
II. PROBLEM STATEMENT is bounded between two preset values; hence, the
The optimization problem under study can be stated reactive power is also bounded in return.
as follows:
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 623
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• Lines thermal limit (line Ampacity): it represents the reactive current injection depends on the difference
maximum current that the line can withstand at certain between the voltage magnitude of the PV node and
DG penetration, exceeding this value leads to melting the scheduled value. Steps for modeling DG when
of the line: operating at specified terminal voltage are minutely
discussed in [32] and [33]. DG in the proposed
algorithm is modeled as PV node with the flexibility
to be converted to PQ node in case of reactive power
• Power balance: the sum of input power should be limit violation.
equal to the sum of output active power in addition to
3) Complexity of the optimization problem: the
the active power loss. The input power may include
traditional BB-BC algorithm [27] can be easily used
the DG active power and the active power supplied
to solve a nonlinear, multidimensional optimization
by the utility. The active output power is the sum of
problem where the function to be optimized is
loads active power:
continuous and formulated as an equation that depend
on the system variables.
On account of the complexity, unbalance, offshoot
Approach: apply the supervised BB-BC method to of the feeder branches and the mutual impedances
solve the optimization problem and find the optimal between phases for the feeder under study, the function
location and capacity of DGs in order to minimize the to be optimized either as the power loss or the energy
power loss or the energy loss. Rummage for the optimal loss cannot be formulated as a function of DGs power
location and capacity of DGs connected to unbalanced or location. In addition, the locations of DGs as one of
distribution system by using the proposed method is the system variables, is not continuous as it must be an
faced by some obstacles that can be summarized in the integer numbered in a random way. Moreover, the
following challenges: current optimization problem involves many local
1) Nature of the distribution system: a distribution minimum locations that may trap the traditional BB-
system has a radial topological structure. Newton BC algorithm.
Raphson and fast decoupled Newton Raphson are
III. SUPERVISED BIG BANG-BIG
the most widely used methods for transmission
systems but they are unsuitable for the distribution CRUNCH
networks because distribution networks are ill- The traditional BB-BC algorithm [27] consists of
conditioned. The backward forward sweep method two steps; the first one named Big Bang phase
is selected for the developed power flow, as it involves encompasses the creation of the initial candidate
limited matrix operations and no matrix inversions solutions that are spread randomly all over the search
[32]. The hired method is composed of two steps,
space, the Big Bang phase is the followed by Big Crunch
the backward sweep step at which the branch current
is calculated based on the nude currents using KCL,
phase that huddle all the candidate solution at only one
the forward sweep step at which the updated voltages solution that is called the center of mass.
at all nodes are calculated using KVL. The step by step procedure of the BB-BC algorithm
2) Modeling of voltage controlled DGs: small is discussed as follows:
capacity DGs can not supply sufficient reactive power 1) Form an initial generation of candidate solution inside
to control the output voltage, this leads to representing the search space.
the generation node as PQ or constant negative load
with current injection into the node. Large capacity 2) Calculate the objective function value of all candidate
DG can supply required reactive power; hence the solutions.
generator node in this case must be modeled as PV 3) Find the center of mass (x2 ) according to (10). Best
node. When modeled as PV node DG behaves as value of the previous step can be chosen as the center
voltage dependent current source as the amount of of mass:
624 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1) Construct the guidance table consists of power The proposed supervised BB-BC method grips the
intervals and the corresponding best location for each demerits of the traditional BB-BC through the following
interval. Guidance table is formulated by dividing the modifications:
DG active power range 0 <pg<pgmax to equally 1) Proposing the guidance table that orients the method
divisions, at each division the best location is roughly towards the optimal solution and preventing it from
estimated by setting the DG active power to the falling in local minimum locations.
middle value of each division and find the location
that achieve the minimum active power loss. 2) Amendment of the updating equations of the BB-BC
method to be suitable for the current optimization
2) Generate randomly the initial values of the system
problem and for accelerating the convergence.
variables (DGs active power, DGs locations).
3) Calculate the active power loss corresponding to all
initial DG locations and powers by running the
unbalanced load flow.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 625
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
626 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The IEEE 33-bus feeder is a balanced feeder with The DG in the proposed study is modeled as PV
constant active and reactive power loads while the IEEE node with the flexibility to be converted to PQ node in
37-node feeder is complex as it is characterized by case of reactive power limit violation; the reactive power
spot loads, single phase and three phases balanced and limits is calculated by varying the power factor from
unbalanced loads, delta connected loads, constant 0.8 lagging to 0.8 leading. Moreover, the DG model
active and reactive power, constant impedance, and could be switched to PQ node only whenever required.
constant current type loads. The regulator was removed
in order to clearly evaluate the effects of the DG on the A. Comparative Study
system voltage profile for the IEEE 37-node feeders. 1) Validation of the Unbalanced Load Flow:
The substation node is numbered as (0) as it is the Unbalanced load flow without DG was done on the
reference node which has a constant voltage of 1 per- IEEE 37-node feeder and the results of voltages were
unit, the numbering of the other nodes compared with [32]. Table I shows a sample of the
per unit line to line nodes voltages of the proposed
load flow and [32]. It is clear that the results obtained
matched closely the results of [32].
2) Validation of DG Integration to the Load Flow:
Different sizes of constant power factor DG were
tested and compared to results done on the 33-bus
feeder and presented in [25].Table II confirms that
the results are almost identical.
3) Validation of the Supervised BB-BC Algorithm:
The proposed algorithm is applied to the 33-bus feeder
and the optimal DG active power and location are
compared with the results published in [25] which
uses analytical method for finding the optimal location,
size
Table 2
Comparison of Results Published in [25] and the Proposed
Results
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 627
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
uses artificial bee colony algorithm (ABC) and also with Table III : Comparison of Optimal Location and Power of DG
Connected to the IEEE 33- Bus Feeder With [25]
results published in [36] which uses genetic algorithm
(GA). Two case studies were conducted using the
proposed method, the first case was to find the optimal
location and power of a DG unit that's able to supply
active power only and the second was for a DG that's
able to supply active and reactive power within the
permissible range. The comparison of results is
presented in Table IV. The results of case 1) closely
matches the results of [26] and [36] as their studies
were done on using a DG that supplies active power
only. Case 2) shows that the proposed algorithm is more Table IV : Comparison of Optimal Location and Power of DG
Connected to the IEEE 33-Bus Feeder with [26] and [36]
efficient in finding the DG optimal location and power
as the power loss is much reduced. This can be
explicated that the proposed algorithm not only evaluate
the optimal DG active power but also evaluate the
optimal DG reactive power within the permissible range
that is able to keep the bus voltage at the specified
voltage (1 p.u.). It is important to notice that numbering
of the IEEE 33-bus feeder starts from zero in the
proposed work while it started from one in [26] and
[36]. To evaluate the speed of convergence of the
proposed method the power loss versus iterations is
plotted in Fig. 4. It's noticed that the active power loss
converged to its optimal values after 4 iterations only, Table V : Guidance Table of One DG
meeting the stopping criteria previously mentioned in
Section III need 13 iterations which shows the high
speed of convergence of the proposed method.
B. Applications of the Supervised BB-BC
Method
1) Optimal Location and Power of One DG Using
Supervised BB-BC Method: The optimization problem
is constrained as mentioned in Section II. All constraints
are taken into account in these applications. The
proposed method is applied on the IEEE 37-node
feeder. The IEEE 37 feeder is formed from four different
types of branches with current capacity (698 A, 483
A, 230 A, and 156 A) [33]. The maximum active power
of each DG is calculated in order not to exceed the
feeder thermal limit. The guidance table is presented in Table V where
the maximum power is considered to be 80% of the
feeder rated KVA (2500 KVA) and the power range
is divided to 8 intervals. The optimal location and power
are presented in Table VI.
628 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
A Comparison is done between the traditional BB- 2) Optimal Location and Power of Two DGs Using
BC method and the Supervised BB-BC method to Modified BB-BC Method: Integrating two DGs into
emerge the advantages of the subsequent method. Ten the system increase the complexity of the optimization
trials with different initial values were done using the problem, the objective function becomes four
dimensional as it depend on locations and powers of
two methods at different number of system variables
two DGs. In addition another constraint is added to
(DG powers, DG locations). Any method is considered
the system that the sum of the two DGs power must
failed if it converges to values other than the optimal not exceed the total load power.
values. Fig. 5 shows the robustness of the proposed
method at small number of system variables. The The guidance table is obtained by fixing the power
proposed method has the following advantages over interval of one DG and varying the power interval of
the traditional one: the second DG until the sum of the DG powers reaches
80% of the feeder rated KVA, then the power interval
• The supervised BB-BC method never trapped in local of the first DG is changed to a new interval and the
minimums at a sufficient number of system variables.
intervals of the second are varied again. This result in
Table VI : Optimal Location and Power of DG Connected to
IEEE 37-Node Feeder
32 different cases, i.e., guidance table in case of two
DGs consists of 32 raw and the corresponding optimal
locations. A sample of the guidance table presented in
Table VII and the optimal DGs locations and powers
are evaluated as shown in Table VIII.
C. Optimal Location and Scheduling of One DG for
Energy Loss Minimization
Three different types of loads residential, commercial
and industrial are used as shown in Table IX, the average
hourly values of the load scaling factor curve presented.
Table VII : Calculated Sample of the Two DGsGuidance Table
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 629
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Table VIII : Calculated Optimal Locations and Powers of Two Table X :Hourly Optimal Location
DGs
630 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
typical to the powerloss case. The minimum daily [4] C. Wang and M. H. Nehrir, "Analytical approaches for optimal
placement of distributed generation sources in power systems,"
energy loss at the optimal location is 1031.318 kWh IEEE Trans. Power Syst., vol. 19, no. 4, pp. 2068-2076, Nov.
(i.e., 68.35% daily energy loss reduction as the daily 2004.
energy loss at the base case where no DG is connected [5] N. Acharya, P. Mahat, and N. Mithulananthan, "An analytical
is 3258 kWh). The daily active power schedule of a approach for DG allocation in primary distribution network,"
DG connected to node 5 to achieve the minimum Int. J. Elect. Power Energy Syst., vol. 28, no. 10, pp. 669-678,
Dec. 2006.
energy loss is presented in Fig. 9.
[6] T. Gözel and M. H. Hocaoglu, "An analytical method for the
sizing and siting of distributed generators in radial systems,"
Elect. Power Syst. Res., vol. 79, no. 6, pp. 912-918, Jun. 2009.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 631
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[7] D. Q. Hung, N. Mithulananthan, and R. C. Bansal, "Analytical [20] R. K. Singh and S. K. Goswami, "Optimum allocation of
expressions for DG allocation in primary distribution networks," distributed generations based on nodal pricing for profit, loss
IEEE Trans. Energy Convers., vol. 25, no. 3, pp. 814-820, Sep. reduction, and voltage improvement including voltage rise issue,"
2010. Int. J. Elect. Power Energy Syst., vol. 32, no. 6, pp. 637-644,
Jul. 2010.
[8] D. Q. Hung and N. Mithulananthan, "Multiple distributed
generators placement in primary distribution networks for loss [21] J. M. López-Lezama, J. Contreras, and A. Padilha-Feltrin,
reduction," IEEE Trans. Ind. Electron., vol. 60, no. 4, pp. 1700- "Location and contract pricing of distributed generation using a
1708, Apr. 2013. genetic algorithm," Int. J. Elect. Power Energy Syst., vol. 36, no.
1, pp. 117-126, Mar. 2012.
[9] A. Keane and M. O'Malley, "Optimal allocation of embedded
generation on distribution networks," IEEE Trans. Power Syst., [22] K. Nara, Y. Hayashi, K. Ikeda, and T. Ashizawa, "Application
vol. 20, no. 3, pp. 1640-1646, Aug. 2005. of tabu search to optimal placement of distributed generators,"
in Proc. IEEE PES Winter Meeting, Columbus, OH, USA, Feb.
[10] X. Zhang, G. Karady, and S. Ariaratnam, "Optimal allocation of
2001, vol. 2, pp. 918-923.
the CHP-based distributed generation on urban energy
distribution networks," IEEE Trans. Sustain. Energy, vol. 5, no. [23] C. Novoa and T. Jin, "Reliability centered planning for distributed
1, pp. 246-253, Jan. 2014. generation considering wind power volatility," Elect. Power Syst.
Res., vol. 81, no. 8, pp. 1654-1661, Aug. 2011.
[11] A. Keane and M. O'Malley, "Optimal utilization of distribution
network for energy harvesting," IEEE Trans. Power Syst., vol. [24] L. Wang and C. Singh, "Reliability-constrained optimum
22, no. 1, pp. 467-475, Feb. 2007. placement of reclosers and distributed generators in distribution
networks using an ant colony system algorithm," IEEE Trans.
[12] L. F. Ochoa, A. Padilha-Feltrin, and G. P. Harrison, "Evaluating
Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 6, pp. 757-764,
distributed time-varying generation through a multiobjective
Nov. 2008.
index," IEEE Trans. Power Del., vol. 23, no. 2, pp. 1132-1138,
Apr. 2008. [25] F. S. Abu-Mouti and M. E. El-Hawary, "Heuristic curve-fitted
technique for distributed generation optimisation in radial
[13] R. A. Jabr and B. C. Pal, "Ordinal optimisation approach for
distribution feeder systems," IET Gener., Transm., Distrib., vol.
locating and sizing of distributed generation," IET Gener.,
5, no. 2, pp. 172-180, 2011.
Transm., Distrib., vol. 3, no. 8, pp. 713-723, Aug. 2009.
[26] F. S. Abu-Mouti and M. E. El-Hawary, "Optimal distributed
[14] Y. M. Atwa, E. F. El-Saadany, M. M. A. Salama, and R.
generation allocation and sizing in distribution systems via
Seethapathy, "Optimal renewable resources mix for distribution
artificial bee colony algorithm," IEEE Trans. Power Del., vol. 26,
system energy loss minimization," IEEE Trans. Power Syst.,
no. 4, pp. 2090-2101, Oct. 2011.
vol. 25, no. 1, pp. 360-370, Feb. 2010.
[27] K. Osman and I. Eksin, "A new optimization method: Big Bang-
[15] Y. M. Atwa and E. F. El-Saadany, "Probabilistic approach for
Big Crunch," Adv. Eng. Softw., vol. 37, no. 2, pp. 106-111, 2006.
optimal allocation of wind-based distributed generation in
distribution systems," IET Renew. Power Gener., vol. 5, no. 1, [28] C. V. Gopala and G. Yesuratnam, "Big Bang and big crunch and
pp. 79-88, Jan. 2011. firefly optimization application and comparison to optimal power
flow with continuous and discrete variables," Int. J. Elect. Eng.
[16] L. F. Ochoa and G. P. Harrison, "Minimizing energy losses:
Informat., vol. 4, no. 4, Dec. 2012.
Optimal accommodation and smart operation of renewable
distributed generation," IEEE Trans. Power Syst., vol. 26, no. 1, [29] S. Sakthivel, S. Arun, S. Marikani, and S. Kurinji, "Application
pp. 198-205, Feb. 2011. of big bang big crunch algorithm for optimal power flow
problems," Int. J. Eng. Sci. (IJES), vol. 2, no. 4, pp. 41-47, 2013.
[17] G. P. Harrison, A. Piccolo, P. Siano, and A. R. Wallace, "Hybrid
GA and OPF evaluation of network capacity for distributed [30] Z. Zandi, E. Afjei, and M. Sedighizadeh, "Reactive power dispatch
generation connections," Elect. Power Syst. Res., vol. 78, no. 3, using big bang- big crunch optimization algorithm for voltage
pp. 392-398, 2008. stability enhancement," in Proc. IEEE Int. Conf. Power and
Energy (PECON), Malaysia, Dec. 2012, pp. 239-244.
[18] A. Helal, M. Amer, and H. Eldosouki, "Optimal location and
sizing of distributed generation based on genetic algorithm," in [31] C. F. Kucuktezcan and V. M. I. Genc, "Big bang-big crunch
Proc. 2nd Int. Conf. Computing and Control Applicat., Marseilles, based optimal preventive control action on power systems," in
France, 2012, pp. 1-6. Proc. 3rd IEEE PES Innovative Smart Grid Technologies Europe
(ISGT Europe), Berlin, Germany, 2012, pp. 1-4.
[19] C. L. T. Borges and D. M. Falcão, "Optimal distributed generation
allocation for reliability, losses, and voltage improvement," Int. [32] S. Khushalani, J. M. Solanki, and N. N. Schulz, "Development
J. Elect. Power Energy Syst., vol. 28, no. 6, pp. 413-420, Jul. of threephase unbalanced power flow using PV and PQ models
2006. for distributed generation and study of the impact of DG models,"
IEEE Trans. Power Syst., vol. 22, no. 3, pp. 1019-1025, Aug.
2007.
632 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[33] C. S. Cheng and D. Shirmohammadi, "A three-phase power flow [36] T. N. Shukla, S. P. Singh, V. Srinivasarao, and K. B. Naik, "Optimal
method for real-time distribution system analysis," IEEE Trans. sizing of distributed generation placed on radial distribution
Power Syst., vol. 10, no. 2, pp. 671-679, May 1995. systems," Elect. Power Compon. Syst., vol. 38, no. 3, pp. 260-
274, 2010.
[34] M. E. Baran and F. F. Wu, "Network reconfiguration in
distribution systems for loss reduction and load balancing," IEEE [37] W. El-Khattam, Y. G. Hegazy, and M. M. A. Salama,
Trans. Power Del., vol. 4, pp. 1401-1407, 1989. "Investigating distributed generation systems performance using
Monte Carlo simulation," IEEE Trans. Power Syst., vol. 21, no.
[35]Radial Distribution Test Feeders [Online]. Available: http://
2, pp. 524-532, May 200.
ewh.ieee. org/soc/dsacom/ test feeders.html
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 633
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: Now a day's power demand keep on various practical limitations such as valve-point effects,
increasing due to rapid changes occurs in power prohibited operating zones and up/down ramp rates.
industry. For that purpose establishing new Methods such as particle swarm optimization (PSO)
generating is costlier rather than effectively utilize [1], firefly algorithm (FFA) [2], quick group search
the available generating stations. In order to
optimizer (QGSO) [3], cuckoo search algorithm (CSA)
properly planning of power system generation
[4], hybrid approach (GA-APO-NSO) [5], MSG-HS
sharing Economic Dispatch (ED) plays vital role.
In this paper, Equilibrium Optimizer (EO) is used [6], PSOGSA [7], teaching learning based optimization
to solve the ED problem with effect of valve-point, (TLBO) [8], PSO [9], backtracking search algorithm
prohibited operating zones (POZs), ramp rate up/ (BSA) [10], exchange market algorithm (EMA) [11],
down limits and pollution like practical constraints. modified CSA [12], evolutionary algorithm (EA) [13],
In order to analyze the capability of the EO multiobjective BSA [14], multiobjective EA [15], new
algorithm, the algorithm is applied to four test global PSO (NGPSO) [16].
systems with 6 unit systems and the results are
compared with other optimization algorithms. The However some of the above mentioned optimization
comparative results proven that EO is better algorithm stuck in the local minimum and does not
optimization technique to solve ED problem with converse to the global minimum. The above methods
practical constraints. are not used for solving the ED problem with all practical
constraints. To overcome these drawbacks proposed
Keywords: Power Industry, Economic Dispatch,
Equilibrium Optimizer, Valve-point, Prohibited new equilibrium optimizer (EO) [17] algorithm. In order
operating zones, Ramp rate up/down limits. to analyze the capability of the EO algorithm, the
algorithm is applied to four test systems with 6 unit
I. INTRODUCTION systems and the results are compared with other
Economic Dispatch (ED) is a major issue in the optimization algorithms.
electrical system. The required power demand is II. PROBLEM FORMULATION
optimally allocated to the available generator units
known as ED. Usually, the ED problem is complicated A. Classical ED
by the practical constraints of the thermal units, such as The theoretical cost curve of classical ELD problem
transmission losses, valve-point loading, prohibited is as shown in the Figure 1.
operating zones and ramp rate limits. The conventional
ED problem focused only on minimizing operating costs,
with a view to reducing emissions along with operating
costs, which would change the ED problem to the
Economic Emission Dispatch (EED) problem.
In the last decade, many meta-heuristic optimization
algorithms have been used to solve ED problems with
634 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
$/MWh
D
A B C
Minimize C. EDRPOZ
n ED problem with ramp rate Limits and prohibited
FT min f Fi (Pi ) ($ / h) (1)
i 1
operating zones (POZs) treated as EDRPOZ. Figure
N
3 shows the model of Ramp-rate limits.
Fi (Pi ) (a i Pi2 bi Pi ci ) (2) Pi P0i UR i if generation increases
i 1 (7)
P0i Pi DR i if generation decreases
Equality Constraints:
N Pi
Pi0 Pi0
Pi PD PL (3)
Pi
i 1
Pi0 Pi
To calculate transmission losses the B-coefficient
method used. t t+1 t t+1 t t+1
(a) (b) (c)
N N N
PL Pi Bi jPj B0i Pi B00 (4)
Fig. 3 Ramp rate limits of generating units
i 1 j1 i 1 The new operation limits:
Inequality Constraints Pi min,r Pi Pi max,r (8)
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 635
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fuel Cost ($/h) selected four best particles based on their fitness value
during the entire optimization process with other particles
whose positions are in the mean of the four best particles
described above. Such five particles were called
candidates for equilibrium and used to construct an
equilibrium pool.
Ceq,pool {Ceq(1) , Ceq(2) , Ceq(3) , Ceq(4) , Ceq(ave) } (14)
Pjmin LB UB
Pj lPj l
L B UB
Pj k kPj k k Pmax power output (MW)
t t t t
j C. Exponential term (F)
Fig. 4 Generator characteristics with POZs
The key updating rule for concentration is controlled
D. EED by the exponential term F
To reduce emissions along with the cost of F e (t t 0 ) (15)
k 1
F a1sign(r 0.5)(e t 1) (18)
Weighted sum method: The fuel cost and emission
objective problem is converted into single objective D. Generation rate (G)
CEED problem given by Equation (12) by assuming Generation rate is the most significant parameter
weighting factor proportion to the importance of the used in equilibrium algorithm to increase the process of
objective. exploitation.
Minimize F=W F2 (1 W) F3 (12)
G G 0 e –k(t –t 0 ) (19)
III. EQUILIBRIUM OPTIMIZER Where
A. Faramarzi proposes an Equilibrium Optimiser G 0 GPC(Ceq C) (20)
(EO). In EO, each solution with its position acts as a
0.5r1 r2 GP
search agents. GP = { } (21)
0 r2 GP
A. Initialization and evaluation of the functions Finally, EO's updating law shall be as follows:
The initial positions were randomly determined G
C Ceq (C Ceq ) * F (1 F) (22)
according to the number of particles in the search space V
Cint
i
ial
Cmin randi (Cmax Cmin ) i 1, 2,3,......n (13) IV. RESULTS
B. Equilibrium pool and candidates (Ceq) A. Classical ED
The state of equilibrium is known as the final state In order to evaluate solution of classical ED problem
of EO convergence. In EO these candidates are generator practical constraints are not considered like
636 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
valve-point effect, ramp limits and prohibited operating Table 2: Comparison results for 6-unit to EDVPE
zones. But the transmission losses, equality and GA-NSO[5] MSG-HS[6] PSO [6] EO
P1 (MW) 182.4784 199.6331 197.8648 199.5997
inequality constraints are considered for 6-unit test P2 (MW) 48.3525 20.0000 50.3374 20.0000
system [2] with power demand of 800 MW. The fuel P3 (MW) 19.8553 23.7624 15.0000 23.8221
cost function is convex function follows as Equation 1. P4 (MW) 17.1370 18.3934 10.0000 19.0903
P5 (MW) 13.6677 17.1018 10.0000 18.1304
Table 1: Comparison results for 6-unit to classical ED P6 (MW) 12.3487 15.6922 12.0000 13.7463
P L (MW) 10.4395 11.1830 11.8022 11.0135
PSO [1] FFA[2] CSA[4] EO PT(MW) 293.839 294.5829 295.2022 294.0135
P1 (MW) 32.67 32.5861 32.5863 33.9199 FC($/hr) 984.936 925.6406 925.7581 924.8883
P2 (MW) 14.45 14.4843 14.4843 14.4029
P3 (MW) 141.73 141.548 141.548 141.2473 EDVPE
990
P4 (MW) 136.56 136.045 136.045 135.6431
P5 (MW) 257.37 257.664 257.664 257.3198 980
200 400 600 800 1000 1200 1400 1600 1800 2000
4.25
Iteration
Fuel cost ($/hr)
4.24
Fig. 6 Convergence characteristics of EDVPE
4.23
4.22
C. EDRPOZ
4.21
4.2
EDRPOZ comprising six generators meets [11] a
4.19 load demand of 1263 MW and includes loss, POZs
200 400 600 800 1000 1200 1400
Iteration and ramp up/down limits.
Fig. 5 Convergence characteristics of classical ED Table 3: Comparison results for 6-unit to EDRPOZ
The simulation and comparison results for the given BSA [10] EMA [11] MCS[12] EO
P 1(MW) 447.4902 443.3872 447.5038 447.0649
test system are presented in Table 1. Among all the P 2(MW) 173.3308 173.2524 173.3182 173.1643
methods, the proposed EO method is better interms of P 3(MW) 263.4559 263.3721 263.4628 263.9481
optimal cost and convergence characteristics shown in P 4(MW) 139.0602 138.9894 139.0653 139.0668
P 5(MW) 165.4804 165.3650 165.4764 165.5847
figure 5 for 25 trails. P 6(MW) 87.1409 87.0781 87.1347 86.5868
PL (MW) 12.9583 12.4430 12.9582 12.4154
B. EDVPE PT (MW) 1275.95 1275.443 1276.958 1275.4164
FC($/hr) 15449.89 15443.07 15449.89 15442.675
The cost function of the generation is represented
by the Equation 6. The sinusoidal term added to convex The optimal and comparison results for EDRPOZ
cost function and resulting becomes non-convex cost problem are presented in Table 3. The total operating
function. The test system comprising six generating units cost during practical constraints is 15442.6753 ($/hr)
[5] meets a power demand of 283.4 MW and includes and it is found to be lesser than the other methods
valve-point effect and transmission loss. reported in the literature. The convergence
The best and comparison results for test system are characteristics of 6 unit system with proposed method
presented in table 2. Among all the methods the for EDRPOZ are shown in Figure 7 for 25 trails.
proposed EO method is better in terms of optimal cost
and convergence characteristics shown in figure 6 for
25 trails.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 637
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
4
x 10 figure 8, 9 and 10 represents convergence
1.9 EDRPOZ characteristics of test system.
1.85 Table 5: Comparison results for 6-unit system to EED
1.75
Min.($/Hr)
($/Hr) (ton/Hr)
BSA [13] 605.9984 0.194203 608.9169
1.7
MOEA [14] 607.78 0.1942 NA
1.65
NGPSO [15] 605.9983 0.194178 623.8705
SMODE [16] 619.07 0.1942 NA
1.6 EO 604.9688 0.1942 598.9677
1.55 COST MINIMIZATION
620
Fig. 7 Convergence characteristics of EDRPOZ
quadratic functions. Nevertheless, by combining all the 200 400 600 800
Iteration
1000 1200 1400
0.2
the objective.
0.198
Table 4: Optimal results for to EED by EO
minimization minimization
0.194
P1 (MW) 5.0000 40.9793 50.0000
P2 (MW) 30.3402 46.2677 17.9027 200 400 600 800 1000 1200 1400
Iteration
P3 (MW) 64.1857 54.2949 15.0798
P4 (MW) 102.4765 38.8797 12.2136 Fig. 9 Convergence characteristics of EED to emission
P5 (MW) 48.0259 54.3078 15.0798 min imiz atio n
P6 (MW) 35.1204 51.4338 18.6104 670 ECONOMIC EMISSION MINIMIZATION
PTotal (MW) 285.1486 286.6741 284.6620
660
P los s (MW) 1.7486 3.2741 1.2620
Gcost ($/h) 604.9688 649.5788 598.9677 650
640
combined economic emission with the help of EO. Table 200 400 600 800
Iteration
1000 1200 1400
638 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
V. CONCLUSIONS 7. Serhat Duman and Nuran Yorukeren, "A Novel Modified Hybrid
PSOGSA based on Fuzzy Logic for Non-Convex Economic
A new optimization algorithm called Equilibrium Dispatch Problem with Valve-Point Effect", Electrical Power
Optimizer (EO) is used in this paper to solve the and Energy Systems (Elsevier Journal), Vol.64, pp.121-135, 2015.
economic dispatch problem with realistic restrictions 8. Sumit Banerjee and Deblina Maity, "Teaching Learning Based
Optimization for Economic Load Dispatch Problem Considering
such as valve point effect, ramp rate up/down limits, Valve Point Loading Effect", Electrical Power and Energy Systems
prohibited operating zones and pollution. The EO has (Elsevier Journal), vol.73, pp.456-464, 2015.
been used to evaluate four separate 6-unit test systems. 9. Zwe-Lee Gaing, "Particle Swarm Optimization to Solving the
The findings were consistent with other methods listed Economic Dispatch Considering the Generator Constraints",
in the literature and showed that EO had quick IEEE transactions on power systems, Vol. 18, no. 3, august 2003.
convergence speed, better fuel cost outcomes, 10. Mostafa Modiri-Delshad and S. Hr. Aghay Kaboli, "Backtracking
Search Algorithm for Solving Economic Dispatch Problems with
prevailing computational performance and more Valve-Point Effects and Multiple Fuel Options", Energy (Elsevier
cognizant achievement. The suggested algorithm would Journal), Vol. 116, pp.637-649, 2016.
be a viable solution to solve ED problem practical 11. Naser Ghorbani and Ebrahim Babaei, "Exchange Market Algorithm
constraints. The proposed methodology is a potential for Economic Load Dispatch", Electrical Power and Energy
approach in large-scale framework to solve complex Systems (Elsevier Journal), Vol. 75, pp.19-27, 2016.
non-smooth optimization problems. 12. Jian Zhao and Shixin Liu, "Modified Cuckoo Search Algorithm
to Solve Economic Power Dispatch Optimization Problems",
REFERENCES IEEE/CAA journal of automatica sinica, Vol. 5, no. 4, pp,794-
807, july 2018.
1. Hardiansyah, Junaidi and Yohannes MS, "Solving Economic Load
Dispatch Problem Using Particle Swarm Optimization 13. M. A. Abido, "Multiobjective Evolutionary Algorithms for
Technique", International journal of intelligent systems and Electric Power Dispatch problem", IEEE transactions on
applications, Vol.12, pp.12-18, 2012. evolutionary computation, Vol. 10, no. 3, pp.315-330, june 2006.
2. K. Sudhakara Reddy and M. Damodar Reddy, "Economic Load 14. Mostafa Modiri-Delshad and Nasrudin Abd Rahim, "Multi-
Dispatch Using Firefly Algorithm", International Journal of Objective Backtracking Search Algorithm for Economic Emission
Engineering Research and Applications, Vol. 2, Issue4, pp.2325- Dispatch Problem", Applied Soft Computing (Elsevier Journal),
2330, July-August 2012. Vol. 18, pp.1-15, 2015.
3. Mohammad Moradi-Dalvand and Behnam Mohammadi-Ivatloo, 15. B.Y. Qu, J.J. Liang, Y.S. Zhu, Z.Y. Wang and P.N. Suganthan,
"Continuous Quick Group Search Optimizer for Solving Non- "Economic emission dispatch problems with stochastic wind
Convex Economic Dispatch Problems", Electric Power Systems power using summation based multi-objective evolutionary
Research (Elsevier Journal), Vol. 93, pp.93-105, 2012. algorithm", Information Sciences (Elsevier Journal), Vol.12, pp.1-
19, 2016.
4. A.Hima Bindu and M. Damodar Reddy, "Economic Load
Dispatch Using Cuckoo Search Algorithm", International Journal 16. Dexuan Zou, Steven Li, "A New Global Particle Swarm
of Engineering Research and Applications, Vol. 3, Issue 4, pp. Optimization for the Economic Emission Dispatch with or
498-502, Jul-Aug 2013. without Transmission Losses", Energy Conversion and
Management (Elsevier Journal), Vol.139, pp.45-70, 2017.
5. Tahir Nadeem Malik and Azzam ul Asar, "A New Hybrid
Approach for the Solution of Nonconvex Economic Dispatch 17. Faramarzi et al "Equilibrium Optimizer: A Novel Optimization
Problem with Valve-Point Effects", Electric Power Systems Algorithm", Elsevier 2019.
Research (Elsevier Journal), Vol. 80, pp.1128-1136, 2010.
6. Celal Yasar and Serdar Ozyon, "A New Hybrid Approach for
Nonconvex Economic Dispatch Problem with Valve-Point
Effect", Energy (Elsevier Journal), Vol. 36, pp.5838-5845, 2011.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 639
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
640 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: In the recent years various vehicle Ring gear. Planetary gearing or epicyclical gearing consist
were introduced in the market but due to limitation of one or more outer gear, or planet gear rotate about
in carbon emission and BS series limited speed central or sun gear. By adjusting Pedal crank mechanism
availability vehicle in the market and causing of
or rotation of pedal in given rotation transmission of
environment pollution over few years. There is a
gear through sprocket to rear axle of wheel we adjust
need to decrease dependency on fuel vehicle, so
bicycle is to be modified for optional in future. To various speed ratio according to requirement.
implement the new technique using the change in LITERATURE SURVEY
pedal assembly and two epicyclical gears are added
one of 18 teeth and another gear of 42 teeth placed 2.1 Design And Fabrication Of String Bicycle "Av.Hari
in-between the chain sprocket and rear sprocket Babu, V.Madhava" The main aim of this project is
to optimize the speed of the vehicle and to increase to design and fabricate a string bicycle.Bicycle is a
the efficiency of the bicycle for comfort drive and two wheel vehicle,which is being powered by a rider
to reduce the effort applied on the bicycle. In and can be steered using a handle. It is one of the
normal cycle one full rotation of the pedal cover a most eco-friendlier and an economical mode of
distance of 5.4 meter only, but in our modified transport word wide.There were various forms of
bicycle covers a distance of 10.9 meter in one full bicycle in the past history through which the existing
rotation of pedal at high speed.. form has evolved. Studies are still going on for making
bicycling more comfortable and economical.Though
Keywords : Pedaling, Human Powered Vehicle bicycle is a low cost system that is used for travelling
(HPV) up to a certain distance,it need more man power and
1. INTRODUCTION human effort for propelling it.Hence there is always
a search for a high efficient form of bicycle which
In automobile system, gearbox play important role requires less human effort for propelling it. Here
in shifting of gear. A cycle is local means of transport no introduce a new innovative concept. In this project
of cycle available in market Bicycle, Tricycle. Most the power transmission is done with the help of the
cycle Rickshaws used to carry Passengers for hire this strings instead of sprockets and the chain drives.
vehicle used in southern Asia and south Asia generally 2.2 Design & Fabrication Of Shaft Driven Bicycle"G.
rickshaws are provided for recent immigrant from the Hari Prasad, S.Marurthi, R.Ganapathi".A shaft driven
rural areas for the work. generally impoverished men bicycle is a bicycle that uses a shaft drive instead of
various locally made cycle used for transportation, in a chain which contain two set of bevel gear at both
an eco-sensitive zone where there is increasing green the ends to make a new kind of transmission system
house effect, Global Warming effect due to ban of highly for bicycle for getting high reliability system,and more
emitted vehicle cycle is basic use for transportation. safe system.This project is developed for the users
to rotate the back wheel of a two wheeler using
But in the cycle has many shortcoming, cycle has less
propeller shaft. Usually in two wheelers, chain and
advantage, due to less efficiency extra effort(i.e. torque)
sprocket method is used to drive the back wheel.
applied on the pedal while Gradient, to improve the Shaft-driven bikes have a large bevel gear where a
efficiency of bicycle planetary gear box can be used. conventional bike would have its chain ring.
Planetary gear consists of planet gear, sun gear, and
3. WORKING PRINCIPLE
This system is been designed with lever mechanism
i.e. stated that two equal force acting in opposite
direction i.e.(clockwise or counter clockwise) and
applied to uniform lever to equal distance from fulcrum
counter each other and established state of Side view of a High Speed Effortless Bicycle
eqillibrium.with applying lever principal to pedal and
epicyclical gear box there is increase speed.When brake 4. APPLICATIONS
pedal is pressed it force transmitted to slotted Strip Highly suitable for bicycles riders
provided in bicycle pedal which is pivoted at one end Sport activities using bicycles where people use to
near pivoted restriction of connecting rod to increase cycle/pedal for long distances.
the torque acting on pedal of bicycle. Slotted part is Daily life bicycle uses as a main tool of transportation
provided for crank rotation over pedaling of bicycle for some people.
connected to chain sprocket. Hollow tube section is
provided to utilize maximum power during pedaling and Contribution to motivate old age people to use
maximum force transmitted to sprocket which is rigidly bicycles to exercise their legs
supported at pedal-crank mechanism supporting rod 4.1 ADVANTAGES
is fixed at end of one end, two bearing is provided for
Effortless
rigidly supported gear and sprocket clamped on fixed
supporting rod.Chain mechanism is shifted to spur gear The components used for the fabrication are very
for transmission of torque. spur gear has large simple.
advantage over other gear due to simple design, have a There is no slippage problem.
high power speed efficiency, The cost of the system is less.
Strings deliver maximum power to the wheels.
The rider needs not to apply minimum power to the
pedals.
Noiseless operation can be achieved.
• Also, we can use Turbocharger for increasing the • The engines work with both air taken from
speed. atmosphere and air pre-compressed in tanks. Air is
compressed by the onboard compressor or at service
• The expansion of this air pushes the piston and creates
station equipped with a high-pressure compressor.
movement. The atmospheric temperature is used to
re-heat the engine and increase the road coverage • Before compression, the air must be filtered to get
rid of any impurities that could damage the engine.
• The air conditioning system makes use of expelled
Carbon filters are used to eliminate dirt, dust, humidity
cold air.
and other particles which unfortunately are found in
COMPRESSED AIR CAN FUEL A CAR: the air in our cities.
In practical terms compressed air at 300 bars is • This represents a true revolution in automobiles and
stored in the carbon fiber tank A. it is thefirst time that a car has produced minus
pollution, i.e. iteliminates and reduces exciting pollution
rather thanemitting dirt and harmful gases. The
exhaust pipe on thecar produces clean air which is
cold on exit (between -150and 00) and is harmless to
human life. With this system theair that comes out of
the car is cleaner than the air thatwent in.
WORKING:
Jem Stansfield created the bike by strapping two • Compressed air engine reduces the cost of vehicle
high-pressure tanks onto the side of his Push moped. production by about 20%, because there is no need
The tanks are basically scuba tanks. He uses the to build a cooling system, spark plugs, starter motor,
electricity from his house to fill the tanks. The power is or muffler.
then "stored" there, much like a battery, ready for use. • The rate of self-discharge is low opposed to batteries
The tanks used are carbon-fiber tanks of the sort used that depilate their charge slowly over time. Therefore,
by firefighters for oxygen. But still, they're far cheaper the vehicle maybe left unused for longer periods of
than even the lead acid battery used in car now. Of time than electric cars.
course, the compressor works on electricity, so that's • Compressed-air vehicles emit few pollutants, mostly
not always a clean power source but recharging options dust from brake and tire wear.
at night or off peak will enhance the chances to use the
power that would be wasted otherwise. The top speed DISADVANTAGES:
is about 18 mph, and it can only go 7 miles before the • Very little is known about air powered vehicles thus
air pressure runs out and a lot more power could far.
probably be pulled by tweaking his configuration. A • Compressed air has a low energy density comparable
small gear on the end of the air drill, connected to the to the values of electrochemical lead-acid batteries.
chain of the bike would make a much more elegant
solution. Several companies are investigating and • The air cars will travel only with low speed and it will
producing prototypes, and others plan to offer air take nearly 6 hours to charge.
powered cars, buses and trucks. The compressed air • Limited storage capacities of the compressed air tank.
is stored in carbon-fiber tanks that are built into the
chassis. As the air is released, the pressure drives CONCLUSION:
pistons that power the engine and move the car, and For the entire disruption made one can say that by
the pistons compress the air into a reservoir so that the using air car there is reduction in air pollution. The
process continues. emission benefits of introducing this zero-emission
technology are obvious. Compressed air for vehicle
ADVANTAGES: propulsion is already being explored and now air
• Refuelling can be done at home using an air powered vehicles are being developed as a more fuel-
compressor or at service station. efficient means of transportation. Some auto-mobile
companies are further exploring compressed air hybrids
Abstract: Solid-state diffusion bonding (DB) of especially when their Physico-chemical characteristics
Ti-6Al-4V to AISI 304 austenitic stainless-steel change. This method generates joints with less
plates was carried out in vacuum with uniaxial dimensional tolerance, less macroscopic deformation,
compressive pressure of 14 MPa and bonding and fewer structural inhomogeneities.Ghosh et al. report
temperature of 900 °C. The quality of the joint was that for solid-state DB of commercially pure titanium
assessed using optical and SEM microscopy and
and 304 stainless steel, maximum bond strength of 71%
intermetallic compounds were confirmed using
XRD. The bonded joints' room-temperature of that of titanium was attained for the couples treated
characteristics were assessed using for 30 minutes. Ghosh et al. studied direct bonding
microhardness, ram tensile, and lap shear tests. between commercially pure titanium and 304 stainless
The 75-minute DB connection has a maximum steel at 850 °C for 30-150 min under uniaxial stress in
bonding strength of 243 MPa and a lap shear a vacuum. Despite the large volume percentage of
strength of 149 MPa. intermetallics, the assemblies treated for 90 minutes had
Keywords: Diffusion bonding, Ti-6Al-4V alloy, 76 percent of the bond strength of titanium. Assemblies
Austenitic stainless steel, Holding time bonded to AISI 304 were studied for their interfacial
microstructure and mechanical characteristics.
INTRODUCTION
EXPERIMENTAL WORK
In addition to its high strength-to-weight ratio,
titanium alloy Ti-6Al-4V has an excellent fatigue life, DB was performed on rolled Ti-6Al-4V alloy and
low density, and corrosion resistance. Joints of titanium AISI 304 austenitic stainless-steel plates. The samples
alloy and stainless steel have found use in nuclear, were 50 mm square and 5 mm thick. Tables 1 and 2
chemical, and aerospace sectors. The metallurgical provide the chemical and mechanical characteristics of
disconformity of titanium alloys and stainless steels the basic materials. The specimen was heated to the
makes conventional fusion welding problematic due to bonding temperature in a 1600°C heating furnace while
chemical segregation and intermetallic formation at the necessary pressure was applied. After bonding, the
interfaces. Dissimilar materials may be joined via DB, samples were cooled to room temperature before
removal.
Table 1 Chemical composition (wt %) of the base metals
Material Al C Cr Fe Mn Ni O P S Si Ti V
Ti–6Al–4V 6 - - 0.25 - - 0.2 - - - 90 4
AISI 304 - 0.08 20 74 2 10 - 0.045 0.03 1 - -
Table 2 Mechanical properties of base metal
and 75 minutes, then decreased when the holding period This shift may be due to gradual homogeneity of the
was increased to 75 minutes. joint area as components diffuse out and titanium alloying
elements diffuse in. During this period, isothermal
solidification was accomplished. A study of samples
bonded at 900 °C for various holding periods revealed
alterations in the diffusion zone microstructure.
3.2 Microstructure characterization
Figure 4 depicts a cross-section of the bond contact
after 30 minutes. Diffusion zones widen as the holding
duration rises to 45 and 75 minutes. A DLT may be
visible along with the interface after 30 minutes of
holding. Solid-state diffusion of Ti/Fe in base metals is
one of the early bonding phases at the Ti/Fe contact.
Intermetallic Fe2Ti intermetallic developed at grain
boundaries as holding time increased. Intermetallics
Fig. 3 Diffusion layer thickness as a function of holding time between Ti/Fe may also develop afterward.
Fig. 4 Optical micrographs of the joint interface at holding time of (a) 30 min, (b) 45 min, (c) 60 min, (d) 75 min, and (e) 90 min
Figure 5 displays SEM and EDS findings of DB (a&b). The interface includes 49.74 % Ti, 28.77 %
samples bonded at 900°C, 14 MPa, and 75 minutes. iron, 9.5 % chromium, 7.33 % aluminum, 2.5 %
SEM examination of the Ti6Al4V/AISI304 joint shear vanadium, and 2.28 % nickel Figure 5 shows the
fracture shows cleavage fracture (Figure 5(a)). Many findings of an X-ray diffraction study (c). XRD and
fine river patterns and cleavage fractures with a local EDS indicate the existence of intermetallic phases such
rip (Figure 5(b)). This demonstrates that the Ti6Al4V/ a s F
3
, Fe2Ti4O, Fe2Ti, NiTi2, FeNi, Fe3OTi3, FeTi,
e N i
AISI304 joint fracture is not completely brittle and is and Cr2Ti. Intermetallics produced at the diffusion zone
also tough. The shear fracture location in the diffusion increase with DB time, in agreement with previously
zone is determined by interface structure. Figure 5 published studies.
shows the findings of an EDS study at the interface
Fig. 5 Microstructural characteristics of diffusion bonded joint (a) SEM micrograph, (b) EDS results, and (c) XRD results
[3]. He P., Zhang J., Li X. (2001); Diffusion bonding of titanium [10].Kundu S., Chatterjee S. (2006); Effect of bonding temperature
alloy to stainless steel wire mesh, Materials Science and on interface microstructure and properties of titanium-304
Technology, 17, pp.1158-1162. stainless steel diffusion bonded joints with Ni interlayer,
Materials Science and Technology, 10, pp.1201-1207.
[4]. Ghosh M., Chatterjee S., Mishra B. (2003); The effect of
intermetallics on the strength properties of diffusion bonds formed [11].Mahendran G., Balasubramanian V., Senthilvelan T. (2010);
between Ti-5.5Al-2.4V and 304 stainless steel, Materials Science Influences of diffusion bonding process on bond characteristics
and Engineering A, 363, pp.268-274. of Mg-Cu dissimilar joints, Transaction of Nonferrous Metal
Society of China, 20, pp.997-1005.
[5]. Kurt B., Orhan N., Kaya M. (2009); Interface characterisation
of diffusion bonded Ti-6Al-4V alloy and austenitic stainless steel [12].Cam G., Ipekoglu G., Bohm K.H., Kocak M. (2006);
couple, Materials Science and Technology, 25, pp.556-560. Investigation into the microstructure and mechanical properties
of diffusion bonded TiAl alloys, Material Science, 41, pp.5273-
[6]. Ghosh M., Chatterjee S., Mishra B. (2002); Characterization of
5282.
transition joints of commercially pure titanium to 304 stainless
steel, Materials Characterization, 48, pp.393- 399 [13].Vigraman T., Ravindran D., Narayanasamy R. (2012); Diffusion
bonding of AISI 304L steel to low-carbon steel with AISI 304L
[7]. Lee H.S., Yoon J.H., Park C.H., Ko Y.G., Shin, Lee C.S. (2007);
steel interlayer, Materials and Design, 34, pp.594-602.
A study on diffusion bonding of superpalsticTi-6Al-4V ELI grade,
Materials Process and Technology, 187-188, pp.526-529. [14].Ghosh M., Samar Das, BanarjeeP.S., Chatterjee S. (2005);
Variation in the reaction zone and its effects on the strength of
[8]. Ozdemir N., Bilgin B. (2009); Interfacial properties of diffusion
diffusion bonded titanium-stainless steel couple, Materials
bonded Ti-6Al-4V to AISI 304 stainless steel by inserting a Cu
Science and Engineering A, 390, pp.217-226.
interlayer, Advanced Manufacturing Technology, 41(5-6),
pp.519-526.
[9]. Vigraman T., Ravindran D., Narayanasamy R. (2012); Effect of
phase transformation and intermetallic compounds on the
microstructure and tensile strength properties of diffusion-bonded
joints between Ti - 6Al - 4V and AISI 304L, Materials and
Design, 36, pp.714-727.
Abstract- There is a wide application of coiled conditions such as adiabatic or insulated wall conditions.
heat exchanger in the field of cryogenics and other Some examples of heat exchangers are:
industrial applications for its enhanced heat transfer
characteristics and compact structure. Lots of • Intercoolers and pre heaters
researches are going on to improve the heat • Condensers and boilers in refrigeration units
transfer rate of the helical coil heat exchanger. Here,
in this work, an analysis has been done for a tube- • Condensers and boilers in steam plant
in-tube helical heat exchanger with constant heat • Regenerators
transfer coefficient with turbulent flow. There are
various factors present that may affect the heat • Oil coolers and heat engines
transfer characteristics of the heat exchanger. • Automobile radiators etc.
Here, the experiment has been done by varying
the curvature ratio i.e. ratio of coil diameter to inner II. PROBLEM IDENTIFICATION
tube diameter and inlet velocity of the hot fluid in
To accomplish this goal, the following problems were
the inner tube. The curvature ratio is varied from
8 to 25 and inlet velocity is varied from 1m/s to
encountered:
2m/s step wise. The analysis has done using ANSYS Various parameters changing due to coil shape,
13 CFD methodology. Different parameters are temperature gradient and various Thermodynamic
calculated from the results obtained and graphs are properties.
plotted between various parameters such as
Nusselt number, friction factor, pressure drop and Problems in determining overall heat transfer
pumping power versus Reynolds number. These coefficient due to fouling, and other
graphs have been analysed and discussed to find Parameters, Design and Construction of a physical
out the optimal result for which the heat exchanger
model of the heat exchanger.
would give the best performance.
Keywords- Heat Exchanger, Helical Coil, CFD
Testing of the physical model under different flow
Analysis, Double Pipe Heat Exchanger. rates and flow configurations.(Parallel flow and counter
flow).
I. INTRODUCTION
Comparison of the results from both theoretical and
A heat exchanger may be defined as equipment experimental work.
which transfers the energy from a hot fluid to a cold
The progression of the S-N curve shown in Fig. 2
fluid, with maximum rate and minimum investment and
can be influenced by many factors such as stress ratio
running cost. The rate of transfer of heat depends on
(mean stress), loading frequency, temperature,
the conductivity of the dividing wall and convective heat
corrosion, residual stresses, and the presence of
transfer coefficient between the wall and fluids. The heat
notches. A constant fatigue life (CFL) diagram is useful
transfer rate also varies depending on the boundary
for the study of stress ratio effect. The Goodman line is
IV. EXPERIMENTAL PROCEDURE Now the project was updated, saved and meshing
window was closed. After that the ANSYS Fluent
A. Geometrical modelling: launcher was opened double clicking on setup. The
First the geometry of the model is created in ANSYS dimension was set as 3D, option as Double Precision
workbench. Fluid flow (fluent) module is selected from and then OK. The Fluent window was opened.
the workbench. The design modeller opens as a new
C. SOLUTION
window when the geometry is double clicked.
Sketching: Problem Setup
Using sketching option three concentric circles are The mesh was checked. The analysis type was
created in XY-plane (diameters of circles are 6mm, changed to Pressure Based type and the velocity
7mm and 13mm) in three different sketches. A straight formulation was changed to absolute. Time was changed
line is also created in sketch 4 along the height of the to steady state.
helical tube at the centre. Models
Sweep: Energy was set ON position. And viscous model
Then the three circles were swept about the central was selected as "k-? model (2 equations).
axis with pitch 40 mm and number of turns is 1.5. At
Materials
first the mean coil diameter is 50mm and then it is varied
for different values of D/d. Then using Boolean operation Water-liquid as fluid and copper as solid was
the overlapping volumes are subtracted and respective selected from the fluent database by clicking change/
phases were chosen. create.
All the conditions were left as default. Then the Hot • The engine was allowed to run at the rated speed of
inlet was selected from the compute from drop down 1500 rev/min for a period of 20 minutes to reach the
steady state.
list and then the solution was initialized.
• The fuel consumption was measured by a stop watch. It is found that there is no change is outlet
• Smoke readings were measured using the AVL Smoke temperature when number of divisions is more than 31,
meter at the exhaust outlet. 33, and 63. Hence, it is taken as the mesh size for all
the calculations. "31. 33, 63" means the no of divisions
• The amount of NOx, CO, HC was measured using of the three diameters are 31, 33, 63 respectively.
exhaust gas analyzer.
V. RESULTS AND DISCUSSIONS
• The exhaust temperature was measured by using a
sensor. The heat transfer and flow characteristics of a helical
coil pipe can be observed from the contour diagrams
• Then the load was applied by adjusting the knob, which
of temperature and pressure distribution, variation of
was connected to the Eddy Current Dynamometer.
Nusselt number, friction factor and pumping power with
• Experiments were conducted using sole fuel, Biodiesel Reynolds number.
and it blends with diesel fuel, and the above procedure
was adopted. A. Tables
Table I. Number of division's nodes and outlet temperature The results obtained from the CFD analysis are given
D/d=8
in the tables below and from that Nusselt number (Nu),
No. of divisions No. of nodes Outlet te mp. of hot fluid friction factor (f), pressure drop (p) and pumping
21,23,45 85622 331.524
25,27,53 128722 333.324
power (P) has been calculated.
31,33,63 325488 333.717 Table 5.1 Nu, f, p and P for different values of Re at D/d=8
41,43,85 459619 333.717
D/d=10 Re Nu p f P
No. of divisions No. of nodes Outlet te mp. of hot fluid 12938.79 130.6194 1192.57 0.06535 158.8453
21,23,45 92467 331.542 15526.34 150.5578 1654.1 0.06296 263.7802
25,27,53 135262 332.926 18113.9 169.8872 2183.83 0.06108 405.8183
31,33,63 356922 333.252 20701.46 188.7711 2749.04 0.058864 583.4454
41,43,85 489231 333.254
23289.02 209.8607 3443.76 0.058268 821.9023
25876.57 225.2856 4171.54 0.057174 1105.929
Temp Vs Nodes Table 5.2 Nu, f, p and P for different values of Re at D/d=10
Re Nu p f P
334
reu 12938.79 126.6922 1252.53 0.057494 166.7881
ta 333.5 15526.34 146.1506 1731.68 0.055212 276.1124
re
p 333 Temp Vs 18113.9 165.0135 2279.97 0.053415 423.648
m
e 332.5 Nodes 20701.46 183.4424 2895.788 0.051947 614.5485
T
te 332 23289.02 201.4091 3536.32 0.050126 843.9726
lt
u 331.5 25876.57 219.0824 4325.312 0.049664 1146.669
O
331 Table 5.3 Nu, f, p and P for different values of Re at D/d=15
Re Nu ?p f P
Pressure drop Vs Re
12938.79 158.4227 2187.524 0.040278 290.6452
5000
15526.34 181.7256 3003.343 0.038407 478.2586
18113.9 204.2441 3930.159 0.036929 729.6851 4000
20701.46 226.1019 4963.713 0.035721 1052.844
23289.02 250.1111 5832.123 0.034231 1354.1542 3000
25876.57 268.2465 7341.522 0.033805 1945.774 Pressure drop
2000 Vs Re
VI. GRAPH 1000
150 600
Pumping
Nu Vs Re 400 Power Vs Re
100
200
50
0
0
0 10000 20000 30000
0 10000 20000 30000
Fig.6.4 Graph of Reynolds number Vs pumping power for D/
Fig.6.1 Graph between Nusselt number Vs Reynolds number d=8
for D/d=8
From the above graphs (Figure 6.1, 6.2, 6.3, 6.4) it
friction factor Vs Re is observed that the Nusselt number, pressure drop and
pumping power increases with increasing Reynolds
0.066 number whereas friction factor decreases with increasing
0.064 Re. For the optimal condition of heat exchanger,
0.062 pumping power should be minimum with maximum
friction factor Nusselt number, i.e. the power consumption should be
0.06 Vs Re
less with more heat transfer rate.
0.058
0.056 Nu Vs Re
0 10000 20000 30000 300
250
Fig.6.2 Graph between Reynolds number Vs friction factor for
D/d=8 200 D/d=8
150
u D/d=10
N
100 D/d=15
50 D/d=20
0 D/d=25
Re
8000
Nu Vs Re f V s Re
7000
250 0.066
p6000 D/d=8 0.065
or
5000 200 0.064
D D/d=10
er4000 0.063
su
se3000
D/d=15 f150 0.062
r D/d=20 & 0.061
P
2000 u
D/d=25 N100 0.06
1000 0.059
0 50 0.058
0.057
Re 0 0.056
0 5000 10000 15000 20000 25000 30000
Fig.6.6 Graph between pressure drop & Re for different D/d Re
0.07
0.06
0.05 Nu Vs Re f Vs Re
0.04 D/d=8
250 0.058
0.03 D/d=10
0.057
0.02 D/d=15 200 0.056
0.01 D/d=20 f 0.055
&150 0.054
0 D/d=25 u
N 0.053
100
0.052
50 0.051
0.05
Fig.6.7 Graph between friction factor & Re for different D/d
0 0.049
0 5000 10000 15000
Re 20000 25000 30000
Pumping Power Vs Re Fig.6.10 Variation of Nusselt number and friction factor with
Reynolds number (D/d=10)
2500
2000
N u Vs Re f Vs Re
1500 D/d=8
300 0.05
D/d=10 0.045
1000 250
D/d=15 f 0.04
500 &200 0.035
D/d=20 u 0.03
N150 0.025
0 D/d=25 0.02
100 0.015
50 0.01
0.005
0 0
0 10000 20000 30000
Fig.6.8 Graph between power & Re for different D/d
Re
This work investigates the heat transfer and flow [7] J.S. Jayakumar, S.M. Mahajani, J.C. Mandal, P.K. Vijayan, and
Rohidas Bhoi, 2008, Experimental and CFD estimation of heat
characteristics of a tube-in-tube helical heat exchanger transfer in helically coiled heat exchangers, Chemical Engg
for counter flow using CFD methodology. The effect Research and Design, 221-232.
of mass flow rate in the inner tube and curvature ratio is [8] Rahul Kharat, Nitin Bhardwaj, R.S. Jha, 2009, Development of
studied and the various conclusions drawn are: heat transfer coefficient correlation for concentric helical coil
heat exchanger, International Journal of Thermal Sciences, 48,
• Nusselt depends on the curvature ratio, i.e. the ratio 2300-2308.
of coil diameter to inner tube diameter. Nu increases [9] N. Ghorbani a, H. Taherian b, M. Gorji c, H. Mirgolbabaei d,
with increasing curvature ratio. Also it was found that 2010, Experimental study of mixed convection heat transfer in
Nu increases with increasing mass flow rate or vertical helically coiled tube heat exchangers , Experimental
Reynolds number. Thermal and Fluid Science 34, 900-905.
[10]J. S. Jayakumar, Helically Coiled Heat Exchangers, Heat
• For turbulent flow in the pipe, friction factor decreases Exchangers - Basics Design Applications, 12.
with increasing Reynolds number(Re) whereas heat
[11]Rajput R.K., 2011, Heat and Mass Transfer, S. Chand &
transfer rate increases with Re. So, there exists an Company ltd., pp.563, chap.10
optimal value of mass flow rate and curvature ratio
for which the heat exchanger would give the best
performance.
Abstract- This paper presentation explores the The resultant braking power is straightforwardly
working principle of eddy current brake relative to the velocity at which the balance is traveling
mechanism, which can be analyzed by Maxwell through the brake component. This very property, in
3DTransient solver. An eddy current brake, like a any case, is additionally one of attractive braking's
conventional friction brake, is responsible for
burdens in that the vortex drive itself can never totally
slowing an object, such as a train or a roller coaster
hold a train in perfect condition. It is then regularly
etc. Unlike the friction brakes, which apply
pressure on two separate objects, eddy current important to hold the train setup with an extra
brakes slow an object by creating eddy currents arrangement of balance brakes or "kicker wheels" which
through electromagnetic induction which create are straightforward elastic tires that reach the train and
resistance, and in turn either heat or electricity. In successfully stop it.
this paper, linear Halfback magnetized mover is Magnetic brakes can be found in two configurations:
applied to eddy current braking system for high
speed. For such a breaker, we give analytical • The brake elements are mounted to the track or
formulas considering end effects for its magnetic alongside the track and the fins are mounted to the
field, eddy current distribution, forces according underside or sides of the train. This configuration
to the secondary relative permeability, and looks similar to frictional fin brakes.
conductivity. The results given here are purely • The fins are mounted to the track and the brake
analytic & applicable. elements are mounted to the underside of the train.
Keywords- Magnetic field, Eddy current brake, This configuration can be found on Intamin's
Conventional friction brake) Accelerator Coasters (also known as Rocket
Coasters) such as KingdaKa at Six Flags Great
Magnetic brakes Adventure.
Attractive brakes are a moderately new innovation Attractive brakes are noiseless and are much
that is starting to pick up notoriety because of their high smoother than grinding brakes, bit by bit expanding the
level of security. As opposed to moderating a train by braking control so that the general populations on the
means of grinding, (for example, balance or slide ride don't encounter quick changes in deceleration.
brakes), which can regularly be influenced by different Numerous advanced exciting rides, particularly
components, for example, downpour, attractive brakes those being fabricated by Intiman, have used attractive
depend totally on certain attractive properties and braking for quite a while. Another real crazy ride creator
resistance. Truth be told, attractive brakes never interact actualizing these brakes is Bollinger and Maxillary in
with the train. 2004 on their Silver Bullet altered liner, Making it the
Attractive brakes are comprised of maybe a couple initially suspended exciting ride to highlight attractive
lines of neodymium magnets. At the point when a metal brakes, and again utilized them on their more up to date
balance (commonly copper or a copper/aluminum tasks, for example, Leviathan at Canada's Wonderland.
amalgam) goes between the columns of magnets, swirl These later applications have demonstrated successfully
streams are produced in the blade, which makes agreeable and important for these modified napkins
attractive field restricting the balance's movement. which frequently give the feeling of flight.
There additionally exist outsider organizations, for prerequisites of braking at high speeds, totally without
example, Magnatar tech. Which give different designs the utilization of erosion. Because of its particular
of the innovation to be utilized to supplant and retrofit establishment area (transmission line of unbending
stopping mechanisms on existing crazy rides to build vehicles), electromagnetic brakes have better warmth
wellbeing, enhance rider solace, and lower upkeep scattering ability to dodge issues that grinding brakes
expenses and work. face. Ordinarily, electromagnetic brakes have been
mounted in the transmission line of vehicles. Fredrick,
EDDY CURRENT BRAKING J. R (2002)
Whirlpool streams are stream in a roundabout way. The propeller shaft is partitioned and fitted with a
They get their name from "whirlpools" that are shaped sliding all inclusive joint and is associated with the
when a fluid or gas streams in a roundabout way around coupling rib on the brake. The brake is fitted into the
impediments when conditions are correct. To produce case of the vehicle by method for hostile to vibration
whirlpool streams for an examination a "test" is utilized. mounting. The down to earth area of the retarder inside
Inside the test is a length of electrical channel which is the vehicle keeps the immediate impingement of air on
framed into a loop. Rotating current is permitted to the retarder created by the movement of the vehicle.
stream in the curl at a recurrence picked by the Any wind stream development inside the skeleton of
professional for the sort of test included. An element the vehicle is found to have a moderately inconsequential
extending and falling attractive field frames in and around impact broadcasting live stream around tire ranges and
the curl as the rotating current courses through the loop. consequently on the temperature of both front and back
circles. So the utilization of the retarder does not
influence the temperature of the consistent brakes.
In that way, the retarders amplify the life range of
the normal brakes and keep the general brakes cool
for crisis circumstance. Electromagnetic brakes work
in a moderately cool condition and fulfil all the vitality
prerequisites of braking at high speeds, totally without
the utilization of grinding. Because of its particular
establishment area (transmission line of inflexible
vehicles), electromagnetic brakes have better warmth
dispersal ability to maintain a strategic distance from
Figure 1: Generation of Eddy current Bae J. S., (2004) issues that grinding brakes face. Ordinarily,
At the point when an electrically conductive material electromagnetic brakes have been mounted in the
is put in the loop's dynamic attractive field transmission line of vehicles. The propeller shaft is
electromagnetic, prompting will happen and whirlpool isolated and fitted with a sliding all inclusive joint and is
streams will be instigated in the material. Karnopp, M., associated with the coupling rib on the brake. The brake
(1989) Eddy streams streaming in the material will is fitted into the undercarriage of the vehicle by method
create their own "optional" attractive field which will for hostile to vibration mounting. The handy area of the
contradict the curl's "essential" attractive field acc. To retarder inside the vehicle keeps the immediate
the Lenz's guideline. impingement of air on the retarder brought about by
the movement of the vehicle.
I. INSTALLATION LOCATION
Any wind stream development inside the
The establishment area of Electromagnetic brakes undercarriage of the vehicle is found to have a
close to the moving part. Electromagnetic brakes work moderately inconsequential impact reporting in real time
in a generally cool condition and fulfill all the vitality stream around tire zones and subsequently on the
temperature of both front what's more, back circles. can be correspondingly attenuated up or down. Rather
So the use of the retarder does not influence the than pads pressing harder on a rotor, the resistive
temperature of the consistent brakes. In that way, the magnetic force is amplified. Though there is no physical
retarders broaden the life range of the customary brakes contact, the process still generates increased slowing,
and keep the normal brakes cool for crisis circumstance. along with heat, as a result of the resistance. Eddy
Klingerman, Y. (1998) current brake systems are used mostly in larger vehicles,
like trains. A sub-type of the Eddy current brake is
II. WORKING PRINCIPLE
known as the linear Eddy current brake. Instead of the
normal circular design, magnetic coils are wound around
a straight rail. The coils alternate between a positive
and negative magnetic charge, so, when activated,
generate resistance and slowing action. This design is
less widely used than traditional electromagnetic brakes
on train systems, but, in places like Europe, is becoming
more common on high-speed rail systems.
Unpowered versions of the linear design - which
instead use permanent, rare Earth magnets - are the
brake of choice on most roller coasters. As anyone
Figure 2 :Magnetic Braking who has ridden a roller coaster will be aware, these
When an electrical conductor, such as copper or non-electromagnetic types work on an on-off basis,
aluminum, moves through the field of a permanent and cannot be easily modulated. This results in very
magnet or an electromagnet, electromagnetic induction abrupt periods of deceleration, and, for this reason,
creates eddy currents, which dissipate some of the they are not a popular choice on more comfort-oriented
kinetic energy into Joule heat and results in slowing the vehicles, like trains.
motion of the conductor. This principle is utilized in the III. FUTURE OF EDDY CURRENT
construction of magnetic brakes. This Demonstration BRAKING
shows magnetic braking applied to a rotating metallic
disk. This might, for example, serve to control resistance The assortment of papers that have been reviewed
to motion in exercise machines. Magnetic braking can in this paper shows that use of eddy current dampers
also find applications in roller coasters and railroad has seen a number of diverse applications. However,
trains, in which the metallic conductor has the shape of many of the applications are not directed towards the
a linear rail. In contrast to conventional friction brakes, commercial market and are developed to suit a niche
there is no direct contact between interacting surfaces, field. The eddy current damper does have numerous
which makes magnetic braking more reliable and advantages over other damping systems. For instance,
reduces wear and tear. due to the non-contact nature of the damper it does
not change the dynamics of the structure or cause mass
A magnetic brake is a device that leverages strong loading and added stiffness, as many other damping
magnetic forces to slow a vehicle down. There are mechanisms do. Additionally, because the damper does
various different types of magnetic brake systems, not contact the structure, there is no need for a viscous
including ones that use electromagnets to actuate fluid, seals, or the periodic maintenance needed by many
traditional friction pads, and those that leverage magnetic other damping and braking systems. Furthermore, eddy
repulsion itself to provide resistance. current damping systems are easy to install, and the
By increasing or decreasing the amount of electric damping force can easily be controlled through
current, the stopping power of an Eddy current brake adjustment of the position or strength of the magnets.
The question left un an were, where will eddy current Finally, the use of eddy currents for active damping
damping mechanisms be in the future? There are several mechanisms may allow a more effective damper to be
locations that are particularly well suited for eddy current developed. The use of eddy current dampers as active
dampers, but perhaps the most promising is in space. control mechanisms is limited in the current literature.
The advantages listed above provide a combination of One application that may be effective is to displace the
attributes that are not available in other damping magnet relative to the moving conductor, in an attempt
mechanisms. When a device is placed into orbit, the to increase the net velocity between the two devices
system must function for its entire and instigate a higher damping force. Other active
life span without requiring any type of maintenance. control methods may use electromagnets to damp
This can place limitations on the type of damper used, vibrations out. If the amount of research into eddy
leaving few systems left. Perhaps the two damping current damping continues to grow, this type of damper
systems that require the least amount of maintenance will surely find its way out of niche applications and
after their placement are eddy current dampers and into the commercial market.
constrained layer damping. The drawback of ADVANTAGES
constrained layer damping is that it modifies the system's These are non-mechanical; no moving parts hence
structural properties, while the drawback of the eddy no friction. Fully resettable, no parts need to be
current damper is that it typically requires a second replaced. Can be activated at will via electrical signal,
structure to support the magnets. However, the Low maintenance cost, Operates at any rotational
extremely cold temperatures that are present in space speed.
actually improve the damping performance of the eddy
current damper, due to the decrease in resistivity of the DISADVANTAGES
conductor. The opposite is the case for constrained layer Braking force diminishes as speed diminishes with
damping treatments, because the extreme cold can no ability to hold the load in position at stand still. That
cause stiffening of the visco elastic material and the could be considered to be a safety issue, but it really
vacuum pressure could cause out gassing if not properly means that friction braking may need to be used as
sealed, thus making their use in space problematic. The well., Eddy-current brakes can only be used where the
use of these dampers in space may be the key to infrastructure has been modified to accept them.
developing better eddy current technology that may
open a commercial market. One commercial market IV. CONCLUSION
that may be a key location for eddy current damping is With all the advantages of electromagnetic brakes
the vibration absorbers used in vehicles. The dampers over friction brakes, they have been widely used on
currently used tend to require replacement throughout heavy vehicles where the ?brake fading' problem is
the life of the automobile and lose effectiveness over serious. The same concept is being developed for
time. The eddy current damper could potentially replace application on lighter vehicles. A Halbach magnetized
these devices if sufficient research were carried out. A mover was applied to a high-speed eddy current braking
second area of the automobile that may benefit from system. Based on analytical 2-D field solutions
the use of eddy currents is the braking system. The use considering dynamic end effect, the magnetic field, eddy
of eddy currents for braking purposes could potentially current distribution, and forces according to the
lead to regenerative braking that would reduce the secondary relative permeability and conductivity were
amount of electrical energy required to power the presented.
electromagnets. The automobile market is a key It was observed that the air-gap flux density has a
commercial market that can typically open doors for non uniform distribution for the high speed.
the technology used. Comparisons between numerical simulations and
experimental data were also presented.
Abstract: All life on earth depends on energy buildings have been investigated within the past
and the cycling of carbon. Energy is essential for decade. The experimental results computed in the
economic and gregarious development and poses field of dihydrogen monoxide distillation process
an environmental challenge. The world's utilizing solar energy in the presence of energy
dependence on fossil fuels commenced storage materials i.e paraffin wax are discussed in
approximately 200 years ago. Availability of fossil this paper.
energy resources, peak oil era and this is the time
for terminus of the fossil fuel era, price and INTRODUCTION
environmental impact and sundry renewable Water crisis is one of the major problems on this
resources and utilization of it. earth. As the world population increases continually,
The twenty-first century is expeditiously water shortage will become more severe in the future.
becoming the impeccable energy storm, modern Even though water represents 70% of the earth. In the
society is faced with volatile energy prices and next decades, increased potable water consumption and
growing environmental concerns as well as energy fresh water resources depletion will cause a worldwide
supply and security issues. Solar and wind energy water scarcity problem. Nearly one third the world
are now providing the lowest cost options for
population will suffer from a problem of water scarcity.
economic and community development in rural
regions around the globe. Energy and dihydrogen Rarefaction of potable water has become a major
monoxide are the key to modern life and provide concern in many countries and therefore new techniques
the substructure indispensable for sustained are required to produce fresh water. To take advantage
economic development. Due to a growing world of natural resources, attention has been focused on
population and incrementing modernization desalination of sea water or brackish water/saline water.
ecumenical energy demand is rising during the At the same time, the gradual depletion of non
current century. renewable fuels and the related climate change
Finding the adequate supplies of clean and consequences should lead to key changes in energy
sustainable energy for the future is the ecumenical supply and use of energy.
society's most challenging task for this century. The To overcome this problem, there are various
future will depend on renewable sources such as
methods to produce fresh water from sea water, saline
solar, wind and biomass.
water or brackish water. Desalination processes have
There are immensely colossal numbers of PCMs received great attention as an alternative solution for
that melt and solidify at a wide range of fresh water production. Desalination is one of the
temperatures, making them captivating in a
methods which is suitable for potable water and less
number of applications. PCMs have been widely
cost effective. The demand for reliable and
utilized in latent heat thermal storage systems for
heat pumps, solar engineering and spacecraft autonomously operating desalination systems is
thermal control applications. The utilization of increasing continuously. These systems are meant for a
PCMs for heating and cooling applications for basic need of drinking water and fresh water supply.
is used as phase change material. Two variants of afternoon at 12:15 P.M then it is in decreasing
paraffin wax are used with respect to different colors order.Since it was a on a partially sunny day there was
of the wax. All experiment work conducted in the month a slight variation in the intensity of light falling on the
of December on a partially sunny day here in solar still.
Hyderabad, India.
A basin of solar still has a thin layer of water, a
transparent glass cover that covers the basin and channel
for collecting the distillate water from solar still. The
glass transmits the sun rays through it and saline water
in the basin or solar still is heated by solar radiation
which passes through the glass cover and is absorbed
by the bottom of the solar still. In a solar still, the
temperature difference between the water and glass
cover is the driving force of the pure water yield. It Fig 5: Variation of Basin Temperature with Time
influences the rate of evaporation from the surface of From the figure it is seen that there is an increase in
the water within the basin flowing towards condensing the basin temperature as readings were taken at equal
cover. Vapor flows upwards from the hot water and intervals of time. As the rays fall continuously on the
condenses. This condensate water is collected through glass there is a huge increase in temperature of the glass
a channel. in the afternoon.
RESULTS AND DISCUSSIONS The increase in the temperature is seen when the
Output of a solar distillation depends on the incident wax was taken along with normal water.The increase
solar radiation. Figure 4 represents the variation of solar in the basin temperature is slightly more for the green
radiation flux with respect to time. It is observed to wax as its energy absorption and emission coefficient
increase with time up to 12:15 Noon with maximum are slightly more.
flux reaching 1156.37 W/m2. Thereafter both curves
(with and without wax) showed a decreasing trend
towards evening hours.
Radiation (I) = (154.5* Pyranometer Reading in
mV)-3.2 W/m2.
Fig 7: Variation of Vapor Temperature with Time Glass cover inside and outside temperatures
Vapor temperature increased as there is an continual increased with respective time with maximum
increase in atmospheric temperature and intensity of temperatures as shown in figure 8 and figure 9.
light, reaches maximum of 66.23oC with green wax and The glass temperatures increased continuously until
then falls as the intensity of light gradually fails, but the a particular point of time reaching a maximum of 50.7oC
fall is considerably less with the wax as they absorb the with green wax and then decreased
heat and releases the heat over a period of time.
CONCLUSION
The temperature of vapour inside the solar still is
observed to increase with time up to 3:30 P.M as shown Researchers working on solar energy and energy
in figure 7. storage materials need to adopt an approach to ensure
no impact on the environment and a lesser cost method.
Solar water distillation by using different types of waxes
is used to improve system performance in many thermal
engineering systems. The experimental results clearly
indicate that the wax absorbs some heat energy from
water store in them and release the stored energy
accordingly. Based on our experimental investigation
we thereby prefer green wax as the values obtained
are high compared to the normal water. The absorption
and emission coefficient are more for wax and it also
depends upon the color of the wax as the energy
Fig 8: Variation of Glass Cover inside Temperature with Time absorbed or emitted will be directly proportional to
The inner glass cover temperature increases with frequency and inversely proportional to wavelength of
increase in vapor temperature and intensity of light. So the color of wax.
there was a continual increase in the temperature
ACKNOWLEDGMENTS
attaining a maximum at 53.2oC and then a gradual
decrease but with respect to the wax the decrease in Foremost, I am thankful to Dr. A. Jaya Laxmi,
the inner glass temperature is less. Coordinator, Center for Energy Studies, JNT University
Hyderabad for giving opportunity to utilize energy
systems laboratory and Department of mechanical
engineering staff for their continues encouragement
towards research activities and preparing this paper.
REFERENCES [7] Naga Sarada Somanchi, Ravi Gugulothu, Sri Lalitha Swathi Sagi,
Thotakura Ashish Kumar and Vijaya Koneru (2014),
[1] Hima Bindu Banoth, Bhramara Panithapu, Ravi Gugulothu, Naga "Experimental Study of Solar Water Distillation Using Epsom
Sarada Somanchi, Devender G, Devender V and Banothu Kishan, Salt as Phase Change Material", Fourth International Conference
"A Review on Performance of Solar Still with Different on Hydrology and Watershed Management, Organized by Centre
Techniques", Proceedings of International Conference on for Water Resources, Institute of Science & Technology,
Renewable Energy and Sustainable Development (ICRESS 2014), Jawaharlal Nehru Technological University Hyderabad, held on
pp: 393-398, 2014. 29th October to 1st November, 2014, pp: 470-474.
[2] Nagasarada Somanchi, Hima Bindu Banoth, Ravi Gugulothu and [8] Ravi Gugulothu, Naga Sarada Somanchi, Sri Rama Devi and
Mohan Bukya, "A Review on Performance of Solar Still Coupled Devender Vilasagarapu, "Experimental Study of Solar Still with
with Thermal Systems", Proceedings of 2014 1st International Energy Storage Material", International Conference on Industrial,
Conference on Non Conventional Energy (ICONCE 2014), pp: Mechanical and Production Engineering: Advancements and
114-118, 2014. Current Trends. Organized by Department of Mechanical
[3] Naga Sarada Somanchi, Hima Bindu Banoth, Ravi Gugulothu Engineering, Maulana Azad National Institute of Technology
and Mohan Bukya, "A Review on Parametric Performance of (MANIT), Bhopal, held on 27th - 29th November, 2014, pp:
Solar Still", International Conference on Industrial Engineering 489-494.
Science and Applications-2014 (IESA-2014), Organized by [9] Ravi Gugulothu, Naga Sarada Somanchi, R.Sri Rama Devi and
Department of Electrical Engineering, NIT Durgapur, held on Devender Vilasagarapu (2014), "Experimental Study of Solar Still
2nd to 4th April, 2014. pp: 167-172, ISBN: 978-93-80813-27-1. with Energy Storage Material", Journal of Sustainable
[4] Naga Sarada S, Banoth Hima Bindu, Sri Rama Devi R and Ravi Manufacturing and Renewable Energy, Volume 3, Number 1-2,
Gugulothu, "Solar Water Distillation Using Two Different Phase ISSN: 2153-6821, Nova Science Publishers,Inc.
Change Materials", International Mechanical Engineering [10]Ravi Gugulothu, Naga Sarada Somanchi, Sri Rama Devi R and
Congress 2014 (IMEC-2014), held at Department of Mechanical Kishan Banothu (2014), "Solar Water Distillation Using Three
Engineering, NIT Tiruchirappalli, held on 13th - 15th June, 2014. Different Phase Change Materials", Proceedings of "International
[5] Naga Sarada S, Banoth Hima Bindu, Sri Rama Devi R and Ravi Conference on Advances in Design & Manufacturing", at NIT
Gugulothu, "Solar Water Distillation Using Two Different Phase Tiruchirappalli, Tamil Nadu, India, held on 5th -7th December,
Change Materials", Applied Mechanics and Materials, Volume: 2014, pp: 961-965.
592-594, pp: 2409-2415, 2014.
[6] Naga Sarada Somanchi, Sri Rama Devi R, Hima Bindu Banoth
and Ravi Gugulothu, "A Review of Solar Water Distillation
Techniques", National Conference on Renewable and Sustainable
Energy (NURSE-2014) Organised by IST and JNTUH College
of Engineering Hyderabad, held on 27th -28th June, 2014.
Abstract- The initial phase in identifying Hindering social class transmission is the best
Coronavirus isto search for indications of fever. We approach to reducing the store on clinical consideration
actually need to watchout for everybody for a veil. systems and to keep the economy rolling. Associations
We have temperature testing frameworks for all are expected to notice standard working techniques
examining door ways, yet manual temperature
(SOPs) given by their organizations in attempts to check
checking has various disadvantages. The staff isn't
knowledgeable in the utilization of temperature
neighborhood of the disease. Regardless, there is a
scanners. When understanding qualities, there is money related impact on autonomous organizations to
space forhuman mistake. Individuals are regularly complete express SOPs and consistence rules and this
permitted sectionregardless of higher temperature is exacerbated when expected to selector re-
readings or the absence ofveils. In case directors appropriate staff people to execute consistence like
are absent, the staff might miss thefiltering. For assessing the temperature of moving toward customers
enormous groups, a manual checking gadgetisn't and ensuring genuine distance between them. As
proper. A contactless temperature scanner and a demonstrated by a report [2], one pharmacy business
veilshow are utilized in the gadget. We propose a in New South Wales (NSW), Australia, expected to
completely computerized temperature scanner and spend AUD1000-1500 consistently to higher staff for
passage supplier framework to tackle this issue.
noticing temperature and ensuring isolating.
It's a multi-reason machinethat can be utilized in
an assortment of ways. A contactlesstemperature EASEOF USE
scanner and a cover show are utilized in the gadget.
In the event that a high temperature or the short Web of things (IoT), as an engaging specialist of
fall of a veil is noticed, the scanner is connected data sharing through accessibility, is charming in clinical
straight forwardly to a human boundary, which fores benefits applications [3,4]. An advantage of this
talls passage. development is that it engages far off prosperity noticing.
Keywords- Mask detection, Temperature IoT similarly engageshuman-to-human, machine-to-
checking, Contactless. human, and machine-to-machine correspondence with
no external intervention. It can thus lybea very important
INTRODUCTION gadget in completing and noticing human social
In the current wake of the COVID-19 pandemic, correspondence during COVID-19. Safe work
thwarting or possibly limiting the neighborhood of the Australia has organized a plan[5] for privately owned
disease is a mammoth task, with governments and businesses in retail that follows working climate
associations across the world applying different securitytechniques.
techniques to bind people advancement and social "Key regions are physical separating and checking
correspondence. A result has been totally serious COVID-nineteen facet effects (likefever). We have a
monetary impacts. Another outline drove on 5800 little tendency to propose a marginal effort different for
US associations[1] gathered that 43% of associations personal firms to measure and report key COVID-19
were unexpectedly closed and falls in crafted by 40%. operating setting prosperity boundaries, for instance,
internal heat level (fever), the amount o fpeople per incoming and exiting people at the entrance and exit
square metre, and distance between individuals within points, providing a needed live of the quantity of
the line region. Besides, we have a tendency to gift a individuals per square measure. Upon cominginto the
functioning LED-based continuous declare powerfully premises, the individual is needed to answer the
administer physical removing for individuals remaining COVID-nineteen symptom-related form that is coupled
in an exceedingly line. to the dashboard. They then march on for the vital sign
Different existing works have careful executions for mensuration employing anon-contact IR temperature
COVID-19 identification and saying. planned a 5 (5) device MLX90614. Once queuing at the client service
sectionIoT-based system for early discovery of or payment counter, available LEDs WS2812B square
COVID-19 cases, utilizing constant manifestation info measure wont to visually show the permissible queuing
gathered to acknowledge associated cases with locations.
contamination. Kaplan et al. Thel ocations on the market in a very queue correlate
Executed quick screening off ever to acknowledge to the quantity of people coming in to the business area
sound and non-solid under studies in an exceedingly as an example, if solely 2 persons enter, the queue can
scholastic setting, utilizing infrared sensors introduced assign the 2 furthest apart locations attainable within
on a set frame. Temperature readings were sent the queuespace.As additional individuals enter,the
remotely to a wearable watch show for the administrator. quantity ofaccessible queuing locations updates while
For recognizing many cluster. [8] administered a camera- maintaining aminimum of one 5 m distance between
based individual together with framework in an locations. A time off light(ToF) device VL531 x at the
exceedingly library. the information on the amount of counter is employed to measure the gap of the front-
people checked was sent to a conveyable application mostindividual within the queue and provides alerts to
utilizing IoT innovation an interior IoT-based checking the individual (and the system) if minimum distance is
framework was accounted for by Petro Vic et al. desecrated.
[9]during which contactless temperature, cover, Individuals and managers should even be alerted ifthe
Associate in Nursing social removing check was dead minimum distance between individuals is desecrated
utilizing an Arduino-based mostly arrangement. within the queue. A RaspberryPi (RPi) camera lens
Current practices to ensure COVID-19 SOP camera module was wont to observe any violation in
consistence incorporate recruiting or relegating minimum distance between the queued people. The
employees to screen the inner heat level of participants available light-emitting diode strip used for permissible
and guarantee physical removing whereas earlier locations within the queue conjointly acted because the
executions think about parts ofmanifestation and standardization markers for the camera. The physical
distance checking, they do not provides a complete distance between the markers was translated to
continuous arrangement that may powerfully administer constituent distance between the 2 people. The system
participants to stay up COVID-SOP consistence. alerts if a personal strays into AN impermissible space
for over fives. As real distance mensuration isn't needed,
DESIGN this setup is enough to confirm social distancing
The setup assumes the ground area of little retail compliance."
businesses and checks for the quantity of people
enteringor going away the area, any COVID-19
symptoms beforecoming into, their vital sign, the gap
between the queuedcustomers, and distance between
the client and therefore the workplace counter,
Figure1.Infrared obstacle detectors keep a count of
Fig1
SETUP
"Figure 1 one presents the system device property. Fig3
Fig2
The image processed using Viola Jones technique associated with that image. Nowadays, image
using Open CV and tensor flow, the classification processing is among rapidly growing technologies. It
between the person wearing mask or not is verified. forms core research area within engineering and
The proximity sensor detects the hand of a person computer science disciplines too. Image processing
places his/her hand under the sanitizer and it dispenses basically includes the following three steps: • Importing
the sanitizer accordingly. Each process of the proposed the image via imageacquisition tools; • Analysing and
work is explained in briefly in the following section. Fig.1 manipulating the image;
Flow Chart of the Proposed System. Output in which result can be altered image or report
A. PERSONDETECTION that is based on image analysis. There are two types of
methods used for image processing namely, analogue
Person detection is the process of identifying a and digital image processing. Analogue image processing
human's presence at the entrance. It is achieved using can be used for the hard copies like printouts and
the Passive Infra Red sensor(PIR). When a person is photographs. Image analysts use various fundamentals
detected the PI R sensor gives the output as 1. When a of interpretation while using these visual techniques.
person is not detected it gives the output as 0. Digital image processing techniques help in manipulation
B. TEMPERATURE CHECK of the digital images by using computers.The three 34
general phases that all types of data have to undergo
When a person is detected then the temperature of
while using digital technique are pre-processing,
the person is checked using mlx 90614 sensor. If the
enhancement, and display, information extraction.
temperature is above 1000 F then an alert message is
sent to the COVID Centre. If the temperature is below FACIALRECOGINATION
1000F then the person is checked for facemask. Facial recognition could be a method of recognizing
C. ALERT TO COVID CENTRE ESP an individual's face through technology. A biometric
identification system uses Biometrics to map facial
8266 module isused to send the message to COVID
expression from a photograph or video. It compares
Centre.
the knowledge with a information of well-known.
D. FACE MASK DETECTION Faces to seek out a match. biometric identification
When the temperature is below 1000F the will facilitate verify identity.
facemaskis detected using camera's input. For checking • Operating method of biometric identification
the facemask of a person, we use deep learning with
image processing using python. The code is flashed Step1.An image of face is captured from a
inside the RaspberryPi module. photograph or video. Face would possibly seem alone
or during a crowd. The image may show you wanting
E. ALERTINGSYSTEM straight ahead or nearly in profile.
If the facemask is not worn by the person then the Step2.Biometric identification software package
buzzer supply is turned on by the Raspberry Pi. The reads the pure mathematics of the face. Key factors
buzzer will ring until the facemask is worn. embrace the space between your eyes and also the
distance from forehead to chin. The software package
IMAGE PROCESSING
identifies facial landmarks-one system identifies sixty-
Image processing is a method to perform some eight of them-that area unit key to characteristicy our
operations on an image, in order to get an enhanced face. The result: the facial signature.
image or to extract some useful information from it. It is
Step3.Facial signature-a mathematical formula-is
a type of signal processing in which input is an image
compared to a information of well-known faces.
and output may be image or characteristics/features
KEY BENEFITS:
• Fully machine-driven observation of compliance with
mask and blood heat needs IMPLEMENTATIONANDRESULTS
• Reliable detection inside seconds To test the credibleness of the proposition, research
• Contact surfaces (touch screen) square measure laboratory house was utilized to line up sensors in
straight forward to wash and make clean keepingwith the look. Raspberry Pi was organized to
• Customizable system response and audio/video run on associate categorical(Node.js) web server
communication just in caseof non-compliance associated categorical was utilized as an attachment
employee. Agraphical information dashboard was
• Touch screen with obvious audio/video interaction for planned in Bootstrap five Alpha that shows device info
guiding users through the whole scanning method and cautions of any infringement. Bootstrap provides a
• Saves workers resources free and compelling structure to execute sites or
• Avoids potential hygiene and information privacy risks, graphical formats for low force processors [11]. The
because of totally machine-driven, information employee was organized to transfer the recovered
protection compliant technology information to issue Speak [10] on regular schedule.
explicit device hubs were designed as remote hubs
utilizing ESP8266 and sent info to the Pi employee inprogress knowledge remotely to a dashboard which
utilizing Web Socket correspondence convention. This may be used to screen and aid COVID-19 SOP.
convention builds up full-duplex correspondence and The framework is as of currently restricted to
sets up a diligent association over transmission visualize distance infringement simply within the
management convention(TCP) among employee and predefined territory (i.e.,line). Future endeavours are
client. the 2 IR sensors were set at the passage wayat engaged to grow the location for the whole floor
at allness of one meter ranging from the earliest stage territory, contact following, and backing for further lines.
(3a) and also the individual dump (in andout) was sent The framework is broadened effectively with negligible
to the graphical dashboard. In lightweight of that IR time and is speedily versatile to numerous circumstances.
sensor-external or internal-identified the impediment 1st,
the counter was inflated or decremented. In lightweight
of the contributions from these sensors,boundaries, for
instance, people in, people out, current people check,
and absolute footstep day after day were started.
The temperature device was settled before long
when the passage at a stature of one.2 m. Approaching
individuals were required to place their brow close to
the device and also the temperature studying was
recorded and shipped off the employee. to ensure the
correct distance was maintained once utilizing the
device, associate IR snag location switchwas utilized
and acclimated to figure within a two cm- 5cm vary (as
determined by the IR temperature device datasheet). REFERENCES
At the purpose once the member was within thisreach, 1. Pang,Z. Technologies and architectures of the Internet-of-Things
an inexperienced lightweight turned on demonstrating (IoT) for health and well-being. Ph.D. Thesis, KTH Royal
Institute of Technology, Stockholm, Sweden, January2013.
the correct distance. The temperature device utilized
will quantify contactless temperature with 0.5-degree 2. Kumar, K.; Kumar, N.; Shah, R. Role of IoT to avoid spreading
of COVID-19. Int. J. Intell. Netw. 2020, 1,32-35,doi:10.1016/
uranologers' truth [12]. The limit for the brow estimation j.ijin.2020.05.002.
of the IR device was set at daily and a 0.5uranology's 3. S a f e w o r k A u s t r a l i a . A v a i l a b l e o n l i n e : h t t p s : / /
to require into consideration the estimation website www.safeworkaustralia.gov.au/sites/default/files/2020-06/
selection [13]. An amount of flight device (Figure3b) COVID-19_Workplace-Checklist_12June2020.pdf(accessedon
16 October2020).
was set at a 1-m vary ranging from the earliest stage
acknowledge min distance infringement of the front of 4. Otoom, M.; Otoum, N.; Alzubaidi, M.A.; Etoom, Y.;Banihani,
R . A n I o T- b a s e d f r a m e w o r k f o r e a r l y i d e n t i f i c a t i o n
theroad. The device was set as a parallel device during andmonitoringofCOVID-19 cases.Biomed. Signal Process.
this manner presumably handing-off information once Control2020,62,102149,doi:10.1016/j.bspc.2020.102149.
the gap limit was crossed. the gap was endlessly 5. K a p la n , R . B. ; J o h n so n , T. M. ; S c h n ei d e r, R .; K r i s h n a n ,
determined and answered to the dashboard. S.M.ADesignforLowCostandScalableNon-ContactFever
Screening System. J. ASEE Annu. Conf.Expo.2011, doi:10.18260/
CONCLUSION 1-2-17316.
6. Sabancý, K.; Yigit, E.; Üstün, D.; Toktaº, A.; Çelik, Y.Thingspeak
A powerful account guarantee COVID-19 security BasedMonitoringIoTSystemforCounting People in A Library.
consistence is introduced during this work. The In Proceedings of the2018 International Conferenceon Artificial
framework depends on open supply programming and Intelligence and Data Processing (IDAP), Malatya,Turkey, 28–
30September2018; pp.1–6,doi:10.1109/IDAP.2018.8620793.
customarily accessible sensors to form AN ease and
easy to rearrange and redo started. It transfers valuable
Abstract- The aluminium-magnesium (Al-Mg) tensile strength, elongation, and fatigue life [1-5].
alloys typically contain between 0.5 to 13% Estimating the material life based on the operating
magnesium, with smaller additions of other conditions is critical. Material life is determined by design
elements. The magnesium provides substantial assumptions, material properties, and loading
increases in strength. In the automotive and
circumstances. Fatigue is responsible for 90 percent of
aerospace industries aluminium alloys are widely
used and as can be heat treated to enhance the
structural element degradation. Fatigue is the primary
properties of strength and corrosion resistance failure mechanism in many cases, consisting of initiation,
while maintaining low weight. The goal of this paper propagation, and final fracture [6]. Casting, welding,
is to prepare aluminium alloy in well-equipped and machining procedures may increase the importance
furnaces under the right thermal conditions to of the propagation phase by introducing minor flaws
achieve the needed temperature, and to create that act as local stress concentrators [7-8]. Micro voids,
aluminium alloy (5000 series) by sand casting to non-metallic inclusions, surface roughness, sudden
obtain the desired specimen. Variable percentages changes in cross-section, quenching fractures, and
of aluminium 88% and magnesium 12% by weight grinding cracks are examples. As a result, fracture
fraction were used to make the specimens. In this formation is aided by elements such high temperature,
study, the fatigue analysis of Al-Mg specimens is
corrosion, excessive loading, residual stresses, stresses
carried out using Ansys Workbench. Specimen was
subjected to fatigue analysis using and its
under combination loadings, stress concentrations,
performance was observed. The safe design life of surface quality, and metallographic structure.
the material is determined in the analyses for II. CALCULATIONS FOR FATIGUE LIFE
loadings in the elastic region.
Material fatigue is a phenomenon where structures
Keywords- Aluminium 5000 alloy, Fatigue
strength, ANSYS analysis)
fail when subjected to a cyclic load. This type of
structural damage occurs even when the experienced
I. INTRODUCTION stress range is far below the static material strength.
Aluminum alloys that have been age hardened are Fatigue is the most common source behind failures of
extremely useful in technology. In particular for building mechanical structures. The process until a component
and construction, automotive, cryogenic, marine finally fails under repeated loading can be divided into
applications, when relatively moderate strength, good three stages:
corrosion resistance and high toughness are required in 1. During a large number of cycles, the damage develops
conjunction with good formability and weldability, on the microscopic level and grows until a
aluminium alloys with Mg as alloying element (Al-Mg, macroscopic crack is formed.
5xxx aluminium series alloys) are used. Initial melt quality 2. The macroscopic crack grows for each cycle until it
and process design have a significant impact on the reaches a critical length.
mechanical properties of cast aluminium alloys, such as
3. The cracked component breaks because it can no B. Low-Cycle Fatigue and High-Cycle Fatigue
longer sustain the peak load.
Fatigue analysis is not always based on a stress
A. Selecting Fatigue Variables response. This branch, however, has historically
received much attention since the majority of research
Under the influence of a nonconstant external load,
has been performed in regimes where stress-based
the state in the material also varies with time. The state
models are useful. Based on the number of load cycles
at a point in the material can be described by many
needed to produce a crack, it is customary to make a
different variables such as stress, strain, or energy
distinction between low-cycle fatigue (LCF) and high-
dissipation. The fatigue process is typically viewed as
cycle fatigue (HCF). The limit between the two is not
controlled by a specific such variable. A load cycle is
distinct, but it is typically of the order of 10,000 cycles.
defined as the duration from one peak in the studied
The physical rationale is that in the case of HCF, the
variable to the next peak. In a general case, all cycles
stresses are low enough that the stress-strain relation
do not have the same amplitude. For a superficial
can be considered elastic. When working with HCF,
discussion, it can, however, be assumed that the fatigue-
the stress range is usually used for describing the local
controlling state variable has the same value at the start
state. For LCF, meanwhile, strain range or dissipated
and end of each load cycle. In elastic materials, a cyclic
energy are common choices [9].
load causes a periodic-cyclic stress response. For such
cases, the load cycle is easily defined. This is illustrated C. Fatigue Models
by the Fig. 1, where stress is the fatigue-controlling state
Stress-life (S-N) method:
variable.
Materials fatigue performance is commonly
characterized by an S-N curve, also known as a Wohler
curve. This is often plotted with the cyclic stress (S)
against the cycles to failure (N) on a logarithmic scale.
S-N curves are derived from tests on samples of the
material to be characterized (often called coupons or
specimens) where a regular sinusoidal stress is applied
by a testing machine which also counts the number of
cycles to failure. This process is sometimes known as
Fig. 1. Common variables used for fatigue prediction
coupon testing. For greater accuracy but lower
The stress varies between a maximum stress,max, generality component testing is used. Each coupon or
and a minimum stress, min, during a load cycle. In the component test generates a point on the plot though in
field of fatigue, the variation in stress is often defined some cases there is a run out where the time to failure
using the stress amplitude, a, and the mean stress, m. exceeds that available for the test (see censoring).
Further, variables defining the stress range, R, and the Analysis of fatigue data requires techniques from
R-value are frequently used to describe a stress cycle. statistics, especially survival analysis and linear
The most important parameter for the fatigue damage regression.
is the stress amplitude. For any detailed analysis, the The progression of the S-N curve shown in Fig. 2
mean stress, however, must be taken into account as can be influenced by many factors such as stress ratio
well. A tensile mean stress increases the sensitivity to (mean stress), loading frequency, temperature,
fatigue, whereas a compressive mean stress allows for corrosion, residual stresses, and the presence of
higher stress amplitudes. notches. A constant fatigue life (CFL) diagram is useful
for the study of stress ratio effect. The Goodman line is
a method used to estimate the influence of the mean
stress on the fatigue strength.
A. Sand Moulding
Sand casting is a method of producing metal
components with complex shapes. The process cycle
we followed for sand casting consists of six main stages,
mainly Mold-making, Clamping, Pouring, Cooling,
Removal and Trimming shown in Fig. 4.
The stress level is usually described by the stress B. Machining of the specimen
ratio R and the stress amplitude a.
The final specimen is reduced to the appropriate
(1) diameter after it is obtained from the sand casting with
a 20 mm diameter in accordance with ASTM E606
(2) standard [11]. We started by machining on a standard
hand lathe machine to meet this need. Using a lathe
(3) machine, the 20 mm diameter was lowered to 14 mm.
The specimens were then taken to the CNC Lathe and
III. PREPARATION OF THE SPECIMEN
reduced to the size depicted in Fig. 5 with a regular
We wanted to mix the two components in different surface finish.
compositions to make an aluminium alloy based on the
Specimens were loaded into a Siemens Computer
Aluminum 5000 series, which is a mixture of aluminium
Numerical Control (CNC) Lathe Machine; we built a
and magnesium. We mixed the proportions for
programme with conventional dimensions, and the
Aluminium-88 % and Magnesium-12 % for this
finished specimen after CNC machining is shown in Fig.
composition depicted in the Fig. 3.
6.
Fig. 6. Final specimens after CNC Machining. Fig. 7. Fatigue stremgth analysis for 500 N in ANSYS
[1] John Campbell, "A Personal View of Microstructure and [10] Shahan Mazlan et. al., "Experimental and Numerical Analysis
Properties of Al Alloys" Materials, 14, 1297, March 2021. of Fatigue Life of Aluminum Al 2024-T351 at Elevated
Temperature" Matals, 10, 1581, 2020.
[2] Sasidhar Gurugubelli, Fathimunnisa Begum, "Experimental
Tensile Strength Characterization of Metal Matrix Composite [11] American Society for Testing and Materials. Standard test
Aluminum-6069 Percentage Variation Reinforced with method for measurements of fatigue crack growth rates. Annual
Molybdenum and Coconut Shell Ash" International Journal of Book of ASTM Standards 2000: Volume 03.01, ASTM E 647.
Scientific & Technology Research, Vol. 9, Issue 2, pp. 803-808, p. 591-630.
February 2020.
4.1.Pressure:
4.2.Velocity:
obstacles for model 1&2 - b which means the distance [9] D.C. Langer, B.A. Fleck, D.J. Wilson, Trajectory measurements
of a wall jet impinging onto a forward-facing step entering a
from the inlet is of distance of 2h will give more exist cross-flow, Journal of Hazardous Materials 176 (2010) 199-
velocity and the pressure difference form the re = 206.
30,000 is normal decreases gradually decrease for the [10] M. Atashafrooz, S.A.G. Nassab, A.B. Ansari, Numerical
re = 1,00,000 the pressure will suddenly be dropped investigation of entropy generation in laminar forced convection
and then gradually decreases flow over inclined backward and forward-facing steps in a duct
under bleeding condition, Thermal Science (2012),
IV. 6.REFERENCES [11] H. Hattori, Y. Nagano, Investigation of turbulent boundary layer
over forward-facing step via direct numerical simulation,
[1] Hakan F. Oztop et al had conducted a review of Analysis of International Journal of Heat and Fluid Flow 31 (2010) 284-294.
turbulent flow and heat transfer over a double forward-facing
step with obstacles International Communications in Heat and [12] D. Wilhelm, C. Hartel, L. Kleiser, Computational analysis of
Mass Transfer 39 (2012) 1395-1403 Available online 21 July the two-dimensional- three-dimensional transition in forward-
2012 facing step flow, Journal of Fluid Mechanics 489 (2003) 1-27.
[2] H.I. Abu-Mulaweh, A review of research on laminar mixed [13] R. Camussi, M. Felli, F. Pereira, G. Aloisio, A.D. Marco,
convection flow over backward-and forward-facing steps, Statistical properties of wall pressure fluctuations over a forward-
International Journal of Thermal Sciences 42 (2003) 897-909. facing step, Physics of Fluids 20 (2008) 075113-1-075113-13.
[3] I. Y?lmaz, H.F. Oztop, Turbulence forced convection heat transfer [14] J.G. Barbosa-Saldana, N.K. Anand, Flow over a three-dimensional
over double forward facing step flow, International horizontal forward-facing step, Numerical Heat Transfer, Part
Communications in Heat and Mass Transfer 33 (2006) 508-517. A: Applications 53 (2008) 1-17.
[4] S.A.G. Nassab, R. Moosavi, S.M.H. Sarvari, Turbulent forced [15] H.I. Abu-Mulaweh, B.F. Armaly, T.S. Chen, Measurements of
convection flow adjacent to inclined forward step in a duct, turbulent mixed convection flow over a vertical forward-facing
International Journal of Thermal Sciences 48 (2009) 1319-1326. step, In: ASME Proceedings of the Summer Heat Transfer
Conference, Las Vegas, Nevada, 2003, CD-ROM.
[5] A. Bahrami, S.A.G. Nassab, Study of entropy generation in laminar
forced convection flow over a forward-facing step in a duct, [16] H. Stüer, Investigation of separation on a forward facing step,
International Review of Mechanical Engineering 4 (2010) 399- PhD thesis, Swiss Federal Institute of Technology, Zürich, 1999.
404.
[17] K. Abe, T. Kondoh, Y. Nagano, A new turbulence model for
[6] H.I. Abu-Mulaweh, Turbulent mixed convection flow over a predicting fluid flow and heat transfer in separating and reattaching
forward-facing step - the effect of step heights, International flows - I. Flow field calculations, International Journal of Heat
Journal of Thermal Sciences 44 (2005) 155-162. and Mass Transfer 37 (1994) 139-151.
[7] H. Stüer, A. Gyr, W. Kinzelbachv, Laminar separation on a [18] Y.T. Chen, J.H. Nie, B.F. Armaly, H.T. Hsieh, Turbulent separated
forward-facing step, European Journal of Mechanics - B/Fluids convection flow adjacent to backward?facing step-effects of step
18 (1999) 675-692. height, International Journal of Heat and Mass Transfer 49 (2006)
3670-3680.
[8] M. Sherry, D. Lo Jacono, J. Sheridan, an experimental investigation
of the recirculation zone formed downstream of a forward-facing [19] B.E. Launder, D.B. Spalding, The numerical computation of
step, Journal of Wind Engineering and Industrial Aerodynamics turbulent flows, Computer Methods in Applied Mechanics and
98 (2010) 888-894. Engineering 39 (1974) 269-283.
Abstract- The Aluminium Alloy 2024 grade tends frequent maintenance to keep the surface of the
to corrode the surface of the material, because it materials. The commonly used Aluminium alloy has the
having copper content, it will undergo severe attribute of not being able to tolerate high-temperature
corrosion. Normally these types of Aluminium resistance while also having a low wear resistance.
grade are applied in the building of the body of the
Aluminium alloy 2024 is available in both the forms of
aircraft. The main drawback of this material is after
the painting, it has to be frequently painted to
plates and in the forms of the sheet; the plates are used
decrease the corrosion, for those aerospace in the application of the fuselage structures, whereas
industries have to spend more amounts for the the sheets are used in the forms of fuselage skins. In
painting. In this work, we concentrated to get the this study we use Titanium Nitride (TiN) as a coating
better strength of Aluminium alloy 2024 grade by the surfaces of the Aluminium Alloy 2024, the TiN will
reducing the corrosion. The face of the AA2024 is be the hard materials in the metal family and it applied
layered with Titanium Nitride (TiN) at ∼1.465m for the coatings with the less than 5m.
thickness. This coating is prepared by the PVD
method, and after the coating process, the Most researchers are focused on plasma nitriding a
specimen is tested using the X-ray Spectroscopy Titanium coating onto the AA2024 to boost its wear
and SEM analysis for surface finish and the resistance. By employing magnetron sputtering, nano-
hardness test using the Micro hardness test. sized titanium particles are coated on the surface of the
Keywords: Titanium Nitride (TiN), Aluminium Aluminium alloy 2024 grade, and then the same is
Alloy 2024, Physical Vapour Deposition (PVD), plasma nitrate for eight hours at 300C interval starting
Scanning Electron Microscope (SEM). from 4000C to 4900C and in a gas having a mixture of
40% & 60% of N2 and H2. As compared to uncoated
I. INTRODUCTION material, the wear rate is reduced by 56 per cent after
In the Aerospace industry, lightweight materials have this treatment [1]. Some of them are using the Plasma-
a major impact on the construction of Aeroplanes; these enhanced chemical vapour deposition method on AA
materials have the properties of more hardness and also 2024. In this method they using the two different gasses
a reduction in corrosion properties like Aluminium Alloy at the ratio of 1:1, i.e. 50% oxygen and 50%
2021 grade materials. These materials having a copper hexamethyldisiloxane, plasma is ignited using the radio
content, and this leads to severe corrosion, while it frequency at 13.56MHz. The power was varying from
contacts with oxygen and water. For that, the majority 10 W to 80W in the 6 different sets of experiments.
of the Aeroplanes companies paints the materials to Salt spray method & electrochemical impedance
withstand the strength and hardness of the materials to spectroscopy will be used to assess corrosion
increase the lifetime of the print quality. This leads to an resistance [2]. Based on the several researcher
increase in the maintenance cost and also it takes methodologies handling the AA 2024 with TiN, we
adopted the surface coating using the Physical Vapour III. PREPARATION OF THE SUBSTRATE
Deposition Method (PVDM). MATERIAL
II. MATERIALS AND THEIR For this study, we use the basic material as AA2024
COMPOSITION grade in the form of a square plate having a thickness
of 4mm. After the primary cleaning process carried on
For this study, we use the main materials as the the plate, the plate will be cut for the required
Aluminium Alloy 2024 Grade and the Titanium Nitride dimensions. For that the AA2024 grade is cut in the
Powder. The detailed properties of the Aluminium Alloy dimensions of 20 x 20 cm using the Wire cut EDM,
2024 grade are shown in Table 1, and Table.2 describes specification and the picture of the EDM is mentioned
the detailed properties of the Titanium Nitride. in Table.3 and Fig.1.
Table.1 Property of Aluminium Alloy 2024 (AA 2024)
Physical Properties
Properties AA 2024
Density 2.78 g/cc
Mechanical Properties
Tensile Strength 483 MPa
Yield Strength 345 MPa
Modulus of Elasticity 73.1 GPa
Thermal Properties
Coefficient of Thermal Expansion 23.2 µm/m-°C
Thermal Conductivity 121 W/m-K Fig.1 Wire-Cut EDM Fig.2 Surface Grinding Machine
Chemical Composition
Table.3. Specification of Wire cut EDM
Silicon 0.5%
Iron 0.5% Parameters Range
Copper 3.8% - 4.9% Maximum Cutting speed 160mm²/min
Manganese 0.5% - 0.6% Surface Finish 0.8 µ
Magnesium 1.2% - 1.8% Taper ± 30°/ 50 MME
Chromium 0.1% Table size 445 X 655 mm
Zinc 0.25%
Titanium 0.15% After the cutting process, the surface is to be grinding
Table.2 Properties of Titanium Nitride
for 0.25 mm using the surface grinding machine,
specification and the picture of the surface grinding
Physical Properties
Properties TiN
machine is mentioned in Table.4 and Fig.2.The prepared
Density 5.21 g/cm3 material is shown in Fig.3.
Mechanical Properties Table.4. Specification of Surface Grinding Machine
Tensile Strength 240 MPa
Parameters Range
Modulus of Elasticity 251 GPa
Maximum Grinding Dia. 150 mm
Shear Modulus 15.6 GPa
Max. Grinding Length 450 mm
Thermal Properties
Spindle Speed 2800 RPM
Coefficient of Thermal
9.35×10- 6 K- 1 Motor Power 1 HP
Expansion
Thermal Conductivity 29 W/m-K Fig.3 shows that the prepared substrate of the
Melting point 2947 °C
Chemical Composition
Aluminium alloy 2024 after all the preparation.
Titanium 77.5% Simultaneously, Titanium Nitrides (TiN) is used for this
Nitrogen 22.6% study is in the form of a Powder state, for that Titanium
Nitrides (TiN) is to be filtered using Nano filter, from
which the above 0.70 ?m are filtered as shown in Fig.
4
Fig. 4 Titanium Nitride Powder at 0.70 ?m Fig. 7 Procedure for the TiN coating in the AA 2024
and the characteristics of the substrate for various [4] C.Lu, J.W.Yao, Y.X.Wang, Y.D.Zhu, J.H.Guo, Y.Wang, H.Y.Fu,
Z.B.Chen, M.F.Yanb, "A novel anti-frictional multiphase layer
thicknesses was studied, examined and analyzed over produced by plasma nitriding of PVD titanium coated ZL205A
the period of time and results were obtained. aluminium alloy", Applied Surface Science, Volume 431, 15
February 2018, Pages 32-38.
[5] FanyongZhang, MufuYan, JiningHe, FuxingYin, "Microstructure
evolution and wear resistance of nitride/aluminide coatings on
the surface of Ti-coated 2024 Al alloy during plasma nitriding,
Ceramics International", Volume 43, Issue 14, 1 October 2017,
Pages 10832-10839.
[6] FanyongZhang, YiDing, ShuYan, JiningHe, FuxingYin,
"Microstructure evolution and mechanical performance of Cr-N/
Al-Cr multilayer coatings produced by plasma nitriding Cr-coated
Al alloy", Vacuum, Volume 180, October 2020, pp.109540-
Fig.14. XRD Analysis
109544.
[7] R.N.Ibrahim, M.A.Rahmat, R.H.Oskouei, R.K.Singh Raman,
We conclude this study as a substrate was designed "Monolayer TiAlN and multilayer TiAlN/CrN PVD coatings as
for the sputtering process in which Titanium Nitride was surface modifiers to mitigate fretting fatigue of AISI P20 steel",
coated over Aluminium 2024 alloy by physical vapour Engineering Fracture Mechanics, Volume 137, March 2015, Pages
64-78.
deposition of gas. The resulting prototype was then
tested to get the appropriate results in different loading [8] Soroush Momeni, WolfgangTillmann, "Investigation of the self-
healing sliding wear characteristics of NiTi-based PVD coatings
conditions various types of tests were taken to get the on tool steel", Wear, Volumes 368-369, 15 December 2016, Pages
best result of the substrate for which it was developed. 53-59.
From that, we conclude that Titanium Nitride coated [9] Ali Shanaghi, Ali Reza Souri, Mahdi Rafie & Paul K. Chu, "Effects
Aluminium 2024 alloy possesses excellent result of Benzotriazole on nano-mechanical properties of zirconia-
alumina-Benzotriazole nanocomposite coating deposited on Al
compared to normal Aluminium alloy. 2024 by the sol-gel method", Applied Physics A volume 125,
Article number: 728 (2019).
REFERENCES
[10]Bing Li, Fei Sun, Qizhou Cai, Jing fan Cheng, Bingyi Zhao,
[1] American Society for Testing and Materials. Standard test method "Effect of TiN nanoparticles on microstructure and properties
for measurements of fatigue crack growth rates. Annual Book of of Al2024-TiN nanocomposite by high energy milling and spark
ASTM Standards 2000: Volume 03.01, ASTM E 647. p. 591- plasma sintering", Journal of Alloys and Compounds, Volume
630. 726, 5 December 2017, Pages 638-650.
[2] Joyia, Muhammad Ghufran, "Comparative performance analysis [11]Sun, Fei Li, Bing, Cai, Chao, Cai, Qizhou, "Effects of TiN
of cemented carbide, TiN, TiAlN, and PCD coated inserts in dry nanoparticles on hot deformation behavior of ultra-fine grained
machining of Al 2024 alloy", The International Journal of Al2024-TiN nanocomposites prepared by spark plasma sintering,
Advanced Manufacturing Technology volume 112, pages1461- Mechanics of Materials, Volume 138, November 2019,
1481 (2021). pp.103152.
2) MECHANICAL ENERGY rotary motion. Here, the rack is the element producing
Mechanical energy is the energy that is possessed reciprocating motion and pinion rotates due to this
by an object due to its motion or due to its position. reciprocating motion. The rack is displaced vertically
Mechanical energy can be either kinetic (energy of due to the weight of the vehicle passing on the dynamic
motion) or potential energy (stored energy of position). plate in the floor and thus it reciprocates. As the rack
reciprocates, it makes the pinion rotate. The rack is
3) ELECTRICAL ENERGY the flat part with teeth, while the pinion is a gear.
Electrical energy is energy derived from electric Advantages of rack and pinion mechanism are
potential energy or kinetic energy.Electrical energy • This assembly gives good mounting convenience.
refers to energy that has been converted from electric
to potential energy. This energy is generated by the • Gear losses are maximum up to 5 percent .
combination of electric current and electric potential • Approximate efficiency of rack and pinion
which is delivered by an electrical circuit. mechanism is about 95 percent.
IV. EQUIPMENTS REQUIRED FOR THIS
IDEA
1. RACK AND PINION
A rack and pinion is a type of linear part that
comprises a circular gear ( pinion) engaging a linear
gear ( rack), which converts rotational motion into linear
motion. Driving the pinion to rotatory motion causes
the rack to be driven linearly.
2. BALL BEARINGS
The basic energy conversion taking place is first from
A ball bearing is a type of rolling-element bearing
kinetic energy to mechanical energy and then from
that uses balls to maintain the separation between the
mechanical energy to electrical energy. The kinetic
bearing races. Ball bearing is used to decrease rotational
energy of the vehicle which is wasted at the floor is
friction and it supports radial and axial loads.
converted to mechanical energy of the unit below the
floor by the rack and pinion mechanism. This
mechanical energy is converted to electrical energy
by using a generator.
III. MECHANISM USED
The mechanism used in the assembly is the rack and
pinion mechanism. It converts reciprocatory motion to
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 697
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
3. SPUR GEAR
Spur gears are a cylindrical shaped toothed
component used in industrial equipment to transfer
mechanical motion as well as control speed, power,
and torque. These simple gears are cost-effective,
durable, reliable and provide a positive, constant speed
drive to facilitate daily industrial operations.
6. FLYWHEEL
Flywheel, heavy wheel attached to a rotating shaft
so as to smooth out delivery of power from a motor to
a machine. The inertia of the flywheel opposes and
moderates fluctuations in the speed of the engine and
stores the excess energy for intermittent use.
9. DYNAMO
When a vehicle moves on the dynamic plates it
The function of the dynamo is to change mechanical creates a vertical motion.Then this motion is converted
energy into electricity. The control gear associated with to rotational motion.For this process a rack & pinion
the dynamo regulates the current output according to mechanism is used. The load of the vehicle is act upon
the demands on the electric system and the state of the when the plate is transmitted to rack and pinion
battery. arrangements. This vertical motion is converted to
rotary motion and transmitted to a sprocket
arrangement. The sprocket arrangement consists of
two sprockets - one larger diameter and the other of
smaller diameter. The axis of the pinion is coupled to
the larger sprocket. The pinion and the larger sprocket
are mounted on the same shaft.
Now the larger and smaller sprockets are connected
with each other through a chain drive. Smaller sprocket
is mounted on the other shaft. The smaller sprocket
consists of a pawl and a ratchet which avoids the rotation
10. BATTERY in the reverse direction of the shaft on which the smaller
sprocket is mounted. Thus, the shaft on which the
It is a device which stores electrical energy generated smaller sprocket is mounted rotates in one direction
from the generator. The energy is stored in the form of only. i.e. it rotates only when the rack moves downward
chemical energy in the battery. This energy can be used due to the load of the vehicle. When the rack moves
as and when it is required. upward to return to its initial position, the rotation of
the shaft is avoided by the pawl and ratchet.
As the sprocket arrangement is connected by a chain
drive the speed available at the larger sprocket is
characteristically multiplied at the smaller sprocket.Thus
a larger speed is obtained. The axis of the smaller
sprocket is coupled to a gear arrangement which
consists of two gears with different dimensions. The
gear wheel with the larger diameter is coupled to the
axis of the smaller sprocket and these two are mounted
on the same shaft. The speed that has been increased
at the smaller sprocket wheel is handed to this gear
wheel of larger diameter. The smaller gear is meshed
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 699
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
to the larger gear. Therefore, as the larger gear rotates, arms. The EMF is generated as the armature cuts the
it increases the speed of the smaller gear and multiplies magnetic field flux, already present due to the magnets
it to more intensity. (Now, as the armature continuously rotates, the
Though the speed due to the rotational motion direction of the current induced in its arms changes
achieved at the larger sprocket wheel is less, the final constantly. As a result of this we get an alternating
speed achieved is high, as the power is transmitted to current, which has sinusoidal nature characteristics.Thus
gears. The smaller gear is coupled to the dynamo or electric current is achieved and it is stored in storage
generator. Between the smaller sprocket and the larger sources such as a battery and used whenever required.
gear, a flywheel is mounted on the same shaft to adjust
the fluctuation in the energy . Flywheel also makes the
energy consumption uniform so that the shafts will rotate
with certain speed consistently.
Then mechanical energy is available at the output of
the motion conversion system.In this system the
mechanical energy available at the smaller gear is
converted to electrical energy by means of a dynamo
or generator. The smaller gear is coupled to the dynamo
or generator. The conversion will be directly
proportional to traffic density.
A Dynamo or Generator consists of a stationary
structure, called the stator, which provides a constant
magnetic field, and a winding called the armature, which VI. POWER CALCULATION
rotates within that field. The armature is a soft iron
core on which a copper coil of turns is mounted and it Mass of car (W) = 1000kg(approx)
is connected to the shaft of the smaller gear. So as the g = gravitational acceleration = 9.81
smaller gear rotates, the shaft also rotates and relatively
the armature is also turned around the shaft axis. The Weight of car = 1000 * 9.81
armature has two rings, each connected to one end of = 9810 N
the armature. These rings rotate with the armature.To Work done = Weight * displacement
these armature rings, brushes are connected. This
assembly is known as slip ring & brush assembly. The = 9810* 0.10
brushes are a stationary part of this assembly and are = 1079.1
generally made of carbon. The output of the brushes is
Work done per minute= 1079.1/60
connected to the outer circuit for measuring current.
As the armature rotates with current induced in its arms, = 17.98 W
the brushes transmit this current to the outer circuit. For 60 minutes (1 hour) = 17.98 * 60
The field magnets are designed such that they are =1079.1 W
concave at the inner side and entirely cylindrical in
shape. The reason for this is, it enables the magnets to For 24 hours (1 day) = 1079.1 * 24
generate a radial magnetic field. As the armature rotates = 25898.4 W
in the radial magnetic field about an axis perpendicular
to the magnetic field, an EMF (electro-magnetic force)
is generated which induces current in the armature
breaker generators, IOSR J. Engineering, 5(9): 17-21. M. Ramadan, 19. A. K. Singh, D. Singh, M. Kumar, et al. (2013), Generation of
M. Khaled, et al. (2015), Using speed bump for power generation, electricity through speed breaker mechanism, Int. J. Innovations
In: The 7th International Conference on Applied Energy, Energy in Engineering and Technology, 2(1): 20-24.
procedia, pp.867-872.
20. A. Mishra, P. Kale, A. Kamble, (2013), Electricity generation
9. A. Kaur, S. K. Singh, Rajneesh, et al. (2013), Power generation from speed breakers, The Int. J. of Engineering and Science,
using speed breaker with auto street light, Int. J. Engineering 2(11): 25-27.
Science and Innovative Technology, 2(2): 488- 491.
21. H. Singh, Omprakash. (2016), Energy generation from speed
10. P. Vishnoi, P. Agrawal, (2014), Power generation by kinetic energy breaker by rack and ratchet mechanism, Int. J. Advance Research
of speed breaker, MIT Int. J. Electrical and Instrumentation and Innovative Ideas in Education, 2(3): 4183- 4187.
Engineering ,4(2): 90-93.
22. G. R. Prabu, G. Ethiraj, (2015), Electricity generation by speed
11. C. B. Prakash, A. V. R. Rao, P. Srinuvas, (2014), Road power breaker, Int. J. Advanced Research in Electrical, Electronics and
generation by speed breaker, Int. J. Engineering Trends and Instrumentation Engineering, 4(5): 4799-4808.
Technology, 11(2): 75-78.
23. K. P. Singh, P. Singh, (2014), Eco-friendly electricity generator
12. F. Najuib, N. Gupta, P. Rawat, et al. (2014), Energy efficient from busy road, Int. J. Emerging Trends in Engineering and
power generation using speed breaker with auto street lights, Int. Development, 3(4): 307-313.
J. Engineering Research and Management Technology, 1(1): 223-
24. Speed limits and reduction. (27 Sept 2006), Eastleigh Borough
228.
Council, http://www.eastleigh.gov.uk/ebc-3053. A. S. Fawade,
13. M. Sailaja, M. R. Roy, S. P. Kumar, (2015), Design of rack and (2015), Air compression and electricity
pinion mechanism for power generation at speed breakers, Int.
25. Generation by using a speed breaker with rack and pinion
J. Engineering Trends and Technology, 22(8): 356-362.
mechanism, Int. J. Modern Engineering Research, 5(1): 23- 28.
14. S. Srivastava, A. Asthana, (2011), Produce electricity by the use
26. A. P. Rao, A. K. Kumar, S. Suresh, (2014), Power generation
of speed breakers, J. Engineering Research and Studies, 2(1):
from speed breaker by rack and ratchet mechanism, Int. J. Current
163-165.
Engineering and Technology, sp. issue 2: 549-552.
15. N. Kumar, P. Saini, M. Kumar, (2016), Automatic road light
27. J. Goldemberg, T. B. Johansson, A. K. N. Reddy, et al. (1985),
controller through electricity generation from speed breaker, Int.
Basic needs and much more with one kilowatt per capita, Ambio,
J. Engineering Technology Science and Research, 3(4): 17-25.
14: 190-200.
16. S. English, (11 Nov 2005), Smart road hump will smooth the
28. A. K. N. Reddy, B. S. Reddy, (1994), Substitution of energy
way for safe drivers, https://web.archive.org/web/
carriers for cooking in Bangalore, J. Energy, 19(5): 561- 571.
20060113164245/
29..V. Aswathaman, M. Priyadharshini, (2011), Every speed breaker
17. http://www.timesonline.co.uk/article/0,,2-1867157,00.html
is now a source of power, In: 2010 International Conference on
18. Ankita, M. Bala, (2013), Power generation from speed breaker, Biology, Environment and Chemistry, IPCBEE, Singapore, pp.
Int. J. Advance Research in Science and Engineering, 2(2). 234-23.
Welding Technology
Gokulapriyan G1, Balaganesh S2, Hareeswer M3, Harshavartthan A4, Cheran B5, Hariprasath S6
1,2,3,4,5,6
Mechanical Engineering, Bannari Amman Institute Of Technology, Erode,India
Email: Gokulapriyan.me19@Bitsathy.ac.in1, Balaganesh.me19@Bitsathy.ac.in2, Hareeswer.me19@Bitsathy.ac.in3,
Harshanartthan.me19@Bitsathy.ac.in4, Cheran.me19@Bitsathy.ac.in5, Hariprasath.me19@Bitsathy.ac.in6
Abstract: Welding is a fabrication process that "hot" more relating to red-hot or a swelling rage; in
joins materials, usually metals or thermoplastics, contrast to samodfæst, "to bind together with rope or
by using high heat to melt the parts together and fasteners").The term "weld" is derived from the Middle
allowing them to cool, causing fusion. Welding is English verb "well" (wæll; plural/present tense: wælle)
distinct from lower temperature metal-joining
or "welling" (wællen), meaning: "to heat" (to the
techniques such as brazing and soldering, which
maximum temperature possible); "to bring to a boil".
do not melt the base metal..
The modern word was likely derived from the past-
INTRODUCTION tense participle, "welled" (wællende), with the addition
Welding is a fabrication process that joins materials, of "d" for this purpose being common in the Germanic
usually metals or thermoplastics, by using high heat to languages of the Angles and Saxons. It was first
melt the parts together and allowing them to cool, recorded in English in 1590, from a version of the
causing fusion. Welding is distinct from lower Christian Bible that was originally translated into English
temperature metal-joining techniques such as brazing by John Wycliffe in the fourteenth century. The original
and soldering, which do not melt the base metal. In version, from Isaiah 2:4, reads, "...thei shul bete togidere
addition to melting the base metal, a filler material is their swerdes into shares..." (they shall beat together
typically added to the joint to form a pool of molten their swords into plowshares), while the 1590 version
material (the weld pool) that cools to form a joint that, was changed to, "...thei shullen welle togidere her
based on weld configuration (butt, full penetration, fillet, swerdes in-to scharris..." (they shall weld together their
etc.), can be stronger than the base material (parent swords into plowshares), suggesting this particular use
metal). Pressure may also be used in conjunction with of the word likely became popular in English sometime
heat or by itself to produce a weld. Welding also between these periods.
requires a form of shield to protect the filler metals or TYPES OF WELDING
melted metals from being contaminated or oxidized.
Many different energy sources can be used for welding, Plastic Welding or Pressure Welding The piece of
including a gas flame (chemical), an electric arc metal to be joined are heated to a plastic state and
(electrical), a laser, an electron beam, friction, and forced together by external pressure (Ex) Resistance
ultrasound. While often an industrial process, welding weldingo Fusion Welding or Non-Pressure Welding The
may be performed in many different environments, material at the joint is heated to a molten state and
including in open air, under water, and in outer space. allowed to solidify (Ex) Gas welding, Arc welding.
ETYMOLOGY METHODS
The term "weld" is of English origin, with roots from Some of the most common current welding methods
Scandinavia. It is often confused with the Old English are:
word, weald, meaning "a forested area", but this word 1. Shielded metal arc welding (SMAW), also known as
eventually morphed into the modern version, "wild". The "stick welding."
Old English word for welding iron was samod (to bring 2. Gas tungsten arc welding (GTAW), also known as
together) or samodwellung (to bring together hot, with TIG (tungsten, inert gas).
3. Gas metal arc welding (GMAW), also known as MIG high thermal and electrical conductivity as well as being
(metal, inert gas). characteristically ductile. Three of the most commonly
4. Methods Flux-cored arc welding (FCAW), very used crystal lattice structures in metals are the body-
similar to MIG. centred cubic, face-centred cubic and close-packed
5. Submerged arc welding (SAW), usually called Sub
hexagonal. Ferritic steel has a body-centred cubic
Arc. structure and austenitic steel, nonferrous metals like
aluminum, copper and nickel have the face-centred
6. Electroslag welding (ESW), a highly productive
cubic structure.Ductility is an important factor in ensuring
process for thicker materials.
the integrity of structures by enabling them to sustain
PROCESS local stress concentrations without fracture. In addition,
structures are required to be of an acceptable strength,
These processes use a welding power supply to
which is related to a material's yield strength.
create and maintain an electric arc between an electrode
and the base material to melt metals at the welding point. ADVANTAGES OG WELDING
They can use either direct current (DC) or alternating
Dissimilar metals which canot be welded can be
current (AC), and consumable or non-consumable
joined by brazingo Very thin metals can be joinedo
electrodes. The welding region is sometimes protected
Metals with different thickness can be joined easilyo In
by some type of inert or semi-inert gas, known as a
brazing thermal stresses are not produced in the work
shielding gas, and filler material is sometimesThese
piece. Hence there is no distortiono Using this process,
processes use a welding power supply to create and
carbides tips are brazed on the steel tool holders
maintain an electric arc between an electrode and the
Disadvantageso Brazed joints have lesser strength
base material to melt metals at the welding point. They
compared to weldingo Joint preparation cost is moreo
can use either direct current (DC) or alternating current
Can be used for thin sheet metal sections.
(AC), and consumable or non-consumable electrodes.
The welding region is sometimes protected by some RESULTS
type of inert or semi-inert gas, known as a shielding
This paper has summarised significant recent
gas, and filler material is sometimes used as well.
developments in both traditional and emerging welding
METALLURGY processes. It is clear that progress is being made, and
this should lead to improved quality, greater reliability
Covalent bonding takes place when one of the
and lower costs for the offshore industry. The
constituent atoms loses one or more electrons, with the
importance of welding technology to the offshore sector
other atom gaining the electrons, resulting in an electron
is well recognised, but there is still great scope for
cloud that is shared by the molecule as a whole. In
improvement.
both ionic and covalent bonding the location of the ions
and electrons are constrained relative to each other, REFERENCES
thereby resulting in the bond being characteristically 1. Howse D S, Scudamore RJ, Booth GS 'Yb fibre laser/MAG
brittle.Lifetime extension with after treatment methods hybrid processing for welding of pipelines'. IIW document IV-
Metallurgy Metallic bonding can be classified as a type 880-05, 2005.
of covalent bonding for which the constituent atoms 2. Thomas WM, et al 'Friction Stir Welding' International patent
are of the same type and do not combine with one application GB9125978.9, Dec 1991.
another to form a chemical bond. Atoms will lose an 3. Verhaeghe G 'The fibre laser - a newcomer for material welding
and cutting' Welding Journal vol 84 No 8, Aug 2005, P56-60.
electron(s) forming an array of positive ions. These
electrons are shared by the lattice which makes the
electron cluster mobile, as the electrons are free to move
as well as the ions. For this, it gives metals their relatively
Abstract- An FRP composite is described as a wherein the matrix is a metal or a ceramic. Fiber-
polymer this is reinforced with a fiber. The chief strengthened plastic (FRP) (additionally called fiber-
characteristic of fiber reinforcement composite is bolstered polymer, or fiber-bolstered plastic) is a
to carry load alongside the length of the fiber and
composite material, that is product of a polymer matrix
to provide intensity and stiffness in particular
strengthened with fibers. The fibers are commonly glass
direction. FRP represents a category of materials
that falls into a class known as composite materials. (in fiber glass), carbon, aramid, or basalt. Not often,
Fiber strengthened Polymer (FRP) are utilized in other fibers consisting of paper, wooden, or asbestos
almost each form of advanced engineering systems, had been used. The polymer is usually an epoxy,
with their utilization starting from plane, helicopters vinylester, or polyester thermosetting plastic, even
and spacecraft via to boats, ships and offshore though phenol formaldehyde resins are nevertheless in
platforms and to vehicles, sports activities goods, use [1-9] Fiber-strengthened polymer (FRP), also
chemical processing system and civil infrastructure Fiber- bolstered plastic, is a composite material made
which include bridges and homes. The application from a polymer matrix bolstered with fibers. The fibers
of FRP composites maintains to develop at an are usually glass, carbon, or aramid, although other
outstanding charge as these substances are used
fibers along with paper or wooden or asbestos were
extra of their present markets and end up installed
once in a while used. The polymer is generally an epoxy,
in noticeably new markets. in the offered studies
paintings, one-of-a-kind grade sort of fiber vinylester or polyester thermosetting plastic, and phenol
reinforcement composite is given and the author formaldehyde resins are nevertheless in use. FRPs are
implemented MOOSRA approach so as to examine commonly used inside the aerospace, automobile,
the best as in line with given their homes. marine, and creation industries. The authors conducted
Keywords- Fiber Reinforcement Composite, few literature surveys to find the information and relevant
MOOSRA, method, exclusive Grade, proper method so that it will evaluate the exceptional fiber
reinforcement composite between several as according
I. INTRODUCTION to given their characteristics. The fibers (or, in some
Composite materials are engineered substances cases, debris) are regularly alternatively complex; for
made from or greater constituent materials with instance, improvements may be Sought in creep, put
considerably distinct physical or chemical qualities on, fracture longevity, thermal balance, and many others
which continue to be separate and distinct in the finished [1]. Composite materials include or more substances
shape. Maximum composites have sturdy, stiff fibers in that retain their respective chemical and physical
a matrix which is weaker and less stiff. The goal is characteristics when blended together. FRP composites
commonly to make a issue which is robust and stiff, are exclusive from conventional production substances
regularly with a low density. Mass produced material like metal or aluminum. FRP composites are anisotropic
typically has glass or carbon fibers in matrices based (residences obvious inside the direction of implemented
on thermosetting polymers, consisting of epoxy or load) while steel or aluminum is isotropic (uniform
polyester resins. From time to time, thermoplastic houses in all guidelines, impartial of applied load).
polymers can be desired, because they're moldable after therefore FRP composites homes are directional, that
initial production. There are further lessons of composite means that the best mechanical houses are inside the
course of the fiber placement [2-9].
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 705
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
II. TYPES OF FIBRE REINFORCED there exists different brands too, e.g Twaron, Technora
COMPOSITE and SVM. The module of the fibers is 70-2 hundred
There are exclusive sorts of fiber strengthened GPa with closing elongation of 1.5-5% depending at
polymer are: glass fiber, carbon, aramid, extremely the high-quality. Aramid has a high fracture quality and
excessive molecular weight polyethylene, is consequently used for helmets and bullet-proof
polypropylene, polyester and nylon. The alternate in clothes. Aramid fibers are highly sensitive at high
properties of those fibers is due to the raw materials temperatures, moisture and ultraviolet radiation and
and the temperature at which the fiber is fashioned. consequently now not broadly utilized in civil engineering
packages. Similarly aramid fibers do have troubles with
A. Glass fiber reinforced polymer relaxation and stress corrosion.
Glass fibers are made up of mixing silica's and, III. PROCEDURAL STEPS
limestone, folic acid and other minor substances. The
mixture is heated until it melts at about 1260°C. The Step 1: Fiber-strengthened polymer (FRP), statistics
molten glass is then allowed to flow through holes in a in opposition to young's modulus, power, and density,
platinum plate. The glass strands are cooled, accrued coefficient of thermal enlargement, and thermal
and wound. The fibers are attracted to increase the conductivity and density, respective is given in table 1.
directional strength. The fibers are then woven into Mind set at table 2.
various bureaucracies for use in composites. Primarily Step 2: Built a normalized selection matrix through
based on an aluminum lime borosilicate composition normalization components [1] and to assemble weighted
glass produced fibers are taken into consideration the normalized matrix, proven in table 3.
main reinforcement for polymer matrix composites
Step 3: Rank the special grade type of fiber
because of their high electrical insulating quality, low
reinforcement composite by applying MOOSRA
susceptibility to moisture and excessive mechanical
method, MOOSRA method as consistent with given
residences. Glass is usually an excellent impact resistant
their properties, end result is shown in table 4
fiber however weighs more than carbon or aramid. Glass
fibers have wonderful traits same to or higher than metal IV. CONCLUSION
insure forms.
Composite materials are engineered or evidently
B. Carbon fiber reinforced polymer: occurring substances designed or greater constituent
materials with substantially exceptional physical or
Carbon fibers have a high modulus of elasticity, two
chemical qualities which remain separate and awesome
hundred-800 GPa. The closing elongation is 0.3-2.5
in the finished shape. Maximum composites have
% in which the decrease elongation corresponds to the
robust, stiff fibers in a matrix that's weaker and less
better stiffness and vice versa. Carbon fibers do now
stiff. The objective is normally to make an issue which
not soak up water and are proof against many chemical
is powerful and stiff, frequently with a low density.
solutions. They with stand fatigue excellently, do not
Industrial material typically has glass or carbon fibers
pressure corrode and do no longer show any creep or
in matrices primarily based on thermosetting polymers,
relaxation, having much less relaxation as compared to
such as epoxy or polyester resins. Sometimes,
low relaxation high tensile pre-stressing steel strands.
thermoplastic polymers can be preferred, due to the
Carbon fiber is electrically conductive and, consequently
fact that they are moldable after preliminary
might deliver galvanic corrosion in direct contact with
manufacturing. There are similarly types of composite
metal.
wherein the matrix is a metallic or a ceramic. Within the
C. Aramid fiber reinforced polymer: offered studies work, exclusive grade form of fiber
Aramid is the fast form for aromatic polyamide. A reinforcement composite is given and the author carried
well known trademark of aramid fibers is Kevlar but out MOOSRA approach with the intention to examine
the high-quality as according to given their residences. [5] Oncu, M.E., Karasin, A., Y?lmaz,S., "behavior of strengthed
concrete sections with cfrp under axial loading". Journal of New
M55J is the nice than other as scoring is excessive World Sciences Academy Engineering Sciences, Vol. 5(3), 2010
1.379. p.p. 515-525.
[6] Erdemli S. and Karasin, A., "Use of FRP compos?te mater?al for
REFERENCES: strengthen?ng re?nforced concrete", European Scientific Journal.,
[1] Z. Hashin,"Analysis of Composite Materials - A Survey", ASME Vol. 10 (3), 2014, p.p. 41-49.
Journal of Applied Mechanics,Vol. 50, 1983, pp.481-505. [7] Rousakis, T.C., Manolitsi, G.E. and Karabinis, A.I., "FRP
GUIDELINE NO. GD-ED- 2210 PAGE 1 of 9 APRIL 1996. strengthening of columns - parametric finite element analyses of
[2] R.M. Christensen, Mechanics of Composite Materials, John bar quality effect", Asia Pacific Conference on FRP in Structures
Wiley and Sons, New York, 1979. (APFIS), 2007.
[3] Fiber reinforced polymer composite material selection. [8] JSCE working group on retrofit design of concrete structures in
specification revision international institute for frp in construction,
[4] Lam L., and Teng, J.G., "Design- oriented stress-strain model for "Guidelines For Retrofit of Concrete Structures (Draft)", 1999.
FRPconfined concrete." Construction and Building Materials,
Vol. 17, 6-7, 2003, pp. 471-489. [9] Roylance, D., introduction to composite materials'. Department
of Materials Science and Engineering, Massachusetts Institute
of Technology, Cambridge, MA, 02139, 2000.
TABLE: 1
Fiber reinforcement composite material grade type
TABLE: 2
Attitude of Fiber reinforcement composite properties
TABLE: 4
Ranking orders
Abstract- Polymer Matrix Composite (PMC) is composites are directly proportional to the volume filler
a composite material comprises of a diversity of reinforcing into the composites. The existence of the
tiny/short/ continuous fiber embedded into the filler carries most of the load during service applications.
organic polymer matrix. This material is intended 3D printing adds up as a revolutionary manufacturing
to transfer loads between the fibers over a matrix.
technique in which the layer-by-layer manufacturing
The addition of fiber enhances the mechanical
approach keeps away with the usage of costly molds,
properties, moisture resistance, and thermal
properties. PLA is a biodegradable material and is allowing the fabrication of highly controlled parameters
used as a matrix material. The moisture absorption in addition to the manufacturing of complex assemblies
of composite samples causes dimensional variation [2]. Embedding carbon fiber is one of the suitable
and spoils the dimensional accurateness. The 3D options for 3D printed polymer composites. The greater
printing process is employed to print composite moisture absorption causes the dimensional change and
samples. Printing speed, layer thickness, and spoils the dimensional accuracy. Further, moisture
nozzle diameter are selected as 3D printing process absorption enhances the weight of the composites in
parameters. The objective of the paper is to study turn reduces the mechanical properties [3]. The study
the moisture absorption characteristics of 3D on moisture absorption helps to assess the thermos-
printed PLA-Carbon fiber composites under
physical, chemical, and mechanical behavior of the
variable printing process parameters. Analysis of
polymer matrix composites. Pandian et al.[4] noted that,
the results illustrates that the sample printed by
using 50 mm/s printing speed, 0.1 mm layer there is a decrement in the flexural, tensile, and impact
thickness, and 0.2mm nozzle size has minimum characteristics when the composites are exposed to
moisture absorption. This experimental study on water immersion. Moradi and Aminzadeh [5]
moisture absorption supports the prediction of the established the relationship between mechanical
thermos-physical, chemical, and mechanical properties and infill patterns and found that the triangular
characteristics of polymer matrix composites. The infill pattern has greater tensile strength and E-modules.
establishment of moisture absorption behavior of Liua and Lei [6] investigated the mechanical behavior
the PLA-based composites will find numerous real- of 3D printed PLA composite samples with different
time applications. fillers such as aluminum, copper, ceramic, wood, and
Keywords-Polymer, Carbon fiber, Polylactic carbon fiber and observed that the raster angle and
acid, 3D printing, Moisture absorption build orientations have a significant impact on mechanical
behavior.
I. INTRODUCTION
A polymer-based composite is a dual-phase material II. MATERIALS AND METHODS
in which reinforcing fillers are embedded into a polymer PLA is a thermoplastic polymer derived from lactic
matrix. As a result, the mechanical properties of the acid and widely used for manufacturing biodegradable
polymer composites improved than the pure polymer products, such as planting cups and plastic bags. PLA
[1]. Composite properties have relied upon the is being used as a matrix material for manufacturing the
properties of basic materials such as fibers and composites. Carbon fiber is a very hard and strong
polymers. However, the stiffness and strength of the material with lightweight. It is five times harder than steel
710 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: Water - An element essential for Keywords: Alkalinity. Acidic Nature, pH value,
existence of all the living beings on the face of the Non- Chemical Water Treatment, Pressure Drop
Earth. The fact that only 10% of the total water Chamber, Cavitation, Alkaline Water, Water
available for consumption can be used for drinking Scarcity.
purposes can never be ignored and thus it makes
inevitable to study about effective utilization of INTRODUCTION
water by adopting various methods to replenish and Both natural and human causes have made a
reuse the available water resources. noticeable decline in the available drinking water
The pH of water is one of the prime quality of resources. The Global water crisis scenario quotes that
concern which makes the water usable of drinking more than 2.1 billion people still live without safe
purposes. The acidic or alkaline nature of water drinking water across the globe. Indian city Chennai in
determines the use of water for specific utilities. Tamil Nadu State and cities like Cape Town in the
Alkaline water is more suitable for drinking African continent have seen the worst days of water
purposes and also for aqua culture. The acidity and
scarcity in the recent past. Railway wagons were utilized
alkalinity describe the waters capacity to neutralize
strong acids. The definition of pH is based on the
to transport drinking water for about 250kms to supply
logarithmic transformation of the hydrogen ion the residents of Chennai City. With the existing water
concentration (H+).[2] scarcity scenario, the domestic and industrial sector
faces a major challenge in water consumption. Most
The experimental study is made on improving
researchers and industries today focus on replenishing
the pH value of water making it suitable for
drinking. The proven method of Pressure drop and reusing of water which reduces the stress on water
method of water treatment is effective in increasing demand. [1]
the pH value of water making it usable for drinking The pH Overview
purposes. The pressure drop method of water
treatment uses the effect of pressure drop caused Temperature, salinity, hardness, pH, acidity, and
by passing of water through a convergent nozzle in alkalinity are fundamental variables that define the quality
the closed chamber at various inlet air pressures. of water. Although all six variables have precise,
The precipitate formation reduces the TDS and unambiguous definitions, the last three variables are often
Hardness of water thus increasing the pH of water misinterpreted in aquaculture and fisheries studies.[9]
making it suitable for drinking purposes by further
addition of minerals.[15] The pH Value is an index of the Concentration of
Hydrogen Ion [H+] in water. The technical definition
The pressure drop created enhances the higher
levels of calcium carbonates which results in
of pH is that it is a measure of the activity of the hydrogen
increasing the alkalinity of water. The experimental ion [H+] and is reported as the reciprocal of the
study resulted in the increase of pH value from logarithm of the hydrogen ion activity. Therefore, a
7.1to 7.91 which accounts to11.5% increment. water with pH value 7 has 10-7 moles per litre of
hydrogen ions. The pH scale ranges of 0 to 14 with 0
being acidic and 14 being alkaline. The ideal pH level
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 713
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
of alkaline ionized water for long term human slows down the effects of aging also reduces diabetic
consumption is between 8.5 to 9.5. This pH value and kidney disorders[1,2]
affects the most biological and chemical processes and This characteristic of alkaline water keeps the human
thus considered as an important parameter in water body hydrated allowing the water pass in and out of
quality study. [2] the cells more easily and also helps in flashing out the
The quantitative assessments of C02 sea water can toxins in the body more effectively.
be obtained through determinations of alkalinity and The alkaline water due to its vivid beneficial
pH.[9] characteristics also enhances the aquatic life and thus
The pH value of water is an intensity factor, whereas improves the productivity of aquaculture. [21]
the acidity and alkalinity are the capacity factors.
Alkalinity is the waters capacity to neutralize strong acids Working Principle of Pressure Drop Chamber
and Acidity is the water capacity to neutralize strong The pressure Drop Chamber method of Water
bases. treatment is a proven method of Non -Chemical Water
pH of Common Liquids treatment. The Pressure drop method allows the water
pass through two oppositely faced convergent nozzles
Vinegar 3.0
in a closed chamber. The water thus colliding oppositely
Wine 2.8 - 3.8 creates a low pressure in the middle of the chamber
Beer 4-5 with causes cavitation. This results in rapid formation
Milk 6.3 - 6.6 and collapse of bubbles in the chamber releasing
Seawater 8.3 enormous amounts of energies required for precipitate
(Source: Driscoll, 1986) formation. [15]
Alkaline Water and its Advantages The Pressure Drop Method of water treatment
comprises of a Pressure Drop Chamber and
pH values of water will determine its utility.
Convergent Nozzles which are assembled as shown in
Alkaline ionized water with its pH levels between the Fig.1.1
8.5 to 9.5 is considered ideal for long terms human
consumption.
Alkaline water with higher pH levels help balance
the acidity in the human body this benefits the people
suffering from acids reflects, diabetics, cancer and other
critical deceases caused by high acid levels in the
body.[1]
Pure water doesn't contain any minerals and thus
has a lower Ph levels. Alkaline water due to its higher
pH levels has these dissolved minerals which can be
absorbed by the human body. Drinking alkaline water
enhances hydration, improves acid base balance and
anaerobic exercise performance for sports persons.[1]
Alkaline water with higher pH ideal pH value is made FIG:1: Experimental set up of pressure drop assembly
up of small cluster of water molecule which can be The Chamber length for the experimental setup is
absorbed better by the human body as compared to considered as 200, 300 and 400mm and the
normal water. Long term consumption of alkaline water Convergent nozzles have been designed based on the
L/D ratio 1.5. The chamber design and the nozzle design Experiment 1.
are as shown in Fig 1.2 and 1.3 The water is allowed to pass through the pressure
drop chamber of length 200mm and Convergent nozzle
of exit diameter 12mm with varying air pressures of
1,3,5 and 7 bar.
The water is collected after a settling time of 30 min
and is sent for analysis. The results are plotted in the
graph below.
REFERENCES:
[1] B.Rubik., "Studies and observations on the health effects of
drinking electrolyzed-reduced alkaline water". B. Journal in ,WIT
Transactions on Ecology and The Environment, Vol 153,© 2011,
ISSN 1743-3541.
[2] Craig S. Tucker, Rawee Viriyatum, Claude E. Boyd.,
"Interpretation of pH, Acidity, and Alkalinity in Aquaculture
Fig:6:ph values increases from various pressure values of 400 and Fisheries", North American Journal of Aquaculture 73:403-
mm chamber length 408, 2011. American Fisheries Society 2011, ISSN: 1522-2055.
It is evident from the table and graph above that, [3] Abdul Nasir Laghari, Gordhan Das Walasai, Abdul Rehman Jatoi.,
the pH value of water increases as the inlet air pressure " Performance Analysis of Water Filtration Units for Reduction
of pH, Turbidity, Solids and Electricity Conductivity". Journal
increases. The increase in 10% of pH value of water in Engineering, Technology & Applied Science Research Vol. 8,
indicates under 7 bar inlet air pressure, the precipitate No. 4, 2018, 3209-3212.
[4] Sabrina Chelli, Adnan Falah, Rami El Khatib., "A Comparison [12]Lawrence E. Armstrong, Matthew S.Ganio, Jennifer F. Klau,
Study of Water Quality among Different Regions of Sharjah and Evan C. Johnson, Douglas J. Casa, and Carl M. Maresh., "Novel
Ajman in the United Arab Emirates".Avestia Publishing hydration assessment techniques employing thirst and a water
International Journal of Environmental Pollution and Remediation intake challenge in healthy men". Appl. Physiol. Nutr. Metab.
Volume 2, Issue 1, Year 2014 ISSN: 1929-2732 DOI: 10.11159/ 39: 138-144 (2014) dx.doi.org/10.1139/apnm-2012-0369.
ijepr.2014.002.
[13]Sanetaka Shirahata,Shigeru Kabayama, Mariko Nakano, Takumi
[5] C. R. Ramakrishnaiah, C. Sadashivaiah And G. Ranganna., Miura, Kenichi Kusumoto, Miho Gotoh, Hidemitsu Hayashi,
"Assessment of Water Quality Index for the Groundwater in Kazumichi Otsubo, Shinkatsu Morisawa, and Yoshinori
Tumkur Taluk, Karnataka State", ISSN: 0973-4945; CODEN Katakura., "Electrolyzed-Reduced Water Scavenges Active
ECJHAO E-Journal of Chemistry http://www.e-journals.net Oxygen Species and Protects DNA from Oxidative Damage".
2009, 6(2), 523-530. Received 18 August 2008; Revised 29 Biochemical And Biophysical Research Communications 234,
November 2008; Accepted 11 December 2008. 269-274 (1997) Article No. Rc976622.
[6] Basavaraja Simpi, S.M. Hiremath, KNS Murthy, [14] Kokichi Hanaoka, Dongxu Sun, Richard Lawrence, Yoshinori
K.N.Chandrashekarappa, Anil N Patel, E.T.Puttiah., "Analysis Kamitani , a, cc b Gabriel Fernandes., "The mechanism of the
of Water Quality Using Physico-Chemical Parameters Hosahalli enhanced antioxidant effects against superoxide anion radicals of
Tank in Shimoga District, Karnataka, India". Global Journal of reduced water produced by electrolysis". Biophysical Chemistry
Science Frontier Research Volume 11 Issue 3 Version 2011 Type: 107 (2004) 71-82. Received 8 July 2003; received in revised
Double Blind Peer Reviewed International Research Journal form 22 August 2003; accepted 22 August 2003
Publisher: Global Journals Inc. (USA) ISSN: 0975-5896.
[15] Dr. P Ram Reddy et al. "Non- Chemical water Treatment Process
[7] Jakub ChyckiID, Anna Kurylas , Adam Maszczyk , Artur Golas for TDS Reduction in cooling Tower Specific Study on Electrical
, Adam Zajac., "Alkaline water improves exercise-induced Conductivity & Turbidity" .December 2018,151-158, Scopus
metabolic acidosis and enhances anaerobic exercise performance indexed journal. International Journal of Mechanical and
in combat sport athletes." e0205708. The effectiveness of alkaline production Engineering Research and Development (IJMPERD)
water as an improvement in anaerobic performance. (2018) .PLoS ISSN(P):2249-6890,ISSN(E):2249-8001,Vol 8,Issue 6, scopus
ONE 13(11). index paper
[8] S. M. Shirreffs., "Hydration in sport and exercise: water, sports [16] Ref Annual Report 2017-Word Bank Group, Www.World Bank.
drinks and other drinks". Journal compilation © 2009 British Org/En/About/Annual Report.
Nutrition Foundation Nutrition Bulletin, 34, 374-379.
[17] AQUASTAT survey-2011, "Irrigation In Southern And Eastern
[9]By H. Dennig, J. H. Talbolt, H. T. Edwards And D. B. Dill., Asia", Edited By Karen Krenken, food, and agriculture
"Effect Of Acidosis And Alkalosis Upon Capacity For Work. Organisation Of The United Nations Rome,2012, ISBN 978-92-
From the Fatigue Laboratory". Morgan Hall, Harvard University, 5-107282-0.
Boston (Received for publication September 16, 1930).
[18] Dong Li, "Simulation of cavitation induced by water hammer",
10]Soetanto Hartono, Sukadiono., "The Effects of Sodium Bicarbonate science direct journal of hydrodynamic,2017,29(6):972-978.
and Sodium Citrate on Blood pH, HCO3-, Lactate Metabolism
[19] Kanchan Chavan, B Bhingole, J Raut, and A B Pandit, "Numerical
and Time to Exhaustion". Sport Mont 15 (2017) 1: 13-16 Original
Optimization of converging-diverging cavitation nozzles", Journal
scientific paper UDC 612.12:796.056.
of Physics: Conference Series 656 (2015) 012138.
[11]Louise M. Burke and David B. Pyne., "Bicarbonate Loading to
[20] David Nicholas, Philip Vella, Ph.D.," Chemical Free Bacteria
Enhance Training and Competitive Performance. International
and Legionella Control: A Case Study Using Hydrodynamic
Journal of Sports Physiology and Performance". 2007;2:93-97
Cavitation", report on VRTX Technologies Schertz, Texas,2014.
© 2007 Human Kinetics, Inc. Burke is with the Dept of Sports
Nutrition, and Pyne, the Dept of Physiology, Australian Institute [ 2 1 ] ( S o u r c e : h t t p : / / w w w. e p a . g o v / b i o i n d i c a t o r s / p d f /
of Sport, Belconnen, ACT 2616 Australia. Chapt4_WQS_final.pdf )
Abstract: Wire arc additive manufacturing improves production efficiency and manufacturing
(WAAM) is a promising approach to producing flexibility [3, 4]. Laser beams, electron beams, and
large-scale metal structures. The investigation on electric arcs are commonly used heat sources during
the WAAM of aluminum alloys and Titanium alloys additive manufacturing of metallic components [5-7].
has lasted for over 16 years and covered multiple
When laser beams or electron beams are selected as
alloy systems. However, fundamental research on
the WAAM of quaternary Al-Zn-Mg-Cu alloys is
the heat source, the energy control is accurate, and the
still lacking. This review paper focuses on component shape is relatively precise [8, 9]. Therefore,
understanding the micro structural characteristics investigations regarding additive manufacturing based
and mechanical properties of an ultra-high-strength on laser and electron beams are thorough [10-12].
alloy fabricated by WAAM. Results indicate that a Direct energy deposition and power bed fusion are the
single deposition layer consists of two types of general additive manufacturing processes used when
columnar grains with different micrographs and laser beams or electron beams are selected as the heat
origins. Nanoscale second phases are observed to source [13, 14].
precipitate during the manufacturing process with
location-dependent sizes and volume fractions due Wire arc additive manufacturing (WAAM) adopts
to different thermal histories. The micro hardness an arc as the heat source and metal wire as the feedstock
of the cross-section exhibits a special un-uniform material. Generally, the primary cost of the metal wire
distribution between 75-164 HV0.2 from the is approximately 10% of the same weight of metal
substrate to the top of the component. The WAAM powder. During the WAAM process, the metal wire is
deposited component shows higher overall tensile heated, melted, and then transferred to the melt pool
properties than the as-fabricated spray formed and then solidifies at the melt pool boundary and forms
counterpart. The average yield strength and digitally designed components [15, 16]. WAAM is a
ultimate strength are higher in the vertical direction
kind of droplet based additive manufacturing process,
than in the horizontal direction, while the difference
in elongation is small.
which is very promising for the direct fabrication of
complex thin walled parts [17, 18]. WAAM features a
Keywords: Additive Manufacturing; AA 7075; high deposition rate, which is suitable for fabricating
Microstructure; Mechanical Property large scale components [19,20]. Furthermore, WAAM
1. INTRODUCTION features advantages such as low cost and low wastage
rate, and thus WAAM is an advantageous alternative
Additive manufacturing transforms the fabrication of additive manufacturing process to other methods based
a structurally complicated three-dimensional (3D) on laser and electron beams [21,22]. The dominant
component into stepwise additions of thin material layers factor that affects the component morphology,
guided by a digital model [1, 2]. Additive manufacturing microstructure, and mechanical properties during
enables the fabrication of structurally complex WAAM is the heat input. However, differences in heat
components without using a mold, which significantly
input exist when different arc modes are adopted even conducted on the different locations of the components,
if the wire feeding rate is held constant. and the fracture morphologies were analyzed to reveal
Another particular phenomenon found in WAAM is the relationships between the metal transfer modes and
the transfer of liquid droplets across the arc from the mechanical properties.
wire electrode to the melt pool [23, 24]. The liquid A major benefit of the WAAM process relates to
droplet temperature is higher than the solidus the low capital investment, as the components of a
temperature, and part of heat is transferred to the melt WAAM machine may be derived of open source
pool by the liquid droplet [25]. However, differences equipment, sourced from an array of suppliers in the
in liquid droplet transfer exist when different metal mature welding industry [30]. The processing
transfer modes are adopted even if the wire feeding characteristics may also make the WAAM process
rate is held constant. Therefore, what is essential but preferable compared to the alternative fusion sources.
seldom reported in the literature is to reveal what and For example, WAAM does not does not need a
how the metal transfer mode affects the component vacuum environment to operate as required in electron
morphology, microstructure, and mechanical properties beam based methods [31]. As such, prolonged set up
during WAAM. Cong et al. [26] systematically and ramp down times which can lead to over-aging in
investigated the effects of different metal transfer modes precipitate hardened materials can be avoided [32].
during the cold metal transfer (CMT) process on the Whilst inert shielding gas may not be required in electron
porosity characteristics of additively manufactured Al- beam DED to avoid atmospheric contamination, there
6.3%Cu alloys, and their results indicated that heat input is an elevated susceptibility to element depletion and
is one of the critical factors that enables the CMT pulse evaporation during processing [33]. In comparison to
advanced (CMT-PADV) process to control the laser based methods, the use of the electrical arc offers
porosity rate. Luo et al. [27] conducted WAAM on a higher efficiency fusion source [34]. This is of benefit
aluminum alloys using pulsed arcs and non pulsed arcs, from an energy consumption perspective, in particular,
and their results indicated that pulsed arcs can achieve for reflective metal alloys of poor laser coupling
higher droplet transfer frequencies and that the size of efficiency such as aluminium, copper [35] and
the droplet in the pulsed arc approach is smaller than magnesium [36]. With typical layer heights of 1-2 mm,
that in the non pulsed arc approach. Although some surface waviness of 500 ?m [37] and deposition rates
characteristics of WAAM under various arc modes have up to 10 kg/hr, WAAM productivity and material
been documented in the literature, the component removed is similar to laser based and electron beam-
morphology, integrity, microstructure, and mechanical based DED approaches. Research and developments
properties are not comprehensively demonstrated or have allowed the WAAM process to become highly
understood. Stainless steel 316L is a kind of austenitic capable in a number of materials, including aerospace
stainless steel that is widely used in marine and offshore titanium alloy Ti-6Al-4 V and nickel bronze, where
equipment, automobiles, and nuclear reactors due to static mechanical properties close to those found in
its outstanding corrosion resistance, high strength, high wrought and cast can be produced [38]. Present there
ductility, and relatively low cost [28,29]. Arc current are several commercial WAAM machine manufacturers
and arc voltage data were collected during the additive and/or service providers able to produce WAAM
manufacturing process to evaluate the manufacturing components in a number of materials. However, high
process stability. X-ray CT tests were conducted on quality production of WAAM parts is only achievable
tensile samples of the component to evaluate the when the specific materials processing challenges related
structural integrity of the manufactured component. The to the high-levels of heat input of the WAAM process
microstructures at different locations in the components are addressed. Williams, et al. [39] and Ding et al.
were characterized to reveal the relationship between regarded the management of the high levels of residual
the arc modes and microstructures. Tensile tests were stress and distortion as the primary heat related material
2. EXPERIMENTAL WORK
2.1 Material and methods
The 7055-Aluminum alloy flat plates join was with
the WAAM system shown in Figure 1, which consisted
of a Miller Dynasty 350 GTAW power supply, a GTAW
Figure 2. Single-pass multilayer component: (a) The
torch, a preheating platform, a three-degrees-of- fabricated component, (b) Cross-section of the fabricated
freedom moving table, a wire feeder, and a control component
system. For the WAAM process, the preheating For the tests on the tensile properties, samples were
platform was heated to a certain interlayer temperature cut in two directions: horizontal and vertical, as shown
(80 ? in this experiment). When depositing a single layer, in Figure 3. Eight test samples were cut for each
the welding torch remained static, while the moving table direction. All samples were polished with metallographic
traversed a pre-set trajectory. When one layer was abrasive paper. Tensile tests were carried out with
deposited, the welding torch was lifted to the next layer, Instron-5569 at room temperature with a loading
and the moving table returned to the starting place. The velocity of 2 mm/min. Sample fractures were observed
temperature of the layer was detected with a Tachyon with an FEI Quanta 200FEG SEM to investigate the
1024 ?core thermal imager. When it decreased to the fracture mechanism.
pre-set level, the next layer was deposited. The
deposition parameters used in this work are presented
in Table 1. SAL7055 aluminum wires with a diameter
of 1.2 mm were used as feedstock.
nucleation and growth of these nanoscale second phases Locations near the top of the component (Position A)
may have occurred in the subsequent deposition experiences no effective thermal cycles within the
process. precipitation temperature range. Alloy elements are still
soluted in the matrix. After that, locations closer to the
substrate experiences more effective thermal cycles
(Position B and C). The precipitates are more likely to
nucleate and grow larger. However, as the distance to
heat source also increases, the peak temperatures of
subsequent thermal cycles may decrease below the
precipitation temperature range, so the growth of the
precipitates cannot keep continuing. The sizes of the
precipitates finally achieve stability (Position D). We
examined these nanoscale second phases in more detail
by using HADDF.
Figure 6. Second phases at different locations: (a) 4mm, (b) 3.2 Mechanical Properties
20mm, and (c) 40mm to the top of the component; (d) a
schematic figure of the formation mechanism of second 3.2.1 Micro hardness
phases
During the information of these second phases, the Micro hardness tests were carried out on the cross-
solid solubility, diffusion rates of alloy elements, and section of as-deposited 7055- Al to evaluate the
temperature are the three main influencing factors. The micromechanical properties. We focused on the
bright-filed image of the last deposition layer indicates hardness uniformity at different layers. An interval of 1
that the requirement for solid solubility in the matrix can mm was chosen along the vertical direction, and 5 points
be met. For the diffusion rates of the alloy elements, were tested at each location. The hardness distribution
the cooling rates during deposition are much less than is shown in Figure 7. The hardness increases significantly
that of water quenching, which is usually conducted from the bottom to the top of the cross-section. The
during solution treatment. Thus, the vacancy densities chemical composition of the substrate is different, due
are also lower, which can be an obstacle for alloy to the dilution effect, the first few points have the lowest
elements to diffuse in the solid-state. However, because hardness. Below a height of 20 mm, the hardness
Al has high thermal conductivity, the subsequent distribution stabilizes at around 75 HV0.2. However, it
deposition reheats the deposited layers to increase the increases at a rate of 3.8 HV0.2/mm to 164 HV0.2 up to
equilibrium vacancy concentration and the diffusion rates a height of 45 mm. Above 45mm, the hardness
of the alloy elements. With regard to the temperature, decreases gradually to 136 HV0.2. This non-uniform
the subsequent deposition can be regarded as a short hardness distribution significantly differs from that of
non-isothermal aging process. Validated thermal other aluminum alloys fabricated by WAAM.
process numerical studies [3,11] indicate that the peak
temperatures of successive thermal cycles caused by
subsequent deposition on a single layer can exceed 120
- 200, which is the required temperature range for the
formation of phases. Thus, the requirement of
temperatures or thermodynamic driving forces can also
be achieved. Therefore, precipitation and growth can
proceed during the WAAM process for this type of
aluminum alloy. As shown in Figure 6, the sizes of the Figure 7. Hardness distribution on the cross-section
precipitate depend on the local thermal history.
The hardness distribution can be explained by the 148.3±15.9 MPa, 230.7±12.0 MPa, and 3.3±1.0 %,
evolution of the second phase. For the top region above respectively. The results from different samples show
45 mm, the alloy elements are dissolved in the Al matrix, significant dispersion, especially for elongation. This
and the strengthening mechanism is mainly solution indicates that the as-deposited 7055-Al is not sufficiently
strengthening. As discussed in the second phase can homogeneous. The average yield strength and ultimate
precipitate out during the deposition process for as- strength are 16.8 % and 7.6 % higher in the vertical
deposited 7055-Al. For the lower part of the direction than in the horizontal direction. In contrast,
component, the strengthening mechanism gradually the difference in average elongation according to
changes to precipitation strengthening. Thus, we direction is small, considering the large fluctuations in
observed the hardness increasing from the top of the the test data.
specimen to the height of 45 mm after several
subsequent thermal cycles. The strengthening effect of
second phases with incoherent sizes can be expressed
by the Orowan mechanism [33]: wherec is the shearing
stress required by dislocations, f and R are the volume
fraction and radius of the precipitates, G is the shear
modulus, is the Poisson's ratio, b is the Burgers vector,
and r0 is the radius of the dislocation core. The model
indicates that the strengthening effects are highly sensitive Figure 8 Tensile properties of as-deposited 7055-Al: tensile
curves of (a) horizontal and (b) vertical specimens, strengths
to the sizes and volume fractions of the second phase. and elongations of (c) horizontal and (d) vertical specimens
However, because the subsequent thermal cycles during
Table 2 shows a comparison of tensile properties
WAAM can be regarded as isothermal aging with
between the as-deposited specimen and 7055-Al in
relatively high peak temperatures for the deposited
other states. Compared with other as-fabricated states,
metal, the growth rate of the second phase after
the WAAM deposited 7055-Al exhibits greater strength
nucleation is very fast [29,31,34]. This increases the
and elongation than the spray formed counterpart
growth in size and reduces the volume fractions, which
without further extrusions [35], and higher elongation
further degrades the strengthening effects. Thus, the
than the direct chilling cast counterpart [36]. However,
hardness decreases significantly from the height of 45
compared with those that have been subjected to hot
mm to 20 mm and finally reaching a stable state.
working and heat treatments [35, 37, 38], the WAAM
3.2.2 Tensile tests deposited 7055-Al shows inferior overall tensile
properties. There are two reasons for the poor
Tensile tests were carried out on as-deposited 7055-
performance. On the one hand, there are ubiquitous
Al to evaluate the macromechanical
porosities in the as-deposited has been observed during
properties. Samples were tested in both horizontal WAAM, the solutes are depleted by the large second
and vertical directions to compare the anisotropies that phases. The solution strengthening and precipitating
have been observed in other as-deposited materials. strengthening effects are still weaker than the heat-
Figure 8 shows the tensile properties. We labeled the treated specimens.
tensile test samples by the test direction and sample
ID. For example, H-3 represents the third test sample
in the horizontal direction. Figure 8a and b show the
tensile curves of the 16 specimens, while Figure 8 c
and d give the strength and elongations obtained from
tensile curves. The average yield stress, tensile stress,
and elongation of as-deposited 7055-Al are
Table 2. Mechanical properties of 7055-Al in different states surfaces: (a) Low magnification image of the front
Manufacturing
Heat treatment Temper
Yield
Strength
Tensile
Strength
Elongation fracture, (b) intergranular fracture region, (c)
Technique (%)
(MPa) (MPa)
Waam CAST 148 230 3.2 transgranular fracture region, d) finger-like
Solution: 450°C/24h
Waam
Aging: 120°C /12h
T6 608 667 10 protuberances on the surface of the shrinkage porosity,
Solution:470°C /24h
Waam
Aging: 120°C /12h
T6 562 620 11 (e) secondary crack initiates from the shrinkage porosity,
Solution: 475°C /1h
Aging: 120°C /24h and (f) broken large second phases
Waam Regression: 160°C T77 720 732 7.2
/0.5h Re-aging: 120°C
/24h The profiles of the tensile test specimens are
observed to examine the crack propagation path. As
3.3 Fracture analysis
illustrated in Figure 10a and b, broken second phases
Figure 9 shows the typical morphology of fracture and porosities are observed distributed along the crack
surfaces of WAAM deposited 7055-Al. As illustrated propagation path for samples in both horizontal and
by Figure 9a, the fracture surfaces are characterized vertical directions. Figure 10c shows a second crack
by numerous exposed external surfaces of columnar initiates from continuous second phases and propagates
dendrites, indicating the fracture path is predominantly along the grain boundary. Moreover, porosities are
intergranular. However, as marked by the yellow found connected by the second crack in Figure 10d.
arrows, there are also ruptured dendrites along the The second crack propagates along the continuous
cross-section, which proves the fracture path still has second phases between porosities. The above
some transgranular contributions. Figure 9b magnifies observation reveals that the continuous second phases
the external surfaces of columnar dendrites. Cleavage and porosities are weaknesses of the WAAM deposited
facets that are visible almost everywhere reveal the as- 7055-Al. They can act as crack sources individually.
deposited specimens exhibit the brittle cleavage fracture In addition, porosities are geometric discontinuities
mode. Figure 9c magnifies a cross-section of columnar themselves, which may further accelerate the crack
dendrites. The surface consists of shearing dimples with propagation by connecting the cracks initiate from
sizes from 4.2 to 6.6 ?m. As shown by Figure 9d, e, second phases.
and f, there are porosities and broken second phases
in the gaps of the columnar dendrites, and second
cracks are found initiate from them. Finger-like
protuberances on the internal surfaces of porosities are
clearly observed, proving they are shrinkage metal, as
shown in Figure 7. These porosities reduce the load
area and facilitate the propagation of cracks during
tensile tests and even cause local brittle fractures,
according to the research of Ma et al. [39]. On the
other hand, although precipitation
Figure 10. SEM images of side fracture
surfaces: low magnification BSE image for the side
fracture of (a) horizontal and (b) vertical specimens;
(c) secondary crack initiates from net-shaped second
phases; (d) porosities play a vital role in crack
propagation by connecting cracks from second phases
4. CONCLUSIONS
In this review paper the Al-Zn-Mg-Cu aluminum
Figure 9. SEM images of front fracture alloy 7055-Al was successfully fabricated by GTAW-
[15] W.E. Frazier, Metal additive manufacturing: a review, J. Mater. [29] Y. Zhong, L.-E. Rännar, L. Liu, A. Koptyug, S. Wikman, J.
Eng. Perform. 23 (2014) 1917-1928. Olsen, D. Cui, Z. Shen, Additive manufacturing of 316L stainless
steel by electron beam melting for nuclear fusion applications, J.
[16] A. Horgar, H. Fostervoll, B. Nyhus, X. Ren, M. Eriksson, O.M.
Nucl. Mater. 486 (2017) 234-245.
Akselsen, Additive manufacturing using WAAM with AA5183
wire, J. Mater. Process. Technol. 259 (2018) 68-74. [30] G.C. Anzalone, C.L. Zhang, B. Wijnen, P.G. Sanders, J.M. Pearce,
A Low-cost Open source metal 3-D printer, IEEE Access. 1
[17] H. Yi, L. Qi, J. Luo, N. Li, Hole-defects in soluble core assisted
(2013) 803-810.
aluminum droplet printing: metallurgical mechanisms and
elimination methods, Appl. Therm. Eng. 148 (2019) 1183-1193. [31] J.O. Milewski, Lasers, Electron Beams, Plasma Arcs, Additive
Manufacturing of Metals, Springer International Publishing, 2017,
[18] H. Yi, L. Qi, J. Luo, D. Zhang, H. Li, X. Hou, Effect of the
pp. 85-97.
surface morphology of solidified droplet on remelting between
neighboring aluminum droplets, Int. J. Mach. Tools Manuf. 130- [32] W.J. Sames, K.A. Unocic, G.W. Helmreich, M.M. Kirka, F.
131 (2018) 1-11. Medina, R.R. Dehoff, S.S. Babu, Feasibility of in situ controlled
heat treatment (ISHT) of inconel 718 during electron beam melting
[19] J. Ding, P. Colegrove, F. Martina, S. Williams, R. Wiktorowicz,
additive manufacturing, Addit. Manuf. 13 (2017) 156-165.
M.R. Palt, Development of a laminar flow local shielding device
for wire+arc additive manufacture, J. Mater. Process. Technol. [33] K. Taminger, R. Hafley, Electron beam freeform fabrication: a
226 (2015) 99-105. rapid metal deposition process, Proceedings of Third Annual
Automotive Composites Conference, Troy, MI, 2003, pp. 9-10.
[20] J. Xiong, Y. Lei, H. Chen, G. Zhang, Fabrication of inclined thin-
walled parts in multi-layer single-pass GMAW-based additive [34] M.A. Jackson, A. Van Asten, J.D. Morrow, S. Min, F.E.
manufacturing with flat position deposition, J. Mater. Process. Pfefferkorn, A comparison of energy consumption in wire-based
Technol. 240 (2017) 397-403. and powder-based additive-subtractive manufacturing, Procedia
Manuf. 5 (2016) 989-1005.
[21] J. Zhang, X. Zhang, X. Wang, J. Ding, Y. Traoré, S. Paddea, S.
Williams, Crack path selection at the interface of wrought and [35] D.D. Gu, W. Meiners, K. Wissenbach, R. Poprawe, Laser
wire+arc additive manufactured Ti-6Al-4V, Mater. Des. 104 (2016) additive manufacturing of metallic components: materials,
365-375. processes and mechanisms, Int. Mater. Rev. 57 (3) (2012) 133-
164.
[22] D. Yang, C. He, G. Zhang, Forming characteristics of thin-wall
steel parts by double electrode GMAW based additive [36] J. Guo, Y. Zhou, C. Liu, Q. Wu, X. Chen, J. Lu, Wire arc additive
manufacturing, J. Mater. Process. Technol. 227 (2016) 153-160. manufacturing of AZ31 magnesium alloy: grain refinement by
adjusting pulse frequency, Materials 9 (2016) 823-836.
[23] A. Scotti, V. Ponomarev, W. Lucas, Interchangeable metal transfer
phenomenon in GMA welding: features, mechanisms, [37] S.W. Williams, F. Martina, A.C. Addison, J. Ding, G. Pardal, P.
classification, J. Mater. Process. Technol. 214 (2014) 2488-2496. Colegrove, Wire + arc additive manufacturing, Mater. Sci. Technol.
32 (7) (2016) 641-647.
[24] A. Scotti, V. Ponomarev, W. Lucas, A scientific application
oriented classification for metal transfer modes in GMA welding, [38] F. Martina, S.T. Williams, P. Colegrove, Improved microstructure
J. Mater. Process. Technol. 212 (2012) 1406-1413. and increased mechanical properties of additive manufacture
produced ti-6al-4v by interpass cold rolling, Annual International
[25] H. Yi, L. Qi, J. Luo, D. Zhang, N. Li, Direct fabrication of metal
Solid Freeform Fabrication Symposium - An Additive
tubes with high quality inner surfaces via droplet deposition
Manufacturing Conference, Austin, Texas, USA, 2013, 2013,
over soluble cores, J. Mater. Process. Technol. 264 (2019) 145-
pp. 490-496.
154.
[39] D. Ding, Z. Pan, S. van Duin, H. Li, C. Shen, S. van Duin, Z.
[26] B. Cong, J. Ding, S. Williams, Effect of arc mode in cold metal
Pan, D. Ding, H. Li, C. Shen, Fabricating superior NiAl bronze
transfer process on porosity of additively manufactured Al-
components through wire arc additive manufacturing, Materials
6.3%Cu alloy, Int. J. Adv. Manuf. Technol. 76 (2015) 1593-
9 (8) (2016) 652-662.
1606.
[40] Z. Pan, D. Ding, B. Wu, D. Cuiuri, H. Li, J. Norrish, Arc welding
[27] Y. Luo, J. Li, J. Xu, L. Zhu, J. Han, C. Zhang, Influence of
processes for additive manufacturing: a review, Trans. Intelligent
pulsed arc on the metal droplet deposited by projected transfer
Weld. Manuf. 1 (1) (2018) 3-24
mode in wire-arc additive manufacturing, J. Mater. Process.
Technol. 259 (2018) 353-360.
[28] C. Wang, X. Tan, E. Liu, S.B. Tor, Process parameter optimization
and mechanical properties for additively manufactured stainless
steel 316L parts by selective electron beam melting, Mater. Des.
147 (2018) 157-166.
Abstract - In the present work, woven E-glass/ Numerous studies have been conducted on the
epoxy composite containing artificial defect under delamination of unidirectional composite laminates
flexural loading were conducted. The composite comprised of fibrous pre-pregs. And failures could be
consisted of five layers with a sequence of [0o/90o/ noticed as pure matrix cracking and debonding at the
0o/90o /0o]. The artificial defect is circular in shape matrix/fiber interface. Currently, bidirectional fibers are
with uniform thickness. Artificial delaminations with
used in the majority of industrial applications. Woven
different sizes were used. The effect of artificial
delamination on the flexural strength of the
fabric is an example and is widely used because it offers
laminated composite was investigated. Results a number of advantages over unidirectional fabric,
indicate that the flexural strength of artificially which include less manufacturing errors, reduction in
delaminated samples is lower than laminated labor, high fatigue resistance, increased fracture
samples due to the occurrence of local buckling in toughness, high in-plane specific stiffness and strength,
the specimen. high impact resistance and good handling properties.
Keywords: Laminate, Artificial Delamination, As a result, the demand for woven fabric composites
Flexural Strength & Circular Defect in various industries has expanded significantly. Many
authors investigated the influence of artificial
I. INTRODUCTION delaminations in the shapes of rectangle, circle [1, 2],
Composites are employed in aeroplane, automotive ellipse [1, 2], strip [2, 3] and triangle [3] on the flexural
and defence applications because they have higher behaviour of woven fabric composites.
strength to weight and stiffness to weight ratios than The comprehensive review suggests that there is still
metals, making them a better choice than metals for a lack of interest in the flexural behaviour of woven
these applications. There are different types of damage fabric composites when artificial delamination is
that can occur in reinforced composites. These include introduced at various locations in subsequent plies in
fiber breakage, matrix cracking, debonding of the fiber the thickness direction. Thus, the purpose of this work
from the matrix, and delamination. Delamination is a is to evaluate the flexural strength of a plain weave E-
failure that occurs out of the plane in the laminate and glass/epoxy composite that has been subjected to
results in the separation of successive laminae. It can artificial circular delamination of uniform thickness at
occur in any laminate. When it comes to damage modes, many locations. Additionally, delaminations of various
delamination is a prominent one that can occur during sizes were considered.
the manufacturing process as well as be caused by
various service loads. Local buckling occurs when a The in-depth review still indicates lack of interest
delaminated composite is caused by the bending of the on flexural behavior of woven fabric composites when
laminates. The flexural stiffness of the composite will artificial delamination is created at various locations in
be reduced when local buckling occurs [1]. adjacent plies in the direction of thickness. Hence, the
aim of this work is to determine the flexural strength of
Tables 1 to 7 give the flexural test data of control S. Breaking Flexural Average
(artificial defect free) and artificial delamination (artificial No load (N) strength, σ (MPa) strength (MPa)
1. 442.9038 262.78
defect) specimens for the artificial defects of three
2. 416.7218 250.14
different sizes 3 mm, 6 mm and 10 mm placed in 3. 448.7968 265.80 256.59
between layers 1-2 and 4-5. For each data point of 4. 426.7218 252.47
flexural strength, five specimens were tested and their 5. 422.7968 251.80
average was taken. The flexural strength of the control Table 4: Flexural strength of specimen containing
specimen is 305.67 MPa. The data of Tables 1 to 7 delamination size of 10 mm located in between 1-2 layers
were plotted in Figures 4 and 5 to compare the flexural S. No Breaking load Flexural Average
strengths of artificial defect specimens with control (N) strength, σ strength (MPa)
(MPa)
specimen. From these diagrams, it has been observed 1. 434.6635 252.80
that the flexural strength of artificial defect specimen is 2. 432.4804 251.89
less than that of the control specimen. And also, it can 3. 430.6814 250.88 251.36
be noted that the flexural strength decreases with the 4. 431.4954 251.25
increase in the size of the artificial defect located in 5. 428.6814 250.02
contact plane of the same adjacent layers. For the Table 5: Flexural strength of specimen containing
delamination size of dia 3 mm located in between 4-5 layers
artificial defect of the same size located in between
different layers, the flexural strength increases due to S. Breaking Flexural Avera ge
No load (N) strength, σ strength
the decrease in local buckling. The amount of local (MPa) (MPa)
buckling on the compression side of the specimen on 1. 330 .3893 248.76
layer 1 towards the loading side was very large. A 2. 423.31 1 330.38
typical specimen with delamination extended in 3. 351.08 5 274.02 27 0.82
4. 341 .1674 259.94
transverse and longitudinal directions during flexure is
5. 362 .6588 276.31
shown in Figure 6. This damage began developing
Abstract- The temperature of earth at below vertically. Vertical loops go deeper. Horizontal loops
ground level around 2 to 5m, is almost remain are sometimes buried at depth. Temperature regime at
constant through out of year. This temperature this depth and on the far side is stable, with no diurnal
called as Earth Undisturbed temperature EUT. fluctuation and with solely a tiny low seasonal or annual
This EUT is higher than atmospherics temperature variation[1].
in winter season. While in reverse condition can
find in summer season. In summer season, EUT is The temperature waves dampen as they penetrate
always lower than atmospherics outside through layers of soil. High frequency waves do
temperature. The heat exchange is set up at below therefore faster. Consequently, diurnal fluctuations (one
ground approximately 2 to 5m. The heat exchanger cycle per day) diminish inside but a meter. However,
is device exchange heat and give satisficed the annual wave (one cycle per year) penetrates deeper.
utilization of EUT. In summer, the ambient is air Its amplitude of fluctuation is far smaller. Massive mass
pass through this below ground heat exchanger and
of soil at a stable, close to constant, temperature permits
provide cooling effect to any domestic and
its use as sink and supply of heat. Geothermal energy
industrial building with the help of EUT. While
opposite in winter season the ambient is air pass as renewable, free of cost, availability during year days
through this below ground heat exchanger and & eco-friendly in nature being popular for domestic
provide cooling effect to any domestic and and commercial applications [2].
industrial building with the help of EUT. In both Earth Air heat exchangers (EAHE) are sometimes
season like in summer and winter; heat exchanger utilized for energy cooling/heating of structures, such
gives efficient result of cooling and heating result
as, residential buildings, hospitals. Application of such
respectively. It was found that our aim of designing
made us to face designing and analysing of it by a system is predicted to cut back the consumption of
implanting various types of basic fundamentals voltage [3]. Completely different approaches are utilized
related to the concepts of Heat Exchanger for analysing the styles of EAHE. In arid regions, like
Jodhpur, India, the close temperature becomes as high
Keywords-component, formatting, style, styling,
as five hundred C, throughout summer. In such a vicinity,
insert (key words)
the applying of EAHE thought, visible of a lower soil
I. INTRODUCTION temperature compare to the atmosphere, is predicted
Geothermal Energy is renewable resource like to play a possible role in cooling of permanent likewise
biomass energy and solar energy. So with the use of as semi-permanent structures with reduced electricity
geothermal energy, Heating Ventilation and Air- consumption. It is stressed that such a system is
Conditioning HVAC application can be satisfied. In integrated with alternative energy driven natural
summer season, Earth Air Heat exchanger (EAHE) is ventilation [4]..
convert the hot atmospherics air into cool and in winter,
cool atmospherics heat into hot. sometimes comprises
loop(s) of pipe buried within the ground horizontally or
the bottom loop device, the dimensions of the pool, 7. Raluca Teodosiu, Lidia Nicult et al. They addressed
and also the management strategy. To additional totally earth-air device (EAHX) implementation for
perceive this, further analysis victimisation the Romanian dwellings. the target is to assess the
simulation techniques developed during this paper is potential of this resolution for ventilation energy
required. This analysis would additionally take into savings and greenhouse emission emissions
consideration the economic prices and edges, that reductions. Numerical transient coupled model (single-
we've got not investigated. further validation of the pipe EAHX - ventilation - building) is developed
model, victimisation information from an operating exploitation Trnsys as simulation tool. The simulations
system, would be helpful. Extension of the model to square measure administered for typical Romanian
hide deep pools for things wherever associate existing single-family detached home, taken under
pond or lake is offered. consideration 3 totally different climate regions. for
every case, careful results square measure conferred
5. Upamanyu Bangale Samir Deshmukh et al. India is
regarding EAHX thermal behaviour and its edges in
largest producer of fruit and vegetable in world state
terms of energy savings and anti-pollution effects for
of affairs however handiness of fruit and vegetable
recent air pre-heating and pre-cooling inside
per capita is considerably low thanks to post-harvest
mechanical ventilation of the house.
loses that is concerning twenty fifth to half-hour of
production that the demand of refrigeration and air- 8. Amanda Pertzborn, Gregory Nellis et al as per their
con has been increased. Building or cluster of buildings observation, a summary of the work being conducted
with thermal insulation and cooling system during on GSHPs at the University of Wisconsin - Madison
which biodegradable food or product will be hold on has been conferred. The work to this point has found
for numerous length of your time to cut down that styles supported TMY weather information could
deterioration with necessary temperature and under-predict the specified part sizes as a result of
humidness is named as cold storage. In cold storage the particular year-to-year weather variation is
cooling system brings down the temperature ab initio neglected. Initial validation of the part wants to
throughout start off however thermal insulation simulate the GHX (the DST model) has shown that
maintains the temperature soon ceaselessly. during the model will predict the outlet temperature of the
this read, the easy methodology is given to calculate GHX for brief term simulations, however extra
heat transfer by analytical method conjointly try has validation is needed. extra validation of the DST model
been created to attenuate the energy consumption is performed as information is collected from the
by substitution a hundred and fifty metric linear unit location in Madison similarly as from extra sites in
enlarged phenyl ethylene (EPS) by a hundred-metric city, NV. the warmth pump part model will be valid.
linear unit Poly ester foam (PUF) insulation. The
9. Trilok Singh Bisoniya et al. The Earth air heat
methodology is valid against actual knowledge
exchanger (EAHE) will be recent or new
obtained from sphenisciform cold storage settled in
advancement which might be effectively for the
Pune, India.
heating and cooling load calculation. several authors
6. Stuart J. Self, Bale V. Reddy, brandy A et al. They observed equations, models and procedures about
had investigated that geothermic heat pumps square EAHE. The model EAHE utilised for a observations
measure extremely economical heating technologies of equations and main objective is that to find out the
that yield reductions in dioxide emissions, the potential earth's undisturbed temperature (EUT) The model
rejection of fuel usage and economic blessings. Heat also help to calculate Reynold number Re, Nusselt
pumps utilize considerably less energy to heat a Number Ne, and others parameters for pipe and soil.
building than different heating systems. several The prepared equations are used to change in design
variations of geothermic systems for heating exist, to calculate Co-efficient of heat and other
with totally different configurations appropriate in performance parameters.
several things and most locations round the world.
10.Rakesh Kumar, A.R. Sinha et al. They addressed that
decide among heating choices, it's vital to see the
new improvement methodology supported GA is
advantages for various ground setup choices, usually
applied as a generative and search procedure to
in terms of potency, emissions and social science.
optimize the look of earth-to-air device. The GA is EAHE for area heating and cooling of a house in
employed to come up with doable style solutions, that Delhi-India. this paper deals with the experimental
square measure evaluated in terms of passive heating outside annual performance analysis of the 2.32 kWp
and cooling of building, employing a careful thermal electrical phenomenon (PV) grid situated at delhi -
analysis of non-air-condition building setting the results solar energy park. electrical load nearly about ten-
from the simulations square measure afterward kilowatt h/day that is compare with the electrical air
accustomed more guide the GA search to seek out blower of associate earth air tunnel heat exchanger
the high-energy solutions for optimized style used for cooling/heating of the soddy, ceiling fan,
parameters. the particular drawback self-addressed fluorescent tube-light, computer, submersible pump,
during this study is that the size of earth-to-air device etc. The outside efficiencies, power generated and
in a very non-air-conditioned residential building. lost in PV system elements were determined
exploitation hourly experimental measured knowledge
for one year on typical clear day in monthly.
13. Rohit Misra, Vikas Bansal, Ghanshyam Das Agrawal
et al. [2013] has investigated that length of pipe
increase, the outlet air temperature from EAHE
reduce. It had been discovered that with increase in
pipe diameter, the outlet air temperature of EAHE
will increase as a result of the convective heat transfer
coefficient at inner surface of pipe similarly as overall
heat transfer constant at earth- pipe interface
decreases at higher pipe diameters. With increase
Graph 1: EUT vs Days thorough of pipe buried, outlet air temperature of
EAHE system decreases. So, pipes of EAHE system
11. Sujata Nayak and G.N. Tiwari (2009) investigated
ought to be put in as deeply as potential however it
the theoretical performance of earth heat exchanger
increases excavation value. So, it's suggested to stay
concern with greenhouse exploitation energy and
depth of buried pipe deals at 2m. The outside air
exergy analysis ways. The utilization of solar energy
temperature of EAHE system will increase with
through the electrical phenomenon system and EAHE
increase in air flow rate. This is because of the air
for heating and cooling of greenhouse. Calculations
flow rate is exaggerated, the time to that air remains
are in dire straits the four varieties of weather
to bear with ground is reduced. The performance of
conditions (a. b, c and d types) in Indian capital, India.
EAHE cannot be exaggerated solely by decreasing
The paper was compares with greenhouse air
the air flow rate as a result of the cooling capacity of
temperatures once it's operated with photovoltaic/
EAHE system depends each on air flow rate and
thermal throughout daytime including the planet air
temperature distinction. So, each air flow rate and
tunnel heat exchanger in the dark, with the air
temperature distinction ought to be thought-about at
temperatures, The results conclude that air
an equivalent time.
temperature within greenhouse may be magnified by
7-80C throughout the winter season, once system is 14. Viaka Bansal and Misra et al. they observed that the
operated with the electrical phenomenon, coupled with utilization of material like PVC for the cooling capacity.
earth air tunnel device in the dark. From the results This aim of the planning of the duct system. The
it's seen that hourly helpful thermal energy generated, practical works was created as an example EAHE
throughout the day time and already dark, when model. This paper applicable of small residential. For
system is operated with electrical phenomenon this application, suitable steel material and non-ferrous
including the planet air tunnel heat exchanger, is 33MJ material like brass material can be possible. So thermal
and 24.5 MJ. conductivities of Ferrous & non-ferrous materials are
different. The Co efficient of performance also
12. Arvind Chel and G.N. Tiwari (2010) Investigated the
depend on materials of tube or pipe. So, useable
complete electrical phenomenon integrated with
energy is less as compared to conventional system.
They have used lower cost of steel material or steel Vertical direction with parallel. In the summer, good
graded material used. The COP of EAHE depend on cooling rate calculated based on steel graded material.
Mass flow rate of air. The COP also depends on Also suggested that PVC material can be used but
Materials of Pipe. thermal conductivity less as compared to steel graded
materials. The mass flow rate of air and speed pf air
15. Trilok Bisoniya et al. They have prepared EAHE
increased, in result temperature decrease but COP is
model for calculating parameter like pipe length, radius
slightly decrease as per their expected.
and depth of buried pipe. An Authors prepared 1D
and 2D of EAHE for Find out earth undisturbed
temperature at different depth level. As well as 3D
model is developed for performance analysis of Earth
Air Heat Exchanger. The CFD is used For a heat
transfer analysis of 3D model. Even also they
concluded that CFX, CFD200, FLUENT and ADINA
can be used for complicated fluid flow analysis of
Earth air heat exchanger. The energy equation can
be given efficient analysis of EAHE
16. Jakhar et al. The Author has used TRYNSYS 17.0
used for analysis of Earth Air Heat Exchanger The
experimental setup was established in Ajmer location Figure 3: Vertical EAHE & Horizontal EAHE
of India. The results were calculated as per thermal 19. Chaturvedi et al. he has done his Experimental set
climates conditions of Ajmer. There was a galvanised up of EAHE in Bhopal region. The EAHE consist of
iron duct used for star air heating purpose. So, its Multiple pipes in parallel direction in summer climates.
also known as Star Air Heating Duct (SAHD). They It found that there was impact on output due changing
have found that variable in air conditions affect the material like PVC and Steel or other ferrous materials.
performance of EAHE. But the others parameters But diameter, length and arrangement of pipe affect
like thermal conductivity of duct, soil diffusivity and COP of EAHE. The COP of EAHE depends on
design of EAHE also can be improved coupled with Materials of pipe, but also depend on soil diffusivity
other system. and performance parameters. The final conclusion
17. Ahmed et al. The author used Rockhampton - as per his suggestion that material of pipe is not play
Australia for experimental set up for EAHE. They used role in COP of EAHE.
used two shipping containers. Vertical EAHE and 20. Rahul Rathee & Dr Atul Lanjewar investigated that
Horizontal EAHE are set up in two containers. So, after learning the views of authors. evokes of all this
Materials of Container play use role in this set up. attempt we have a tendency to could proceed that
Air blower is used for sucked atmospheric air and The technology of cooling system with ground
blow inside set up. There are 20 PVC pipes are used coupled condenser reduces energy consumption, fuel
experimental work. The researchers had also price and heating and cooling system seems to be
prepared CFD Model based Experimental set up. the flexible, multi-functional, and also the overall constant
soil temperature also calculated in summer days at of performance of the device may be abundant
different depth levels. From the CFD analysis results improved. The conventional air-conditioner may be a
show the common temperature for HEAHE was massive shopper of power while in cooling system
larger than VEAHE. Thus, concluded that VEAHE with ground coupled condenser cut back power
provides a lot of reduction in temperature drop than consumption. During this system the seasonal thermal
the HEAHE. Thus, VEAHE is preferred to use for storage ability of the soil, that encompasses a
Australian weather. temperature delay compared to the outside
18. Dubey et al. as per suggested of researcher, he has temperature. This temperature difference between
used open loop type EAHE used. In the experimental the outside temperature and also the soil temperature
work consist of three pipes. These pipes arranged in permits a cooling result of the new summer air. So,
the utilization of the hold on cold within the ground 23. Kumar et al. he has used MATLAB for analysis of
with the suggests that of Associate in Nursing EAHE. For better thermal analysis, he had used Fast
underground device produces positive result on the Furrior Transform mehtod and FDM method. He is
C.O.P. any future scope in cooling system with ground indian researcher.he has setup expermental work in
coupled condenser is that the feasibleness of this MATHURA. He has calculated COP, Heat transfer
method for extreme summer and extreme winter is Co efficeient and overall heat transfer. He has also
can be studied. The modified cooling system looks to concluede that piping matereial like MS or any Steel
be attention-grabbing system for rainy climate and material gave good performance in result. But PVC
awaits additional any investigation. The temperature material only saved cost of Material of Pipe. Thermal
of soil at completely different depth may be obtained conductivites of Both Pipe material like steel and PVC
during the bottom cooling as condenser. The impacted on COP of EAHE. The cooling capacity
experiment on different types of soil within the pit was calculted 456KWH for particular experimental
and compared with this result obtained and that soil work. He has suggested that for economical set up,
offer higher results. length of pipe and larger diameter shoul be kept in
experimental work. Bassed on Cooling and heating
21. Sansui et al. he has suggested soil material and pipe
capacity calculted
material are very useful for peromance of EAHE.
As well as during simulation of EAHE, he has found
different soil temperature at 5meter depth or below
ground level. He has done his research work in Islamic
university in Asian contion. Also, he has experienced
that soil having grasss coated. The soil is sandy type.
Pipe material might not be affetct the performace of
EAHE. As well as, tyeps of EAHE also not supported
pareamter for COP EAHE. The air velocity slightly
affect the COP of EAHE.
25. D. Bastien and A.K. Athienitis investigated that a water and outlet was fashioned using PVC pipes and
simple transient model that may predict the bricks. Results show the utmost wetness recorded
temperature and ventilation requirements for a home- was ninety eight. Irrespective of the water
scale greenhouse was developed. A lively system temperature, outlet temperature vary between 25-
consisting of buried pipes within the soil beneath the 26°C. Results also show variation of outlet temperature
greenhouse was confirmed to expeditiously lower with air flow rate. it had been seen that mistreatment
temperature fluctuations within the cold greenhouse of bamboo with hydra kind plaster within the tunnel,
from 1°-26°C to 3°C-24°C. Reducing temperature reduces the outlet temperature by 10-15°C which
fluctuation even additional would be extremely helpful. reduces the electricity consumption. Thus, this sort
To attain this, future work on optimisation of thermal of tunnel configuration is incredibly effective for
storage and pipe characteristics are going to be agricultural and residential buildings. EAHE provides
carried out. Condensation in pipes throughout the day recent air ventilation and is other than atmosphere. It
was found to be negligible within the tested conditions. conjointly reduces the CO2 emission that helps in
Changes within the active system characteristics and atmosphere management.
in greenhouse operation conditions are going to be
thought-about to attain important condensation in pipes III. CONCLUSION
so as to reduce ventilation necessities. The From above literatures, following conclusions are
requirement for a back-up heat for cloudy days made observed
of a device that may heat the soil beds from the
thermal storage of the Alston vale House are going 1. At a depth of concerning 1.5 to a pair of m the
to be evaluated temperature of ground remains nearly constant. This
constant temperature is termed earth's undisturbed
26. Khandelwal et al. he had selected Jaipur city for temperature. The earth's undisturbed temperature
Experimental set up of EAHE. He has developed remains invariably over that of close air temperature
experimental set up in MNIT. In MNIT, he had used in winter and the other way around in summer.
library for his research work or EAHE experimental
work. There were 4 rooms in MNIT, Jaipur city. The 2. Finally, different materials offer a variety of thermal
library cliamte condition also affect thermal conductivity, which is vital to the conductive heat
peroformance of EAHE. Because library had split transfer process to or from the ground via the pipe.
Air condtioning system. He had calculalted heating This factor is also controlled by the designer along
and cooling load for library rooms. He had used long with the pipe boundary shape. The chosen material
72m pipe with steel material. He had calculated must be compatible with the process fluids, and it
coolind load 72kw as well as ventilation.. during must have a low resistance to heat flow so that it
experimental work, it was experienced that 11.5°C does not become the overriding factor in the
temperature drop. Evenalso another found that conductive heat transfer process.
confort temperature was 26.7°C to 28.6°C for library.
ACKNOWLEDGMENT (HEADING 5)
27. Choudhury et al. investigated Associate in Nursing
experimental study of EAHE style mistreatment low
I must thankful to Dr. Nirav P. Maniar and Dr.
price material like Bamboos and hydra kind to cut Rupesh V. Ramani for provide technical support in
back energy consumption. Associate in Nursing open selection of best 27 review papers for paper. I am also
loop EAHE system was accustomed predict the thankful to Dr. Jiten J. Makadia sir helped in
potential of EAHE. The experiment was conducted reviewpaper.
in Arunachal Pradesh. The study principally focuses
on the employment of domestically accessible
materials. Out of all domestically accessible materials
bamboo was selected for the pipe material. The
thermal conductivity of bamboo was inflated by
mistreatment hydra kind plaster. PVC pipes were
used to install sensors for the live of gradient. The
[4] Sharan G., and Jadhav, R (2003). "Performance of Single Pass [19] Singh SP (1994) Optimization of earth-air tunnel system for
Earth Tube Heat Exchanger: An Experimental Study." Journal of space cooling. Energy Convers Manag 35(8):721-725
Agricultural Engineering, 40:1, (2003), 1-8. [20] Sujata Nayak, G.N. Tiwari, Energy metrics of photovoltaic/
[5] Arvind Chel, G.N.Tiwari, "Performance evaluation and life cycle thermal and earthair heat exchanger integrated greenhouse for
cost analysis of earth to air heat exchanger integrated with adobe different climatic conditions ofIndia, Applied Energy 87 (2010)
building for New Delhi composite climate" Energy and Buildings 2984-2993.
41 (2009) 56-66. [21] Bojic M., Papadatris G. "Kyritsis S. Energy from a two-pipe,
[6] Jens Pfafferott, "Evaluation of earth-to-air heat exchangers with earth-to-air heat exchanger." Energy 24 (1999): 519-523
a standardised method to calculate energy efficiency", Energy [22] Spengler R W and Stombaugh D P (1983), "Optimization of
and Buildings 35 (2003) 971-983. Earth-Tube Heat Exchanger for Winter Ventilation of Swine
[7] Anil Kumar, Prashant Baredar, "Experimental and analytical Housing", pp. 1186-1193, Trans. ASAE.
studies of earth-air heat exchanger (EAHE) systems in India: A [23] SodhaMS, SharmaAK, SinghSP, BansalNK, Kumar A .Evaluation
review",Renewable and Sustainable Energy Reviews 19 (2013) of an earth- air-tunnel system for cooling/heating of a hospital
238-246. complex. Building and Environment 1984;20(2):115-22.
[8] Miroslaw Zukowski, "Assessment of the cooling potential of an [24] H., Wang S., Zhu D. "Modeling and evaluation of cooling capacity
earth-tube heat exchanger in residential buildings" Building and of earth-air-pipe systems." Energy Conversion and Management
Environment, (2011) 41: 235-244. 48 (2007): 1462-147.
[9] Rohit Misra, Vikas Bansal, Ghanshyam Das Agrawal, Jyotirmay [25] Bhutta Muhammad Mahmood Aslam, Nasir Hayat, Bashir
Mathur, Tarun K. Aseri. "CFD analysis based parametric study Muhammad Hassan, Khan Ahmer Rais, Ahmad Kanwar Naveed,
of derating factor for Earth Air Tunnel Heat Exchanger." Applied Khan Sarfaraz. "CFD applications in various heat exchangers
Energy 103 (2013): 266-277. design: A review." Applied Thermal Engineering 32 (2012): 1-12.
[10] L. Chandra, "A Stepwise Modeling Approach for Designing an [26] A. Chel, J.K. Nayak, G. Kaushik, Energy conservation in honey
Earth-Air Heat Exchanger in Jodhpur Region of Rajasthane", storage building
School of Mechanical Engineering, 2202-2209 (2014).
Using Trombe wall, Energy and Building 40 (2008) 1643-1650.
[11] Manojkumar Dubey "Earth Air Heat Exchanger in Parallel
Connection", International Journal of Engineering Trends and [27] Kumar R, Kaushik SC, Garg SN (2006) Heating and cooling
Technology (2013) 2463-2467. potential of an earth-to-air heat exchanger using artificial neural
network. Renew Energy 31(80):1139-1155.
[12] Upamanyu Bangale, "Heat transfer analysis of cold storage"
International Journal of Advances in Engineering & Technology [28] Bhardwaj SS, Bansal NK (1981) Temperature distribution inside
(2014) 889-886. ground for various surface conditions. Build Environ 10(3):183-
192.
[13] Thomas Woodson "Earth-Air Heat Exchangers for Passive Air
Conditioning: Case Study Burkina Faso", Journal of Construction [29] Bisoniya TS, Kumar A, Baredar P (2015) Energy metrics of
in Developing Countries, 17(1) 2012, 21-32, 2012. earth-air heat exchanger system for hot and dry climatic conditions
of India. Energy and Buildings 86:214-221.
[14] Raluca Teodosiu, "Utilization of Earth-air heat exchangers in
Energy and pollution savings for Romanian dwellings", Recent
Advances in Engineering (2011) 163-168.
and CO2 (25-50%) and other gases like H2O (1-5%), A. Benefits of Biogas
H2S (0-0.5%), N2 (0-5%) and NH3 (0-0.05%) that • Biogas systems produce clean energy for household
are produced when the waste is fermented in the use. After an initial investment on biogas plant there
absence of the oxygen. The biomass slurry that remains is no need to spend more money on fuel and no more
in the digester after the complete fermentation process, smoke and pollution produce from wood or charcoal.
which is rich in macro and micronutrients, can be used
• Biogas makes cooking quicker and easier than
as an organic fertilizer in agricultural field. cooking with firewood.
In 1859, the first biogas digestion plant was built at • A farm with a biogas system is a cleaner and safer
a leper colony in Bombay, India [2]. Anaerobic place, it kills the bacteria in livestock manure.
digestion (AD) reached England in 1895 when biogas
was recovered from a "carefully designed" sewage • Biogas system produces excellent and safe fertilizers
for the agriculture purpose.
treatment facility and used to fuel street lamps in Exeter
[3]. The development of microbiology as a science led • Biogas systems can play major role against global
to research by Buswell and others in the 1930s to warming by allowing to burn methane from organic
identify anaerobic bacteria and the conditions that waste, instead of letting it escape into the atmosphere
promote methane production [4]. Since then, the where it adds to the greenhouse effect.
process was applied and developed for sewage B. Biogas Digester
treatment. In the early 1970s the energy crisis prompted
Biogas produce by decomposition of organic waste
interest in renewable energy and raised awareness about
in a biogas digester. The size of a digester can vary
alternatives of energy sources such as biogas from AD.
according to its application and capacity from a small
The interest in biogas production received more traction
household system to a large commercial plant having
with the confirmation of the scarcity of fossil fuels along
thousands cubic meters. Farmers mostly use cow dung
with the need for finding sustainable and environmentally
as a feedstock to feed into digester. Two simple biogas
friendly methods of recycling and treating human, animal,
digester designs have been developed, the fixed dome
and organic waste.
type digester and the floating dome digester. The
There are over 35 million biogas plant installations digestion process is same in both digesters but the gas
worldwide, widely spread in Europe and North collection method is different. In the floating type dome,
America; however, these installations are plant-based, the water sealed cover is provided in the digester in
while India and China focus on household biogas order to stop the gas leakage when the floating dome
production [5]. The anaerobic digestion now is using rises as gas is produced and acts as a storage chamber,
globally as a wastewater treatment method for methane whereas the fixed dome type has a lower gas storage
production with livestock manures. But several factors capacity and requires good sealing in order to prevent
affect the anaerobic digestion process; temperature, pH gas leakage when the high pressure developed by gas
value, carbon nitrogen ratio, pressure and different in the digester. Both the digesters have been designed
feedstock will degrade at different rates and produce for use with animal waste, food waste and plant waste.
different amounts of methane. Through co-digestion The biomass is fed into the digester via the inlet pipe
schemes the different wastes with wastewaters can be and undergoes fermentation process under anaerobic
mixed together and treated, the mixing process of condition in the digestion chamber. The temperature is
different substrates improves the methane production quite important factor in digestion process because
and reduces the life cycle costs. A biogas digester is an bacteria do their work best at temperatures between
airtight enclosed container that facilitates anaerobic 30- 60oC. It takes from 2 to 8 weeks to digest the
digestion process of biodegradable waste such as animal biomass, depending on the temperature. The extra slurry
manure and domestic wastes. or decomposed slurry is removed at the outlet for use
as a fertilizer.
Due to lack of space in the home for biogas digester, • Feeding rate
the portable biogas digester can be installed into the Optimum feed rate should be maintained in the
building or building rooftop. The size of digester will digester. At higher feeding rate the retention period of
depend on how much biogas needed to meet daily biomass will be less and undigested Slurry may come
cooking (and lighting) requirements, the availability and out.
amount of biomass and water available on place.
Portable biogas digesters are built using FRP (Fiber • Carbon to nitrogen ratio
reinforced plastic) and it can be fixed in a small area. The optimum C/N ratio is 30:1 for maximum
Water jacket models prevent biogas from leakage are microbiological activity.
most efficient among different designs. Portable biogas
• Seeding
plants having two portions, one is the digester where
fermentation process occurs and another portion where In order to accelerate the fermentation process, a
biogas is collected and stored. Both the portions are small amount of digested slurry containing a methane
separated using water jacket, which is also acting as forming bacteria is added to the freshly charged slurry.
safety relief when excess gas is produced. As the regular This process is known as seeding. Seeding helps to
supply of water is essential for operation, the rainwater start and accelerate the digestion process.
harvesting could help for the biogas plant. • Mixing or stirring
C. Operational Parameters Mixing of slurry get uniformity in substrate
Operation of a biogas plant is affected by the concentration and temperature, prevents the deposition
following factors: of solids at the bottom and break down the scum layer.
• Temperature II. MATERIALS AND METHODS
The methane forming bacteria works best in A. Source of Feedstock
temperature ranges 20-60oC. Digestion at higher
Cow dung is solely used as the prime source for
temperature proceeds more rapidly than at lower
biogas production. Cow dung generate from 3-5 cattle/
temperature. The gas production decreases sharply
day can run a simple 8-10 m3 biogas plant which is
below 20oC and almost stops at 10oC
able to produce 1.5-2 m3 biogas per day which is
• Pressure sufficient for the family 6-8 persons, can cook meal for
The minimum pressure in the digester should be 6- 2 or 3 times or may light two lamps for 3 hrs or run a
10cm of water column i.e., 1.2 bar which is ideal for refrigerator for all day and can also operate a 3-KW
proper functioning. It should never be allowed to exceed motor generator for 1 hr [6]. In this paper cow dung
40-50 cm of water column. Excess pressure inhibits has been taken for studies. Food waste can also be
release of gas from slurry and leakage in masonry. used in the digester which includes vegetables, fruits
and other items. The treatment process of food waste
• Solid to moisture ratio in the biomass products gives hazardous waste. The usage of chemicals
The water and solid mass should be in equal is one of the main reasons for this.
proportion. If water content is too high in the slurry, the
B. Sample Collection
gas production will drop. If water content is too low,
acids will form and it hinder the fermentation process. A sample of 200 kg cow dung has been taken for
biogas production and equal proportion of water which
• pH value
mix together in the digester and forms semi solid state
During methane forming stage, pH value 6.5 to 7.5 called slurry. The slurry formation is shown in fig.1.
should be maintained. In the acid forming stage, pH
value may be around 6 or less.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 741
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Cow dung is not a waste product but do purify all E. Reactor Operation
the waste present in the nature [7]. The study was
The cow dung slurry was fed to the reactor from
conducted on a cow dung sample collected from dairy
the inlet with the help of funnel and the floating drum
farm. The waste was mixed with equal quantity of tap
was placed in the digester. Before keeping the floating
water approximately 200L to form slurry.
drum in the digester the gas valve was opened in order
D. Experimental Setup to allow the air come out from the gas chamber. To
make the fermentation process fast, the place was
A completely recycled anaerobic reactor made from
selected so that the sun radiation can fall directly on the
two polyethylene water tank (used for drinking water
digester. The fermentation process under anaerobic
storage). The floating type gas reactor consists of a
condition produced biogas which was collected in the
water tank as a digester having capacity 400L and
gas chamber.
another water tank for gas storage having capacity 250L
as shown in fig.2. As the gas produces in the digester
and collected in the another tank which act as floating
dome, raises up due to pressure created by biogas.
This digestion system for AD of cow dung consists of
with arrangement for feed, recirculation is made by 400L
container, biogas collection and measurement by using
250L container, 90mm T joint, 90mm male adapter,
90mm cap, 90mm PVC pipe, Elbow 63mm, 63mm
male adapter 2, 63mm check nut, 63mm PVC pipe,
12.5mm male adapter, 12.5 galvanized elbow, PVC
adhesive seal, 50mm Ball valve, 63,50 and 12.5mm
barrel piece, Funnel and Teflon tape.
III. EXPERIMENTAL RESULT It can be seen from the graph, the gas production
TABLE I BIOGAS PRODUCTION IN LITRE AND PH VALUE increases first up to day 10 days rapidly but then it
OF SLURRY starts slowing down the production rate as acid
Date No. of Gas pH valu e concentration increases in the digester and pH decreases
Day Production below 7 after 17- 19 days. Water was added to dilute
(Litre)
4th Feb 1 0 7.25 which increases the pH, gas production again starts
5th Feb 2 0 7.24 increasing. Therefore, it can be concluded that acid
6th Feb 3 8 7.22 concentration greatly affects the biogas production.
7th Feb 4 16 7.20
8th Feb 5 24 7.15 During the experiment the climate change was affected
9th Feb 6 33 7.10 the biogas production.
10th Feb 7 46 7.08
11th Feb 8 54 7.05 pH value
12th Feb 9 71 7.08 7.4
13th Feb 10 75 7.11 7.2
14th Feb 11 84 7.15
15th Feb 12 87 7.12 7
16th Feb 13 96 7.10 6.8
17th Feb 14 104 7.05
18th Feb 15 112 7.02
6.6
19th Feb 16 129 7.01 6.4 pH value
20th Feb 17 142 7.00
6.2
21st Feb 18 146 7.00
22nd Feb 19 150 6.98 1 3 5 7 9 11131517192123252729
23rd Feb 20 151 6.93
24th Feb 21 163 6.91 No. of Days
25th Feb 22 165 6.90 Fig. 4 pH value V/s day
26th Feb 23 175 6.86
27th Feb 24 188 6.82
The pH values of the slurry before during and after
28th Feb 25 196 6.79 digestion were determined with a digital pH meter. The
29th Feb 26 200 6.71 graph shows that first the pH value is on higher side i.e.
1st March 27 210 6.70 nearly 7 under this pH increased gas production was
2nd March 28 214 6.65
3rd M arch 29 222 6.60 observed. As reaction inside the digester continues, it
stars decreasing and after day 19 it becomes acidic.
From the above result shown in table1 it has been
Water added to dilute and thus pH increases.
seen that the biogas production increases as days passes
but pH value of slurry reduces as the process going on IV. CONCLUSION
as the bacteria produces fatty acids. It has been After the thorough study on the performance of
observed that 60 to 70% of gas production takes place biogas digester and evolution of acidogenic reactor, the
in the range of 7.2 to 6.8. If the pH value decreases following collusion has been reached. As a result of the
below 5 the acid formation starts which slow down the treatment of cow dung under anaerobic digestion, the
gas production rate. useful bi product, bio-gas has been produced with a
Gas Production ( Litre) considerable rate of decrease in the values of pH, acidity
250
and alkalinity. Through the successful anaerobic
200
150 processing of cow dung inside the reactor, methanogen
100 gradually converts the organic acids into the methane
50 Gas Production ( Litre)
0
gas and carbon dioxide, which indicates that the waste
1 4 7 10 13 16 19 22 25 28 has better anaerobic biodegradability. Thus achieves a
No. of Days
waste of resource utilization. The results show that
reactor can treat animal waste with high contaminated
Fig. 3Gas Production V/s day
load.
REFERENCES [9] Bodkhe S.Y. and Vaidya A.N. 'Complete recycle bioreactor for
anaerobic digestion of organic substrates: Food waste' Research
[1] United Nations Development Programme. The Sustainable Journal of Chemistry and Environment Vol.16 (2) June (2012)
Development Goals Report 2018; United Nations: New York,
NY, USA, 2018. [10]Brown RC (ed) (2003) Biorenewable resources-engineering new
products from agriculture. Lowa state press, London
[2] Meynell, P-J. (1976). Methane: Planning a Digester. New York:
Schocken Books. pp. 3. [11]QingXian, X., XueFang, G., BiFen, L., Lei, Q., & Bin, L 2014
Comparison on biogas production of different biogas digesters
[3] McCabe, J; Eckenfelder, W. eds. (1957). Biological Treatment Acta Agriculturae Zhejiangensis, 26(1), 194-199.
ofSewage and Industrial Wastes. Two volumes. New York:
Reinbold Publishing. [12]Mansur, A., Taufik, A., & Janari, D 2015 Design of Portable
Digester for Domestic and Restaurant Organic Solid Waste
[4] Buswell, A.M.; Hatfield, W.D. (1936). Bulletin 32, Anaerobic Processing as Clean Biogas In Replacing LPG as Alternative
Fermentations. Urbana, IL: State of Illinois Department of Energy Source. Prociding International Conference on Information
Registration and Education. Technology and Engineering Application, 4 (133-138)
[5] Kemausuor, F.; Adaramola, M.; Morken, J.; Kemausuor, F.; [13]Sodha M.S., Ram S., Bansal N.K. and Bansal P.K., 1987. Effect
Adaramola, M.S.; Morken, J. A Review of Commercial Biogas of PVC greenhouse in increasing the biogas production in
Systems and Lessons for Africa.,Energies 2018, 11, 2984 temperature cold climate conditions. Energy Conversion and
[6] Werner U, Stöhr U, Hees N (1989) Biogas plants in animal Management, 27(1): 83-90
husbandry. Deutsches Zentrum für Entwicklungstechnologien- [14]M. Kaoma, Potential Greenhouse Gas Emissions Reduction
GATE. through Production and Utilization of Biogas from Pig Manure -
[7] Randhawa, G. K. & Kullar, J. S. Bioremediation of Case Study for Zambia, A dissertation, Agricultural Engineering,
pharmaceuticals, pesticides, and petrochemicals with gomeya/ School of Engineering, University of Zambia, Lusaka, 2013.
cow dung. ISRN Pharmacol. 7 (2011) [15]Beenu and S. Sodhi, "Generation of Biogas energy and its uses",
[8] Deublein, D.; Steinhauser, A. Biogas fromWaste and Renewable International Journal for Research in Applied Science &
Resources: An Introduction, 2nd ed.; WILEY-VCH: Deggendorf, Engineering Technology (IJRASET), Volume 4 Issue VIII, August
Germany, 2010; ISBN 9783527327980. 2016.
Abstract: We are living in a world where rain, tides, and geothermal heat, which are renewable.
almost 80% of energy in demand is supplied by An Underwater windmill like a device that extracts
sources such as natural gas, coal or oil, which are power from the tides. Tidal stream turbines are
quickly waning. International treaties for the described as underwater windmills. This technology is
climate control have boosted the research in the
similar to wind energy technology, with the rotor blades
field of Renewable energy from oceans. Ocean has
driven not by wind power but by tidal currents. They
different currents at different depths. Windmills are
usually used to extract power from wind energy. are driven by the kinetic energy of moving water as
Underwater windmills are used to extract energy same as the way that wind turbines rotate by moving
from the water flow of oceans. Underwater water. The generator is placed into a marine current
windmills can also be called as Tidal stream that typically results when water being moved by tidal
turbines. Tides are used to throw water against forces. Tidal stream turbine can majorly help in
slanting blades and make them spin. This, source production the energy.
of energy will prove to be highly efficient with high
energy density, provided economical and technical MAIN PARTS OF UNDER WATER
problems are solved. Tidal stream turbines play a WINDMILL:
major role in generation of energy by renewable 1. Turbines
sources. They are driven by the kinetic energy of
moving water; the generator is placed in moving 2. Gear box
water that typically result when water being flowing
3. Generator
underwater currents around the world to make this
form of marine renewable energy worth pursuing. 4. Cables
Protection of sea life is also important. Due to the
5. Support
considerable amount of solid over air underwater
windmill has slow rotation.
Keywords: Renewable energy, underwater
windmill, turbine, power.
INTRODUCTION:
Renewable energy sources have major role in
decreasing of emissions of the carbon dioxide (CO2)
into atmosphere. Renewable energy technologies are
becoming an increasingly favourable alternative to
conventional energy sources to assuage fossil fuel
related issues. Renewable energy is energy which
comes from natural resources such as sunlight, wind,
BLOCK DIAGRAM:
way that windmill rotors are driven by the wind, the VERTICAL AXIS TURBINE:
main difference being that water is more than 800 times Unlike with horizontal turbines, the shaft that the
as dense as air, so quite slow velocities in water will blades are connected to is positioned vertical to the
generate significant amounts of power. The energy ground. In this type, all the main components are located
generated, being derived from tides has the added close to the ground - in fact, the wind turbine itself is
significant advantage of being predictable. near the ground. This type is easy to maintain, does not
TYPES OF UNDER WATER WINDMILL: incur high construction and transportation costs, and
does not have to face the wind.
ADVANTAGES: REFERENCES:
• There are no fuel costs. 1. Ganesh Fodase, Assistant Professor, Mechanical Engineering,
2. Pimpri-Chinchwad college of Engineering and Research, Ravet,
• The initial construction costs are high; but the overall Pune.
maintenance is affordable. Other than renewable
3. Andreas Uihlein and Davide Magagna, Wave and tidal current
resources such as wind power, the ebb and flow of energy- A review of the current state of research beyond
the ocean tides are entirely predictable and consistent technology (2016).
and aren't affected by outside forces such as the
4. Prandle D, Simple theory for designing tidal power schemes,
weather. Advances in Water Resources, 1984.
• Tidal energy produces no emissions. 5. MERLIN SUBHA.G, ASSISTANT PROFESSOR(GRADE1),
DEPARTMENT OF ELECTRICAL ENGINEERING,
• Hidden directly underneath the water. PANIMALAR COLLEGE OF ENGINEERING,
POONAMALEE, CHENNAI.
• Tidal energy independent on oil reserves from other
countries. 6. http://www.ecopedia.com/energy/how-do-underwater-turbines-
work/
• Reduce the depends upon fossil fuel. 7. https://electricalacademia.com/renewable-energy/horizontal-axis-
wind-turbine-hawt-working-principle-single-blade-two-blade-
DISADVANTAGES: three-blade-wind-turbine/
• Off shore turbine expense more than wind turbine. 8. Rakesh Patel, A review on underwater Windmill, International
Journal for technical education and research innovations.
• Due to underwater function, it expenses more.
• Because of salt content, there will be corrosion to
steel.
• Fishing has to be restricted in the areas of the power
plant.
• Damages habitat up to 500km away.
• Construction under water is difficult.
• Noise abatement.
CONCLUSION:
The importance of renewable energy is essential
nowadays. More and more people have recognized
the importance of the renewable energy, the vast coastal
and offshore areas contributes one of renewable
resources, i.e. the tidal stream energy, to the entire
energy consumption. In the underwater windmill, the
upcoming projects are under construction due to its
predictability of generating power. Tides play a very
important role in the formation of global climate as well
as the ecosystems for ocean habitants.
Figure1.Acaciatree
2.2 Oil Production by Solvent Extraction used for esterification was 9:1. Sulphuric acid was used
Method as catalyst at 1 % w/w of oil. Sulphuric acid has been
Oil has been extracted from Acacia seeds through slowly added to the methanol and mixed well. Then the
solvent extraction process. The apparatus consisted of mixture has been added to the preheated oil. The
a heating mantle which could hold a round bottomed esterification has been carried out for about 2 hours.
flask of 2 L capacity (see Fig 4). Soxhlet extraction The reactant mixture has been allowed to stand in a
chamber has been attached on top of the flask and on separating funnel for 24 hours. The oil layer that got
top of the extraction chamber a condenser has been settled at the bottom has been separated and used for
fitted. 0.5 Kg of seed powder has been used for the trans-esterification.
extraction each time. The seeds were finely powdered Transesterification reaction has been carried out in
by a dry grinder and added to the extraction chamber. a similar experimental set up (see Figure 5). The trans-
An hydrous n-Hexane (organic solvent) has been added esterification parameters such as Methanol to oil ratio,
to the flask and the temperature of the flask has been reaction temperature and speed of the stirrer have been
maintained at 50oC using a temperature controller maintained as constant for all experiments at 6:1, 60oC
mechanism. At this temperature, the hexane gets and 600 rpm respectively. The concentration of catalyst
vaporized and reaches the condenser where it gets (potassium hydroxide) and reaction time have been
condensed and trickles in to the extraction chamber. varied from 0.5 % to 2% and 0.5 hr to 2 hrs respectively
The powdered seeds percolate in n-Hexane solvent the biodiesel yield has been measured and compared.
there by the oil content from the seeds gets dissolved in Optimum catalyst concentration & reaction time for
to the solvent. The extraction chamber has been maximum biodiesel yield is 1% w/w and 1 hour.
designed in such a way that when the solvent reaches a Maximum Biodiesel Yield in two stage process is 87%
certain level, it overflows and trickles back in to the
flask. This process has been repeated till most of the
oil from the seeds powder is extracted by the solvent.
Then, distillation has been carried out to separate oil
from n-Hexane. The oil thus produced has been filtered
using filter paper. Then degumming process has been
carried out in a centrifuge with water to remove water
soluble phospholipids. The degummed oil has been then
treated with sodium sulphate to remove any traces of
moisture remain in oil. The oil yield in this extraction
process was about 18.8% by weight concentration
2.3 Transesterification of Acacia seed oil
Preparation of biodiesel from acacia seed oil by
Transesterification, it is a process of using methanol
(CH3OH) in the presence of catalyst Potassium
hydroxide (KOH) to chemically brake there molecule
of raw oil into ester and glycerol. This process is a
reaction of the oil with an alcohol to remove the glycerin,
a byproduct of biodiesel production.
Due to Higher Fatty Acid, two stage Trans-
esterification Method is used in extraction Process. The
Figure 4. Soxhlet apparatus used for Solvent Extraction
oil is preheated up to 500C, Methanol to oil molar ratio Method
2.4 Determination of Characterization of Acacia The calorific value for petroleum diesel is 45.4MJ
Biodiesel kg-1 whereas for the seed oil of Acacia extracted is
The oil obtained using the non-polar organic solvents 35.70 MJ kg-1. This low energy content is due to the
(n-Hexane) from the seeds of Acacia was used for the presence of chemically bound oxygen in the fatty acid
determination of physico-chemical properties, which is chains. The viscosity is an important physical property
important from biodiesel aspect. Some properties of of a liquid fuel, the kinematic viscosity values for the
oil were determined and are shown in Table- 2. In our acacia seed oil recorded at 40°C in our experiment is
experiments, we recorded the density to be 0.886 gm/ 4.15 cst was in the range recommended by ASTM.
ml at 30°C for n-Hexane extracted seed oil of acacia. From Literature it is reported that the ASTM standard
The density of the seed oil is similar to those of the for biodiesel viscosity is 1.9-6.0 cst at 40°C. The other
other vegetable oil, it is higher than the acceptable ranges important Physical Properties are Flash & Fire Point
of petroleum diesel (0.820-0.845 gm/ml) as per the which is done on Closed cup apparatus. The experiment
current ASTM requirement. Biodiesel is considerably is done by PMCC and result Flash & Fire Point was
more susceptible to autoxidation than petroleum diesel noted as 80oC & 90oC. From this results it is clear that
and autoxidation is a serious threat to biodiesel fuel not much difference lies in the physico-chemical
quality. Thus, oil obtained from the seed of acacia was properties of acacia seed oil as shown in table 3,
characterized by lower contents of unsaturated fatty extracted using n-Hexane compared ASTM Standards..
than other vegetable oils, where affects directly the Table-3 Comparsion of Physico-Chemical Properties of Acacia
Biodiesel
oxidation stability of the biodiesel from which it was
S.No Property Value ASTM criteria
produced. This low degree of unsaturation is expressed Standards
o
by the iodine value obtained for the biodiesel produced 1 Density@30 C (gm/ml) 0.886 0.860- Satisfied
0.890
124.48, which it is in agreement with IS: 548 (PART- 2 Kinematic Viscosity @ 40oC 4.15 1.9-6.1 Satisfied
1) 1964 (Reaffirmed 2010) standard. This result (cst)
3 Flash Point (oC) 80 50-90 Very
indicated that such a biodiesel can present a suitable Close
4 Fire Point (oC) 90 100-110 Very
chemical stability against oxidation. Close
Table-2 Physico-Chemical Properties of Acacia Biodiesel 7 Acid Value (mm KOH/gm) 0.11 0.5 max Satisfied
9 Sulphur (%) 0.08 10 max Satisfied
S.No Property Value Method 10 Gross Calorific Value 8534 8500-8700 Satisfied
1 Density@30o C 0.886 I.S.1448 (Kcals/Kg)
(gm/ml) (PART 32)
2 Kinematic 4.15 I.S.1448 3. CONCLUSIONS
Viscosity @ 40 oC (PART 25)
(cst) From the seeds of the acacia tree, Oil was obtained
3 Flash Point (oC) 80 I.S.1448
(PART 21) with 10.8% yield by using solvent extraction process.
4 Fire Point (oC) 90 I.S.1448 A biodiesel was formed by Transesterification of the
(PART 21)
5 Cetane Index 44.60 ASTM D 976-
crude oil by using conventional catalyst KOH and
91 methanol. Based on the results obtained in this study
6 Carbon Residue 0.57 I.S.1448 regarding the characterization of crude oil for various
(%) (PART 122)
7 Acid Value (mm 0.11 I.S.1448 physico-chemical properties demonstrated that, almost
KOH/gm) (PART 2) all the important properties of seed oil from Acacia
8 Iodine 124.48 IS:548
(PART-1)- methyl esters are in agreement with the biodiesel making
1964 it a potential candidate to be an alternative economical
(Reaffirmed
2010) bio fuel, in view to limited supply of natural fossil fuel.
9 Sulphur (%) 0.08 I.S.1448
(PART 33)
10 Gross Calorific 8534 I.S.1448
Value (Kcals/Kg) (PART 6)
13.M.Mittelbach & P.Tritthard' "Diesel fuel derived from vegetable 25. J.M. Babu, M.S.Sikarwar, M.S. & R.Velu, "Experimental
oils, III. Emission tests Using methyl esters of used frying oil", investigation on the effect of diesel engine performance when
Journal of the American Oil Chemists' Society, volume 65, 1185- operated with palm Munja biodiesel", International Journal of
11,1988. Mechanical and Production Engineering Research and
Development, Special Issue,PP 213- 220, 2018.
Abstract: Reduction of energy consumption is countries, the performance of the air condenser drops
a major concern in the vapor compression down and the air conditioner works improperly since
refrigeration cycle especially in the area with very the temperature and the pressure of thecondenser
hot weather conditions (about 50°C), where increase and the compressor is forced to workunder
window-air-conditioners are usually used to cool
the greater pressure ratio, which results in more power
homes In this weather condition performance of
consumption.
air condenser window-air-conditioners decrease
sharply and electrical power consumption increase Another problem which was reported with
considerably. These problems have activated the application of air condenser in hot weather area is related
research programs in order to improve the to the highstories buildings. In these buildings the hot
performance of window-air-conditioners by air from air conditioners of lower stories rise up and
enhancing heat transfer rate in the condenser. In provide a hot flow field around the air conditioners of
this article, a new design with high
higher stories as shown in Fig.1. Sometimes, the increase
commercialization potential for incorporating of
evaporative cooling in the condenser of window- in the air temperature isso high that the air conditioner
air-conditioner is introduced and experimentally trip down. In order to prevent this problem the hot air
investigated. A real air conditioner is used to test is required to be cool down before passing over the
the innovation by putting two cooling pads in both condenser.
sides of the air conditioner and injecting water on It is generally believed that the coe?cient of
them in order to coold own the air before it passing
performance (COP) of an air conditioner decreases
over the condenser. The experimental results show
that thermodynamic characteristics of new system
about 2-4%by increasing each °C in condenser
are considerably improved and power consumption temperature [1]. So the COP of an air conditioner
decreases by about 16% and the coefficient of could dropdown as much as 40% in hot weather
performance increases by about 55%. condition. This large reduction of COP means more
electric power consumption for air conditioners in
Keywords:Window-air-conditioner; Evaporative
cooling; Coefficient of performance; Water
summer when the demand for electric power is already
injection; Energy reduction high and the increase in power consumption of air
conditioners create more pressure on the power
1. INTRODUCTION network which is not desirable. Therefore, it is very
Air condenser is generally used in small size important to decrease the power consumption of air
residential air conditioners like window or split type, conditioners in very Different designs for applying
for heat rejection process in the cycle. The reason is to evaporative cooling in an existing residential air
make the system assimple as possible without any need conditioner could be introduced. Concern should be
to the water connection line and other equipment. This taken to employ a design with best performance and
idea seems reasonable as far as the air temperature in minimum side effects. There are two methodsfor
summer is moderate andnot too high (about 40 °C). evaporative cooling in condensers namely direct and
But when the air temperature increase and approach indirect method. Indirect method water is directly
50 °C or higher, as it happens inmany Middle East injected on the condenser and provides cooling effect.
This method hot ambient temperature. To do this, it is They reported theelectric energy saving of 20% for the
required to decrease the temperature of the ambient retrofitted systemwhen ambient air temperature was
air before it passes over the condenser coil, in order to 34°C. Hajidavalloo[5] investigated the effect of
decrease temperature and pressure of the condenser. evaporative cooling of window-air-conditioner by
The simple and cheapest way for cooling the ambient injecting water directly on the condenser and reported
air temperature is employing the evaporative cooling 10% reduction in power consumption. Although the
system. problem in air conditioner performance in very hot
weather condition have been reported for long time but
there is little work to address the problem and offer
appropriate solution. There are many questions about
the ways of applying evaporative cooling in the system
and also the amount of expected improvement in COP
after retrofitting especially in very hot weather condition.
In order to specify the best arrangement and optimum
design of evaporative cooling in the residential air
conditioner, much works are required. In this work an
experimental investigation was performed to evaluate
the application of media pad evaporative cooling system
in a 1.5-ton window-air-conditioning system in very
hot weather condition.
2. SYSTEM DESIGN AND
EXPERIMENTAL SET-UP
Has many side effects including mineral deposits and
corrosion of the condenser coils. Therefore, this method
hasrarely been used in residential air conditioners. In
the indirect method water is injected on the evaporative
media padwhich is located in the way of air over the
condenser and provides cooling effect by evaporation
of water. Media pads are cellulose bound cardboard
structures which are cross-fluted to increase the contact
This could result insignificant energy and demand area between air and water. The average life expecting
savings overall since there are millions o fair of the media pad evaporative cooler is of the order of
conditioners in the residential sector and any small five years. With clean waterit may last up to 10 years
reduction in power consumption of an air conditioner [6]. The place where the media pad should be installed
could save huge amount of megawatt in the network. is an important aspect of the design. The media pad
Although the application of evaporative cooling in large should be placed where it gives the best cooling
industrial refrigeration systems were investigated[2,3], performance and also takes minimum space from air
but there is little work to investigate the application of conditioner. Since the window-air-conditioners are
evaporative cooling on small size refrigeration system. designed to have minimum space, therefore the limitation
Goswamiet al. [4] employed an evaporative cooling of space should be considered in the design.In this work
on existing 2.5 ton air conditioning system by using two evaporative media pads, each with 3 cm thickness
media pad. They put four media pad around condenser were installed in both sides of air conditioner togive the
and inject water from the top by a small water pump. largest area available for cooling without increasing the
total volume of the air conditioner as shown in Fig. 2.
P-h diagram. As shown in Table 2, the condensing The experimental results for another run (run B)
temperature reduced about 10 °C while the evaporator areshown in Table 2. In this run the pressure was not
temperature reduction is about 2.5°C which is an measured in the cycle due to two reasons. First, it was
indication of reducing the pressure ratio across the found from the previous run that there are little
compressor. Exit air temperature from condenser differences between the experimental pressure reading
reduces about 14 °C while the exit air temperature is and the one specified based on saturation temperature
almost constant. Electric power reduction in this run is reading from thermodynamic tables. Second, it was also
about 16%. Water circulation rate was about 217l/hand found that thepressure drop in condenser and
water evaporation rate was 7.5l/h. evaporator are negligible and can be ignored. Generally
measuring the pressure inthe refrigeration cycle is difficult
4. CALCULATION AND RESULTS because the refrigerantt ends to escape from the
In order to calculate the cooling capacity, refrigerant pressure gauge connections and fittings and in the
effect and COP, it is required to specify thermodynamic longterm it may leak outside. So itwas decided to
properties of refrigerant at different sections of the cycle remove the pressure gauges and specify pressure data
based on the experimental results. Tables 3 and 4 show based on the temperature reading and thermodynamic
the thermodynamic properties of refrigerant for saturation table.Fig.6 shows the results of this run on
conventional and evaporative runs respectively based P-h diagram. As shown in Table 2, the condensing.
on data from Van Wylen and Sonntag[7]. Actual power
consumption canbe obtained by using Eq.(1) since the
voltage, current and cos/ are known. Mass flow rate
can be obtained by Eq. (2). Cooling capacity and COP
can be obtained by using Eqs. (3) and (4), respectively.
In Eq.(4) subscripts (1), (2), (3) and (4) stand for exit
conditions from evaporator, compressor, condenser and
capillary tub respectively.
Qc =
B=
5. CONCLUSIONS REFERENCES
The application of evaporative cooling in the small 1. Y.A. Cengel, M.A.Boles, Thermodynamics An Engineering
Approach, thirded., McGraw-Hill, Boston, 1998.
sizerefrigeration system was emphasized for regions of
very hot weather condition. A novel design for 2. R.J.Dossat, Principal of Refrigeration, Prentice Hall, New Jersey,
1991.
employing in direct evaporative cooling system in a
3. W.K. Brown, Fundamental concepts integrating evaporative
window-air-conditioner was introduced. The potential techniques in HVAC systems, ASHRAE Transactions 96 (Part
of commercialization of thisdesign is very high and it 1) (1990)1227-1235.
could also be easily applied on existing air conditioners. 4. D.Y. Goswami, G.D. Mathur, S.M. Kulkarni, Experimental
The performance of air conditioner was experimentally investi-gation of performance of are sidential air conditioning
investigated with and without media pad evaporative system with an evaporatively cooled condenser, Journal of Solar
Energy Engineering 115(1993) 206-211.
cooling on the condenser. The experimental result
5. E. Hajidavalloo, Increasing COP of window air conditioner in
revealed that with evaporative cooling system the power very hot weather of Khoozestan, Research Project Report to
consumption decreased and cooling capacity and Management and Programming Organization, 2001.
coefficient of performance increased considerably. It 6. Munters Catalog, Evaporative Cooling Media, Fort Myers.Fl,
was recommended to use indirect evaporative January1986.
condenser in very hot weather condition instead of 7. G. J.VanWylen, R.E.Sonntag, Fundamental of Classical
conventional air condenser to save electric power and Thermodynamics, thirded., JohnWiley and Sons, New
increase cooling capacity. Economic analysis based on York,1986.
local prices shows the energy saving can pay for the
cost associate with retrofitting the condenser in less than
1 year.
Abstract- Plastics have woven their way into our are a sort of material that can't be deteriorated effectively
daily lives and now pose a tremendous threat to in a brief period of time. Generous amounts of plastic
the environment. Over a 100million tones of have gathered in the regular habitat and in landfills. Those
plastics are produced annually worldwide, and the squanders can be classified according to their origins.
used products have become a common feature at
They are
overflowing bins and landfills. Though work has
been done to make futuristic biodegradable - Industrial
plastics, there have not been many conclusive steps
- Municipal
towards cleaning up the existing problem. Here,
the process of converting waste plastic into value These gatherings have various characteristics and
added fuels is explained as a viable solution for properties and are exposed to various management
recycling of plastics. Thus two universal problems strategies. Huge amounts of plastic wastes arise as a
such as problems of waste plastic and problems of by-product or defective
fuel shortage are being tackled simultaneously. In
this study, plastic wastes were used for the pyrolysis product in industry and agriculture. Main
to get fuel oil that has the same physical properties c2onstituents of municipal solid waste are food waste,
as the fuels like petrol, diesel etc. Pyrolysis runs wood, paper, cardboard, plastics, rubbers, metals. On
without oxygen and in high temperature of about the other words, more than half of the municipal solid
300°C which is why a reactor was fabricated to waste elements are organic species in this mainly
provide the required temperature for the reaction. thermoplastics, which can be used as energy sources.
The waste plastics are subjected to The conventional MSW removal strategy is landfill. In
depolymerisation, pyrolysis, thermal cracking and
light of the life span of plastics, removal to landfill may
distillation to obtain different value added fuels
essentially be putting away issues for what's to come.
such as petrol, kerosene, and diesel, lube oil etc.
Converting waste plastics into fuel hold great For instance, plasticizers and other added substance
promise for both the environmental and economic synthetics have been displayed to filter from landfills.
scenarios. The extent of varies accordingly, particularly pH and
organic content.
Key words: Pyrolysis, Plastic Waste, Flash Point,
Fire Point, Viscosity. 1.2 PLASTICS
INTRODUCTION As a brief introduction to plastics, it can be said that
Plastic waste is viewed as a possibly modest plastics are 4 synthetic organic materials produced by
wellspring of synthetics and energy. Parts of us have polymerization. They are typically of high molecular
experienced an assortment of items that utilization plastic mass, and may contain other substances besides
materials today. polymers to improve performance and/or reduce costs.
These polymers are made of a series of repeating units
Because of the expanding level of private utilization known as monomers. Therefore, polymers can be
of this plastic 1 materials enormous measure of molded or extruded into desired shapes. There are two
squanders is released to the climate. Plastic materials main types of plastics: thermoplastics and thermosetting
polymers. Thermoplastic scan repeatedly softens and The types of plastics and their piece will condition
melt if enough heat is applied and hardened on cooling, the transformation Process and will decide the pre-
so that they can be made into new plastics products. treatment prerequisites, the burning temperature for the
Thermosets or thermosetting plastics can melt and change and hence the energy utilization required, the
take shape only once. They are not suitable for repeated fuel quality yield, the vent gas creation (for example
heat treatments; therefore, after they have solidified, arrangement of risky vent gases like NOx and HO),
they stay solid. Plasticis perhaps the most ordinarily the fly debris and base debris piece and the capability
utilized materials in day-by-day life which can be of substance erosion of the equipment.
arranged from multiple points of view, for example, in Major factors to be considered while selection is:
light of its compound construction, amalgamation cycle, - Smooth feeding for equipment
thickness, and different properties.
- Effective conversion
1.3 SELECTION OF WASTE PLASTICS
- Well-controlled combustion
Squander plastics are quite possibly the most
encouraging assets for fuel creation in view of its high As shown in below table PE, PP and PS
warmth of burning and because of the expanding 5 thermoplastics are ideal as feedstock in the creation of
accessibility in neighbourhood networks fluid hydrocarbons. The expansion of thermosetting
plastics, wood, and paperlo the feedstock prompts the
arrangement of carbonous substances and brings down
the rate and yield of fluid items.
The municipal plastic waste comprises of 80%
thermoplastics and 20% thermosetting plastic. Since
thermoplastics are can be further processed, basic types
of thermoplastics can be used. Simple and common
thermoplastics are polyethylene and polypropylene.
For our experiment, we took Polypropylene 2as the
Selection of waste plastic raw material for the following reasons and factors.
In contrast to paper and wood, plastics don't - One of major factor to consider PP over PE is the
assimilate a lot of dampness and the water content of carbon footprint.
plastics is far lower than the water content of biomass,
for example, yields and kitchen squanders. - PP is abundantly used in Plastic bags; plastic bottles
so raw material is easy to get.
The change strategies for squander plastics into fuel
rely upon the sorts of plastics to be focused on and the - The crystallinity of PP is less than PE.
properties of different squanders that may be utilized - PP fuel has more calorific value than all fuels.
simultaneously.
As a result, we preferred Polypropylene over
Moreover, the successful change expects innovations Polyethylene and other polymers.
to be chosen by neighbourhood monetary, natural,
social and specialized attributes. By and large, the II. PLASTIC PYROLYSIS
t4ransformation of waste plastic into fuel requires 2.1 FACTORS AFFECTING PLASTIC
feedstock which are non-perilous and flammable. PYROLYSIS
Specifically, each kind of waste plastic change strategy
has its own reasonable feedstock. The central point affecting the plastic pyrolysis
interaction 7 and pyrolysis item atomic appropriation
FIRE FIGHTING MEASURES Line l: High pressure is used in which the plastic is
Flash Ignition Temperature: 335°C used for extracting 32 the fuel by the process of
vaporization of plastic.
Auto Ignition Temperature: 350°C
Line 2: Filtration system is provided in the
Flammable Limits: NA
equipment which helps to decrease the flux content in
Suitable Extinguishing Media: Water, Foam, Carbon case of high thickness plastic or low thickness plastic.
Dioxide, Dry chemical powder.
Line 3: Water is used for the process of
For Safety reasons, unsuitable extinguishing media: condensation where the extracted fuel is in the form of
None gaseous state.
Protective Equipment: Respiratory & Eye protection Line 4: After completion of condensation the fuel is
for firefighting personnel Special hazards caused by the stored in a container that which consists of low flux
material, its products of combustion or resulting gases: content comparing to method-1 due to low thickness
In case of fire it can release: Carbon dioxide (C02), of the plastic and high pressurized container.
and when lacking oxygen (02), carbon monoxide (CO),
Ketones & Aldehydes. The products of the burning 44 At last the gaseous produced in the containers while
are dangerous. The formation of hydrocarbons and the process is running out they are exposed in to the
aldehydes are possible in the initial stages of a fire atmosphere.
(Especially in between 400°C and 700°C). - In this process the high pressurized container is
Additional information: Heat value: 8000 -11000 placed on burner.
kcal/kg. - The Plastic material placed in the container starts
METHODOLOGY melting and then evaporation takes place at certain
temperature.
PRODUCTION METHOD:
- The petrol is collected in the CONTAINER 1.
1. Extraction of petrol from plastic we need heavy
equipped machinery in cause of safety as we are - Leaving low amount of flux due to the low thickness
dealing with petrol and the emission of gases which of plastic and 4 high pressurized container and filtration.
are inflammable when reacted to atmospheric air.
- The excess steam is further sent out and mixed
2. High Pressurized Container is used to overcome with the atmospheric air.
defect of flux content 4 in the fuel which is extracted
from plastic. FILTRATION & PURIFICATION
3. High Pressurized Container with filtration chamber The fuel collected in the collecting chamber will be
which is capable of burning plastic at maximum impure. There will be wax, greese, and other impurities.
temperature is taken in which a nozzle connected to
So to remove the impurities, the following processes
it which is responsible for flow of petrol.
were carried out.
4. The most important are the pipe lines which are
connected through the whole equipment. - Gravity separation.
Listed below: - Filtration with filter paper.
Gravity separation is the basic process. In this
process the impure fluid is poured in a container in which
the bottom part is like a funnel. So, when the fluid is
poured, the denser liquid will settle down below. Most
probably the water was found. Then the waxy and
Fuel Extract form Plastic greasy substance which was pale greenish yellow was
The purified fuel is to be tested to find out its The high thickness of the plastic tends to the high
characteristics. In order to interpret the quality and flux content in the 53 liquid fuel that traced from the
properties of fuel, various tests were carried out in the plastic. The high flux content of the liquid fuel can be
laboratory 30 under various testing conditions. decreased by the process of filtration and the solid
plastic must be heated in high pressurized chamber.
The tests performed were:
Due to the high flux content produced during the
Flash Point, Fire Point, Density, Kinematic Viscosity, process of extraction of fuel decreases the flaming
Calorific Value. characteristics of plastic fuel so to reduce the flux content
the highly equipped machinery filtration is required. This
RESULT & DISCUSSION
filtration may also reduce the density of the plastic fuel.
By heating the nearby ignition chamber with warmer
of 2,000 watts in 11 a temperature scope of 200 to CONCLUSION
350 degree Celsius we get approx. 560 ml fuel oil by - Pyrolysis of hydrocarbon polymers is a very
warming of burning around 455 minutes the layer of oil complex process, which consists of hundreds of
shows up on the water level. Following two hour we reactions and products. Several factors have significant
get 500 ml of fuel oil. effects on the reactions and the products.
- Based on previous research, this chapter
investigated the fundamental plastic processes and
reactions. With temperature increasing, plastic will go
through glassy state, rubbery state, liquid state, and
decomposition.
- Decomposition of plastic in an inert environment 5. Agarwal Avinash Kumar, Biofuels (alcohols and biodiesel)
applications as fuels internal combustion engines, Journal of
into liquid is called pyrolysis. There are four stages of Energy and Combustion Science, 33,233-71 (2007).
reactions during the plastic pyrolysis process: initiation,
6. Murtha NH., patel M. premnath V. plastic materials flow analysis
propagation, hydrogen transfer, and termination for India, resources, conservation and recycling 2006.
reactions. 7. SivasankerS. Catalysisin petroleum refining. Catalysis; 2002:362-
- It was found that heavy molecular weight 376.
hydrocarbons produced from primary cracking can be 8. Ner?n C., Domeno C., Moliner R., Lazaro M.J., Suelves I.,
Valderrama J.J. (2000) Anal. Appl. Pyrolysis, 55, 171-183.
further cracked into light molecular weight products
through a secondary cracking process. This secondary 9. Hajekova E., Mlynkova B., Bajus M., Spodova L.J. (2007) Anal.
Appl. Pyrolysis, 79, 196-204.
cracking process has significantly influence on the
10. Preliminary study on the conversion of different waste plastics
distribution of the product. This process converts heavy into fuel oil, munich, GRIN Verlag, http://www.grin.com/en/
hydrocarbons into gas or light liquid product. ebook/206451/preliminary-study-on-the- onversion-of-differcnt-
wastcplastics-into-ruel.
REFERENCES
11. European Association of Plastics Recycling Website:http://
1. Mani M., Subash C. and Nagarajan G., Performance emission www.eproplasticsrecycling.org
and combustion characteristics of a DI diesel engine using waste
12. Oluwafunmilayo A. Aworanti, Samuel E. Agarry, Ayobami O.
plastic oil, Applied Thermal engineering, 29,2738-2744 (2009).
Ajani. dvances in chemical Engineering and Science, 2012 http://
2. Yuan, X., Converting Waste Plastics into Liquid Fuel by dx.doi.org/10.4236/aces.2012.24054 Published Online October
Pyrolysis:Developments in China, in Feedstock Recycling and 2012 (http://www.SciRP.org/journal/aces)
Pyrolysis of Waste Plastics, J. Scheirs and W. Kaminsky, Editors.
13. RECOUP, Recycling of Used Plastics webpage: http://
2006, John Wiley & Sons,Ltd: Changsha, P.R. China.
www.recoup.org/
3. Murugan S., Ramaswamy M.C. and Nagarajan G., The use of
14. Plastics Recyclers Europe, How to boost plastics recycling and
tyre Pyrolysis oil in diesel engines, Waste Management, 28,
increase resource efficiency - Strategy Paper, 2012.
(12),2743-2749 (2008).
4. Rajesh Guntur and Deva Kumar M.L.S., Experimental evaluation
of a diesel engine with blends of diesel-plastic Pyrolysis oil,
International Journal of engineering Science and Technology, 3(6),
(2011).
Abstract- The world is confronted with serious consumption [1]. Therefore, the researchers suggested
problems like the fossil fuel depletion and biodiesels are a viable alternative to diesel fuel in the
environmental degradation. Fossil fuels in near diesel engine. Biodiesel can be prepared from various
future will become rare due to its indiscriminate renewable feedstock like vegetable oils - palm oil,
extraction and consumption. The present research
sunflower oil, peanut oil etc., are edible oils and
work on experimental investigate the effect of
jatropha, calophyllum inophyllum, karanja, etc., are
using cerium oxide (CeO2) nanoparticle additive
(30ppm, 60ppm, 90ppm and 120ppm) in palm oil non-edible oils [3, 6, 8, 10]. The biodiesel properties
B20 blend biodiesel ( as 20% biodiesel and 80% are like rich oxygen content, higher kinematic viscosity,
diesel) in a single cylinder four stroke diesel reduced smoke emission and diluted level of pollutants
engine. The experimental results reveal that B20 from engine exhaust (CO, HC and particulate matter).
blend biodiesel at 90ppm of CeO 2 nanoparticles The biodiesel's emission characteristics are better than
additive found significant reduction emissions petro-diesel fuel except for NOX emission [13]. To
nitrogen oxide (NOX), carbon dioxide (CO), control NOX emissions from the C.I engines, various
unburnt hydrocarbons (UBHC) and smoke. researchers have been described strategies like engine
However, brake specific fuel consumption (BSFC) modification like EGR (Exhaust Gas Recirculation),
is decreased with significant from increase brake
increasing/decreasing injection timing, injection pressure
thermal efficiency (BTE) by doping of CeO2 from
and adulteration of fuel [25, 27]. Among these fuel
30 ppm to 120 ppm. B20 biodiesel blend with 90
ppm of CeO2 nanoparticles additive as optimum alterations with nanoparticles in biodiesel results in
blend out of the test blends. reducing the level of pollutants at the engine exhaust
and eventually, increases engine performance.
Keywords- Biodiesel, palm oil, Cerium oxide,
Nanoparticle blended with fuel shown better thermal
nanoparticles, Performance, Exhaust emissions.
properties, which is mainly due to the higher surface
I. INTRODUCTION area to volume ratio of the nanoparticles also resulting
in increased oxidation of HC and acting as an oxygen
World oil supplies are reaching the point where the
buffer against NOx [19].
demand for fossil fuels may outstrip the supply, and the
oil prices are increasing significantly. Besides, Many researchers used different additives to
combustion of petroleum-based oils and its derivatives biodiesel and found reduced emissions and increased
such as petrol, diesel, etc., discharges greenhouse gases performance [41, 42, 43]. Acetone blended with Palm
into the atmosphere causing global warming. However, biodiesel given a significant reduction in HC, NOX,
the total petroleum reserves are depleting day by day CO and smoke emissions when compared to palm
due to indiscriminate extraction and lavish consumption. biodiesel [27, 29]. V Sajith et al., 2010 conducted
However, the total petroleum reserves are depleting experiments with cerium oxide as nanoparticle additive
day by day due to indiscriminate extraction and lavish in Jatropha biodiesel (20 ppm, 40 ppm & 80 ppm)
had shown increased brake thermal efficiency by 1.5% has most widely recognized as a potential alternative
and there is a significant reduction of NO by 30% and fuel [2, 13].
hydrocarbon emissions by 40%. Ajin et al., 2011 Figure 1 shows the various biodiesel feedstock oil
experimentally observed that the CeO2 as a nano- yield. Palm oil has shown a high productivity when it is
additive in diesel improved the BTE by 5% and a compared to other oils. The palm oil productivity is
reduction of HC and NOX emission by 45% and 30% about 5945 litres per hectare and which is about 14
respectively. From the various metal oxides copper, iron, times higher than soybean oil.
cerium and cobalt have used as fuel additives. Among
all nanoparticles additives, cerium oxide has exhibited
a high catalytic activity due to its high surface-to-volume
ratio, which improves the brake thermal efficiency and
reduces the emission [15]. Selvan et al., 2009
experimentally investigated the effect of cerium oxide
nanoparticle with diesel and biodiesel as fuel in diesel
engine and observed the brake thermal efficiency was
increase and a drastic reduction in HC and NOX
emission. The performance and emission characteristics
of the CI engines improves due to the doping of alumina Figure 1: Various biodiesel feedstock production oil yield
[16].
nanoparticles in the biodiesel emulsion fuels, which leads
to ignition delay and reduced peak pressure 2. MATERIALS AND METHODS
1.1. About palm oil 2.1 Preparation of palm oil biodiesel:
Botanical name of oil palm is Elaeis guineensis. It is Different researchers have developed methods for
an ancient tropical plant from the West African tropical biodiesel preparation from various feedstocks [14, 15,
rainforest where it was grown wild and later it was 16]. The following is the process for converting palm
developed into an agricultural crop. Oil palm produces oil to biodiesel.
two different types of oils: palm oil and palm kernel oil. Palm oil is collected and is preheated to 600C
Palm oil is used in wide variety of food products such separately. A 0.5 g of NaOH and methanol (9:1
as cooking oil, margarine and shortenings and palm methanol to oil ratio) are mixed properly to form Sodium
kernel oil is used as a raw material in the production of methoxide. The preheated oil is slowly poured in Sodium
non-food products like cosmetic, soaps, toiletries, methoxide, keeping the stirrer on. The mixture is allowed
detergents etc. is the most productive oil palm variety stir in a magnetic stirrer for 1hour at 400 rpm maintaining
which can produce 10-35 tonnes/ hectare of fresh fruit 550C reflux. Then the mixture is poured in separating
bunch (FFB) palm oil annually. The palm oil is a tropical funnel and left it undisturbed for 1hour in a separating
perennial plant and it can grow well in lowland with funnel and thus formed glycerin is removed which are
humid places. formed at the bottom layer. The top layered oil is
The palm oil tree is unbranched and single-stemmed required one and it is separated to the next step.
can grow up to 20-30m height. The flowers are Water washing has done to wash the soaps out of
produced in dense clusters which each individual flower the biodiesel with warm water, 3 to 4 times. Add a
is small with three sepals and three petals. The leaves small amount of dilute acetic acid in biodiesel before
are pinnate and can reach between 3 and 5m long. The adding the water. Thus the pH of the solution should be
fleshy orange reddish coloured fruits grow in large and closer to neutral and takes out any catalyst suspended
tight female bunches each fruit weigh as much as 10- in the biodiesel. The biodiesel is water washed gently
40 kg and contain up to 2000 fruitlets. Palm oil biodiesel with warm water at 500C temperature to remove
impurities for three to four times. Then the washed oil A single cylinder, four stroke water cooled diesel
is heated above 1000C to remove water particles and engine was used to conduct the performance, emission
excess methanol. Moreover, thus obtained product is and combustion test. An electrical generator used for
the required palm oil biodiesel. loading the engine. AVL 444 N Di-Gas analyzer and
AVL 437C Smoke meter used for emission studies.
2.2 Characterization of Cerium Oxide
The following Table1 is the specification of the engine:
nanoparticle
Table 1. Specification of the diesel engine.
There are various methods to synthesis CeO 2
Type Single cylinder, four
precipitation, hydrothermal, sol-gel method, stroke, water cooled
microemulsion method and other methods [23-30]. diesel engine
Among the various preparation methods, microwave- Stroke 110mm
assisted solution method is an inexpensive and simple Bore 88mm
Rated output 5.2 kW
method to prepare the nanoparticles. The synthesis of Rated speed 1500 rpm
CeO2 nanoparticles was done by method - Solvothermal Compression ratio 17.5
technique [23]. Loading device Electric generator
The synthesis of CeO2 nanoparticles has carried out
4. RESULTS & DISCUSSION
by using Solvothermal technique. X-ray diffraction
method (XRD) characteristic peaks corresponding to The experimental investigation has been conducted
the (111), (200), (220), (311), (222), (400), (331) and in order to find the performance, combustion and
(420) planes are located at 2? = 28.6°, 33.1°, 47.5°, emissions analysis with diesel, biodiesel blend B20 and
56.4°, 59.1°, 69.4°, 76.7° and 79.1° respectively. CeO2 nanoparticle as additive to B20 (30ppm, 60ppm,
90ppm and 120ppm). The above modified fuels are
fuelled in diesel engine and the thus obtained
experimental results are compared with diesel fuel.
4.1 Properties of fuels used
The properties of the above modified fuels along
with diesel fuel are shown in Table 2. The various
physicochemical properties of the above modified fuels
were carried out and the thus obtained results are
compared with the pure diesel (D100). The main
objective of the investigation was to find the variations
in the properties of the fuels. Also, to find the effect of
Figure 2. XRD of synthesized cerium oxide nanoparticles. the level of inclusion of CeO2 nanoparticles addition of
the B20 biodiesel blend. The test fuels shown an
3. EXPERIMENTAL SETUP
increasing trend for the flash and fire points with the
The experimental investigation was carried out. The increase in dosing level, which indicates a continual
properties of modified fuels are compared with diesel decrease in the volatility of the test fuels with increases
fuel. The properties studied were the calorific value, in the quantity of the CeO2 nanoparticle additive [5, 8].
viscosity, flash point and fire point. The standard ASTM The CeO2 nanoparticles additive to the modified fuels
procedures were used during experimentation. The increase the fluid layer resistance and thus there is an
performance tests were conducted on research engine increase the kinematic viscosity [9].
(single cylinder four stroke diesel engine) using test fuels
and also, the emission characteristics were found by
using exhaust gas emission analyzer.
4.2 Performance and emissions of test fuels on 4.2.2 Brake Specific Fuel Consumption (BSFC)
diesel engine:
Due to lower calorific value of the biodiesel's, BSFC
4.2.1 Brake Thermal Efficiency (BTE) of the biodiesel is higher when compared to diesel fuel
[3]. Figure 4 depicts variations in the BSFC with load
Due to biodiesel has lower calorific value the
for the palm oil biodiesel blends with CeO2 nanoparticles
biodiesel's BTE is less than diesel fuel [3]. Figure 3
doped in biodiesel and diesel fuel. Due to increase in
shows variations in the BTE with load for the palm oil
dosing of CeO2 nanoparticles in biodiesel from 30 ppm
biodiesel blends doped with CeO2 nanoparticles and
to 120 ppm, favouring enhanced combustion.
diesel fuel [41]. The result depicts that the BTE of the
Therefore, the BSFC decreases with the increase in
diesel engine continuously improved by the increased
the dosing levels of the particles, except for
dosing levels of CeO2 nanoparticles additive in B20
B20+120ppm, due to more agglomeration and lowered
biodiesel blend. The enhancement in BTE for the CeO2
catalytic action. B20+90ppm blend shown lower BSFC
nanoparticles additive in B20 biodiesel blend doped
out of other biodiesel blends except for diesel.
fuels from 30ppm to 120ppm is mainly due to the
occurrence of better fuel combustion and the
nanoparticles dopes promotes combustion in the engine
[6, 43]. Above 90ppm dosing level of the CeO 2
nanoparticle increased, due to more agglomeration of
particles, the catalytic action is lowed and lessen the
BTE at 120ppm. The results depicts that the BTE of
blend B20+90ppm of CeO2 has highest efficiency in
the modified blends of biodiesel but less than diesel
fuel at all loads. Figure 4. Variation of brake specific fuel consumption (BSFC)
for the modified fuels and diesel.
more agglomeration and lower catalytic action, the 4.2.5 Nitrogen oxides (NOX) emission
UBHC of B20+90ppm blend is lower than other Figure 7 illustrate the variation in NOx emission with
modified fuels and diesel fuel. The chemical reaction load for the palm oil biodiesel blends with CeO2
during combustion are: nanoparticles doped and diesel fuel. The CeO 2
......(1) nanoparticles additive doped in biodiesel blends from
…....(2)
30ppm to 120ppm. The NOx emission has increased,
in order to reduce it, CeO2 nanoparticles additive added
to B20 biodiesel blend. Due to high thermal stability,
oxidation of hydrocarbon forms Ce2O3 is formed
equation (2) and again reduction of NO occur due to
deoxidizing to CeO2. The chemical reaction during
combustion is:
……(3)
[18]Ashok B, Nanthagopal K, Thundil Karuppa Raj R, Pradeep application on the combustion and exhaust emissions in a diesel
Bhasker J, Sakthi Vignesh D 2017 Influence of injection timing engine, Appl. Therm. Eng. 95 115-124.
and exhaust gas recirculation of a Calphyllum inophyllum methyl
[32]Qi D, Leick M, Liu Y, Chia-fon F L 2011 Effect of EGR and
ester fuelled CI engine, Fuel Processing Technology 167 18-30.
injection timing on combustion and emission characteristics of
[19] Murugesan A, Subramaniam D, Vijayakumar C, A. Avinash, N. split injection strategy DI-diesel engine fueled with biodiesel,
Nedunchezhian 2012 Analysis on performance, emission and Fuel 90 (5)1884-1891.
combustion characteristics of diesel engine fueled with methyl-
[33]Arul Prakasajothi Mahalingam, Dinesh Babu Munuswamy,
ethyl esters J. Renewable and Sustainable Energy. 4 (6) 063116.
Yuvarajan Devarajan and Santhanakrishnan Radhakrishnan 2018
[20]Rashedul H.K., Masjuki H.H,. Kalam M.A, Ashraful A.M, Investigation on the emission reduction technique in Acetone-
Ashrafur Rahman S.M., Shahir S.A. 2014 The effect of additives Biodiesel aspirated diesel engine". Journal of Oil Palm Research
on properties, performance and emission of biodiesel fuelled Vol 30 (2) 345 - 349.
compression ignition engine, Energy Conversion and Management
[34]Yung Chee Liang, Harrison Lau Lik Nang and Choo Yuen May
88 348-364.
2013 Physico-chemical properties of biodiesel produced from
[21]Bhupendra Singh Chauhan, Naveen Kumar, Haeng Muk Cho, Jatropha curcas oil and palm oil Journal of Oil Palm Research
Hee Chang Lim 2013 A study on the performance and emission Vol 25 (2) 159 - 164.
of a diesel engine fueled with Karanja biodiesel and its blends,
[35]Ulf Neuling and Martin Kaltschmitt 2017 Review of biofuel
Energy 56 1-7.
production - feedstock, processes and markets Journal of Oil
[22]Palash S M, Masjuki H H, Kalam M A, Masum B M, Sanjid A, Palm Research Vol 29 (2) 137 - 167.
Abedin M J 2013 State of the art of NOx mitigation technologies
[36]Adeeb Hayyan, Shahidah Nusailah Rashid, Maan Hayyan, M Y
and their effect on the performance and emission characteristics
Zulkifliy, Mohd Ali Hashim and Nurul Alfaa Osman 2017
of biodiesel-fueled Compression Ignition engines, Energy
Synthesis of novel eutectic catalyst for the esterification of crude
Convers. Manag. 76 400-420.
palm oil mixed with sludge palm oil Journal of Oil Palm Research
[23]Kumar E, Selvarajan P, Muthuraj D 2013 Synthesis and Vol 29 (3) 373 - 379.
Characterization of CeO2 nanocrystal by Solvothermal route,
[37]Denis J Murphy 2014 The future of oil palm as a major global
Materials Research 16(2): 269 - 276.
crop: opportunities and challenges Journal of Oil Palm Research
[24] Chen PL and Chen IW 1993 Reactive Cerium (IV) Oxide Vol 26 (1)1- 24.
Powders by the Homogeneous Precipitation Method. Journal of
[38]Mirzajanzadeh M, Meisam Tabatabaei, Mehdi Ardjmand,
American Ceramic Society 76:1577-1583.
Alimorad Rashidi, Barat Ghobadian, Mohammad Barkhi,
[25]Djuricic B and Pickering S 1999 Nanostructured cerium oxide: Mohammad Pazouki, 2015 A novel soluble nano-catalysts in
preparation and properties of weakly-agglomerated powders. diesel-biodiesel fuel blends to improve diesel engines performance
Journal of the European Ceramic Society. and reduce exhaust emissions, Fuel 139 374-382.
[26]Wu NC, Shi EW, Zheng YQ and Li WJ.2002 Effect of pH of [39]Saifuddin M, Goh P E, Moneruzzaman W. S. H, K. M. and
Medium on Hydrothermal Synthesis of Nanocrystalline Fatima A, 2014 Biodiesel Production from Waste Cooking Palm
Cerium(IV) Oxide Powders. Journal of American Ceramic Oil and Environmental Impact Analysis, Bulgarian Journal of
Society.85:2462-2468. Agricultural Science, 20 (No 1) 186-192.
[27]Hirano M and Kato E 1996 The hydrothermal synthesis of [40]Sanjid A, Masjuki H. H.. Kalam M. A, Ashrafur Rahman S.
ultrafine cerium (iv) oxide powders. Journal of Materials Science M.,.Abedin M.J,. Palash S. M 2013 Impact of palm, mustard,
Letters 15:1249-1250. waste cooking oil and Calophyllum inophyllum biofuels on
performance and emission of CI engine Renewable and Sustainable
[28]Li LP, Lin XM and Li GS, Inomata H 2001 Solid solubility and
Energy Reviews 27 664-682.
transport properties of Ce 1-x N dxO 2- nanocrystalline solid
solutions by a sol-gel route. Journal of Material Research [41]Devarajan Y, Jayabal R K, Ragupathy D and Venu H 2016
16:3207- 3213. Emissions analysis on second generation biodiesel. Frontiers
Environ. Sci. Eng., 11(1),3.
[29]Masui T, Fujiwara K, Machida KI, Adachi GY, Sakata T and
Mori H. 1997 Characterization of Cerium(IV) Oxide Ultrafine [42]Venkata Ramanan M and Yuvarajan D 2016 Emission analysis
Particles Prepared Using Reversed Micelles. Chemistry of on the influence of magnetite nanofluid on methyl ester in diesel
Materials. engine. Atoms. Pollution Res., 7(3); 477-481.
[30]Sumalin Phoka, Paveena Laokul, Ekaphan Swatsitang, Vinich [43]Shaafi T, Sairam K, Gopinath A, Kumaresan G, Velraj R 2015
Promarak, Supapan Seraphin, Santi Maensiria 2009 Synthesis, Effect of dispersion of various nanoadditives on the performance
structural and optical properties of CeO 2 nanoparticles and emission characteristics of a CI engine fuelled with diesel,
synthesized by a simple polyvinyl pyrrolidone (PVP) solution biodiesel and blends-Areview, Renewable and Sustainable Energy
route, Materials Chemistry and Physics 115 423-428. Reviews 49 563-573.
[31]Can O, Oztürk E, Solmaz H, Aksoy F, Çinar C, Yücesu H S 2016
Combined effects of soybean biodiesel fuel addition and EGR
INTRODUCTION
Fig 1.heat sink in a CPU
A heat sink is a component that increases the heat
flow away from a hot device. It accomplishes this task 2. MATERIALS & METHODOLOGY
by increasing the device's working surface area and
2.1. An motherboard of a CPU of
the amount of low-temperature fluid that moves across
37.5mmx37.5mmx1mm generates heat at a rate of
its enlarged surface area. Based on each device's
80W.A heat sink needs to be designed so that the
configuration, we find a multitude of heat sink
component temperature remains below 80 C when the
aesthetics, design, and ultimate capabilities. A heat sink
ambient temperature is 30C. A finned heat sink will be
works by moving heat away from a critical component.
used. It is required to design a heat sink that fulfils these
Nearly all heat sinks accomplish this task in four basic
requirements. So, different designs are developed and
steps
evaluated for their performance and cost. Later the
1. The source generates heat. designs are to be investigated by changing fin thickness
2. Heat transfers away from the source as how that affects the performance of the heat
sink.fig.1,2,3 and 4 shows the designed models of
3. Heat distributes throughout the heat sink reactangular along the length, square, circular and array
4. Heat moves away from the heat sink of rectangular shape with height 60mm as fixed for all.
Further size of the each fin is changed.
Electronic circuit boards generate heat during
Table.1: heat sinks studied
processing data, that heat is absorbed by base of heat
sink. Further that heat diffuse into whole heatsink by Heat sinks Thickness(mm)
conduction. A fan is provided in a proper position to Rectangle 2x60 3x60 4x60 5x60
Square 2x2 3x3 4x4 5x5
drag atmospheric air over all the surface of heat sink
Circular Φ2 Φ3 Φ4 Φ5
and to discharge outside of the device Array of Rectangular ----- 2x3 2x4 2x5
REFERENCES
[1] Kyoungwoo Park., Park-Kyoun oh., Hyo-Jae Lim., The
application of the CFD and Kringing method to an optimization
of heat sink, International Journal of Heat and Mass Transfer 49
(2006) 3439-3447 ,Elsevier 2006.
[2] Matthew B. de Stadler., Optimization of the geometry of a heat
sink, university of Virginia, Charlottesville, VA22904.
[3] Kim D., Jung J., Kim S.,Thermal optimization of plate-fin heat
sinks with variable fin thickness, International Journal of Hear
and Mass Transfer 53(2010) 5988-5995,Elseveir,2010.
[4] Koga A., C Edson., Nova H., Lima C., Silva E., Development of
heat sink by using topology optimization , International Journal
of Hear and Mass Transfer 64 (2013) 759-722 .
Fig.3.3: Temperature distribution Circular of dia 2mm [5] Ndao S., Peles Y., Jenson M.K., Multi-objective thermal design
Table 3.1: Motherboard temperatures with heat sink optimization and comparative analysis of electronics cooling
technologies, International Journal of Hear and Mass Transfer
Heat sinks BASE OR MAXIMUM
52 (2009) 4317-4326, Elseveir, 2009.
TEMPERATURE
THICKNESS 2mm 5mm 3mm 4mm [6] TsongC.,and Chen H.,Multi-objective optimization design of plate
Rectangle 74.32 86.86 81.89 84.06 fin heat sink using a direction based genetic algorithm,Journal of
Square 87.39 79.3 72.5 73.1 the Taiwan Institute of chemical Engineers 44(2013) 257-265
Elesevier 2013 .
Circular 70.57 83.65 79.3 80.62
Array of ----- 71.49 69.46 77.53 [7] Lin Lin, Yang YangChen ,Optimization of geometry and flow rate
Rectangular distributin for double layer microchannel heat sink,International
journal of Thermal Sciences 78(2014 158-168 ELSEVIER.
[8] anhoto P., Reis A., Optimization of forced convection heat sinks
with pumping power requirements , International Journal of Hear
and Mass Transfer 54 (2011) 1441-1447,Eleseveir 2010.
"PDCA12-70 data sheet," Opto Speed SA, Mezzovico,
Switzerland.
[9] Kim D., Jung J., Kim S.,Thermal optimization of plate-fin heat
sinks with variable fin thickness, International Journal of Hear
and Mass Transfer 53(2010) 5988-5995,Elseveir,2010.
[10] R.Mohan and Dr.P.Govindrajan., Thermal analysis of CPU with
Composite pin fin heat sinks, International journal of engineering
Fig.3.1.maximum temperatures in different heat sinks science and technology vol2(9),2010,4051-4062.
[11] S.C.Fok, W. Shen, F.L.Tan., Cooling of portable hand held
4. CONCLUSIONS electronic devices using phase change materials in finned heat
Among all heat sinks, the best performer is decided sinks, International journal of thermal sciences 49(2010) 109-
117,Elsevier, 2009.
based on lowest temperature of heat sink under given
[12] S P Pawar and N C Ghuge Design and analysis of heat sink
conditions. optimization and its comparison with commercially available
• The rectangular array heat sink with 2mm thickness heat sink , M-17 Mech PGCON 2015.
and 4mm width has the lowest temperature of
69.460C, at which motherboard will work safely in
terms of heat
• Next to 2mmx4mm rectangular array heat sink, heat
sink with 2mm dia circular fins has the lowest
temperature 70.570C
on cryptographic security services that can operate on also poses significant challenges. Until data has been
resource-constrained IoT devices is required. This will obtained, it must be used intelligently to accomplish
allow numerous eligible users, regardless of the smart IoT functions. To achieve automated decision-
inadequate user interfaces available with almost all IoT making, it is therefore essential to develop machine
devices, to use and deploy IoT systems securely. learning methods and artificial intelligence algorithms,
Additional areas such as data confidentiality, resulting from neural works, genetic algorithms,
trustworthiness and authenticity of communication evolutionary algorithms, and many other systems of
parties, message credibility, and additional safety criteria artificial intelligence.
should also be included and the IoT's security and
security aspects. This may include functionality such as V. SENSING AND SURVEILLANCE OF IOT
being able to prevent several parties from Even if monitoring and sensing technologies have
communicating. For example, smart objects must be made considerable progress, they are continually
prevented in business transactions from enabling the improving, emphasising energy efficiency and shape.
access of rivals to sensitive information on the devices To obtain instantaneous data, sensors and tags are
and, thus, from maliciously using this information. typically required to be continuously active; this aspect
is essential for energy efficiency, especially in life
IV. DATA PROCESSING, ANALYSIS AND extension. Simultaneously, recent developments in
MANAGEMENT ISSUES IN IOT nanotechnology/ biotechnology and miniaturisation have
Due to IoT's heterogeneous nature and the large enabled the production of nanoscale actuators and
scale of data collected, especially in this era of Big Data, sensors.
the processing, analysis, and data management process
are incredibly challenging. Most applications currently VI. CONCLUSION
use centralised systems to unload data and conduct The IoT can best be described as a CAS (Complex
computer-intensive tasks on an international cloud Adaptive System) that will continue to evolve, requiring
network. However, there is a constant concern that new and creative types of software engineering, system
traditional cloud architectures are not efficient in engineering, project management, and various other
transporting the vast volumes of data produced and disciplines to further develop and manage it in the
consumed by IOT-enabled devices and in order to coming years. It is application areas are very varied to
sustain the accompanying computational load further allow it to support different customers, who have
meet timing constraints at the same time. Therefore most different needs in turn. Three groups of users, people,
systems rely on current technologies to overcome this society or societies and organisations represent the app.
problem, such as mobile cloud computing and fog The IoT, as discussed in the application portion of this
computing, both based on edge processing. The research paper, has, without a doubt, a considerable
implementation of Information-Centric Networking potential to be a massively disruptive force that will have
(ICN) in the IoT is another research path in data a positive effect on millions of lives worldwide, and to
management. As these information-centric systems some degree already. As various governments
provide support for efficient retrieval of content and worldwide have shown an interest in the IoT idea by
access to resources, they tend to be very useful in access offering more funding in the field that is intended to
and transfer, managing, and distributing generated encourage more research, it has become even more
content. However, this approach poses numerous apparent. The Chinese government is a good example.
problems, such as competently expanding the ICN Countless study groups from various parts of the world
paradigm across the fixed network edge, taking static have been initiated and continue to be initiated, and
and mobile IoT devices, and distributing the ICN their main goal is to undertake research related to IoT.
features to resource-constrained devices. Data analysis When more and more research studies are performed,
and its meaning play a key role in IoT performance; it new dimensions begin to emerge for the IoT processes,
technologies involved, and that can be connected, [11] Mazayev, A. et al., "Interoperability in IoT through the Semantic
Profiling of Objects" IEEE Access, Vol. 6, Issue 1, pp. 19379-
paving the way for even more IOT application 19385, 2018.
functionality.
[12] Miraz, M. H. et al., "A Review on Internet of Things (IoT)
Internet of Everything (IoE) and Internet of Nano Things (IoT)"
VII. IMPLICATIONS OF STUDY Internet Technologies and Applications (ITA), pp. 219- 224,
The study will offer guidance to the organisations to 2015.
understand the different concepts related to IoT. Various [13] Miraz, M. et al., "Internet of Nano-Things, Things and
Everything: Future Growth Trends" Future Internet, Vol. 10,
issues related to the IoT security, privacy and survival Issue 8, pp. 68-74, 2018.
etc. have been mentioned in the study. It throws the
[14] Miraz, M. H. and Ali, M., "Applications of Blockchain
light on the different aspects of IoT, so it will offer a Technology Beyond Cryptocurrency" Annals of Emerging
wide range of guidance to the researchers to conduct Technologies in Computing (AETiC), Vol. 2, Issue 1, pp. 1-6,
the studies in respective fields. 2018.
[15] Miraz, M. H. "Blockchain of Things (BCoT): The Fusion of
REFERENCES Blockchain and IoT Technologies" Advanced Applications of
Blockchain Technology, Vol. 3, Issue 2, pp. 35-42, 2019.
[1] Alansari, Z. et al., "Internet of Things: Infrastructure, Architecture,
Security and Privacy" International Conference on Computing, [16] Patel, K. K. et al., "Internet of Things IoT: Definition,
Electronics Communications Engineering (iCCECE), pp. 150- Characteristics, Architecture, Enabling Technologies, Application
155, 2018. Future Challenges" International Journal of Engineering Science
and Computing, Vol. 6, Issue 5, pp. 6122-6131, 2016.
[2] Alansari, Z. et al., "Challenges of Internet of Things and Big Data
Integration" Emerging Technologies in Computing, Vol. 4, Issue [17] Porkodi, R. and Bhuvaneswari, V., The Internet of Things (IoT)
2, pp. 47-55, 2018. Applications and Communication Enabling Technology
Standards: An Overview, International Conference on Intelligent
[3] Ansari, D. B. et al., "Internet of Things (IoT) Protocols: A Brief
Computing Applications, Vol. 3, Issue 2, pp. 324-329, 2014.
Exploration of MQTT and CoAP" International Journal of
Computer Applications, Vol. 179, Issue 2, pp. 9-14, 2018. [18] Rajguru, S. et al., "Analysis of Internet of Things in a Smart
Environment" International Journal of Enhanced Research in
[4] Borgia, E. et al., "Internet of Things: Research Challenges and
Management and Computer Applications, Vol. 4, Issue 4, pp.
Solutions" Computer Communications, Vol. 89, Issue 90, pp. 1-
40-43, 2015.
4, 2016.
[19] Rehman, H. U. et al., "Future Applications and Research
[5] Chaudhry, J. A, "A Survey of Distributed Certificate Authorities
Challenges of IoT" International Conference on Information and
in MANETs" Annals of Emerging Technologies in Computing
Communication Technologies (ICICT), Vol. 10, Issue 6, pp. 68-
(AETiC), Vol. 2, Issue 3, pp. 11- 18, 2018.
74, 2017.
[6] Cooper, J. and James, A., "Challenges for Database Management
[20] Ryan, P. J. and Watson, R. B., "Research Challenges for the
in the Internet of things" IETE Technical Review, Vol. 26, Issue
Internet of Things: What Role Can OR Play?" Systems, Vol. 5,
5, pp.320-329, 2009.
Issue 1, pp. 1-34, 2017.
[7] Data, A. S. et al., "Sensor Networks Attacks Classifications and
[21] Soomro, S. et al., "Artificial Intelligence Enabled IoT: Traffic
Mitigation" Annals of Emerging Technologies in Computing
Congestion Reduction in Smart Cities" IET 2018 Smart Cities
(AETiC), Vol. 2, Issue 4, pp. 28-43, 2018.
Symposium, pp. 81-86, 2018.
[8] Jain, R., "A Congestion Control System Based on VANET for
[22] Sundareswaran, V. and Null, M. S., "Survey on Smart Agriculture
Small Length Roads" Annals of Emerging Technologies in
Using IoT" International Journal of Innovative Research in
Computing (AETiC), Vol. 2, Issue 1, pp. 17-21, 2018.
Engineering & Management (IJIREM), Vol. 5, Issue 2, pp. 62-
[9] Mahmud, S. H. et al., "Potentials of Internet of Things (IoT) in 66, 2018.
Malaysian Construction Industry" Annals of Emerging
[23] Taseko, P., "Application of Internet of Things in logistics-Current
Technologies in Computing (AETiC), Vol. 2 Issue 1, pp. 44-52,
Challenges" Ekonomia, Vol. 7, Issue 4, pp. 54-64, 2015.
2018.
[24] Sanjay, S. V. and Tamale, G. R., "Medicine Reminder and
[10] Mano, Y. et al., "Exploiting IoT Technologies for Enhancing
Monitoring System for Secure Health Using IoT" Procedia
Health Smart Homes Through Patient Identification and Emotion
Computer Science, Vol. 78, Issue 1, pp. 471-476, 2016.
Recognition" Computer Communications, Vol. 4, Issue 1, pp.
178-190, 2015.
Abstract- With time human being has appearance of the environment, the safety, many
discovered many combinations of material to fulfill reduce the effect of global warming, acid rain and
their needs for structural applications. The process various other environmental problems, many wastes can
involved to manufacture maybe energy consuming be hazardous to animals etc., so obviously its beneficial,
as well as by products main not be eco-friendly. however they can often be expensive for exam bio fuel
there are various applications in which higher
is more expensive than normal fuel, also many of the
strength may not be the prime requirement. For
such applications eco-friendly material having the material and products are being developed.
intermediate properties can be used. Moreover, Conventional building technologies like burnt bricks,
the properties of eco-friendly materials can be steel and cement are high in cost, utilize large amount
enhanced without any harm to the environment. in of non-renewable natural resources like energy,
this work eco-friendly material bamboo for minerals, top-soil, forest cover etc. So eco-friendly
structural applications will be discussed. building materials play unmatched role for construction
Keywords-Eco-friendly, composite, structural, purposes.
bamboo, natural fibers Eco-friendly, or green material or environment
I. INTRODUCTION friendly material is beneficial or non-harmful to the
environment, and resource efficient aswell as reusable
In modern era a lot of development in manufacturing and recyclable and biodegradable materials[1]-[4].
processes and techniques came. Now it is possible to Eco-friendly materials reduce waste, pollution and use
prepare more stable biodegradable products. of energy. Damage due toEco-friendly materials to the
Moreover, now it's a known fact that to maintain balance environment is less. The materials used for structural
in the nature the ultimate fact that the fate of any material applications will require some strength based on their
that entering the environment should be biodegradable. applications. Such as in RCC that is the reinforcement
So always the oobjectives should be aiming to use is mild steel bars which have high tensile strength and
material which can be recycled or converted to suitable when used in combination with the concreate which
forms which nature can handle.The production and use has high compressive strength. Theamalgamation of mild
of Eco-friendly will not damagethe environment, few steel and concreate and steel gives the required
eco-friendly materials and techniques red shown in properties in RCC. Although the composites are
Figure 1. mentioned in modern era, but have been used in the
past also such as mixture of soil water with plant waste
have been used for preparation of walls of houses so
that the wall will have high compressive strength as well
as high bending strength. In this paper different types
of eco-friendly materials which are used for structural
applications will be discussed in detail [5]-[10].
Green School and the curved bamboo ceiling in Madrid friendly materials will lead to minimization of waste,
International Airport. pollution and use of energy. Which will help in stablishing
a better balance with the nature.
REFERENCES
[1] E. I. Akpan, B. Wetzel, and K. Friedrich, "Process design for
performance improvement in purely ecofriendly composites for
structural applications," J. Appl. Polym. Sci., vol. 137, no. 21,
pp. 1-14, 2020, doi: 10.1002/app.48719.
[2] K. J. Kowalski et al., "Eco-friendly Materials for a New Concept
of Asphalt Pavement," Transp. Res. Procedia, vol. 14, pp. 3582-
3591, 2016, doi: 10.1016/j.trpro.2016.05.426.
[3] M. A. Dweib, B. Hu, A. O'Donnell, H. W. Shenton, and R. P.
Figure 4. Bamboo architecture: Bali's Green School [12] Wool, "All natural composite sandwich beams for structural
applications," Compos. Struct., vol. 63, no. 2, pp. 147-157,
Bamboo possess a high strength-to-weight ratio, 2004, doi: 10.1016/S0263-8223(03)00143-0.
even more comprehensive strength than brick and [4] P. Antov, V. Jivkov, V. Savov, R. Simeonova, and N. Yavorov,
concrete, and has long life. Having more compressive "Structural application of eco-friendly composites from recycled
wood fibres bonded with magnesium lignosulfonate," Appl. Sci.,
strength and long life makes it suitable for flooring and vol. 10, no. 21, pp. 1-12, 2020, doi: 10.3390/app10217526.
cabinetry. Although, bamboo requires treatment to resist
[5] T. Cardinale, M. D'amato, R. Sulla, and N. Cardinale, "Mechanical
insects and rot.The bamboo may face a problemof and physical characterization of papercrete as new eco-friendly
swelling due to water absorption of water and crack.If construction material," Appl. Sci., vol. 11, no. 3, pp. 1-11, 2021,
the bamboo is not treated, then due to presence of starch doi: 10.3390/app11031011.
Abstract- The boring bar is one of the most the existing hole is a through hole), or it may be
widely used types of tool holders in metal cutting supported at one end (which works for both, through
operations. The turning process subjects the tool holes and blind holes). Line boring (line boring, line-
to vibrations and cutting in deep work piece cavities boring) implies the former. Back boring (back boring,
is likely to result in high vibration levels. The back-boring) is the process of reaching through an
consequences of such vibration levels generally
existing hole and then boring on the "back" side of the
results in: reduced tool life, poor surface finishing
and disturbing sound. Internal turning frequently work piece (relative to the machine headstock).
requires a long and slender boring bar in order to The first boring machine tool was invented by John
machine inside a cavity, and the vibrations generally Wilkinson in 1775.
become highly correlated with one of the
Boring is used for enlarging an existing hole. This is
fundamental bending modes of the boring bar.
Different methods can be applied to reduce the used for getting an accurate size and a better finish to
vibrations, the implementation of the most efficient hole, this improves the quality of work. Boring can do
and stable methods require in depth knowledge small works with accurately and effectively but when
concerning the dynamic properties of the tooling used for making large holes the required boring machine
system. Furthermore, the interface between the should be a special type.
boring bar and the clamping house has a significant
influence on the dynamic properties of the clamped II. MATERIALAND METHODS
boring bar. This report focuses on the dynamic MATERIAL
properties of a boring bar that arise under different
PROPERTIES HIGH SPEED CARBIDE
clamping conditions of the boring bar and are STEELS (HSS) ALLOY
introduced by a clamping house (commonly used Density 7.6 kg/m3 15.25 kg/m3
in the manufacturing industry). The dynamic Young’s modulus 233 GPa 699-696 GPa
properties of a boring bar (for different cases of Ther mal conductivity 20.2 W/M-K 28-88 W/M-K
Poisson’s ratio 0.28 0.2
boundary condition of the boring bar) are presented
partly analytically but also experimentally. METHODOLOGY FOR DESIGN AND
ANALYSIS OF HORIZONTAL BORING
I. INTRODUCTION
SPINDLE
In machining, boring is the process of enlarging a
MODELING
hole that has already been drilled (or cast) by means of
a single-point cutting tool (or of a boring head containing DESIGN PROCESS CAD
several such tools), such as in boring a gun barrel or an Initially 2D drawings were created using sketcher
engine cylinder. Boring is used to achieve greater toolbar; tools in profile tool bar such As line, circle,
accuracy of the diameter of a hole, and can be used to rectangle, points, reference lines etc.… and sketch
cut a tapered hole. Boring can be viewed as the internal- references like grid, vertex, and dimensions are used.
diameter counterpart to turning, which cuts external Modules of PRO/E, Catia V5.
diameters.
1. Sketcher
There are various types of boring. The boring bar 2. Part Design
may be supported on both ends (which only works if
Carbide Alloy and HSS with 200 mm length bar 1. The model and analysis of CNC Horizontal Boring
spindle using Professional Engineering software
The frequency of carbide alloy and HSS boring bar CATIA and ANSYS Work bench was performed in
with 200m length with standard diameter at different the presentwork.
modes are as follows 2. A comparative study between HSS Spindle and
Carbide Alloy is carried out with respective to
frequency.
3. The following conclusion can be drawn from the study
• For 100mm Boring Cutter, the Carbide alloy spindle
produces
Fig 8: Carbide Alloy with 200 mm length
92387 Hz-86600 Hz = 5787 Hz
• For 150mm Boring Cutter, the Carbide alloy spindle
produces
77519 Hz-74349 Hz = 3170 Hz
• For 160mm Boring Cutter the Carbide alloy spindle
produces
Fig 9: HSS with 200 mm length 74314 Hz-70863 Hz = 3451 Hz
Carbide Alloy and HSS with 250 mm length bar • For 200mm Boring Cutter the Carbide alloy spindle
produces
The frequency of carbide alloy and HSS boring bar
with 250m length with standard diameter at different 61606 Hz-60606 Hz = 1000 Hz
modes are as follows • For 250mm Boring Cutter the Carbide alloy spindle
produces
49456 Hz-47749 Hz = 1707 Hz
We finally concluded that, the Carbide Alloy is best
replacement in the place of HSS.
Fig 10: Carbide Alloy with 250 mm length VIII. FUTURE SCOPE
The following are the possible ideas for future work:
I. Spindle stiffness coefficients have substantial effects
on the spindle static and dynamicbehavior. To be able
to get more accurate results and predict the spindle
behavior, the stiffness values of the bearings can be
Fig 11: HSS with 250 mm length found experimentally and included in the analysis.
II. Manufacturing drawings can be made for future 2. Gaurav Vohra, Palwinder Singh, Harsimran Singh Sodhi, - Analysis
prototype testing. and Optimization of Boring Process Parameters By Using
Taguchi Method, International Journal of Computer Science and
III. Prototype manufacturing and testing of the spindle Communication Engineering IJCSCE Special issue on -Recent
can be made. Advances in Engineering & Technology NCRAET-2013, ISSN
2319-7080
IV. Spindle with different properties or precision levels 3. K Ramesh, T Alwarsamy and S Jayabal, -Prediction of cutting
and their effects on the rigidity and accuracy can be process parameter in boring operations using artificial neural
investigated. networks?, Journal of Vibration and Control, DOI: 10.1177/
1077546313495253
IX. ACKNOWLEDGMENT 4. T.Alwarsamy, 1 2S.Vetrivel and 1S. Nadarajan, -Theoretical
Cutting Force Prediction and Analysis of Boring Process Using
Our first and foremost thanks to the almighty for his
Mathcad, World Applied Sciences Journal 12 (10): 1814-1818,
blessing in the successfully completion of my project 2011 ISSN 1818-4952
report. 5. M. Senthil kumar, K. M. Mohanasundaram and B. Sathishkumar,
-A case study on vibration control in a boring bar using particle
We express my sincere gratitude to my guide Mr.
damping'', International Journal of Engineering, Science and
M. SANKAR M.Tech, professor, Department of Technology Vol. 3, No. 8, 2011, pp. 177-184
Mechanical Engineering for his supervision and timely 6. G.M.Sayeed Ahmed, Hakeemuddin Ahmed , Syed Safiuddin
guidance switch valuable pieces of advice during the Samad, - Experimental Investigation of Effect of Tool Length on
course of my project. Surface Roughness during Turning Operation and its Optimization
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE)
X. REFERENCES e-ISSN 2278-1684,p-ISSN: 2320-334X, Volume 7, Issue 2 (May.
- Jun. 2013), PP 73-80
1. Show-Shyan Lin, Ming-Tsan Chuang, -Optimization of 6061T6
7. G.-L. Chern, Jia-Ming Liang, -Study on boring and drilling with
CNC Boring Process Using the Taguchi Method and Grey
vibration cutting, International Journal of Machine Tools &
Relational Analysis, The Open Industrial and Manufacturing
Manufacture 47 (2007) 133-140.
Engineering Journal, 2009, 2, 14-20 2]
Abstract- The heavy earth moving machineries energy saving and with reduced amount of time.(6)To
(HEMM) like hydraulic excavators play a major improve the productivity and safety of construction site
role in the construction and mining industries. In an integration of AMC/G with a multi-agent system and
an industry of mining and construction, a hydraulic the RTS. The use of RTS makes one to follow the correct
excavator plays a major role in action to perform a procedure of safety and productivity and also by
carry an heavy load. Employing the technology of
enhancing the transition of RTS through AMC/G causes
automation, an alternative solution is made to
replace the manual operation. By addressing the an great change in productivity, site safety and project
concept of automation in construction, the management.(7)In every mass production there should
inevitable usage of embedded is accumulated to be an shop floor section to carried out a specific tasks
introduce in earthmovers. In a mass production or to meet the production rate. Some of the shortcomings
construction site, unplanned work would lead to like unavailability of tools and sudden damage of tools
time-consuming and fault. To overcome the major and excess inventory control, between those above
disadvantage of time-consuming, so mentioned aspects. makes the operator weary to carry
implementation of automation is made on over the finished part from that place to testing. It also
excavators. This could be made workers do other causes intangible work load for operator.
work sequentially with half monitoring the working
process of excavator. This also favors the firm or 2. MATERIALS AND METHODS
industry to increase the work capability with an
adequate number of laborers.
The aim of this chapter is to describe various
materials used and methodology used to make different
Keywords- Excavator, Embedded programme, parts. The conceptualization, designing, analysis of links
solenoid valve, pneumatic actuators with their line diagrams are dealt in this chapter.
1. INTRODUCTION Fabrication of CPC and heat pipe are also discussed.
The characteristics of various components and their
As we see in the excavator part in the JCB is
specifications along with their dimensions were taken
operated by using manual lever mechanism with the help
into account.
of hydraulic concept facing an issue of inefficiency in
the system because of force reduction exerted on the Methodology
system. The following(3) have done on research about • Conceptual development of model
to eliminate the difficulties of ground clearance and
mechanical vibration of links.Through the LUCIE • Flow chart
programme made to follow the organized robotics • Collection of materials
following with the concept of automation.(4)The
concept of unmanned excavator made to offer facility • Fabrication
for local workers to automated in the hazardous area 2.1 Conceptual design
using sensor and camera recording.(5)While on the eye
The conceptual design of excavator done with the
of economy side especially coal mining industry, bucket
help of solidworks as shown in fig.1
wheel excavator plays an major role to increase the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 789
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fig.1 Fig.2
is known to be bridge rectifier again step down to 5V. 3.1. Embedded C program
It converts AC to DC supply. The embedded C program has the set of instructions
2.7.4 IC circuit to perform, monitor, automate the hydraulic excavator.
The following set of program have one of the illustration
This 5V is being processed by PIC16f877a in which for the working model of excavator. The working
the instructions are stored. These instructions are send operation of excavator approximately runs for 23 secs
to relays for individual operations. Inside the IC chip, with the extraction and retraction of every individual
contains RAM and ROM. It has 32-bit memory. arms and excavators bucket with set of allocated time
2.7.5 Relay: duration.
A relay is an electrically operated switch. It consists #include<pic.h>
of a set of input terminals for a single or multiple control #include"4 BIT LCD HEADER FILE.h"
signals, and a set of operating contact terminals. The
switch may have any number of contacts in multiple #define X1_WHEEL RD0
contact forms, such as make contacts, break contacts, #define X2_WHEEL RD1
or combinations thereof. The relay coil has Input voltage #define Y1_WHEEL RD2
15volts, output voltage 230volts and one input and two
input terminals. #define Y2_WHEEL RD3
Finally the operating voltage of 230V is supplied to #define Z1_WHEEL RC4
solenoid valve by the common supply unit from relay. void X_Forware()
3. PERFORMANCE TESTING {
The automation of excavator can be studied by using X1_WHEEL = 1;
both the Fluidsimu software and embedded C software. X2_WHEEL = 0;
TracePro is one of the most powerful and sophisticated
fluid flow analysis and design software. The Electro- }
hydraulic excavator model designed in solidworks is
imported to the Fluidsim software and the fluid flow
void X_Reverse()
were traced. The final result by the respective software
shows that flow of fluid through the respective hydraulic {
cylinders and with the help of micro-controller makes X1_WHEEL = 0;
it to study the sudden drop and time adjustment of fluid
flow inside the cylinders. With the help the embedded X2_WHEEL = 1;
C program helps to study the automation of excavator. }
The below figure 4.3 shown represent the input given
in the Fluidsim software.
void Y_Forware()
FluidSIM is a comprehensive software for the
creation, simulation, instruction and study of Y1_WHEEL = 1;
electropneumatic, electrohydraulic and digital circuits. Y2_WHEEL = 0;
You'll be able to create circuits easily by using
drag&drop. You only have to place the items in the }
circuit as you want to view them and build the circuit
intuitively. Simple and effective.
void Y_Reverse()
{ __delay_ms(3200);
Y1_WHEEL = 0; All_Stop();
Y2_WHEEL = 1; }
}
void Y_F_Dip()
void Z_Forware() {
{ Y_Forware();
Z1_WHEEL = 1; __delay_ms(6000);
} All_Stop();
Z_Forware(); while(a)
__delay_ms(3200); {
All_Stop(); X_F_Dip();
} a--;
}
void main()
{ while(b)
TRISD=0X00; {
PORTD=0X00; Y_F_Dip();
b--;
TRISC=0X00; }
PORTC=0X00;
while(c)
ADCON1=0X06; {
X_R_Dip();
TRISB=0x00; c--;
PORTB=0X00; }
TRISE=0x00; while(d)
PORTE=0X00; {
Y_F_Dip();
Lcd_Initialization(); d--;
Lcd_String("hello",1,0); }
int a=3,b=1,c=3,d=1,e=3; e--;
while(1) }
{ Y_Reverse();
while(e) __delay_ms(6000);
{ All_Stop();
Lcd_Cursor(2,0);
Lcd_Data(e+48); while(1);
}
a=3,b=1,c=3,d=1; }
IV. RESULTS AND DISCUSSION 6. This relay could capable of acting swith, so it allows
the further voltage supply to next stage by following
The hydraulic excavator was designed and fabricated the instructions stored in IC chip.
as explained in chapter 3.1 to 3.12. Overall
specifications with economic analysis, cost estimation 7. Among the four relay only one is capable to allow
the supply for further stage and if one closes then
of various components used in the CPC and test results
another relay get opened the way for supply.
found were dealt in this chapter. In addition, the
comparison of results by varying different parameters 8. This relay converts the 12V to again 40V supply and
also done. then passed to the solenoid valve where the hydraulic
cylinders have connected.
4.1 Fabricated prototype 9. The compresser (4 ~7 bar) connected to the main
The design of the components was done using unit of solenoid valve from that it is distributed to the
Solidworks modelling software and fabricated. The individual valves.
evacuated tube, tanks, used were readily available in 10.When the signal is given to one of the valves, cylinders
the market. The temperature indicator, light was also retraces with the help of oil filling through compressor.
readily available in themarket. The fabricated prototype
have shown in fig.3. REFERENCES
[1] Bradley, D. A., & Seward, D. W. (1998). Journal of Intelligent
and Robotic Systems, 21(1), 73-97
[2] Ding, R., Zhang, J., Xu, B., & Cheng, M. (2018). Programmable
hydraulic control technique in construction machinery: Status,
challenges and countermeasures. Automation in Construction,
95, 172-192
[3] Gottvald, J., & Kala, Z. (2012). SENSITIVITY ANALYSIS OF
TANGENTIAL DIGGING FORCES OF THE BUCKET
WHEEL EXCAVATOR SCHRS 1320 FOR DIFFERENT
TERRACES. Journal of Civil Engineering and Management,
18(5), 609-620
[4] He, Q., Hao, P., & Zhang, D. (2008). Modeling and parameter
estimation for hydraulic system of excavator's arm. Journal of
Central South University of Technology, 15(3), 382-386.
[5] He, Q., Zhang, D., Hao, P., & Zhang, H. (2006). Modeling and
control of hydraulic excavator's arm. Journal of Central South
Fig.3 University of Technology, 13(4), 422-427.
[6] Lee, J., Kim, B., Sun, D., Han, C., & Ahn, Y. (2019). Development
4.2 Working of Unmanned Excavator Vehicle System for Performing
1. The working of the Electro-hydraulic excavator is Dangerous Construction Work. Sensors, 19(22)
described in this portion. [7] Masuti, P. M., & Dabade, U. A. (2019). Lean manufacturing
implementation using value stream mapping at excavator
2. The voltage of 430V is supplied to the circuit of micro- manufacturing company.
controller.
[8] Rossi, A., Vila, Y., Lusiani, F., Barsotti, L., Sani, L., Ceccarelli, P.,
3. The voltage is passed through the bridge rectifier to & Lanzetta, M. (2009). Embedded smart sensor device in
make the step-down the 430V-12V. construction site machinery. Computers in Industry, 108, 12-20.
[9] Zhang, S., Minav, T., Pietola, M., Kauranne, H., & Kajaste, J.
4. The voltage of 12V is passed to IC chip of PIC16f877a (2019). The effects of control methods on energy efficiency and
in which the instructions are stored to make the task position tracking of an electro-hydraulic excavator equipped with
performance of individual arm. zonal hydraulics. Automation in Construction, 100, 129-144.
Abstract: All renewable energy resources not Considering the nature of solar power, a working solar
only reduce the carbon foot print but also help to energy generator requires two components. A collector
reduce dependency on fossil fuels too. The wind and a storage unit are the two components. The collector
energy, biomass and solar energy are the major merely absorbs the radiation that falls on it and turns a
alternative energy options; out of which solar fraction of it into other energy types (either electricity
energy which is available in ample quantity and can
and heat or heat alone). Because solar energy is non-
be used for cooking, heating and power generation
purpose too. The objective of present work is to constant, the storage unit is required; at times, only a
investigate effect of direction of twist of twisted very little amount of radiation will be collected. The
tape inserted in evacuated tube solar water heater. amount of energy generated by the collector will be
quite modest at night or during periods of thick cloud
Keywords: Solar Energy, Fossil Fuels,
cover, for example. The storage unit can store extra
Evacuated Tube Solar Water Heater, Twisted Tape.
energy generated during high-production periods and
1. INTRODUCTION release it when productivity lowers. In reality, a backup
The sun is the lifeblood of everything on the planet. power supply is frequently included as well, in case the
As society progresses, it uses energy in diverse forms amount of energy needed exceeds both the amount
at each stage. The level of development of a country is produced and the amount stored in the container. Solar
determined by its energy consumption per capita. This power for solar thermal power is the most potential of
leads to the more general conclusion that the higher the the unconventional energy sources, based on present
energy consumption per capita, the more developed industrial growth and environmental implications. Solar
the country. There are many different types of energy energy is an endless source of energy that has the
sources that can be classed as conventional or non- potential to meet a major fraction of all nations' future
conventional. However, given the limitations and harmful energy needs while causing the least amount of
nature of conventional sources, transitioning to non- environmental damage. Solar energy for solar thermal
conventional sources is becoming increasingly plants is the most probable of unconventional energy
necessary. Solar energy is a diverse energy source since sources, based on the current industry growth and
solar radiation is available all around the world, is non- environmental implications. Solar energy has been
polluting, and is simple to convert into numerous suggested as a possible alternative energy source for
required forms. There are three roles performed in any the future. The use of solar thermal energy is critical for
solar energy system for space heating: solar energy protecting the environment and traditional energy
collecting, storing, and distributing of that energy (heat) savings. S. Jaisankar et al. [1] investigated a number of
from storage to living area. These three roles are methods for improving the thermal efficiency of solar
performed in different ways by the two major kinds of water heaters. A full assessment of the limits of existing
solar space heating systems - active and passive. research, the research gap, and potential modifications
is also included. One of passive heat transmission
strategies that has been used is twisted tape. Although were alternately put in 18 mm ID and 20 mm ID
it is frequently used in heat exchangers, its use in solar evacuated tubes, with experimental observations taking
water heaters is limited. Anand Patel et al. [2, 3, 4] place every 30 minutes.
published experimental results on a solar water heater
that used helix and serpentine shaped tubing, and a solar
water heater that used phase change material (PCM).
O.P Shukla et al.[5] used CFD to evaluate the
performance of a solar water heater using a flat - plate
solar collector and evacuated tubes having fin tubes. Fig. 1(a) Experimental Set Up
For heating, a flow rate of around 2 litres per minute is
ideal. The heaters should be used intermittently to heat
a batch of water for 15 to 20 minutes, or until efficiency
drops under and then fresh water should be run through
it. Aman Sharma et al.[6] investigated the use of an
evacuated solar water heater in a variety of applications. Fig. 1 (b) Evacuated Tube with Twisted Tape
50 REFERENCES:
1. S. Jaisankar, J. Ananth, S. Thulasic, S.T. Jayasuthakar, K.N.
Sheeba, A comprehensive review on solar water heaters,
40 Renewable and Sustainable Energy Reviews 15 (2011). PP. 3045-
A 3050.
10
2. Anand Patel and Sadanand Namjoshi, "Phase change material
30 B based solar water heater," International Journal of Engineering
Science Invention., vol. 5, no. 8, August 2016. PP. 31-34.
20 0 3. Patel A, Parmar H, Namjoshi S 2016 Comparative thermal
performance studies of serpentine tube solar water heater with
Fig.3 Temperature Variation for Medium Flow Rate straight tube solar water heater. IOSR Journal of Mechanical and
Civil Engineering (IOSR-JMCE) 13, PP. 79-83.
50
4. Anand Patel, Divyesh Patel, Sadananad Namjoshi Thermal
Performance Analysis of Helical Solar Water Heater, International
40 Journal of Innovative Technology and Exploring Engineering
A (IJITEE) ISSN: 2278-3075, Volume-5 Issue-3, August 2015. PP
30 67-69.
B 5. O.P Shukla, Deepanjal Kumar Gupta, Performance Evaluation
20
0 of Solar Water Heater by Using Flat Plate Collector and Evacuated
Tubes with Fin Tube Using CFD, October 2018 IJIRT Volume 5
10 Issue 5 ISSN: 2349-6002.
Fig. 4 Temperature Variation for High Flow Rate 6. Aman Sharma and A. K. Pathak, "Evacuated tube solar collectors
importance and innovations in wide range applications,"
Table 1 Mass Flow Rate of Water for Solar Water Heater International Journal of Scientific and Technical Advancements,
Flow Time Required to fill Flow Rate (lps) Volume 2, Issue 4, PP. 39-44, 2016.
1000ml Flask (s) 7. Jain Pankaj K, Mutalikdesai Sachin V, Bharambe Ganesh P,
Low 735 0.00136 Performance evaluation of evacuated glass tube solar collector
Medium 695 0.00144 with latent heat storage material 2016. IJEDR Volume 4, Issue 3
High 617 0.00162 | ISSN: 2321-9939.
4. CONCLUSION
The most interesting conclusion drawn from the
present work is that the direction of twisted tape highly
influences the temperature gain of water in case of
evacuated tube solar water heater.
Abstract- the word "composite" refers to the implementation of complex medical devices permit
combination, on a macroscopic scale, of two or increased patient survival, significantly improve quality
more materials, different for composition, of life and contribute to increase life expectancy. The
morphology and general physical properties. In word "composite" refers to a heterogeneous
many cases, and depending on the constituent combination, on a macroscopic scale, of two or more
properties, composites can be designed with a view
materials, differing in composition, morphology and
to produce materials with properties tailored to
fulfill specific chemical, physical or mechanical usually physical properties, made to produce specific
requirements. Therefore over the past 40 years physical, chemical and mechanical characteristics. The
the use of composites has progressively increased, combination of different elements results in a material
and today composite materials have many different that maximizes specific properties. The advantage of
applications, i.e., aeronautic, automotive, naval, and composites is therefore that they show the best qualities
so on. Consequently many composite biomaterials of their constituents, and often exhibit some properties
have recently been studied and tested for medical that the single constituents do not have. Moreover,
application. Some of them are currently composite materials allow a flexible design, since their
commercialized for their advantages over structure and properties can be optimized and tailored
traditional materials. Most human tissues such as to specific applications. Different types of composites,
bones, tendons, skin, ligaments, teeth, etc., are
already in use or currently investigated for various
composites, made up of single constituents whose
amount, distribution, morphology and properties biomedical applications, are presented in this paper.
determine the final behavior of the resulting tissue Specific advantages and critical issues related to the
or organ. Man-made composites can, to some use of composite biomaterials versus traditional materials
extent, be used to make prostheses able to mimic are also pointed out.
these biological tissues, to match their mechanical
behavior and to restore the mechanical functions 1. CARDIOVASCULAR APPLICATIONS
of the damaged tissue. Different types of Various congenital or acquired lesions related to the
composites that are already in use or are being heart and blood vessels lead to severe functional diseases
investigated for various biomedical applications are requiring surgical treatments. Cardiovascular devices
presented in this paper. Specific advantages and are therapeutic supports for heart and blood vessels.
critical issues of using composite biomaterials are
Thrombus formation is the most critical issue for
also described (Journal of Applied Biomaterials &
Biomechanics 2003; 1: 3-18)
materials placed in contact with blood and is strongly
dependent on surface characteristics, implantation site,
Keywords: Biomaterial, Composite, duration, local hemodynamics, etc. The development
Biocompatibility, Bio-functionality, Medical device, of a perfect hemocompatible material is still an unsolved
Prosthesis, Implant
problem. At present, composites are not used in clinical
The use of natural or synthetic materials to substitute practice but there are some studies on the possibility to
or integrate body functions or organs, damaged by use these materials as vascular grafts. Porous
traumatic or pathologic events, to assist tissue healing polyethylene terephthalate (PET),
or to correct abnormalities, dates far back to the polytetrafluoroethylene (PTFE) or polyurethane (PU)
beginning of medicine into ancient civilizations. impregnated with collagen or gelatin have been studied.
Therapeutic innovations and the design and
798 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The hard dental tissues, mainly enamel and dentine, Tissue engineering is an emerging area in medicine
are natural composites made of collagen and involving cells manipulation to promote the regeneration
hydroxyapatite (HA) microcrystals. The use of and healing of defective natural tissues or the
composites materials in dentistry, mainly polymeric development of biological substitutes that restore,
matrix composites, has considerably grown in the last maintain or improve tissue and organ functions. The
years substituting in some cases more traditional combination of natural or synthetic scaf folds with cells
materials. Polymer matrix composites are used in may provide an alternative to both organ transplantation
restorative dentistry to fill cavities, to restore fractured and implantation of mechanical medical devices unable
teeth and to replace missing teeth. to perform all functions of a tissue or an organ.
5. ORTHOPEDIC APPLICATIONS
Orthopedics is the medical area where application
of the biomaterials is highly developed both for
commercialization and research purpose. The use of
composites in orthopedics offers a variety of new
implant design and the possibility to tailor specific device Current applications of composite biomaterials in
properties. Composite materials can reproduce both medicine are still remarkably less than expected a few
the macroscopic and microscopic structure and the most years ago. In many biomedical applications, the research
important mechanical properties of the natural tissues. and the testing of composites has been introduced and
Composites materials are studied and tested to improve highly developed, but only in a very few cases an
the performance and the long-term stability of femoral industrial production and commercial distribution of
stems and bone cement, to replace cartilage, to medical devices partially or entirely made of composites
reconstruct tendons and ligaments and as bone grafts. has started. The use of these materials requires a
complete understanding of the objectives and limitations
involved. The main critical issues are summarized as
follows:
• There are not enough reliable experimental and clinical
data supporting the long-term performance of
composites with respect to monolithic traditional
materials;
• The design of composite materials and components
is far more complex than that of conventional
Fig. 3 - Internal fixation devices made of u-HA reinforced monolithic materials as a consequence of the large
PLLA.
number of additional design variables that must be
considered;
• The available fabrication methods may limit the
possible reinforcement configurations, may be time
consuming, expensive, highly skilled and may require
special cleaning and sterilization processes;
• There are no satisfactory standards yet for the testing
of the biocompatibility of composite implants because
the ways in which the different components of a
composite material interact to control the overall
response to an implant are not completely understood;
• There are no adequate standards for the assessment
Fig. 4 - Commercial artificial ligament explanted because of
of composites fatigue performance because the
fatigue failure and synovitis onset. fatigue behavior of composite materials are far more
complex and difficult to predict than that of traditional
CONCLUSIONS materials.
The use of composite materials for biomedical The mentioned critical issues have to be solved
applications offers many new options and possibilities before widespread commercial use can be made of
for implants design. As a matter of fact, composite composites in biomedical applications. However, the
materials and components can be designed to obtain a future perspectives for the use of composite materials
wide range of mechanical and biological properties. The in medicine are encouraging and promising both in
implant structure and its interactions with the surrounding existing implants, where the use of more flexible materials
tissues can be optimized by varying the constituents, may enhance the prostheses stability, and in other
the type and distribution of the reinforcing phase and important clinical areas where the availability of new
adding coupling agents. materials may allow the development of entirely new
devices or surgical techniques. In any case the success
of biomaterials research and applications depends on 6. Puckett AD, Fitchie JG, Reynolds SA. Shear bond strengths of
dental composites cured at elevated temperatures. Proceedings
the effective co-operation of clinicians, chemists, of the Biomedical Engineering Conference; 1996; 151-2.
biologists, bioengineers and materials scientists.
7. Schedle A, Franz A, Rausch-Fan X, et al. Cytotoxic effects of
dental composites, adhesive substance, compomers and cements.
REFERENCES Dent Mater 1998; 14: 429-40. 8. Ferracane JL, Condon JR. In
1. Ramakrishna S, Mayer J, Wintermantel E, Leong KW. Biomedical vitro evaluation of the marginal degradation of dental composites
applications of polymer-composite materials: a review. under simulated occlusal loading. Dent Mater 1999; 15: 262-7.
Composites Science and Technology 2001; 1189-224. 9. Sarrett DC, Coletti DP, Peluso AR. The effects of alcoholic
2. Gershon B, Cohn D, Marom G. Compliance and ultimate strength beverages on composite wear. Dent Mater 2000; 16: 62-7.
of composite arterial prostheses. Biomaterials 1992; 13: 38-43. 10. Kinomoto Y, Torii M, Takeshige F, Ebisu S. Comparison of
3. Ensaff H, O'Doherty DM, Jacobsen PH. The influence of the polymerization contraction stresses between self- and light-curing
restoration-tooth interface in light cured composite restorations: composites. J Dent 1999; 27: 383-9.
a finite element analysis. Biomaterials 2001; 22: 3097-103. 11. Sandner B, Baudach S, Davy KWM, Braden M, Clarke RL.
4. Spahl W, Budzikiewicz H, Geurtsen W. Determination of Synthesis of BISGMA derivatives, properties of their polymers
leachable components from four commercial dental composites and composites. J Mater Sci Mater Med 1997; 39-44.
by gas and liquid chromatography/mass spectrometry. J Dentistry 12. Davy KWM, Kalachandra S, Pandain MS, Braden M.
1998; 26: 137-45. Relationship between composite matrix molecular structure and
5. Lovell LG, Lu H, Elliott JE, Stansbury JW, Bowman CN. The properties. Biomaterials 1998; 2007- 14
effect of cure rate on the mechanical properties of dental resins.
Dent Mater 2001; 17: 504-11.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 803
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
804 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 805
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
mm to 150 microns are termed as fine aggregate. The The incombustible mineral elements stick together
river sand and crushed sand are used in combination until they are heavy enough causes them to remove from
as fine aggregate conforming to the requirements of the bottom of the furnaces either in a wet or dry condition
IS: 383. The river sand is washed and screened, to and is transported to handling areas by conveyor or
eliminate deleterious materials and oversize particles. pipe. It is angular in shape and ranges in colour from a
medium brown or medium grey to almost black.
Coarse Aggregate Bottom ash is much coarser and more highly fused than
The fractions from 20 mm to 4.75 mm are used as fly ash, but has a similar chemical composition to fly
coarse aggregate. To know more about the concrete it ash. It does not have any cementations properties due
is very essential that one should know more about the to its larger sizes.
aggregate which constitute major volume in concrete.
Without the study of the aggregate in depth and range, Treatment of Bottom Ash
the study of the concrete is incomplete. The raw bottom ash is collected from the Waste-
Aggregate are the important constituents in concrete. to-Energy plant and taken to a special reprocessing
They give body of the concrete reduces shrinkage and facility. Ferrous (iron, steel) and non-ferrous metals
effect economic. The coarse aggregate may be of (such as aluminium, copper and zinc) are separated,
following types, and all particles above a certain size are broken down
in a crushing facility. The remaining combustible material
(i) Crushed gravels or stones obtained by crushing of is also removed. Then bottom ash is stored for ageing
gravels or hard stone. in order to improve its quality as a construction material.
(ii) Uncrushed gravels or stones resulting from the
natural disintegration of rocks. Bottom Ash Disposal
(iii)Partially crushed gravel obtained as a product of From the power plant, Bottom ash comes as slurry.
blending of above two types. Slurry can be stored in ash pond by the help slurry
pump and pipes.
The normal maximum size is gradually 10 to 20 mm;
however particles size up to 40mm or more have been Water
used in self compacting concrete. Locally available
Water is an important ingredient of concrete as it
coarse aggregate having the maximum size of 20 mm
actually participates in the chemical reaction with
was used in this work. The aggregates were washed to
cement. Since it helps to from the strength giving cement
remove dust and dirt and were dirt to surface condition.
gel, the quantity and quality of water are required to be
Bottom Ash looked into very carefully. Potable water available in
laboratory was used for mixing and curing the concrete
Bottom ash is a by-product of burning coal at thermal
specimens.
power plants. Bottom ash is formed when ash adheres
as hot particles to the boiler walls, agglomerates and As a general guidance, if the water is fit for drinking
then falls to the base of the furnace at a temperature it is fit for making concrete. However, some water
around 12000C. Hence the term "Bottom Ash" is containing a small sum of salt is not suitable for concrete.
coarse, with grain sizes spanning from sand to gravel, Portable tap water available in laboratory with pH value
granular, incombustible by-product, and solid mineral of 7.0± 1 and conforming to the required of IS: 456-
residue. 2000 was used.
Depending on the boiler furnace types, the bottom The strength of concrete depends mainly from the
ash collected is classified into two types: dry bottom binding action of hydrate cement paste gel. A higher
ash and wet bottom ash (more commonly referred to water - cement ratio or water - binder ratio will decrease
as boiler slag). the strength, durability, water - tightness and other related
806 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 807
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
IV. CONCLUSIONS [6] Aswathy P.U, Mathews M. Paul "Behaviour of Self Compacting
Concrete by Partial Replacement of Fine Aggregate with Coal
• From the research work carried over the strength Bottom Ash" International Journal of Innovative Research in
and durability of concrete, the following observations Advanced Engineering (IJIRAE) ISSN: 2349-2163 Issue 10,
Volume 2 (October 2015), 45-52.
are made:
[7] P. Bhuvaneshwari and R. Murali "Strength Characteristics of
• The CBA is a low cost available industrial solid waste Glass Fibre on Bottom Ash Based Concrete" International Journal
which on incorporation with concrete helps in attaining of Science, Environment and Technology, Vol. 2, No 1, 2013, 90
strength, thereby paving way for an eco-friendly - 102.
environment. From the results, it's been inferred that [8] Govindarajan D, Keerthana M, Kumara raja G, Prasanna Kumar
25% replacement of CBA is found to be expedient. R "Experimental Investigation on Replacement of Fine Aggregate
with Bottom Ash in Concrete" International Journal of ChemTech
Therefore the optimum percentage is found to be
Research CODEN (USA): IJCRGG ISSN : 0974-4290 Vol.6,
25%. The durability properties also show optimal No.14, pp 5570-5574, Nov-Dec 2014.
results which help in indulging CBA in concrete.
[9] Jumah Jessica Jaleel V, Maya T M "Influence of Metakaolin on
Concrete Containing Bottom Ash as Fine Aggregate" International
Journal of Research in Advent Technology (E-ISSN: 2321-9637)
Special Issue International Conference on Technological
Advancements in Structures and Construction "TASC- 15", 10-
11 June 2015, 41-46.
[10]M. P. Kadam et al. "Effect of coal bottom ash as sand replacement
on the properties of concrete with different w/c ratio" International
Journal of Advanced Technology in Civil Engineering, ISSN:
2231-5721, Volume-2, Issue-1, 2013.
[11]M.P. Kadam and Y.D. Patil, "Effect of Coal Bottom Ash as Sand
Replacement on the properties of Concrete with different W/C
ratio", International Journal of Advanced Technology in Civil
Engineering, ISSN: 2231-5721, Volume 2, Issue 1, 2013, pp.45-
50.
REFERENCES
[12]Keppert, M., Pavlik, Z., Cerny, R., and Reiterman, P., Properties
[1] Abdus Salaam Cadersa, Jaylina Rana, Toolseeram Ramjeawon of Concrete with Municipal Solid Waste Incinerator Bottom Ash,
"Assessing the Durability of Coal Bottom Ash as Aggregate IACSIT Coimbatore Conferences, 2012, Vol. 28
Replacement in Low Strength Concrete", Journal of Emerging
[13]Kiran M, Sannakki & Sanjith J "Experimental Studies on
Trends in Engineering and Applied Sciences (JETEAS), (ISSN:
Replacement of Fine Aggregates by Bottom Ash for Developing
2141-7016) 5(5): 344-349 (2014).
High Strength Concrete" IMPACT: International Journal of
[2] Abhishek Sachdeva, Gobind Khurana "Strength Evaluation of Research in Engineering & Technology (IMPACT: IJRET)
Cement Concrete Using Bottom Ash as a Partial Replacement of ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 3, Issue 12, Dec.
Fine Aggregates" International Journal of Science, Engineering 2015, 45-48
and Technology, 2015, Volume 3 Issue 6 ISSN (Online): 2348-
[14]Dr.R.Madheswaran, M.Bharath, M.Anjali devi "Utilisation of
4098, ISSN (Print): 2395- 4752.
Pond Ash as Fine Aggregate" International Research Journal in
[3] Aditya Verma, Abhishek Kumar, Ashish Mishra, Arjit Verma Advanced Engineering And Technology (IRJAET) E - ISSN: 2454-
"Utilization of Pond Ash as Partial Replacement of Cement 4752 P - ISSN : 2454-4744 VOL 3 ISSUE 3 (2017) PAGES 2500
Concrete Mix" International Research Journal of Engineering and - 2503 RECEIVED : 25.05.2017 PUBLISHED : 19.06.2017.
Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 03 |
[15]Mahapara Abbas, Ravi Kumar, Dinesh Kumar "Study The Effect
Mar-2016 www.irjet.net p-ISSN: 2395-0072, pages: 511-515.
of Coal Bottom Ash And Limestone Dust as Partial Replacement
[4] P. Aggarwal, Y. Aggarwal, S. M.Gupta "Effect of bottom ash as of Sand and Cement" International Journal of Scientific Research
replacement of fine aggregates in concrete" Asian Journal of Civil and Education (IJSAE),Volume||4||Issue||05||May-2016||Pages-
Engineering (building and housing) vol. 8, no. 1 (2007), PAGES 53635372||ISSN(e):2321-7545.
49-62.
[5] Arumugam K, Ilangovan R, James Manohar D "A study on
characterization and use of Pond Ash as fine aggregate in Concrete"
International Journal of Civil And Structural Engineering Volume
2, No 2, 2011, 466-474.
808 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-In modern days concrete made with resources are used more with small amount of support
cement is probably the most widely used artificial and the general conditions is kept safe from waste
material in the world. Despite this fact, concrete money put in bank. It is put a value on that stone-like
production is one of the concerns worldwide that paste producing is responsible for about 3% of the
impact the environment with a huge impact being complete anthrogenicgreenhouse gas emission and for
global warming due to carbon dioxide emission
5.25% of the complete anthrogenic CO2 emission. As
during the production of portland cement. On the
other hand, when industrial wastes are recycled or
about 50.48% of the CO2 given out during stone like
reused, Carbon dioxide(CO 2 ) emissions are building paste producing is related to the breakdown
reduced and a small amount of material is dumped of limestone during burning,mixing is taken into account
in a landfill and natural resources are saved. as a very working well way to get changed to other
Therefore an attempt is made to replace the cement from CO2 emission.
with granite powder in concrete. In this study, the
The move-forward of common building material
possibility of using granite powder with cement on
technology can get changed to other form the using up
the performance of fresh and hardened concrete.
In this experimental study, granite powder is used of natural resources and powder for a given time starting
in concrete as cementitious material a partial points and make less the weight down of pollutants on
replacement of cement. The replacement of cement general condition. Presently greatly sized amounts of
was made by the level of 6%, 12%, and 20% by granite powder are produced in natural stone processing
weight of cement. For each replacement, a plants with an important force of meeting blow on
compressive strength test was conducted. general condition and humans. This undertaking gives
Compressive strength after 7days, 14days, and 28 a detailed account of the able to be done of using the
days curing was done. From the test results, it was granite thick, soft, wet mix of the liquid and solid parts
found that concrete at the level of 20% partial dust in common building materials producing as not
replacement of cement with granite powder had complete, in the part putting in place of stone-like
better workability and strength of 14 days and 28
building paste.
days curing. The granite powder is available easily
and is free of cost. So it seems to be economical. In India, the granite and granite stone processing is
Keywords- Artificial materials, Global warming, one of the most getting on well industry the effect if
Granite powder. changing granite dust what is in on the physical and
machine-like properties of newly produced and
I. INTRODUCTION hardened common building material have been made
Going away from the waste materials to the general observation. Most common materials used in stone-
condition directly can cause conditions hard question like building paste producing added in plant or sites are
for this reason the use again of waste material has been to do with industry wastes. This is because of, in relation
emphasized. Waste can be used to produce new to the fact that making use of again to do with industry
products or can be used as admixtuires so that natural wastes as mixing materials has special to some science
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 809
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
or trade, money-related and conditions benefits in K. ShyamPrakash and Ch. HanumanthaRao , et.
addition to the moving a lower level of co2 emission al, results of experimental investigations conducted, it
from stone-like building paste producing granite powder is concluded that the quarry dust can be used as a
which is a side-effect of granite processing building in replacement for fine aggregate. It is found that 40%
which goods are made was studied by many persons replacement of fine aggregate by quarry dust gives
making observations for its use in common building maximum result in strength than normal concrete and
material and army fighting device producing as sand then decreases from 50%. The compressive strength is
giving another in place of or stone-like building paste quantified for varying percentage and grades of
giving another in place of material. concrete by replacement of sand with quarry
Granite power is obtained from the crusher units in dust.Ravindra Nagar, VinayAgrawal, AdityaRana,
the form of finer fraction. The highest compressive AnshumanTiwari, et. al, study investigates the feasibility
strength was achieved in samples containing 40% of using granite cutting waste (GCW) as a partial
granite power. This is a physical mechanism owing to substitute of river sand in high strength concrete based
its spherical shape and very small in size. granite powder on strength, durability& micro structural attributes at
dispenses easily in presence of superplasticizer and fills 0.30, 0.35 and 0.40 water cement ratios (w/c) by
the voids between the quarry sand, resulting in a well substituting 0%, 10%, 25%, 40%, 55% and 70% river
packed concrete mix .Granite power can be used filter sand by GCW suggested that 25-40% river sand can
as it helps to reduce the total voids content in concrete. be substituted by the GCW with a favourable influence
Granite powder and quarry rock dust improve on the investigated parameters. The optimum amount
pozzolanic reaction .The quarry rock dust and granite of GCW to be used in concrete depends significantly
powder can be used as 100%substitutes for natural upon water-cement ratio of concrete.Pradeep K. Goyal
sand in concrete .The compressive split tensile and et. al study is conducted to investigate the viable use of
durability studies of concrete made of quarry rock dust marble granite residue (MGR) in concrete mixes. Sand
nearly 15% more than the conventional concrete. The is replaced with GD along with cement (OPC grade
concrete resistance to sulphate attack was enhanced 43) is replaced with MP as 0%, 10%, 20%, 30% &
greatly. 40% by weight for M25 grade of concrete.
The combination of pozzloanic and filler action leads Joseph O. et al., (2012) concluded that the flexural
to increase in compressive and split tensile strengths, and tensile strength properties were found to compare
reduction in bleeding and segregation of fresh concrete, closely with those for normal concrete. Hence, concrete
reduction in permeability, reduction in alkali silica with mixtures of lateritic sand and quarry dust can be
reaction, reduction in sulphate attack, chemical attack used for structural construction provided the proportion
and corrosion attack, leading to increased durability of lateritic sand content is kept below 50%. Both flexural
and reduction in heat of hydration. From the test, specific and tensile strengths were found to increase with
gravity of the fine aggregate 2.65 was obtained. increase in laterite content. Further work is required to
get data for long-term deformation characteristics and
Granite powder can be used as filler as it helps to other structural properties of the experimental concrete.
reduce the total voids content in concrete. Granite These include: shear strength, durability, resistance to
powder and quarry rock dust improve pozzolanic impact, creep, etc. Also, it may be necessary to
reaction. The quarry rock dust and granite powder can investigate the optimum contents of lateritic sand and
be used as 100% substitutes for natural sand in quarry dust in relation to the structural properties of the
concrete. The compressive, split tensile and durability concrete. These will assist engineers, builders and
studies of concrete made of quarry rock dust nearly designers when using the materials for construction
15% more than the conventional concrete. The concrete works.
resistance to sulphate attack was enhanced greatly.
810 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 811
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
812 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 813
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
as a house or factory. Buildings come in a variety of a really reasonable bundle for, Multi-storied building
sizes, shapes, and functions, and have been adopted investigation. The whole input information may be
throughout history for a wide number of factors, from produced either graphically or by writing simple English
building materials available, to weather conditions, to language based commands. It is prepared with the
land prices, ground conditions, specific uses and sophisticated algorithms and state of the craftsmanship
aesthetic reasons. illustrations, dwelling in an amazingly user-friendly
In ancient times, the buildings were not properly environment.
designed according to their requirements because of In this project the analysis and design of G+5
unavailability of good materials and no proper guidelines residential apartment building was designed. The plot
were there for how to use material for different purposes dimensions are 70 x 50 sq. ft contains five floors with
and what strength being required to support various parking in ground floor and each flat occupies an area
load. In that time no codes are available to check various of 1575 Sq.ft. It is residential complex, firstly; Plan is
conditions that prevail after the construction of buildings drafted in AutoCAD software and later it was imported
for various load combinations that's why the buildings in STAAD.pro software and structure generated by
were collapse after sometime due to seismic or wind giving geometric inputs and later applying the member
loads. To avoid this, we need to design a structure properties as per the code provisions and providing
properly. The aim of design the achievement of an support to structure and modelling is done. The dead
acceptable probability that structures being designed load, live load, wind load and seismic loads are applied
will perform satisfactory during their intended life. With and also different load combinations are applied and
an appropriate degree of safety, they should sustain all concrete and reinforcement detailing are also done by
the loads and deformations of normal construction and using this software the design for beams, columns, slab
have adequate durability and adequate resistance to and footing is obtained in STAAD.pro, Shear force,
the effects of seismic and wind. Structure and structural bending moment and displacement diagrams are
elements shall normally be designed by Limit State obtained safe within permissible limits. Similarly,
Method. Account should be taken of accepted theories, calculations were done in ETABS software and
experiment and experience and the need to design for compared the reinforcement percentage results between
durability. Calculations alone do not produce safe, STAAD.pro and ETABS.
serviceability and durable structures. Suitable materials,
quality control, adequate detailing and good supervision II. LITERATURE REVIEW
are equally important. To perform an accurate analysis TejavatVenkatesh et.al (2017), designed and
a structural engineer must determine such information analyzed a hospital building for seismic and wind forces.
as structural loads, geometry, support conditions, and The building was analysed for the reactions toward wind
materials properties. The results of such an analysis forces by using STAAD.Pro and earthquake loads were
typically include support reactions, stress and analyzed by Equivalent static method with base shear
displacements. The informationis then compared to criteria. The G+4 structure was analyzed for structural
criteria that indicate the conditions of failure. Advance stability towards considered forces
structural analysis an examine dynamic response, Aman md et al., (2011) The analysis and design of
stability and non- linear behavior. C+G+5 residential cum commercial building based on
Etabs is a stand-alone basic analysis program with the criteria defined by the IS codes on Stadd.Pro
a special reason highlights for structural plan and software. The load imposed were only dead and live
investigation of building frameworks. ETABS is simple load hence the load combination generated was
to utilize and user-friendly and it is unique in its capacity 1.5(D.L. + L.L.) after which the analysis of the building
to address the total range of tasks included within the was done for the Frame and the resulting Bending
process of structure investigation and plan. ETABS is moments and shear forces were studied. The detail of
814 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
all the building members was represented along with STAAD.Pro is more flexible when compared to
the functions of slab, beam, column, footing and ETABS software in terms of analysis of structure
staircase. From which it was concluded that the
horizontal deflections were within 20mm and the III. METHODOLOGY
structure was safe and economical. And not much
difference was obtained between the results from Kani's
method and Stadd.Pro
Anoop. A, et al., (2016) A project to design a G+5
floor structure at Kalakode, 4km from Paravoor. The
planning of the building was done using the software
Revit 2011 with the help of AutoCAD 2014, and the
structural analysis was done in Stadd.Pro.V8i The
project considered the load cases on basis of the Indian
standard codes IS1893:2002 for seismic load, IS 875
Part 3 for wind loads, IS 875 Part 1 for deadloads and
Part 2 for live loads. The combinations of these loads
were generated on the basis of IS 875 Part 5. And the
design was done on the basis of IS 456:2000. After
analysis, it was concluded that the graphical input
generation provided by Stadd. Pro allows the generation
of a graphical model of the structure IV. STATEMENT OF PROJECT
D. R. Deshmukh et.al (2016) Analysis and design Utility of building : Residential purpose
of G+19 Story building using Staad.ProThe design was • No: of floors : G+5
based on Indian Standards on Staad. Pro and was then
compared with respect to the one, made from the manual • Type of construction : RCC frame structure
calculation. The design loads considered were dead • Type of walls : Brick wall
load, live load, seismic load and wind load and were
• Concrete grade : M25
calculated on the basis of Indian Standards. It was seen
that the load was maximum when applied in the x- • Grade of steel : Fe 500
direction (parallel to shorter span) and the deflection • Bearing capacity of soil : 200KN/m2
increases as the height of building increases. The data
regarding take off for material was provided. The results V. GEOMETRIC PARAMETERS
obtained for base shear was 5% more in the case of • Beam = 0.305 m X 0.305 m
Stadd.Pro as compared to manually. It was concluded
• Column = 0.305 m X 0.46 m
in the study that Stadd.Pro is versatile software which
can be used to analyse a building and compute • Slab = 0.125 m
reinforcement. • Wall thickness = 0.230 m
D. Ramya et.al, (2015) compared the design and • Floor height = 3.048 m
analysis over a multi-storey G+10 building with • Riser = 0.150 m
STAAD.Pro and ETABS softwares. The basic wind
speed for this study was taken as 33.0 m/s and the • Thread = 0.280 m
shear force and bendingmoment over each of the • No: of columns = 168
component of the building was calculated for different • No: of beams = 271
combination of loads. This study shows that
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 815
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
A. Advantages of STAADPRO
816 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
VII. MODELLING IN ETABS importance factor and nature and type of soil in that
area loads are generated.
All loads are designed in with accordance with IS-
1893- Part (1) (2002).
B. Wind load
The structure located in Hyderabad town was
B. Advantages of ETABS associated to self weight or dead load and the Intensities
1. Load combination as per your defined building code of wind loads were generated by taking into account
creates automatically; you do not need to define them the known wind intensities at diverse elevations and
individually which saves lots of time. firmly follow by the specifications of IS 875: part iii
2. Automatic creation of Earthquake and Wind load (1987). Wind speed is taken as 44 m/s in zone
saves lots of time to calculate them manually and
assign them in the 3D Mode
3. Different view options of the 3D model including a
plan view, any side elevation view, and also
customization view created by the modeler.
4. ETABS allows users for Graphic input and
modification. Using these features this software
ensures easy and quick model creation for any type Fig No.3 Wind load in+X-direction
of structure.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 817
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fig No.5 Wind load in + Z direction. Fig No.9 Inner wall load=5.41 KN/m
Fig No.6 Wind load in -Z direction Fig No.10 Outer wall load = 10.83KN/m
C. Deadload
All the permanent structures of building form dead
loads comprise of the weights of walls, and partitions
floor finishes, false ceilings, false floors and the other.
Permanent constructions in the buildings. The dead load
loads may be calculated from the dimensions of various
members and their unit weights. As per IS 875:1987 Fig No.11 Parapet wall load = 2.07KN/m
part 1 D. Liveload
Live load is produced by the intended use or
occupancy of a building including the weight of movable
partitions, distributed and concentrated loads, load due
to impact and vibration and dust loads. As per IS
875:1987 part 2 (cl 2.8) Live load =2.5 KN/m2.
FIG NO 12 Liveload=2.5kn/m
E. Load combinations
1. 1.5DL +1.5LL
Fig No.8 Plate load = 4.15KN/m
2. 1.2DL+1.2LL+1.2WX
3. 1.2DL+1.2LL+1.2WZ
4. 1.2DL+1.2LL-1.20WX
818 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 819
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
820 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 821
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• Based on overall analysis and design we conclude [7] SP 16 (1978): Design Aids for Reinforced Concrete to IS 456:1978
IS Code Book (Indian Standards).
that ETABS gives less percentage area of Steel than
STAAD.pro. [8] Aman, ManjunathNalwadgi, Vishal T, Gajendra, "Analysis and
design of the multistorey building by using STAAD
• It doesn't involve manual calculations hence it saves Pro",International Research Journal of Engineering and
time and increase efficiency. Technology (IRJET), Pg. 887-891, Volume: 03 Issue: 06, June-
2016.
XII. REFERENCES [9] Anoop. A FousiyaHussian, Neeraja.R, Rahul Chandran,
Shabina.S, Varsha.S, "Planning Analysis and Design of Multi
[1] IS 456: 2000 Code of practice for plain and reinforced concrete
Storied Building by Staad.Pro.v8i", International Journal of
[2] IS 875: 1987 (part 1) Code of practice for design loads (other Scientific & Engineering Research, Volume 7, Issue 4, April2016.
than earthquake) for building and structures part 1 Dead loads-
[10]D.R. Deshmukh, A.K. Yadav, S. N Supekar, A. B. Thakur, H. P
unit weights of building material and stored materials.
Sonawane, I. M. Jain, "Analysis and Design of G+19 Storied
[3] IS 875: 1987 (part 2) Code of practice for design loads (other Building Using Staad-Pro", Pg. 17-19, ISSN: 2248-9622, Vol. 6,
than earthquake) for building and structures: Imposed loads Issue 7, (Part-1) July 2016
[4] IS 875: 1987 (part 3) Code of practice for design loads (other [11]Tejavatvenkatesh ,md.Subhan "Design and analysis earthquake
thanearthquake) for building and structures: Wind loads. resistant hospital building"International journal of
research,volume 4, pg.no:10 (2017).
[5] IS: 875 (Part 5) - 1987 for Load Combinations, Indian Standard
Code of Practice for design Loads (Other Than Earthquake) For [12]D.Ramya, A.V.S.Sai Kumar "Comparative Study on Design and
Buildings and Structures. Analysis of Multistoreyed" 4(10), 125- 130, IJESRT, Oct 2015.
[6] SP 34 1987 Hand book on concrete reinforcement and detailing
by bureau of Indian standards.
822 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- In this project, the durability of track the importance and impact of coarse aggregate
concrete with fly ash aggregates (FAA) is studied. on concrete strength.
M20 Grade concrete is selected and designed as
per IS method. The project's major goal is to use A. Fly Ash
(FAA) fly ash aggregates to replace traditional fine Fly ash is one of the wastes produced during coal
and coarse aggregates. Cement and fly ash are
burning. Fly ash is usually collected from power plant
mixed in proportions of 10:90, 12.5:87.5, 15:85,
chimneys, although it can also be found at the bottom
17.5:82.5, 20:80, and 22.5:77.5 to make fly ash
aggregates. The specimen cubes will be caste and of the furnace. Fly ash used to be discharged into the
tested for corrosion depth, workability, pull out atmosphere through the smoke stack, but pollution
strength and pH value of concrete at the end of 7, control technology specified in recent decades now
14 and 28-days curing. Fine aggregate and coarse requires it to be collected before being released. Most
aggregates were substituted with fly ash electric power production facilities in the United States
aggregates in all of these experiments. From the store it on-site.
results, the conclusions were drawn.
Fly ash is made up of silica (silicon dioxide, SiO2)
Keywords- Fly Ash Aggregates, Fine Aggregate, (both amorphous and crystalline) and lime (calcium
Coarse Aggregates, Strength. oxide, CaO). Besides its usage in concrete, where it
I. INTRODUCTION offers both technological and economic advantages to
manufacturers, fly ash is increasingly being employed
Concrete is a combination of cement, sand, in the synthesis of geopolymers and zeolites.
aggregate, and water that is homogeneous. It is
extremely strong in bearing compressive pressures, and II. LITERATURE REVIEW
as a result, it is becoming increasingly popular as a The results of a study on a sintered fly ash aggregate
building material across the world. As the circumstance are given. Material orthogonal testing and a short chilled
requires, use of available materials for concrete firing schedule test were used to create the aggregate.
production and their characteristics in both fresh and It had a high tensile strength (7.8 MPa) and a low water
hardened phases. In the past, most structures were built absorption rate (4.2 percent). This light weight aggregate
out of brick, steel, or wood, depending on the resources concrete has a compressive strength of more than CL60,
available and the nature of the job; however, concrete a slump of more than 20cm, a 60-minute slump loss of
has recently become a popular building material. less than 2cm, and an expansibility of more than 50cm.
Concrete has achieved such prominence in such a Such characteristics fulfil the contemporary concrete's
short time that it now accounts for more than 65 percent high strength and pumpability criteria. This innovative
of all new structures being built across the world. Similar technique has significant economic and social
to other constituents, coarse aggregate is an essential implications for the use of industrial waste residues as
factor to consider when producing better concrete; it well as environmental conservation.
has an impact on concrete strength, and this report will
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 823
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Concrete's mechanical properties and durability mass of the cementation's materials content. Typically,
were examined in an experimental study. These ratios FAC is suggested to get all of the benefits of fly ash
were utilised in self-compacting concretes (0.40 and concrete.
0.36 for water/binder) as well as ordinary Portland The FAC is defined by the following characteristics:
Concrete (OPC) (0.58 and 0.48 for water/cement)
(SCC). There were several methods used to analyse • Very low water to cementitious materials ratio
the properties of concrete including compressive and • Low cement and High fly ash content
splitting strengths as well as electrical resistivity as well
• Requires the application of a superplasticizer to obtain
as rapid chloride penetration (RCPT) and the open
the appropriate properties
circuit potential technique and AC impedance.
Concrete's compressive strength and splitting strength, In order to get the necessary workability, this form
for example, can be improved by carbonation. of concrete frequently requires the application of a
super plasticizer. The amount of fly ash produced is
Concrete's mechanical properties and durability
maximised by careful material selection, proportioning,
were examined in an experimental study. These ratios
and the use of chemical admixtures.
were utilised in self-compacting concretes (0.40 and
0.36 for water/binder) as well as ordinary Portland A. Fly Ash Properties
Concrete (OPC) (0.58 and 0.48 for water/cement)
(SCC). There were several methods used to analyse 1) Workability
the properties of concrete including compressive and When Portland cement is partially replaced with fly
splitting strengths as well as electrical resistivity as well ash in concrete, the amount of water required to achieve
as rapid chloride penetration (RCPT) and the open a particular consistency is reduced, and the workability
circuit potential technique and AC impedance. and slump for a given water content are increased.
Concrete's compressive strength and splitting strength,
for example, can be improved by carbonation. 2) Slump
Carbonation, on the other hand, increased the rate of Slump is a measure of the concrete's workability or
corrosion of reinforcing steel in corrosion tests. The fluidity. The slum of FAC is low because of the lower
following conclusions may be derived from the scope water content in this type of concrete. This low water
of this investigation. content is a result of the water reducing property of fly
(1) As exposure duration rises, the carbonation depth ash. If a higher slump is required for placement of
increases, and greater CO2 concentrations result in concrete it is essential to use a super plasticizer. The
increased carbonation depth for all combinations. dosage of this super plasticizer used will depend on the
characteristics of Portland cement and fly ash used for
(2) At the age of 28 days, the compressive and splitting
strengths of carbonated concrete are somewhat preparing the concrete mix.
greater than those of uncarbonated concrete. 3) Bleeding
(3) As the exposure duration rises, the electrical
Bleeding depends upon the concrete mixture
resistance of concrete increases, whereas the quantity
proportioning. Due of its relatively low water content,
of charge transferred reduces considerably as the
carbonation depth increases. FAC bleeds at insignificant to low levels. Therefore
curing of the concrete should commence as soon as
III. FLY ASH CONCRETE possible.
Engineered concrete systems that use fly ashes as a 4) Setting
partial substitute for fine and coarse particles are known
as fly ash concrete. Fly ash concrete is defined as The use of fly ash as replacement in conventional
concrete with a fly ash content of more than 35% by concrete has a retarding influence on the setting time of
824 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
concrete. The extent of retardation depends on several influenced by grain size distribution and material surface
factors such as the type of fly ash, the fly ash content, roughness. Green pellets were made in the present
the type of chemical admixtures and curing temperature investigation using a concrete mixer as a pelletiser and
of concrete. a combination of fly ash, regular Portland cement, and
When compared to traditional Portland cement water as a binder.
concrete, the ultimate setting time of FAC is two to b) Trial selection for preparing FAA
three hours longer. This is advantageous in hot weather
since it gives you more time to transport and place Each trial is selected separately for the preparation
concrete. Excessive set retardation can be prevented of aggregates. The cement and fly ash are weighted
in cold weather by increasing the temperature or utilising accordingly to meet the proportions appropriate for
set accelerating admixtures. cubes, slices. The quantity of aggregates needed for
casting is derived from the mix design of concrete of
IV. DETAILS OF AGGREGATE FORMING grade M20. Desired proportions such as cement, fly
ash and water are mixed together in the concrete mixer.
A. Production of Aggregate from Fly Ash 'Green Pellets' are formed by the process called
Fly ash aggregates are made out of ingredients such 'pelletisation'. The water is mixed thoroughly until a
as cement, fly ash, and water. Water is the binding bonding takes place between the cement and fly ash.
ingredient that allows the aggregate to form with good
bond properties. The topic of this project is the creation B. Processing and Curing of Fly Ash Aggregates
of FAA. It is described in full below. The prepared 'Green Pellets' is allowed to dry for a
day. Fly ash aggregates are then put for 7 days curing.
1) Proportion for fly ash aggregates The fly ash aggregates were weighted before and after
Water is the binder, which is used to enhance the curing process. It was found that no change was
workability of the aggregates. Cement and fly ash are observed.
components for aggregate preparation. The proportions TABLE 1. SIEVE ANALYSIS
of 15:85 are obtained and put through the 'Pelletisation'
Fine Aggregates Coarse Aggregates
procedure. IS CODE
<4.75mm 4.75mm to 20mm
2) Preparation of FAA C. Water
a) Pelletisation • Water lubricates the fine and coarse aggregates and
It is the agglomeration of moistened particles in a reacts chemically with cement to produce the
aggregate binding paste. It is also utilised to cure the
spinning drum or disc to generate a "fresh pellet" that
concrete after it has been cast into the forms.
may be handled further. The processes involved in the
balling phenomena of powdered materials are used to • Water used for both miming and curing should be
form pellets. When a fine-grained substance is free of a variety of harmful contaminants.
moistened, a thin liquid film forms on the grain's surface, • Portable water is typically regarded as adequate for
and bridges form where the moistened particles come concrete mixing and curing.
into touch with one another. Bonding forces emerge
• Water should not be utilised if it includes sugar, acid,
gradually when the particles spin into balls. A water or salt in excess.
bridge or meniscus is responsible for the first bonding
forces between particles. • For concrete preparation, ordinary tap water is
utilised.
Droplets encase the concave moisturising particle
clusters, which tend to create huge, irregular structures.
The effectiveness of the palletisation process is
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 825
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Result: Result:
826 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• Fill the pycnometer with 200g of dry sand and • Empty and carefully clean the pycnometer. Then, up
calculate the weight of the pycnometer with sand to the conical cap's grip, fill it with pure water and
(W2g). weigh it (W4g).
• Shake the pycnometer to remove the air by filling it • Calculate the specific gravity of coarse aggregate
with distilled water up to the hole in the conical cap. using the provided weights.
Then, using sand and water, calculate the weight of
the pycnometer (W3g). Observation and calculation:
• Empty and carefully clean the pycnometer. Then, up Weight of empty pyconometer (W1g) = 667gm
to the conical cap's grip, fill it with pure water and Weight of pyconometer + coarse aggregate (W2g)
weigh it (W4g). = 1140gm
• The specific gravity of sand is determined using the Weight of pyconometer + coarse aggregate + water
aforementioned weights. (W3g) = 1843gm
Observation and calculation: Weight of pyconometer + water (W4g) = 1545gm
Weight of empty pyconometer (W1g) = 667gm Specific gravity of coarse aggregate =
Weight of pyconometer + dry sand (W 2 g) = = [W2-W1]/ [(W4-W1)-(W3-W2)]
1120gm
= [1120-667]/ [(1552-667)-(1833-1120)] = 2.68
Weight of pyconometer + sand + water(W3g) =
1833gm Result:
Weight of pyconometer + water (W4g) = 1552gm Specific gravity of coarse aggregate = 2.68
Specific gravity of sand = Dry weight of sand/ Weight E. Concrete Mix Design
of equal volume of water
1) General
= [W2-W1]/ [(W4-W1)-(W3-W2)]
Mix design is the process of calculating the
= [1120-667]/ [(1552-667)-(1833-1120)] proportional amount of material in order to get the
= 2.63 required characteristics of concrete. As a result, mix
design is defined as the process of selecting acceptable
Result: concrete components and establishing their relative
Specific gravity of sand is = 2.63 amounts in order to produce concrete with the specified
characteristics in the most cost-effective manner
D. Coarse Aggregate Test feasible. The goal of mix design is to determine the
Procedure: material proportions that will result in concrete with the
desired characteristics. The proportions of the mix
• Weigh a clean, dry pycnometer with the cover on it should be chosen such that the resultant concrete has
(W1g). the necessary workability while still being fresh and can
• In the pycnometer, put roughly 200g of coarse be easily put and compacted for the intended use.
aggregate that has passed through a 10mm screen,
and calculate the weight of the pycnometer with 2) Types of Mix Design
coarse material (W2g). • Mix design technique according to Indian Standard
• Shake the pycnometer to remove the air by filling it suggested guidelines for concrete mix design.
with distilled water up to the hole in the conical cap. • British mix design method
Then, using coarse material and water, calculate the
weight of the pycnometer (W3g). • User mix design method
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 827
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Averag e [2] A.A. Al-Azzawi, A.S. Ali, and H.K. Risan, Behavior of ultra-
Curing Strength in high performance concrete structures, ARPN Journal of
2 strength in
days N/mm Engineering and Applied Sciences, 6(5), (2011) 95-109.
N/mm2
12.42 [3] J.H. Xie, Y.C. Guo, L.S. Liu, and Z.H. Xie, Compressive and
7 12.89 flexural behaviours of a new steel-fibre-reinforced recycled
12.95
DAYS 13.53 aggregate concrete with crumb rubber, Construction and Building
15.36 materials, 79, (2015) 263-272
14 15.92 [4] T. Alagunatrayan, P. Mohanraj, S. Manishankar et al., Engineered
15.97
DAYS 16.64 cement composite enhanced reinforced concrete beams
20.12 usingflexural response: An experimental study, Materials Today:
28 20.53 20.71 Proceedings,https://doi.org/10.1016/j.matpr.2021.07.130
DAYS 21.49 [5] P. Parthiban, S. Kar, A. Kumar Mondal et al., Stress-strain
behaviour of (hpfrc) high-performance fibre reinforced concrete:
VI. CONCLUSIONS Anexperimental study, Materials Today: Proceedings,https://
doi.org/10.1016/j.matpr.2021.07.175
When carbon dioxide from the air penetrates
[6] Asok, G., & George, S. (2016). Investigation on hybrid concrete
concrete and mixes with calcium hydroxide to form using steel and polypropylene fiber. International Journal of New
calcium carbonate, a chemical reaction happens. As Technology and Research, 2(5).
we observed earlier, the conversion of Ca(OH)2 to [7] Parthiban, P. M. E., ME, M. R., MIE, D., & George, S.
CaCO3 by the action of CO2 results in a little shrinkage. Comparative Study on Strength Enhancement of Concrete Using
Magnetic and Normal Water. International Journal of New
• FAAs appear to have a low specific gravity, indicating Technology and Research, 2(5).
that they are light aggregates.
• M20 grade concrete cubes will be made with OPC
43 grade cement.
• Material orthogonal testing and a rapid chilled firing
schedule test revealed good strength and low water
absorption in sintered fly ash lightweight aggregate.
• This aggregate has a compressive strength of more
than CL60, a slump of more than 20cm, a 60-minute
slump loss of less than 2cm, and an expansibility of
more than 50cm in lightweight aggregate concrete.
Such characteristics fulfil the contemporary
concrete's high strength and pumpability criteria.
828 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract - In this era the enemy of human Pollution and Environmental Concerns
population is pollution and water pollution is one
Khan has turned into a sewage dump yard, where
of the most responsible for many hazards. As the
population of Indore is going so fast, Indore is also many industries and municipal sewage have been
dealing with this problem and the prime example dumping solid as well as liquid wastes into it, since the
of this is Khan river. Large amount of waste water rapid industrialization in the70s. As an additional load,
is the major concern of this product. Fenton the household drainage is also dumped into the Kahn
Reaction applied to the treatment of municipal without any purification or cleaning. There have been
sewage water. The importance of water treatment several attempts to clean the river since 1985, but none
to the environment is discussed, followed by the of them have materialized till date.
benefits and limitations of treatment technique.
Chemical fundamentals are focused on the Need of the Project
generation of hydroxyl radicals. This method is Indore city is expanding leaps and bound. It is one
based on the use of radical generators like
of the fastest growing metropolitan cities in India. It's
hydrogen peroxide, Fenton's reagent.
developed industrial sector and the growing IT sector
The aim of study is to treat the water of municipal draws a large group of people and business to settle In
sewage by Fenton reaction for the reduction of the city, temporarily or permanently. This is creating a
chemical oxygen demand(COD) and biological
growing demand for urban infrastructure, especially for
oxygen demand(BOD).
water supply and sanitation.
Index Terms - Pollution, Fenton reaction, BOD,
COD • On account of economic feasibility our project is
sustainable.
I. INTRODUCTION • Efficient cleaning of sewage waste water for
About Khan River household use.
The river Khan or Kahn as it is now known is a The stretch from Krishnapura bridge to Khatipura
river flowing through Indore, the commercial capital of bridge the river is almost in septic condition throughout.
the Indian state of Madhya Pradesh. It doesn't contain The river is used as a ravine through which only
freshwater but instead has become polluted over the domestic and industrial wasteflows.
course of time carries sewage due to pollution. In concern to the environment, Despite large supplies
of fresh water and the natural ability of water to cleanse
Present Status of the Sewerage System
itself over time, populations had become so
The sewerage system of Indore has first conceived concentrated by 1850 that outbreaks of life-threatening
in the year 1936 by the erstwhile Holkars for a diseases were traced to bacteria in the polluted water.
population of 1.5 lakhs and may have covered about Since that time, the practice of wastewater collection
10% of the core city area of 134sq.km. Subsequently, and treatment has been developed and perfected, using
various governing agencies have laid sewers as the some of the most technically sound biological, physical,
development of the city progressed. chemical and mechanical techniques available. As a
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 829
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
result, public health and water quality are protected Most public wastewater treatment plants now
better today than ever before. provide a second stage of treatment known as
The modern sewer system is an engineering marvel. secondary treatment to remove more of the pollutants-
Homes, businesses, industries, and institutions -up to 85 or 90 percental together.
throughout the modern world are connected to a Secondary treatment is largely a biological process.
network of below-ground pipes which transport Air is supplied to stimulate the growth of bacteria and
wastewater to treatment plants before it is released to other organisms to consume most of the waste materials.
the environment. Wastewater is the flow of used water The wastewater is then separated from the organisms
from a community. As the name implies, it is mostly and solids, disinfected to kill any remaining harmful
water; a very small portion is waste material. bacteria, and released to a nearby lake, river, or stream.
At a typical wastewater plant, several million gallons EMERGING TECHNOLOGIES IN WASTE
of wastewater flow through each day -- 50 to 100 WATER TREATMENT
gallons for every person using the system. The amount
of wastewater handled by the treatment plant varies • DUCKWEED - POND TECHNOLOGY - The
with the time of day and with the season of the year. In duckweed based waste water treatment system in
some areas, particularly communities without separate conjuction with pisco culture is one such technology
that has the potential of offering effective waste water
sewer systems for wastewater and runoff from rainfall,
treatment beside providing economic returns as well
flow during particularly heavy rains or snowmelts can as generating employment opportunities in the ruler
be much higher than normal. areas. The duckweed is small free floating aquatic
What happens in a wastewater treatment plant is plant often seen growing in thick mats on nutrient
essentially the same as what occurs naturally in lake or rich fresh and brackish waters in tropical and
stream. The function of a wastewater treatment plant is semitropical climate all over the world.
to speed up the process by which water cleanses • VERMICULTURE TECHNOLOGY- this
(purifies) itself. technology is emerging as an environmentally
A treatment plant uses a series of treatment stages sustainable, economically viable and socially
acceptable technology all over the world. It may be
to clean up the water so that it may be safely released
of the from: Vermi-composting technology (To
into a lake, river, or stream. Treatment usually consists
manage most organic wastes); vermin-filtration
of two major steps, primary and secondary, along with technology (To treat municipal and several industrial
a process to dispose of solids (sludge) removed during waste water); Vermi-radiation technology (to treat
the two steps. and clean up contaminated lands).
Primary Treatment • CONSTRUCTED WETLANDS - They are
In primary treatment, sand, grit, and the larger solids engineered systems that use natural functions,
in the wastewater are separated from the liquid. vegetations, soil to treat waste water. Constructed
wetlands have been used to treat both centralized
Screens, settling tanks, and skimmering devices are
and on site wastewater.
most commonly used for the separation. Primary
treatment removes 45 to 50 percent of the pollutants. • SOLAR DRYING OF SEWAGE SLUDGE -using
heat to evaporate water from sludge. This method,
Secondary Treatment first developed by researchers in Germany, reduces
After primary treatment, wastewater still contains the mass and volume of dewatered solids resulting in
solid materials either floating on the surface, dissolved a product that can be used as a low-grade fertilizer.
in the water, or both. Under natural conditions, these Compared to established technologies, solar drying
can significantly reduce fuel requirements compared
substances would provide food for such organisms as
to conventional dryers. Its disadvantages are that it
fungi, algae, and bacteria that live in a stream or lake.
830 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
does have a large footprint and needs days with Unlike conventional technologies which use strongly
sufficient solar heating. (I've also provided an article oxidant species, under certain conditions AOPs can
from The Guardian about this technology) provides the complete mineralization of pollutants;
IMPACT OF WASTE WATER EFFLUENT ON Used for the destruction of refractory compounds
resistant to other treatments, such as biological
Color in effluent -
processes;
Color from municipal waste water can cause Allow the conversion of recalcitrant compounds
significant aesthetic problem.The reductive anaerobic and refractory contaminants submitted to bio-
process would cleave azo dyes while the aerobic degradation systems;
process would oxidize fragments.
It can be used in combination with other processes
Presence of heavy metals - for pre-or post- treatment;
The possible sources for some metals present in the Possess strong oxidizing power with high reaction
wastewater is the presence of trace metals in processing rates;
chemicals such as sodium hydroxide, sodium
The formation of by-products can be minimized if
carbonates, salt, etc. It is difficult to judge how current
optimized amounts of reactants are employed;
trace metal removal technologies could reduce
concentration to the prescribed standards. Source In many cases, AOPs consume less energy
reductions appear to be the only solution in achieving compared to thermal destruction processes
the trace metal level in the wastewater effluents. The (incineration) of liquid waste waters.
method of treating the khan river's water and reducing Fenton's Reaction
BOD value and COD value will be the Fenton's reaction.
H.J.H Fenton discovered in 1894 that several metals
Total suspended solids (TSS) have a special oxygen transfer properties which improve
It is a water quality parameter used to assess the the use of hydrogen peroxide. Actually, some metals
quality of a specimen of any type of water or water have a strong catalytic power to generate highly reactive
body after treatment in a wastewater plant. hydroxyl radicals (.OH). Since this discovery, the iron
catalyzed hydrogen peroxide has been called Fenton's
Total dissolved solids is another parameter acquired reaction. Nowadays, the Fenton's reaction is used to
through a separate analysis which is also used to treat a large variety of water pollution such as phenols,
determine water quality based on the total substances formaldehyde, BTEX, pesticides, rubber chemicals and
that are fully dissolved within the water. soon.
BRIEF ABOUT FENTON REACTION Applications of the Fenton's reaction:
Treatment methods vary with the wastewater This process may be use to wastewater,
characteristics. In economic point of view, the most contaminated soils and sludges with the following
economical and efficient methods are preferable actions:
compare to the other. Chemical methods, biological
methods and physical methods are the general treatment • Organic pollutant destruction
that are being used and further investigations by • Toxicity reduction
researchers proves that chemical methods are the most • Bio-degradability improvement
efficient and economical compare to the other two
• BOD/COD removal
methods. In general, the following are positive aspects
of Fenton: • Odor and color removal
• Destruction of resin in radioactive contaminated sludge
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 831
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
2. METHODOLOGY Procedure
How does the Fenton's reaction work? Waste water sample (0.5ml, 1ml, 2ml) was taken in
the reflux flask and diluted with distill water up to 20
After addition of the iron and the hydrogen peroxide, ml. Small amount of HgSO4 powder was added. 10ml
they are going to react together to generate some of K2Cr2O7 was added, and then 30ml of sulphuric
hydroxyl radicals as it shows in the following equations: acid - silver sulphate reagent was added slowly with
Fe2+ +H2O2 > Fe3+ + .OH +OH- periodic stirring. The COD sample will then refluxed
Fe3+ +H2O2 > Fe2+ + .OOH + H+ for 2 hours at 150°C. The sample is then cooled and
titrated with FAS using ferrous indicator solution. The
The typical range for the iron dose is 1 part of Fe color change at the end point is blue green to wine red.
per 5-25 parts of H2O2.
BOD
After that the hydroxyl radicals are going to react
with the pollutants to oxidize. BOD is the measure amount of oxygen required for
biological oxidation of the organic matter under aerobic
Electrode Preparation condition at 20°C and for a period of 5 days and is
The Aluminium electrode plates were procured from directly related to the extent of pollution of wastewater,
the local suppliers and cut into the required shape, sewage and industrial effluent.
degreased manually. The Aluminium plates having
Procedure
dimensions 70mm*80mm*1.5mm (thick) were used.
1. 20 ml of water sample is taken in BOD bottle.
Parameters to be assessed
2. Add 1 ml of MnSO4 solution followed by 1 ml Alkali-
COD (Chemical Oxygen Demand) Iodide-Azide reagent.
BOD (Biological oxygen demand) 3. Now add 1 ml of Conc. Sulfuric Acid.
Hardness 4. Add 2-3 drops of starch as indicator.
832 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 833
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
834 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract-For Economic, Environmental, and to date show that such materials have a wide range of
technical reasons, the use of industrial and applications. But in India, just a handful materials have
agricultural waste products in industry has been been tested. Some industrial waste products have been
the subject of research. Sugarcane Bagasse, like investigated in a similar manner. Rural building
Ethanol vapor, is a fibrous waste product of the
construction uses cement and lime kiln dusts, quarry
sugar refining industry. This waste product is
already polluting the environment, necessitating
waste, slag, fly ash, construction & demolition wastes,
immediate waste management solutions. During rice husk ash, bagasse ash, etc.
the sawing and polishing operations, the quarry There are a number of wastes (such as cement and
industry creates a considerable quantity of waste, lime kiln dust) that are amassing throughout the world
mostly in the form of powder, which pollutes and and posing financial and environmental challenges in
harms the environment. disposing of them. Debris disposal is getting more
As a result, the goal of this article is to describe expensive, and as sustainable resource management
and assess the potential for utilising Bagasse Ash becomes more of a priority for many communities,
and Quarry Dust created by brick-making landfilling and incineration are becoming less accepted.
enterprises. Bagasse Ash and Quarry Dust were
used as partial replacements for brick material in Coordination and dedication are required from all
the ratios of 0 percent, 5 percent, 10 percent, 15 stakeholders engaged in dealing with the rising disposal
percent, and 20 percent for bricks of size 22cm problem of these materials, including government
10.5 cm7.5 cm. The bricks were fired at 900°C for agencies, corporations, the public, and specialists.
24 hours before being evaluated for water Recycling and using these resources in the construction
absorption and compressive strength. of buildings is one way to decrease the waste disposal
Keywords- Bricks, Quarry Dust, Bagasse Ash, problem.
Waste Management. A preliminary study was conducted in India to assess
the availability of viable waste materials and their
I. INTRODUCTION
appropriateness for use in building construction in the
A large quantity of garbage is generated in India from country's capital city. In some circumstances, building
industries, construction, agriculture, and other sectors. construction businesses may be allowed to charge for
It is possible that these waste items are harmful since the appropriate use of waste materials that would
they have not been disposed of properly. When carefully otherwise require costly treatment for disposal.
researched, a considerable amount of waste material
may be used in the building industry. Rural building in A. Quarry Dust
adjacent regions can benefit from the use of these waste Various noise, dust and aesthetic control measures
materials because it is both cost-effective and are required in a quarry. Quarries are formed when
environmentally benign. Researchers in India are large rocks are broken down into smaller pieces. This
examining the possibilities for using locally accessible substance is very similar to sand, however it is primarily
trash in construction projects at the moment. The results grey in colour.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 835
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Fine particles from quarry washing, crushing, and This study describes the results of a nonconventional
screening, as well as wet silty clay from sand and gravel brick-making experiment utilising fly ash (FA), quarry
washing, make up quarry dust. Typically, these materials dust (QD), and slab scale (BS). Because the new
are put in ponds or stored in a wet condition. process does not use clay or shale, nor does it require
Dehydration and reclamation of these materials are high pressure on the mould or high temperature kiln
required before usage. For parking lots or low-volume burning, it has significant environmental and ecological
roadways, quarry dust fines can be used to create fill benefits. Billet scale and fly ash have an optimal ratio of
or borrow material, as a concrete and flowable fill filler, 1:1, and billet scale and quarry dust are optimal at 1:1.
for base or subbase stabilisation or as a cement stabilised The bricks created in this study can be utilised as an
subbase material. alternative to regular bricks, according to the results of
this research.
B. Bagasse Ash
Raut. S.P (2011) Development of Bricks from
Ash from bagasse production is used in agriculture.
Various Industrial and Agricultural Waste Material:
Bagasse is the solid waste material left behind after cane
sugar juice has been extracted. Sugarcane bagasse is An rise in environmental concerns has come from
the fibrous residue left over after all the sugar has been the accumulation of uncontrolled industrial or agricultural
extracted. It is utilised as fuel in boilers for heat generation solid waste, particularly in developing nations. It
in the same sector, leaving 8-10 percent of it as trash indicates that recycling such wastes as a sustainable
(SCBA). This ash is regarded to be a trash and is construction material is not only a realistic solution to
disposed of in an ecologically damaging way. the pollution problem, but also a cost-effective alternative
for designing green structures. Waste-Create Bricks
C. Objective were developed by adding different waste materials to
• To use non-conventional materials in the manufacture raw materials at varying degrees, with the goal of using
of bricks. industrial and agricultural waste products as construction
• To test the quality of brick with bagasse ash and materials (WCB). The evaluated strategy for the design
quarry sand. and development of WCB utilising industria is shown
in Figure 1..
• To protect the environment by using non-conventional
materials like bagasse ash and quarry dust which Aigbodion. V. S, S.B Hassan, T.Ause and G.B.
result in substantial depletion of virgin resources. Nyior(2010), Potential Utilization of Solid Waste
(Bagasse Ash):
II. LITERATURE REVIEW
This study describes the chemical and physical
Apurva Kulkarni, Samruddha Raje, Mamta
properties of bagasse ash in order to evaluate its
Rajgor(2013), Bagasse Ash As An Effective
potential for application in industry. For economic,
Replacement In Fly Ash Bricks:
environmental, and technological reasons, research has
After sugar cane has been crushed and juice focused on the use of industrial and agricultural waste
extracted, a fibrous residue called bagasse is left behind. products in the industry. Sugar-cane bagasse, coupled
Depending on the incinerating circumstances, sugarcane with ethanol vapour, is a fibrous waste product of the
bagasse ash (SCBA) may have significant amounts of sugar refinery industry.
SiO 2 and Al 2O3, making it suitable for use as
Mangesh V. Madurwar, Sachin A.
supplemental cementious material (SCM) in blended
Mandavgane,Rahul V. Ralegaonkar(2014 ), Use of
cement systems
Sugarcane Bagasse Ash as Brick Material:
Alaa A.Shakir, Sivakumar Naganathan, Kamal
An use of sugarcane bagasse ash (SBA), a biofuel
Nasharuddin Bin Mustapha(2013), Development of
by-product, as a major raw material for brick
Bricks from Waste Material:
836 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 837
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
2) Sieving
In separating desirable components from unwanted
materials or characterising particles, sieves or sifters
are used. The bagasse ash and quarry dust which is
dried is of different sizes, so to maintain a uniform size
the particle is sieved in IS 2.36mm sieve for bagasse
ash and IS 1.00mm sieve for Quarry Dust. The particle
passing through the sieve is used in manufacturing. Using
sieving to separate particles of varying sizes is a simple
and convenient approach.
In a tiny sieve for sifting flour, the pores are so small
that only very fine flour particles may pass through.
When the sieve is rubbed against the screen windows,
the coarse particles that have been retained are broken
up. Sieves with varying sorts of holes are employed
depending on the types of particles to be sorted.
F. Preparation of Bagasse Ash and Quarry Dust
IV. TESTING OF MATERIALS
In preparation of bagasse ash and quarry Dust the
following process are involved A. Specific Gravity
1) Drying When using a pycnometer, make sure that it is clean
and dry. Cap it tightly and weigh it (W1). pycnometer
Drying is free from liquid or moisture, having or The cap is marked with a vertical line parallel to the
characterised by little or no rain and marked by the pycnometer's axis to guarantee the cap is screwed to
absence of natural or normal moisture. DRYING is a the same mark every time.
mass transfer process that involves the evaporation of
a solid, semi-solid, or liquid to remove water or moisture. Pycnometer is opened by unscrewing cap and adding
For this to happen, there must be a heat source and a 200g of oven-dried soil. When the cap is tightened, the
sink for the vapour that is generated by this process. weight is calculated (W2).
Water is usually always the solvent to be extracted from The pycnometer is entirely filled with water and dried
bio-products and medicines. The bagasse ash collected from the outside. The weight is taken as a percentage
is kept under sunlight for 2 to 3 days. Quarry Dust is of body weight (W3). Clean and dry the empty
brought in wet condition so that they do not fly with air pycnometer. Only water is used to fill the pycnometer's
as they are too fine particles. They are dried at normal chamber. As soon as the cap has been screwed on, it is
room temperature for 1-2 days. wiped dry. The weight is taken as a percentage of body
weight (W4).
838 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
TABLE 1. SPECIFIC GRAVITY OF RED SOIL The Liquid limit of Clay soil is 40%
S.No Weight of each item Weight(kg) The Plastic limit of clay soil is 8.69% and Plasticity
1 Weight of 0.66 index of clay soil is 31.30%
pycnometer(W1 )
2 Weight of pycnometer 0.94 C. Quarry Dust
+ soil(W2) The same specific gravity calculation has been carry
3 Weight of pycnometer 1.54 out for bagasse ash. The specific gravity of quarry dust
+ soil +water(W3 )
is found to be 2.09
4 Weight of water + 1.37
pycnometer(W4 ) D. Bagasse Ash
Specific Gravity = (w2 - w1) / [(w2 - w3) - (w1- w4)] The same specific gravity calculation has been carry
out for bagasse ash. The specific gravity of bagasse
= (0.94-0.66)/[(0.94-0.66)-(1.54-1.37)]
ash is found to be 2
= 2.54
The specific gravity of red soil is found to be 2.54
Fig. 6. Liquid limit for Clay, Red soil and Bagasse ash
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 839
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
VI. CONCLUSIONS
• Bagasse ash and quarry dust is available in large
amount throughout the year. As the production of
bagasse ash and quarry dust is in large quantity, it
can be utilized for the manufacture of construction
material like brick etc.
• It is known from the graph that the compressive
strength of the brick which is partially replaced by
bagasse ash and quarry dust obtain an optimum value
at 20%, at a firing temperature of 9000C for
manufacturing of clay-bagasse quarry brick.
• If the quarry dust and bagasse ash are directly
disposed on land then the permeability of the soil
reduces due to the blockage of pores in soil, which
leads to stagnant of water and becomes the breeding
Fig. 7.s variations in Liquid Limit of various mixtures
place for the mosquitoes causing many diseases to
V. TESTING OF NON-CONVENTIONAL living beings.
BRICKS • Since the disposal of these wastes is costlier it can
After 24 hours of soaking in potable water, two be partially replaced in a brick and also the usage of
clay and red soil is considerably reduced.
bricks from each type are selected for compression
strength testing and water absorption testing. For clay- • The reduction in the weight of bagasse quarry clay
bagasse and quarry bricks, the technique provided in brick without compromising on strength could be
IS 3495-part 1:197(9) for evaluating standard size clay advantageously used for multi-storey construction to
bricks applies. With the use of a compression testing reduce the dead weight of the structure. This brick
machine, the compressive strength is determined. As a can be used to build compound wall and for low cost
construction buildings.
rough approximation, two specimens are tested for each
percentage, and the average of the two results is utilised. • Main conclusion is that the compressive strength of
Water-immersed specimens having a significant amount clay sludge brick is 20- 25% more when compared
of trash did not yield encouraging findings in terms of to conventional brick. This is achieved when clay and
compressive stress and water absorption. Due to the red soil are partially replaced by bagasse ash and
fact that the test specimens did not meet the required quarry dust by 20% each respectively.
dimensions stipulated in the IS code, we manufactured REFERENCES
and examined samples of commercial bricks of similar
[1] R.V. Raikar, V.V. Karjinniand, and V.D., Gundakalle, Study on
size. In order to compare the strength of the lab-scale strength parameters of steel fiber reinforced high strength concrete,
bricks to the strength of standard-size bricks, these data Journal of Applied Sciences and Engineering Research, 1(4)
were used. (2012).
[2] A.A. Al-Azzawi, A.S. Ali, and H.K. Risan, Behavior of ultra-
A. Reduction in weight of bricks high performance concrete structures, ARPN Journal of
Engineering and Applied Sciences, 6(5), (2011) 95-109.
Bagasse ash and quarry dust are used to decrease [3] Aigbodion, V.S, Hassan. S. B, Ause. T and Nyior. G. B, Potential
the bricks' weight. The weight of the brick decreases Utilization of Solid Waste (Bagasse Ash), Journal of Minerals &
Materials Characterization & Engineering, Vol. 9, No.1, pp.67-
as the percentage of trash added increases. In addition, 77, 2010.
the bagasse includes aluminium, a light weight material. [4] Alaa A. Shakir, Siva Kumar Nagana than, Kamal Nasharuddin
As a result of the increased sintering temperature, weight Mustapha, properties of bricks made using flyash,quarry dust
loss did not rise much. and bilet scale, construction and building materials 41(2013) 131-
138.
840 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[5] Faria. K. C. P, Gurgel. R. F, Holanda. J. N. F, Recycling of [10]Asok, G., & George, S. (2016). Investigation on hybrid concrete
sugarcane bagasse ash waste in the production of clay bricks, using steel and polypropylene fiber. International Journal of New
Journal of Environmental Management 101 (2012) 7-12. Technology and Research, 2(5).
[6] Lianyang Zhang, Production of bricks from waste materials - A [11]Parthiban, P. M. E., ME, M. R., MIE, D., & George, S.
review, Construction and Building Materials 47 (2013) 643-655. Comparative Study on Strength Enhancement of Concrete Using
Magnetic and Normal Water. International Journal of New
[7] J.H. Xie, Y.C. Guo, L.S. Liu, and Z.H. Xie, Compressive and
Technology and Research, 2(5).
flexural behaviours of a new steel-fibre-reinforced recycled
aggregate concrete with crumb rubber, Construction and Building [12]IS 3495-part 1:197(9) (Determination of Compressive Strength)
materials, 79, (2015) 263-272
[13]IS 3495-part 2:1992(Determination of water absorption in brick)
[8] T. Alagunatrayan, P. Mohanraj, S. Manishankar et al., Engineered
[14]Is 2720-part 5:1985(Method of test for soil-Determination of
cement composite enhanced reinforced concrete beams
liquid and plastic limit )
usingflexural response: An experimental study, Materials Today:
Proceedings,https://doi.org/10.1016/j.matpr.2021.07.130
[9] P. Parthiban, S. Kar, A. Kumar Mondal et al., Stress-strain
behaviour of (hpfrc) high-performance fibre reinforced concrete:
Anexperimental study, Materials Today: Proceedings,https://
doi.org/10.1016/j.matpr.2021.07.175
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 841
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Nanotechnology is one of most active In the middle of 2003, a chemical that could replace
research areas which have wide application in all micro silica was produced with improved properties at
construction fields. In this paper, a study is carried a lower cost while still meeting ISO14001
out about Nano materials used like nano silica, environmental regulations. Cuore Nano silica was
nanoTio2, and carbon nanotubes which are less
developed using physics, chemistry, and recent Nano
than 500 nano meter. Nano silica has heat transfer.
Nano Tio2 also has heat transfer and UV absorption
technology to create a breakthrough product with
character. By the addition of nano silica, durability superior advantages over micro silica. A barrel full of
and strength performance is increased than micro silica, extra cement, and super plasticizing
conventional concrete. admixtures was equal to a litre bottle of Nano silica. At
28 days, compressive strengths of 70 to 100 N/mm2
Keywords: Nano particles, Nano technology,
concrete, durability. have been recorded.
The addition of nanosilica to cement-based materials
I. INTRODUCTION
can also regulate the deterioration of concrete's
SILICON DIOXIDE NANOPARTICLES fundamental C-S-H (calcium-silicate hydrate) reaction
caused by calcium leaching in water, as well as block
Silicon dioxide nanoparticles, often known as silica
water penetration, resulting in improved durability. High
nanoparticles or nano silica, are found in quartz and
workability with low water/concrete ratios, such as 0.2.
sand in nature. It is the first Nano product to succeed
in replacing micro silica. Nano silica has proven to be TITANIUM DIOXIDE
much superior to the silica used in traditional concrete,
Titanium dioxide is a mineral that is found in
thanks to advances made possible by the analysis of
nature.Rutile and anatase are the two crystal types of
concrete at the nanoscale. For more than 80 years,
nano titanium dioxide. It has a high purity, a particle
micro silica has become one of the most commonly
size average of less than 100nm, excellent clarity, and
used additives in concrete around the world. Its
UV absorption. It is also thermally and chemically
properties allow high compressive strength, toughness,
stable. Photocatalysts are generated using the anatase
and impermeability, and it has been used in a number
crystal form. It can help break down hazardous gases
of significant concrete structures.
and organic pollutants through photo-catalysis when
Its primary drawbacks are its relatively high cost illuminated.
and pollution, all of which have negative consequences
In addition to decomposition of vehicle exhaust and
for the environment and the health of construction
sewage treatment, the anatase form may be used. The
workers. As a powder, micro silica is a thousandth of
rutile crystal form excels at UV absorption, and the
the thickness of cigarette smoke. As a result, operators
Nano titanium dioxide powder has a strong bactericidal
must take extra care to avoid inhaling micro silica, which
powder under the combined action of UV rays and
can lead to silicosis, a fatal lung disease.
oxygen. The rutile type provides a fine and smooth feel
842 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ideal for sunscreens and cosmetics due to its smaller for cement in the M25 mix in amounts of 1%, 1.5%,
particle size and high specific surface area. It's a 2%, 3.5%, and 4%. The impact of nano-silica on the
common ingredient in cosmetics, sunscreen, and high- strength and durability of M25 concrete grades using
quality plastics. nano-silica as a cement substitute is summarised in this
report. The compressive strength of nano-concrete is
CARBON NANOTUBE reduced by more than 3.5 percent when cement is
A carbon nanotube is a tube-shaped substance made replaced with nano-silica. According to the findings of
of carbon with a diameter that is measured in the experiments, the permeability of concrete decreases
nanometers. One billionth of a metre, or 10,000 times as the percentage of nano-silica increases up to 3.5
smaller than a human hair, is a nanometer. CNTs are percent.
unusual in that the atoms' bonds are extremely tight, Due to the pore filling properties of nano materials,
allowing the tubes to have extreme aspect ratios. Vasanthi et al (2017) found that concrete containing
Carbon nanotubes are graphitic carbon tubes on a nano particles has increased strength, toughness, and
molecular scale with exceptional properties. They can reduced pores in the concrete. Nanomaterials are
be several millimetres long and have one "layer" or wall beneficial in extending the life of a structure. The use of
(single walled nanotube) or multiple walls (multiwalled a significant amount of cement results in an increase in
nanotube) (multi walled nanotube). CO2 emissions. Nano Silica creates concrete with a
Carbon nanotubes are a type of graphite that has high compressive strength. It also has a high workability
been updated. Many layers of carbon atoms are bonded while having a low water cement ratio.
in a hexagonal pattern in fiat sheets, with weak bonds Sakthivel and colleagues (2017) By replacing the
between the sheets and strong bonds between them, cement with various percentages of Nano-Silica and
to form graphite. A carbon nanotube (CNT) is made natural hybrid fibres, the effect of Nano-Silica on various
up of a sheet or sheets of graphite rolled into a tube properties of concrete can be determined. For M25
shape. CNT can be single walled nanotubes (SWNT), mix, nano-silica is used as a partial substitute for cement
which look like a single sheet rolled up, or multiwall in the percentages of 0.5 percent, 1 percent, 1.5
nanotubes (MWNT), which look like several sheets percent, 2 percent, and 2.5 percent, and hybrid fibre
rolled up. (coir fibre and human hair) in the percentages of 0.5
percent, 1 percent, 1.5 percent, 2 percent, and 2.5
POLYCARBOXYLATES
percent. Nano-Silica concrete is used to cast the
Polycarboxylates are a type of polymer.Super specimens. At the age of 28 days, laboratory
plasticizers, also known as high-range water reducers, experiments were performed to assess the strength of
are chemical admixtures that are used in applications Nano-Silica concrete. As cement is replaced with Nano-
that involve well-dispersed particle suspension. Poly- Silica, the resulting concrete has a higher strength and
carboxylate ether based super plasticizers are a new lower permeability than managed concrete. As cement
generation of these types of admixtures (PCEs). Due is replaced with Nano-Silica at a rate of more than 3%,
to their chemical structure, which allows for good the properties of Nano-Silica concrete are reduced.
particle dispersion, they allow a water reduction of up
Namdev BapuRajguru and others (2017) This paper
to 40% with a relatively low dosage (0.15-0.30 percent
demonstrates the partial replacement of cement with
by cement weight).
Nano silica at different weight percentages of 1 percent,
II. LITERATURE REVIEW 1.5 percent, and 2 percent to improve the strength
property of concrete, as well as a comparative analysis
Pranay Lanjewar and colleagues (2017)
between concrete without Nano silica and concrete with
Nanotechnology is one of the most active research
Nano silica. The application of Nano silica to concrete
areas, and Nano-Silica is used as a partial substitute
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 843
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
increases its compressive power, according to the concrete can be determined. In the M25 blend,
findings of this article. With respect to dosses, the NanoSilica is used as a partial substitute for cement in
average percentage rise in concrete strength after 3 the proportions of 2.5 percent, 3 percent, and 3.5
days, 7 days, and 28 days is 10.3 percent, 15%, and percent. Nano-Silica concrete is used to cast the
19.43 percent, respectively. specimens. At the ages of 7 and 28 days, laboratory
Rahini and her colleagues (2017) The use of titanium experiments were performed to assess the compressive
dioxide (TiO2) to improve the strength of concrete is strength, split tensile strength, and flexural strength of
the subject of this research. By replacing the cement Nano-Silica concrete. The concrete's compressive
with titanium dioxide (TiO2) of 0.5 percent, 1 percent, strength was increased by using Nano-Silica powder,
and 1.5 percent by water ratio, an experimental according to the findings.The compressive strength of
investigation was carried out. This test on it reveals a concrete initially increased up to 3% Nano-Silica
significant rise in early age compressive strength as well content, but as the Nano-Silica content increases, the
as an improvement in overall concrete compressive compressive strength of concrete decreases.
strength. With an increase in the percentage of nano Rajkumar et al. (2016) In this paper, an attempt is
silica, the intensity increased. made to improve the strength characteristics of concrete
Namdev Rajguru and his associates (2017) The by adding Nano-silica, which not only serves as a filter
partial replacement of cement by Nano silica powder to improve the microstructure but also as an activator
(1 percent, 1.5 percent, and 2 percent) by the weight to facilitate pozzolanic reaction, resulting in improved
of cement is demonstrated in this paper. Then, instead mechanical properties of the concrete mix. Nano silica
of doing a comparative study of compressive strength will substitute up to 1.5 percent of cement. According
of concrete with and without Nano silica, do a to the findings of the water absorption test, nS concrete
comparative study of compressive strength of concrete is more stable than standard concrete. For the M20
with and without Nano silica. Nano silica has the blend, the percentage increase in strength after 28 days
potential to minimise environmental pollution by lowering was found to be 35 MPa for compression and 45 MPa
CO2 emissions in the atmosphere. This paper also for tensile strength.
demonstrates an increase in concrete permeability. Umesh Pendharkar and colleagues (2016) This
Ramachandran and his colleagues (2017) The paper examines recent advancements and the current
behaviour of RC slab structures made of Natural hybrid state of nano alumina, nano titanium dioxide, nano zinc
Fibre (coir and hair) and Nano silica reinforced oxide, and nanosilica for the long-term growth of the
Concrete (NHFRC) was studied in this paper. In the concrete industry. Nano-materials were used to
experiments, different percentages of fibres ranging substitute cement in M20, M30, M40, and M50 grades
from 0.5 percent to 2.5 percent by weight of cement at different percentages (2 percent, 4 percent, 6
were used, as well as different percentages of Nano percent, 8 percent, 10 percent, 12 percent, 14 percent,
silica ranging from 0.2 percent to 4.5 percent by weight 16 percent, 18 percent, and 20 percent). The effect
of cement. The use of NHFRC with Nano silica was decreased by more than 3.5 percent when Nano
enhances slab loading efficiency under static loading, particles were replaced.
according to the test results. As compared to a control Arun Nishchal Guleria et al. (2016) investigated the
slab, the slab with 1.5 percent NHFRC and 3 percent impact of MS and NS on concrete properties at various
Nano silica exhibits a 73.33 percent increase in ultimate percentages in various concrete grades. Concrete
load and 56.97 percent increase in deflection. strength with varying percentage ratios of nano silica at
Balasundaram and colleagues (2016) By replacing 0, 1, 1.5, 2, and 2.5 percent ( percent ) with partial
the cement with various percentages of Nano-Silica, cement substitution. On the 7th and 28th days, the
the effect of Nano-Silica on various properties of maximum increase in compressive strength with nano
844 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
silica was 10%. The power was 38.7 MPa on the 7th clearly confirmed that the workability of nano concrete
day at 10% and 58.5 MPa on the 28th day. increased by more than 90% as compared to monitored
Mohamed and his colleagues (2016) The aim of this M40 Grade concrete. Under normal curing conditions,
study is to look at the bond efficiency of concrete with the compressive strength of nano concrete with nano-
a high volume of nano silica (up to 4.5 percent) that has SiO2 increased by more than 24% at 28 days and more
been exposed to corrosive conditions. In comparison than 18% at 90 days, whereas that of nano concrete
to the control mix (0%) before exposure to the corrosive with nano-TiO2 increased by more than 9% at 28 days
atmosphere, adding 4.5 percent nano silica to concrete and more than 6% at 90 days. When exposed to MgSO4
raised the residual bond strength to 79 percent instead and MgCl2, however, the regular concrete specimens
of just 27 percent. Based on the results of the research, had a higher crushing strength than the nano concretes.
we can infer that Nano silica is an effective pore Malek Mohammad Ranjbar et al. (2015) looked
blocker. into the hardened properties of HPC that included
Renu Tiwaret and others (2016) The study is nanoTiO2 (NT) and Fly Ash (FA). Low-calcium fly ash
primarily concerned with the use of nanomaterials in at a rate of 30% of the binder by weight and TiO2
concrete. Researchers are also working to enhance the nanoparticles at rates of 1, 2, and 3% were considered.
quality and sustainability of concrete, and have found Water absorption by capillarity, ultrasonic pulse velocity,
that integrating nanosilica into the mix has resulted in a chloride diffusion, and resistance to sulphuric acid attack
substantial increase in mechanical properties. The effect were used to evaluate the durability efficiency. The
of adding nanosilica to concrete's compressive strength properties of the samples improved significantly after
is summarised in this review article. 2 percentage points cement was replaced with a mixture of 1% TiO2
At 3 days and 7 days, NS decreases initial and final nanoparticles and 30% FA, according to the findings.
setting time while increasing compressive intensity by Haininet al. (2014) studied the use and efficiency of
22% and 18%, respectively. nano silica in porous concrete pavement, as well as
Mohammad Reza and his colleagues (2016) The previous laboratory studies on the material. Various
effect of combined nanosilica (nS) and microsilica (mS) additives have been studied as a part of the porous
on sulphate resistance of Portland cement (PC) mortars concrete mix to increase the strength of the porous
was compared to all cement control mortars and concrete, but the optimal condition for producing strong
mixtures with only one type of silica. Silica-containing porous concrete has yet to be determined. using a
mortars had a 6% cement substitution of either nS, mS, pneumatic press and a regular Proctor hammer (2.5
or a combination of the two. A 1.5-year cycle of kg) (70 kPa compaction effort).
complete submersion sulphate attack in a 5% sodium Arkadeep Mitra et al. (2014) contrasted the results
sulphate (Na2SO4) solution was used to test the mortars of ground and unground micro-silica with concrete in
in this analysis.it Provided that the combination mixtures' 5, 10, and 15% as a partial replacement for cement to
expansion efficiency was comparable to that of the 3 traditional concrete. In the lab, concrete specimens were
percent mS only mortars, the majority of the beneficial cast and tested for compressive and tensile strength.
contribution from the cement replacement with the
combination mixtures could be attributed to the mS III. CONCLUSIONS
proportion. From above literature study carried out, the following
Mainak Ghosal and his colleagues (2015) This paper points about nano concrete are observed:
looks at how adding nanomaterials (like nano-SiO2 and The above papers show partial replacement
nano-TiO2) to a normal M-40 Grade concrete in the Nanomaterials like nano silica which improves the
right proportions improves its fresh and hardened strength ofconcrete.The tests conducted on cubes,
properties (both short term & long term). The findings cylinders and prismWhich shows compressive, split
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 845
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
tensile and flexural strength increased.The effects of [4] Namdev Rajguru " Review Paper on Multifunctional use of Nano
Silica in Concrete" 2017 IJESC Volume 7 Issue No.4
different ratios of Nano-Silica to cement content were
well investigated, and the optimum ratio of 3 percent [5] P.Vasanthi, S.Senthilselvan, D.Benita Hexton,Mohamed Salman
Farooq, and P.Suresh "Durability Study on Nano Concrete"
was reported.Resistance to permeability was also higher International Journal of ChemTech Research CODEN (USA):
in concrete. Corrosion resistance property of the nS IJCRGG, Vol.10 No.3, page:693-698, 2017
added concrete is comparatively higher than ordinary [6] Patel Abhiyan, RathodHiren A, Neeraj Sharma D, ''Overview on
fly ash concrete.The mass of concrete mixtures including application of nano technology in construction industry'', vol 2,
Page No 6094-6098, November 2013.
fly ash is greater.loss as a result of a sulfuric acid assault
Concrete's workability deteriorates as the temperature [7] Pranay Lanjewar1, Anjali Jaiswal2, Ayushman Jain'' Experimental
Study on the Strength and Durability of Nano-Concrete''
rises.the amount of silica fume present.Nano concrete International Journal of Innovative and Emerging Research in
has a longer lifespan than traditional concrete.traditional Engineering Volume 4, Issue 3, 2017
concrete.Tension cracks appeared in the NHFRC [8] R.sakthivel, K.Rajkumar, R. Roja, Ramya Reji, M.Vigneshvaran
beams as a result of NS in the loaded zone.It's also "Investigation of natural hybrid fiber reinforced beam with
nanoconcrete under cyclic loading" 2017 IJRTI | Volume 2, Issue
possible to deduce that the permeability of concrete 5|
reduces as the percentage of concrete decreases.Nano-
[9] S. B. Gagare1, U. R. Kawade "Enhancing properties of concrete
Silica due to the action of Nano-Silica, up to by using Nano-Silica As A Partial Replacement Of Cement" Ijariie-
3%.Concrete cavities must be filled.The results of the ISSN(O)-2395-4396 Vol-2 Issue-5 2016
water absorption test indicate that ordinary concrete is [10]Sakshi Gupta, Application of Silica Fume and Nanosilica in
more durable than nS concrete concrete. Cement and Concrete - A Review, Journal on Today's Ideas -
Tomorrow's Technologies, Vol. 1, No. 2, December 2013 pp. 85-
The impact of varying Nano-Silica to cement ratios 98.
content was thoroughly examined, and the ideal ratio [11]Saloma, AmrinsyahNasution, Iswandiimran, ''Experimental
of The percentage was reported to be 3%.Nanosilica investigation on nano material concrete'', vol :13 No:03,Page no
Resistance is added to permeability.In concrete, it was 15-20, 2013.
also higher.The usage of a high amount of cement results [12]Yuvraj Shanmugasundaram, Dinesh Nagarajan, ''Behaviour
investigation on the use of nano silica as an additive inconcrete'',
in an increase in the amount of cement used.Emissions vol.3, no 1, Page no 6-12, October 2013.
of CO2.Based on the results of the testing, it has been
determined thatconcrete made with 20% fly ash and
3% nano silicaWhen compared to the individual
components, the combination has better qualities.
Concrete that has been carefully monitored. The nS
added concrete's corrosion resistance characteristic is
Compared to typical fly ash concrete, it has a higher
density.
REFERENCES
[1] Mohammad Reza Sohrabi, Mohammad Karbalaie, ''An
experimental study on compressive strength of concretecontaining
crumb rubber'', vol:11 No:03, Page No 23-27, June 2011.
[2] Morteza. H. Beigi, JavadBerenjian, Iman M Nikbin, ''An
experimental survey on combined effects of fibres and nano silica
on mechanical, rheological and durability properties of self-
compacting concrete'', vol.50, Page No 1019-1029, September
2013.
[3] Nader Ghafoori " Effect of Combined Nanosilica and Microsilica
on Resistance to Sulfate Attack" Fourth International Conference
on Sustainable Construction Materials and Technologies.
846 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Structures can have substantial harms four major layers like inner core, outer core, mantle
or breakdown in light of serious tremors. Past and crust. the formation of earthquake happens due to
examinations showed that underlying harm because collision between two blocks suddenly slip past another
of quake is the reason for enormous dislodging. this is the earthquake start for below the earth surface
As a construction is exposed to the tremor, it
is called hypocentre. during earthquakes generates
results vibrating. Here the fundamental aim of
investigation for the quake safe constructions is
seismic waves travel for along the surface of earth, the
that structures to have the option to oppose minor seismic waves categories mainly two types as body
seismic tremors without harm. So, all the four zones waves and surface waves, the intensity of earthquake
and three kinds of structures are square shape, in forces measured by instrument called seismographs and
addition to Plus shape and U-shape building have recording data is called seismogram.
been taken under thought. SAP 2000 V20
Now a day's earthquake zone areas are massively
(Extended Three-Dimensional Analysis of Building
System) is a product that is consolidated with all
damage to the structural elements like beams, column,
the significant investigation motors that are static, slab and walls, so construct any building to analysis for
dynamic, Linear and non-straight and particularly different structural analysis methods can be categories
this Software is utilized to investigate and plan the as following below.
structures. The current work is to contemplate the 1. Linear static analysis
conduct of a G+5 building exposed to tremor load
by embracing seismic coefficient technique. We 2. Nonlinear static analysis
broke down G + 5 story working for all conceivable 3. Linear dynamic analysis
burden blends [Dead, Live Seismic loads]. Seismic
burdens were taken according to IS 1893: 4. Nonlinear dynamic analysis
2016(part1). The final objective of this work is
The objective of this paper is analysis for seismic
analysis and design of rectangle, plus shape and
coefficient method by taking three different shape of
U-shape structures in all seismic zones of zone2,
zone3, zone4, zone5 for determining for buildings under taking for zone-2, zone-3, zone-4,
displacement values and then compare all the zone-5 considering the structure due to lateral loads
displacement values in various structure in all and structure loads will be sustain the all the forces and
zones then conclusion is which is the best shape deformation of buildings to adequate the durability and
structure to construction for seismic zone of India resistances of high seismic regions which is the best
Keywords: Displacement, Rectangle shape suitable structure of these structures.
building, plus shape building U-shape building
I. INTRODUCTION
Generally, earthquakes are occurring in below the
ground surface level, the surface of earth classify as
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 847
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
848 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
3.1.3 Determinationof fundamental natural The after analysis of structure then apply earth quakes
period forces in x-direction and y-direction as per IS:
Provision 7.6.2 of IS:1893(part1): 2016 as given 1893:2016(part1) code book in three buildings like
beneath rectangle, plus, U shape structures given the above fig
(for RC-steel composite MRF The after completion of analysis we get the
building) displacement values for all the zones and compare the
values in different zones to different shapes. The
(for steel MRF building) deformation values along the x-axis and y-axis to draw
the graphs by using excel sheet.
3.1.4 Vertical Base shear
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 849
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
REFERENCES
1. Mohammad Reza Sohrabi, Mohammad Karbalaie, ''An
experimental study on compressive strength of concretecontaining
crumb rubber'', vol:11 No:03, Page No 23-27, June 2011.
2. Anil, K. Chopra, "Dynamics of structures", Prentice-Hall of
India Private Limited New Delhi India, 2008.
3. Rajaram. P., Murugesan .A, "Experimental study on behaviour
interior RC Beam column joints subjected to cyclic loading"
International journal of applied engineering research, volume 1,
2010.
Fig 7: zone-5 displacement
4. Ruichong, " Modeling of seismic wave motion in high-rise
V. CONCLUSIONS buildings" Probabilistic Engineering Mechanics 26 (2011) 520-
527.
In this study of load calculation and structural analysis 5. Wakchaure M.R, Peed S.P.,"Earthquake Analysis of High Rise
of the G+5 building to design for earthquake resistances Building with and without In filled walls" International Journal
for different zones by applying earthquake codes for of Engineering and Innovative Technology(IJEIT) Vol.2, 2012.
resisting lateral forces of the structure in high seismic 6. Raju k .R,"Analysis and Design of RC Tall Building subjected to
wind and earthquake loads" National Conference on Emerging
zones of the India. Then my summary of work following Technologies in civil engineering, (2013).
points describes below clearly.
7. Sanjay Naik and Tushar S Shetty Comparison of Rectangular
1. In all the zones w.r.t to displacement along x-direction Shape, L Shape and C Shape Multistorey Structure Under the
plus shape will have less displacement when compare Effects of Earthquake" (2019).
to rectangle and U-shape buildings. 8. Mohammed Mohiuddin and Hashim Mohiuddin Dynamic
Analysis of RCC Multistorey Framed Structure with Different
2. In all the zones summery of displacement along y- Plan Configuration" (2017).
direction plus shape building less displacement to
9. Pushkar Rathod and Rahul Chandrashekar "Seismic analysis of
compare the rectangle and u- shape buildings multistoried building for different plans using ETABS 2015"
(2017).
3. Then compare rectangle shape and U-shape structure
in all seismiczonerectangle shape is less displacement 10. Abhay Guleria "Structural analysis of a multi-storeyed building
for U-shape building using ETABS for different plan configurations" (2014).
11. NilenduChakrabortty, AkshitLamba "Analysis and design of G+3
4. They are summary for rectangle structure will be safe building in different seismic zones using ETABS" (2020).
because of less displacement value of comparing U-
12. Anju sasi and Teena joy "Comparative study of static and
shape buildings dynamic seismic analysis of 44multi storeyed RCC building by
5. It`s concluded that plus shape building is safe when using ETABS for different configurations" (2020).
compare to rectangle and u-shape buildings in the
zone-2,3,4,5.
Future study
The future scope for above study is analysis for
different methods like responses spectrum method and
time history analysis for different shape of buildings in
seismic zones.
850 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- In the current study we bring out the and social justice and equity (Plaut, 2005). But in India
impact of various social, economic, environmental, even low income residents are forced to depend on
and transportation system characteristics on walk motorized vehicle because of accessibility issue
and cycle mode choice, when they are used as a (Srinivasan and Rogers, 2005), thus reducing the social
main mode. The environmental factors include
equity. Bolstering the argument supporting the need for
density and land use. The impact is determined
using a logistic regression model, developed from high density urban centers, Badland and Schofield
the house hold survey data of Bangalore city, (2005), and Chen et al (2008) related this environment
collected for the year 2009. The results showed a factors with increased health and sustainability, among
reduced likeliness to walk and cycle, with an citizens.
increase in travel time using walk and cycle, and Our current study is an attempt to understand the
individual age. Individuals owning at least a private
extent of impact of characteristics: socio-economic,
motor vehicle had less probability of using walk
and cycle compared with individuals not owning any
transportation network, and environmental; on the walk
private motor vehicle. Females had a positive and cycle mode choice, when they are used as the main
attitude towards walking than male. Mixed Land- mode.
use and increased density had a positive impact on
II. LITERATURE REVIEW
walk and cycle mode use when compared with their
reference group. Many studies have been done with respect to the
Keywords: walk and cycle; mode choice; impact determination of different factors affecting
environmental factors walking and cycling mode choice. Ortuzar (2000) and
Parkin (2008) found a negative relationship between
I. INTRODUCTION increasing car ownership and bicycle mode choice.
Non motorized transport (NMT), which mainly Wardman et al (2007) determined a negative effect for
includes walk and bicycle, has got a number of age on cycling in Britain, while Plaut (2005) determined
advantages. Some of their advantage include less a positive influence for age on walking and cycling in
congestion; less health, accident and social cost; and United States. Noland and Kunreuther (1995) found a
reduced infrastructure costs. However, these positive likeliness for male in using walk and cycle; on
advantages have not , especially in India. Hook and the other hand Agrawal and Schimek (2007)
Replogle (1996) explained how Asian cities are facing determined a negative likeliness for male to walk. An
an environmental degradation because of the motor increase in the travel time using cycle was determined
vehicle boom, and how the Government policies having a reducing impact on the probability of choosing
controlling land-use and density which favor walking a cycle (Wardman et al, 1997).
and cycling, can form one of the solutions for this issue. Buys and Miller (2011) suggested that perceived
According to Plaut (2005) there are at least three transport convenience was modulated by journey
reasons why walking and cycling should be promoted destination and purpose, with subsequent impacts on
over motorized modes. Those are: reduction in car use; travel mode choice. Supporting this notion Ortuzar
planning of urban space by promotion of public transit; (2000) found a positive impact for school purpose for
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 851
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
bicycle mode. Other factors influencing NMT mode as the main mode. The model was estimated using the
choice mentioned in studies were the population density software biogeme (Bierlaire, 2003; Bierlaire, 2008).
and land-use. Badoe and Miller (2000) pointed out The estimation of model was done using the estimation
the mixed results elicited by various studies on the effect tool and sample aggregation was done using the
of land-use and density. Cervero (1996) and Cervero simulation tool in Biogeme. The various factors include
and Kockelman (1997) respectively found out a positive demographic characters of sex, level of education, age,
correlation between NMT use and mixed land-use, and household income, private vehicle ownership, whether
NMT use and high density. Rodriguez and Joo (2004) the purpose of trip is to school; transportation system
arrived at a inconsistent relationship between non- characteristic of time of travel by walk or cycle; and
motorized mode choice and increasing density. environmental characteristics of population density and
Rodriguez and Joo (2004) also pointed to the necessity land use. The land use here is expressed as a ratio of
to include certain factors correlated with the the employment and population in the origin zone of a
environment factors, like vehicle ownership, so that the trip. An arbitrary range of this ratio between 0.8 and
environmental factors are not over estimated. 1.1 is used to classify the land use as mixed. If this ratio
In India only few studies has been done for identifying is less than 0.8 we attribute population to be more than
the impact of different factors on walk and cycle usage. employment in that zone and deem it as a residential
One such study was done by Arasan et al (1996) in zone. Conversely if ratio is more than 1.1 we consider
which the trip characteristics of travelers without vehicles it as a zone were employment opportunities are more
was identified using a logit model. The authors in this than residing opportunities. Cervero (2002) used a land
study used a set of socio-economic variables and a use diversity variable with respect to the origin zones
travel related variable of trip distance in developing the trips. This was determined as retail employment and
logit model. Another was a segmentation analysis done population relative to countywide ratio. In our current
by Rastogi and Rao (2009) for different modes including study logistic regression is done for both walk and cycle
an NMT using socio-economic variables and travel separately. Captive riders are deleted from the trip data.
related variables. Jain et al (2010) evaluated the The travel time of walk and cycle modes when they are
influence of bicyclist comfort and safety perception not the chose mode are found out by dividing distance
using a route choice model. Other NMT studies mainly travelled with average speed of walk (0.0719
pertained to analyzing, walking distance, walking speed, Kilometer/Minute) and cycle (0.146 Kilometer/
and wand walking flow (Arasan et al, 1994; Rastogi et Minute), determined from the current data.
al, 2011; Rastogi and Rao, 2003; Laxman et al, 2010). Binary logistic regression is a technique which is
From the above literature review it is clear that there employed to determine the influence of continuous or
is a dearth of studies for understanding the impact of categorical variables on the probability of choosing an
various factors influencing NMT mode choice in India. option. In the current study we use categorical variables.
No studies are done in India which elicits the influence The option usually is ‘yes’ or ‘no’, in our study the
of environmental factors. Our study tries to put some option is whether NMT is chosen as the mode or not
light on this issue. We develop a logistic regression model for a particular trip.
using a set of socio-economic, transportation network,
and environmental variables; and try to bring out the
extent of their effect with respect to their variation, in
walk and cycle mode choice.
III. METHODOLOGY
A logistic regression is used in estimating the extent
of influence of variables when walk and cycle are used
852 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Table 1. Variable categories, their reference and mean medium gradient, and has a pleasant and equitable
Variable Categories Reference Mean climate throughout the year. It has got a population of 8
case Walk cycle
Travel time Over 20 20 minutes or 0.31 0.39 million (Comprehensive Traffic and Transportation Plan
minutes less for Bangalore, 2007). The area of Bangalore
Age 18-50 18 years or 0.75 0.86
less
metropolitan region is around 8000 sq km of which
Over 50 18 years or 0.10 0.12 2191sq km is in the urban districts.
less
Gender Male Female 0.77 0.80 Details collected in secondary data included
Education level literate illiterate 0.84 0.86
House hold 5000 Rupees- 5000 Rupees 0.57 0.87 personal characteristics of age, gender, occupation,
income 20000 Rupees or less education level, marital status etc; house hold
Above 20000 5000 Rupees 0.02 0.02
Rupees or less
characteristics of income, number of earners, type of
P rivate motor 1 or more none 0.34 0.37 residence etc; and trip characteristics like in vehicle
vehicle
ownership
travel time, mode used, purpose, travel distance etc.
School-purpose Yes No 0.24 0.01 The major trips were detailed along with their stages
Population 25000-50000 25000 or less 0.37 0.37
density
and modes used in those stages. For e.g. a work trip
(Population/Kilo Above 50000 25000 or less 0.17 0.18 using public transit from home was represented as an
meter2) access stage using walk and an in-vehicle stage using
Pr (yes) = 1/ (1+elogit ) (1) public transit. We obtained 11,822 house- holds from
the 63 zones. In the data 55% was males and 45%
Pr (No) = 1- Pr (yes) (2)
females. 22% had an age less than 18 years and 66%
Pr (yes) and Pr (No) represents the probability that an age, 18 to 50. 12% was having an age more than
a NMT mode is chosen or not chosen for a particular 50. The percentage of households in the income groups
trip elogit represents an exponential function of logit. The less than 5,000 Rupees, 5,000 Rupees-20,000 Rupees,
term ‘logit’ is a function which is a linear combination and greater than 20,000 Rupees were respectively 40,
of variables and parameters. The parameters are 57 and 3. After deletion of return trips and trips with
estimated through maximum log likelihood estimation. incomplete observation we got 9054 utility trips. Utility
The antilog of the parameter will give the odds ratio. In trips included trips for purpose work and school with a
case of a categorical variable odds ratio represents the percentage share of 83 and 17 respectively. In the total
percentage increase or decrease in the odds of one trips 39% were made by walk as main mode and 4%
category a variable over the other category of the same by cycle as main mode. Rest was made using motorized
variable. Table 1 defines the various categories of each modes.
variable along with their mean representation in the total
observations (number of observations in a category/ V. RESULTS AND DISCUSSION
total observations) and the reference category for each Table 2 and Table 3 gives the model results for walk
variable. and cycle respectively along with the odds ratio and
change in odds for each category of variables with
IV. DATA SOURCE AND DESCRIPTION
respect to reference variable. The parameter values of
House-hold travel data of the city of Bangalore for certain variables even after being insignificant were kept
the year 2009 obtained through secondary sources is as such because they were the best values available for
used in our study. Data from 63 zones are used for that variable. The logistic model had a predictive
model estimation. The primary data collection was done capability with an accuracy of 100% and 80.65% for
by household interview, in which the details of traveler walk mode and cycle mode respectively.
related variables, mode related variables, trip context
The likeliness to use walk and cycle reduced 68%
variables, and environmental variables were collected.
and 79% respectively when the travelling time became
Bangalore is a plateau with roads having gentle to
more than 20 minutes. This shows a decrease in affinity
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 853
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
towards walking and cycling with travel time increase. Table 2. Model results for walk
An increase in age decreased the likeliness towards Variable Categories coefficient t-statistics Odds Change
ratio in odds
walk and cycle mode. Old people (age greater than Constant _ 2.90 11.61 _ _
50) had 12% and 92% less chance of using walk and Travel time Over 20 -1.11 -12.53 0.32 -0.68
(minutes)
cycle respectively. Compared with women men had a Age 18-50 -0.118 -2.69 0.89 -0.11
reducing effect on probability to walk. But for cycle Over 50 -0.129 -2.60 0.88 -0.12
Gender Male -0.518 -4.27 0.60 -0.40
the inverse was true. Men had an increasing effect on Education literate -0.240 -1.82 0.79 -0.21
probability to cycle. Similar results were found on level
House hold 5000 - -0.0109 -1.12 0.99 -0.10
gender effect by Agrawal and Schimek (2007) for walk income 20000
mode and Ortuzar (2000) for cycle mode. Rise in (Rupees) Above -0.272 -0.85 0.79 -0.21
20000
education level had a negative correlation with walk Private motor 1 or more -1.27 -13.84 0.28 -0.72
mode and a positive correlation with cycle mode. vehicle
ownership
Increase in the income showed a negative effect on School- Yes 0.738 5.04 2.09 1.09
purpose
the probability to walk and cycle. There was a 79% Population 25000- 0.213 2.17 1.24 0.24
and 100% decrease in the likeliness to cycle when an density 2) 50000
Above 0.385 2.87 1.47 0.47
individual belonged to income groups 5,000 Rupees 50000
20,000 Rupees and above 20,000 Rupees respectively. Land-use 0.8-1.1 0.891 4.56
(employment/p
It points to the preference of private vehicle among high opulation)
income group. Ownership of private vehicles had a Null Log -2913.29
Likelihood
reducing impact on the chance of using walk or cycle. Final Log -1716.027
It indicate peoples tendency to use their own motor likelihood
Likelihood 2394.541
vehicles for their utility trips. ratio test
Rho square 0.411
The purpose school indicated a greater chance for Table 3. Model results for cycle
students to choose walk mode. In case of cycling the
purpose school had a negative impact. But the variable
was insignificant with a t-value approximately zero. One
reason for this insignificance may be the meager
presence of school purpose trips for cycle mode (1%).
854 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
percentage for density greater than 50,000. The density Low speed and excessive physical effort are two
showed a weak relationship with likelihood to cycle reasons why people prefer walk and cycle only for short
because of insignificant variables. The likeliness to cycle distances. Hence the policy makers should concentrate
increased 20% for population density between 25,000- mainly on short distance trips for NMT promotion.
50,000 and 8% for density greater than 50,000. A similar Individuals belonging to high income house hold had
trend was projected by Rietveld (2001), and Rietveld a less probability of using walk and cycle. Similarly
and Daniel (2004). In their study for Netherlands private vehicle owners also had a less affinity towards
Rietveld and Daniel (2004) showed that the bicycle walk and cycle. This, points to requirement of a policy
share at first increase and then decrease, with rising level intervention, restricting private vehicles, to promote
density. Even though they attributed this effect to the NMT among high income household and private vehicle
competition of public transit inside high density areas owners.
of CBD in Netherlands, in case of Bangalore lack of
infrastructural provision for cycle mode in form of cycle Trips with purpose school had a positive likelihood
paths may also be one factor. Lack of infrastructural compared with work on choosing walk mode. There is
provision for cycle at high density area will give rise to a huge scope for policy makers to target this section
an increased conflict with other modes. for walk promotion. But one issue which needs to be
addressed while focusing on this section is safety.
The ratio between employment and population in Improved foot ways (Abbas et al, 1996) with good
the origin zone of a trip, used as an indicator of land- connectivity (Randall and Baetz, 2001) can deal with
use, boosted the likelihood to both walk and cycle - this issue to a certain extent.
land-use variable was insignificant pointing to its weak
relation with mode choice. More studies are required Mixed land-use and increased density had a positive
to establish their significance. Short travel distance for impact on walk and cycle mode use when compared
accessing jobs and schools; because of an even mix of with the reference group, even though for cycle the
population and employment, is one reason why people probability of usage first increases and then decreases,
prefer walking when land-use is mixed. with increase in density. One reason for this decrease
at high density may be attributed to the lack of
VI. CONCLUSION infrastructural provision (Wardman et al, 1997) and thus
In the current study we determined the impact of safety (Hopkinson and Wardman, 1996) for bicycles.
various social, economic, environmental, and Age is an important factor which decides the choice
transportation system variables on walk and cycle mode of NMT for a trip. An increase in age is associated
choice. This impact determination was done using a with a decrease in walk and cycle preference.
logistic regression model in which the parameters were
estimated using maximum log likelihood. The model Our study elicits the effect of different variables on
predicted the data with an accuracy of 100% and walk and cycle mode choice in Indian conditions. In
80.65% for walk mode and cycle mode respectively. the current study we have used only limited
The parameters and their sign gave a significant insight environmental variables: density and land use. An
in to our understanding of walk and cycle mode choice. enhancement in our model can be done incorporating
Following are the important conclusions obtained. more environmental variables like slope of paths, safety
condition, walking/cycling index, land-use variable
Walk and cycle had a drastic reduction in the users incorporating neighborhood aspects other than
after 20 minutes. There was a likeliness reduction of employment (Cervero, 2002) etc. It can form a scope
68% for walk and a 79% for cycle. 20 minutes for future research.
corresponded to a distance of 1.5 kilometers and 3
kilometers respectively for walk and cycle mode. This
shows that people prefer walk and cycle for short trips.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 855
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
2. AGRAWAL, A.W., & SCHIMEK, P. (2007). EXTENT AND 14. JAIN, H., TIWARI, G., & ZUIDGEEST, M. (2010).
CORRELATES OF WALKING IN THE USA. EVALUATING BICYCLISTS COMFORT AND SAFETY
TRANSPORTATION RESEARCH PART D, 12, 548 563. PERCEPTION. 12TH WORLD CONFERENCE ON
TRANSPORTATION RESEARCH, LISBON, PORTUGAL.
3. ARASAN, V.T., RENGARAJU, V.R., & RAO, K.V.K. (1994).
CHARACTERISTICS OF TRIPS BY FOOT AND BICYCLE 15. LAXMAN, K., K., RASTOGI, R., & CHANDRA, S. (2010).
MODES IN INDIAN CITY. JOURNAL OF PEDESTRIAN FLOW CHARACTERISTICS IN MIXED
TRANSPORTATION ENGINEERING 120, 283 -294. TRAFFIC CONDITIONS. JOURNAL OF URBAN
PLANNING AND DEVELOPMENT, 136, 23-33.
4. ARASAN, V.T., RENGARAJU, V.R., & RAO, K.V.K. (1996).
TRIP CHARACTERISTICS OF TRAVELERS WITHOUT 16. NOLAND, R.B, & KUNREUTHER, H. (1995). SHORT-RUN
VEHICLES. JOURNAL OF TRANSPORTATION AND LONG-RUN POLICIES FOR INCREASING BICYCLE
ENGINEERING, 122, 76-81. TRANSPORTATION FOR DAILY COMMUTER TRIPS.
TRANSPORT POLICY, 2, 67-79.
5. BADLAND, H., & SCOFIELD, G. (2005). TRANSPORT,
URBAN DESIGN, AND PHYSICAL ACTIVITY: AN 17. ORTUZAR, J.D., IACOBELLI, A., & VALEZE, C. (2000).
EVIDENCE-BASED UPDATE. TRANSPORTATION ESTIMATING DEMAND FOR A CYCLE-WAY NETWORK.
RESEARCH PART D, 10, 177 196. TRANSPORTATION RESEARCH PART A, 34, 353-373.
PLAUT, P.O. (2005). NON-MOTORIZED COMMUTING
6. BADOE, D.A, & MILLER, E.J. (2000). IN THE US. TRANSPORTATION RESEARCH PART D, 10,
TRANSPORTATION±LAND-USE INTERACTION: 347 356.
EMPIRICAL FINDINGS IN NORTH AMERICA, AND
THEIR IMPLICATIONS FOR MODELING. 18. PARKIN. R. (2008). ESTIMATION OF THE
TRANSPORTATION RESEARCH PART D, 5 , 235- 263. DETERMINANTS OF BICYCLE MODE SHARE FOR THE
JOURNEY TO WORK USING CENSUS DATA. FROM THE
7. BIERLAIRE, M. (2003). BIOGEME: A FREE PACKAGE FOR SELECTEDWORKS OF JOHN PARKIN, UNIVERSITY OF
THE ESTI-MATION OF DISCRETE CHOICE MODELS. BOLTON, ACCESIBLE AT:
PROCEEDINGS OF THE 3RD SWISSTRANSPORTATION
RESEARCH CONFERENCE, ASCONA, SWITZERLAND. 19. RANDALL, T.A., & BAETZ, B,W. (2001).
EVALUATINGPEDESTRIANCONNECTIVITY FOR
8. BIERLAIRE, M. (2008). ESTIMATION OF DISCRETE SUBURBANSUSTAINABILITY. JOURNAL OF URBAN
CHOICE MODELS WITH BIOGEME 1.8, BIOGEME.EP.CH PLANNING AND DEVELOPMENT, 127, 1-15.
9. BUYS, L., & MILLER, E. (2011). CONCEPTUALISING 20. RASTOGI, R., & RAO, K.V.K. (2003). TRAVEL
CONVENIENCE: TRANSPORTATION PRACTICES AND CHARACTERISTICS OF COMMUTERS ACCESSING
PERCEPTIONS OF INNER-URBAN HIGH DENSITY TRANSIT: A CASE STUDY. JOURNAL OF
RESIDENTS IN BRISBANE, AUSTRALIA. TRANSPORT TRANSPORTATION ENGINEERING, 129, 684-694.
POLICY, 18, 289 297.
21. RASTOGI, R., & RAO, K.V.K. (2009). SEGMENTATION
10. CERVERO, R. (1996). MIXED LAND-USES AND ANALYSIS OF COMMUTERS ACCESSING TRANSIT:
COMMUTING: EVIDENCE FROM THE AMERICAN MUMBAI STUDY. JOURNAL OF TRANSPORTATION
HOUSING SURVEY. TRANSPORTATION RESEARCH A, 30, ENGINEERING, 135, 506-515.
361-377.
22. RASTOGI, R., THANIARASU, I., & CHANDRA, S. (2011).
11. CERVERO, R. (2002). BUILT ENVIRONMENTS AND MODE DESIGN IMPLICATIONS OF WALKING SPEED FOR
CHOICE: TOWARD A NORMATIVE FRAMEWORK. PEDESTRIAN FACILITIES. JOURNAL OF
TRANSPORTATION RESEARCH PART D, 7, 265 284. TRANSPORTATION ENGINEERING, 137, 687-696.
CERVERO, R., & KOCKELMAN, K. (1997). TRAVEL
DEMAND AND THE 3DS: DENSITY, DIVERSITY, AND
856 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
23. RIETVELD, P. (2001). BIKING AND WALKING: THE 25. SRINIVASN, S., & ROGERS P. (2005). TRAVEL BEHAVIOR
POSITION OF NON-MOTORISED TRANSPORT MODES OF LOW-INCOME RESIDENTS: STUDYING TWO
IN TRANSPORT SYSTEMS. TINBERGEN INSTITUTE CONTRASTING LOCATIONS IN THE CITY OF CHENNAI,
DISCUSSION PAPER. ACCESSIBLE AT: HTTP:// INDIA. JOURNAL OF TRANSPORT GEOGRAPHY, 13, 265
DARE.UBVU.VU.NL/BITSTREAM/1871/9508/1/01111.PDF 274.
(LAST ACCESSED AT 5/3/2013)
26. WARDMAN, M., HATFIELD, R., & PAGE, M. (1997). THE
24. RIETVELD, P., & DANIEL, V. (2004). DETERMINANTS OF UK NATIONAL CYCLING STRATEGY: CAN IMPROVED
BICYCLE USE: DO MUNICIPAL POLICIES MATTER?. FACILITIES MEET THE TARGETS. TRANSPORT POLICY,
TRANSPORTATION RESEARCH PART A, 38, 531-550. 4, 123 133.
RODRIGUEZ, D.A., & JOO, J. (2004). THE RELATIONSHIP
27. WARDMAN, M., TIGHT, M., & PAGE, M. (2007). FACTORS
BETWEEN NON-MOTORIZED MODE CHOICE AND THE
INFLUENCING THE PROPENSITY TO CYCLE TO WORK.
LOCAL PHYSICAL ENVIRONMENT. TRANSPORTATION
TRANSPORTATION RESEARCH PART A, 41, 339 350.
RESEARCH PART D, 9, 151 173.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 857
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1. Generation from milling of HMA layer 5. Compare the test results with the performance of
2. Full depth pavement removal the traditional control conventional asphalt mixes in
laboratory with addition of RAP material and without
3. Waste from HMA generated at plant addition of RAP material (conventional modified
Milling is the process of scraping and removing any mixes).
distressed upper layers of existing pavement to a
2. MATERIALS USED
specified depth.
The process includes grinding by machine and 2.1 Aggregates
loading of RAP into a truck for transportation. The amount of aggregate in asphalt concrete mixtures
is generally 90 to 95 per cent by weight and 75 to 85
per cent by volume. Aggregates are primarily responsible
for the load supporting capacity of a pavement.
Aggregate has been defined as any inert mineral material
used for mixing in graduated particles or fragments. It
includes sand, gravel, crushed stone, slag, screenings,
and mineral filler. Aggregates are collected from
MittiMalkapur stone crushing plant near Yaragera. Sizes
Fig - 1 Various Stockpiles of larger size RAP materials
of aggregates collected are 6mm, 10mm, 20mm, stone
dust from same quarry. Which are used for mix design
1.2 ADVANTAGES by performing varies tests to determine its strength of
1. Reuse and conservation of non-renewable energy aggregates.
sources.
2.2 Binder
2. Preservation of the environment and reduction in land
filling. Asphalt is a constituent of petroleum with most
3. Energy conservation and improved pavement crude petroleum containing some asphalt. Crude
smoothness. petroleum from oil wells is separated into its fractions
in a refinery by a process called distillation. Viscosity
1.3 SCOPE AND OBJECTIVES OF STUDY grade VG 30 bitumen sample was collected from
The overall objective of the present study was to bitumen plant situated near MittiMalkapur village
design and evaluate laboratory performance of Raichur. The VG-30 grade binder is generally used
bituminous mixes containing different percentages of for construction of flexible pavements in India.
RAP. Specifically, the objectives of the present study
2.3 Filler Material
were to:
1. Determine the Physical properties of Conventional
Lime is preferred as filler in asphalt mixes. In
aggregates and RAP aggregates and the constituent addition, lime works as an anti-stripping agent and
mixtures. enhances moisture damage potential of asphalt mixes.
Generally 2% of lime by weight of total aggregates is
2. Determine the optimum bitumen content for
bituminous mix samples.
used in preparation of a mix. The lime taken from BRITE
CEM lime which is product of Raghavendra enterprise
3. Bituminous concrete (BC) with different percentage Raichur.
of RAP (i.e., 0%, 10%, 20%, 30% and 40%) using
Marshall Mix design method. 2.4 Recycled Asphalt Pavement (RAP)
4. Examine the effects of using RAP in bituminous RAP is collected from road which is a link between
mixtures in terms of stability and flow value by using Raichur to Mantralayam. The top layer of the pavement
Marshall Mix design method.
was removed for the construction of existing new roads.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 859
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
By making some transportation arrangement, these Table No 01 Physical Characteristics of Aggregates- Test
Results
RAP material have been brought to the lab by using
S.No Aggregate Result Limits as per Test Method
some hand tools, we crushed that RAP materials into Test MoRTH
small pieces. Specifications
1 Aggregate 15.17% 24% IS:2386-part-4
impact value
2 Aggregate 19.07 % 30% IS:2386-part-4
crushing
value
860 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 861
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Table No 05: Total no of mould prepared for Marshall Stability Table 07 and graph 04. The design blended aggregate
Test conducted.
gradation for different percentages of RAP was within
Percentage No of No of No of No of
of bitumen moulds for moulds for moulds for moulds for the limit of specified BC grade -1 gradation. It can be
used 0% RAP 30% RAP 30% RAP 40% RAP seen that stone dust reduces significantly with addition
4% 1 1 1 1
4 .5% 1 1 1 1 of RAP content.
5% 1 1 1 1
5 .5% 1 1 1 1 Table No 06: Optimum Percentage of Materials used in BC-
6% 1 1 1 1 Grade-1 Mixes for Different Percentage of RAP
Total 5 5 5 5
Percentage of materials for BC-grade-1
Type of
Mixes Coarse Fine Stone Filler RAP Total
(20 mm) (10 mm) Dust (Lime)
BC-G1-0 38 20 40 2 0 100
BC-G1-10 35 20 33 2 10 100
BC-G1-20 34 16 28 2 20 100
BC-G1-30 34 14 20 2 30 100
BC-G1-40 34 18 06 2 40 100
Table No 07: Aggregate Gradation of BC-Grade-1 with
Different Percentage of RAP
862 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The design blended aggregate gradation was used for Table 09 and Table 10 show the bitumen and
this purpose. The additional amount of neat binder was aggregate saving by addition of RAP, respectively.
estimated in case of RAP mixes. The Marshall moulds
were prepared at each of the bitumen content and their 5.0 SUMMARY AND CONCLUSION
volumetric properties were determined. The bitumen 5.1 Summary
content of a mix was found by taking the average of
The construction of highways with RAP materials is
bitumen content corresponding to maximum stability,
not as popular in India as it expected to be, due to lack
maximum unit weight and 4% air voids. The OBC of
of laboratory and field performance data. Furthermore,
0%, 10%, 20%, 30%, and 40% of RAP mixes was
agencies and contractors are not enough trained and
found to be 5.63%, 5.8%, 5.6%, 5.6%, 5%,
confident on quality of RAP materials and to design
respectively. The volumetric properties of mixes at OBC
mixes containing RAP. Generally it is thought that RAP
satisfy design requirements as shown in Table 08. The
is a poor grade material which may negatively impact
addition of RAP results in saving of significant amount
quality of pavements and consequently wastage of
of binder. For example, addition of 40% RAP may result
significant amount of money. Nonetheless, studies
in approximately 41% saving in quantity of binder. The
conducted over the years in different parts of the world
Marshall stability of a mix increases with addition of
showed that performance of bituminous mixes containing
RAP. Table 09 and Table 10 show the bitumen and
RAP can be equal and better than the performance of
aggregate saving by addition of RAP, respectively.
virgin bituminous mix.
Table no 08: Marshall Stability and Flow Value for HMA at
Optimum Bitumen Content The present study was undertaken to design and
% RAP 0 10 20 30 40 Limits evaluate performance of bituminous mixes containing
Bitumen
(%)
5.63 5.8 5.60 5.60 5.0 - different percentages of RAP. For this purpose, RAP
Vv (%) 4.74 4.29 3.59 3.81 3.47 3-5 was collected from Raichur to Mantralayam road near
Vb (%) 13.24 13.70 13.4 13.39 12.00 - yaragera. The preliminary laboratory tests on the
VMA ( %) 17.96 17.99 17.0 17.20 16.55 Min 17 collected RAP such as aggregate quality, gradation and
VFB (%) 73.7 75.1 74.9 73.8 74.6 65-75
Stability
bitumen content were conducted to ensure its quality.
15.09 17.38 17.26 17.36 19.70 Min 9
( kN) The bituminous concrete (BC) with different percentages
Flow
(mm)
3.44 3.97 3.85 3.91 3.67 2-4 of RAP (i.e., 0%, 10%, 20%, 30% and 40%) were
Table No 09: Saving of Binder by use of RAP design as per the standards and specifications provided
by Ministry of Road Surface and Transportation
RAP OBC Virgin Binder Binder
(%) (%) Binder (%) Saving (MoRTH).
(%) (%)
0 5.63 5.63 - - 5.2 Conclusion
10 5.06 5.06 0.52 9.0 The following conclusions can be drawn from the
20 4.59 4.59 1.04 18.6
results and discussion presented in this study.
30 4.07 4.07 1.56 27.7
40 2.92 2.92 2.08 41.6 1. The impact, crushing, and Los Angeles values of
Table No 10: Saving of Aggregate by use of RAP selected virgin aggregates in this study were found
to be within the limit (i.e., less than 30%), indicating
RAP Percentage Savings of Aggregate
(%)
the suitability the aggregates for construction of roads.
20 10 Stone Total
mm mm dust Saving 2. The penetration softening point, viscosity, and ductility
0 - - - - values of collected VG30 binder were found to be
10 0.25 4.2 5.6 10 within the limit as per IS codes, and hence found to
20 0.5 8.6 11.2 20 be appropriate to use for construction of pavements.
30 0.75 12.5 15.8 30
40 1 16.6 22.3 40
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 863
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
3. The asphalt content in collected RAP was determined 6. JulideOner et.al (2015) " Utilization Of Reclaimed Asphalt
from chemical extraction using centrifuge device and Concrete With Warm Mix Asphalt And Cost-Benefit Analysis"
ignition oven was found to be 4.96% and 5.40%, 7. Arshad et.al, (2012) "Effect Of Reclaimed Asphalt Pavement On
respectively. The average of both the methods, 5.2%, The Properties Of Asphalt Binders".
was considered for design of mixes containing 8. Maulik Rao, Dr. N C Shah, Utilization of Reclaimed Asphalt
different percentages of RAP. Pavement Material Obtained By Milling Process: With Numerous
Options in Urban Area at Surat,Gujarat, ISSN : 2248-9622, (July
4. The Optimum bitumen content of 0%, 10%, 20%, 2014)
30%, and 40% of RAP mixes was found to be 5.63%, 9. IS:1202 Methods for Testing Tar & Bituminous Materials :
5.8%, 5.6%, 5.6%, 5%, respectively. The volumetric Determination of Specific Gravity Penetration, Bureau of Indian
properties of mixes at OBC satisfy design Standards, New Delhi.
requirements. The addition of 40% RAP may result 10. IS:1203 Methods for Testing Tar & Bituminous Materials :
in approximately 41% saving in quantity of binder. Determination of Penetration, Bureau of Indian Standards, New
The Marshall stability of a mix increases with addition Delhi.
of RAP. 11. IS:1205 Methods for Testing Tar & Bituminous Materials :
Determination of Softening Point, Bureau of Indian Standards,
REFERENCES New Delhi.
1. Brajesh Mishra. (2015)."A study on use of reclaimed asphalt 12. IS:2386 (Part 1) (Reaffirmed 2002), Methods of Test for
pavement (RAP) materials in flexible pavements", International Aggregates for Concrete Particle Size and Shape, Bureau of
Journal of Innovative Research in Science, Engineering and Indian Standards, New Delhi.
Technology Vol,4,Issue 12,December 2015 13. IS:2386 (Part 4) (Reaffirmed 2002), Methods of Test for
2. Mallick, B. R., lecture notes, A 3-day workshop on recycling and Aggregates for Concrete Mechanical Properties, Bureau of Indian
other pavement rehabilitation methods, IIT Kanpur, 8-10 th Standards, New Delhi.
February, 2005, pp.58-350. 14. MORTH, (2001), Specifications for Road and Bridges Works,
3. Wolters R. O., Bituminous hot mix recycling in Minnesota, Fourth Revision, Ministry of Road Transport and Highways,
Proceedings of the Association of Asphalt Paving Technologists, Indian Roads Congress, New Delhi.
Vol.48, 1979, pp.295-327. 15. Highway materials and pavement test book by S K Khanna - C
4. Satish R Patel et.al," Use of RAP Materials In Bituminous E G Justo - A. Veeraragavan.
Pavement" International Conference On Emerging Trends In
Engineering And Management Research,(March 2016).
5. T.Anil Pradyumna et.al,(2013) "Characterization Of Reclaimed
Asphalt Pavement (RAP) For Use In Bituminous Road
Construction"
864 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract - Chitin, a linear -1, 4-linked that is primarily transformed by bacterial communities.
homopolymer of N-acetylglucosamine, is one of the Chitin is a polymer of unbranched chains of (1->4)
three most abundant polysaccharides in nature linked 2-acetamido-2-deoxy-D-glucose (N-acetyl-D-
besides cellulose and starch. Chitinolytic enzymes glucosamine, GlcNAc). It may thus be regarded as a
are synthesized in a wide variety of organisms, with
derivative of cellulose. in which the C-2 hydroxyl group
fungi and bacteria being the most common.
Although the chitinolytic activity of some species
have been replaced by acetamido residues. Based on
has been reported in the literature, it remains the purity of chitin. it is differentiated into three states
unknown which group of microorganisms is the "native", decalcified chitin and chitin. Pure chitin, rarely
most effective at decomposing this polymer. This found in nature, normally occurs in combination with
paper briefly discusses the latest research findings protein and certain inorganic salts, especially of calcium
on the applications of microbial chitinases to salts. Chitin and chitosan are the only abundant basic
biological control. It was noticed that microo polysaccharides. The chitin is highly hydrophobic and
rganisms producing these enzymes will prevent the is insoluble in water, dilute acids, dilute and
growth of several fungal diseases which lead to concentrated alkalies, alcohols and other organic
serious threat to crop production. At present, solvents. The major sources of chitin are shell fish, krill,
attempts are being made to identify producers of
Clams, oyster, squid, fungi and insects
chitinolytic enzymes. Further, it was noticed that
there is huge potential that natural biofungicides Recently, biological control has been focused on
will replace chemical fungicides or will become microorganisms producing mycolytic enzymes,
alternate supplement for the presently used especially chitinases (CHIs), which are known to
fungicides, which will definitely reduce the negative hydrolyze chitin, a major component of fungal cell walls.
impact of chemicals on the environment and CHIs or chitinolytic microorganisms are currently being
support the sustainable development of agriculture
studied as an attractive alternative to synthetic chemicals
and forestry. Considering the potentials of marine
because of their perceived safety and lower
microorganisms for deriving industrially important
enzymes and the tremendous scope for environmental impact. Biological control strategies have
bioprocessing of chitinous shrimp wastes towards become an important approach for facilitating
economic utilisation employing solid state sustainable agriculture and also for human diseases
fermentation. [Zach et al., 2012; Kishore et al., 2005; Prapagddee
Index Terms - Marine; Enzyme; Antibacterial
et al., 2008; Sharma et al., 2011]. Chitin, a -(1,4)-
activity; Chitinases linked polymer of N-acetyl-D-glucosamine, is one of
the most abundant naturally occurring polysaccharides.
I. INTRODUCTION Chitin occurs in combination with other polymers, such
Chitin is the most abundant organic compound in as proteins. In nature, it is found in two crystalline forms.
nature and represents a rich carbon and nitrogen source The ?-form has antiparallel chitin microfibrils with strong
intermolecular hydrogen bonding and is the most
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 865
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
abundant chitin in nature, found in shrimps and crabs. Bean seeds, insects and microbes. Microbial chitinases
?-chitin has parallel chitin chains and occurs in squid are being qualified for use as biocides for the control of
pens [Zhang et al., 2000]. Chitin is widely distributed fungal pathogens and entomopathogens in agriculture.
in nature, particularly as a structural polysaccharide in The production of microbial chitinases has received
fungal cell walls, the exoskeletons of arthropods, the attention as one step in a bioconversion to treat shellfish
outer shells of crustaceans, and nematodes. waste chitin.
Approximately 75 % of the total weight of shellfish, CHIs are glycoside hydrolases that catalyze the
such as shrimp, crab, and krill, is considered waste. decomposition of chitin. They are produced by
Chitin comprises 20-58 % of the dry weight of this microorganisms, fungi, insects, plants, and animals and
waste [Wang and Wang, 1997]. Chitin has a broad are also found in human blood serum [Gohel et al.,
range of applications in the biochemical, food, and 2006]. They hydrolyze the b-1,4-glycosidic bonds
chemical industries and shows antimicrobial, between the N-acetyl-D-glucosamine residues that
anticholesterol, and antitumor activity [Patil et al., 2000; comprise a chitin chain [Henrissat, 1999]. Complete
Gooday, 1999]. Sturz and Robinson [Sturz and enzymatic hydrolysis of chitin to free N-
Robinson, 1985] observed that the degradation of chitin acetylglucosamine is performed by a chitinolytic system
occurs mainly in surface sediments, where aerobic consisting of a diverse group of enzymes that catalyze
bacteria dominate and play a decisive role in its the hydrolytic polymerization of chitin [Shaikh and
degradation. Although many studies concerned with Deshpande, 1993; Patil et al., 2000; Gohel et al., 2006;
chitinase gene cloning and expression were reported Felse and Panda, 2000]. Depending on the origin of
(Aunpad and Panbangred 2003; Liu et al. 2005; the CHI, its activity can be inhibited or stabilized by the
Morimoto et al. 1997; Robbins et al. 1998) and presence of various metal ions (Table 1).
chitinases were also found in marine bacteria such as
Alteromonas sp. strain O-7 (Tsujibo et al. 1993), Vibrio Decomposition of Shrimp Waste, the Main
anguillarum and V. parahaemolyticus (Hirono et al. Source of Chitin
1998), Salinivibrio costicola (Aunpad and Panbangred The decomposition of chitin, an important part of
2003), and Microbulbifer degradans (Howard et al. the global carbon and nitrogen cycles [Hoang et al.,
2003), few reports on chitinase from microorganisms 2011], relies mainly on microbiological processes. Chitin
associated with marine sponge were found. can be used by microbial populations as the sole source
Chitinolytic Enzymes of these two elements [McCreath and Gooday, 1992].
Considered common waste, shrimp waste (the main
Microbial enzymes have several advantages over source of chitin) is processed for animal feed and is
the enzymes derived from plants or animals by virtue of also used in agriculture as a cheap natural nitrogen
their great variety of catalytic activities. cheaper in cost. fertilizer. However, it is not uncommon for shrimp waste
regular abundant supplies at even quantity and relatively to travel from a drainage basin to stagnant waters, where
more stability. Despite the fact that the terrestrial it is decomposed by different microorganisms. Swiontek
environment Brzezinska et al. [2008] determined the decomposition
has contributed to the overwhelming growth of rate by evaluating oxygen consumption by the
enzyme industry. through providing potential microorganisms present in shrimp waste. Wang et al.
microorganisms. bacteria and fungi. as source for several [2009], Chang et al. [2010], and Wang and Chang
industrial enzymes in all these years. there are reports [1997] who investigated the chitinolytic activity of
on marine microorganisms which are potent producer bacteria in the Bacillus and Pseudomonas genera used
of DNase, lipase, alginase, proteases, chitinases and successfully shrimp and crab shell waste to produce
glutaminase. Chitinase, the subject of the present study, CHIs.
is found in a variety of living organisms such as snails,
866 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Table 1 Biochemical properties of various microbial CHIs (Maria Swiontek et al., 2014)
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 867
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Table 2 Antifungal activity of typical microbial CHIs (Maria Swiontek et al., 2014)
868 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
fungal phytopathogens. The possible research domains 13. Henrissat B (1999) Classification of chitinases modules. EXS
87(1):137-156
in this area include (i) the study of possibility of a chitin-
14. Gohel V, Singh A, Vimal M, Ashwini P, Chhatpar HS (2006)
degradation system available in Bacillus and the presence Bioprospecting and antifungal potential of chitinolytic
of multiple chitinases or truncated forms of the same microorganisms. Afr J Biotechnol 5(2):54-72
protein (ii) due to its high degradability feature, industrial 15. Felse PA, Panda T (2000) Production of microbial chitinases: a
applications for using this enzyme can be explored (iii) revisit. Bioprocess Eng 23:127-134
16. Hoang KC, Lai TH, Lin CS, Chen YT, Liau CY (2011) The
hyperchitinase mutants can be investigated for
chitinolytic activities of Streptomyces sp. TH-11. Int J Mol Sci
bioconversion of chitinous wastes at commercial level 12:56-65
(iv) biocontrol on pathogenic fungi can be employed 17. Chang WT, Chen M, Wang SL (2010) An antifungal chitinase
for disease control among commercially important crops produced by Bacillus subtilis using chitin waste as a carbon
source. World J Microbiol Biotechnol 26:945-950
thereby minimizing the use of pesticides and its negative
18. McCreath KJ, Gooday GW (1992) A rapid and sensitive
effects on crops and human health and (v) cancer and microassay for determination of chitinolytic activity. J Microbiol
tumour applications. Meth 14:229-237
19. Wang SL, Chao CH, Liang TW, Chen CC (2009) Purification and
REFERENCES characterization of protease and chitinase from Bacillus cereus
1. Maria Swiontek Brzezinska, Urszula Jankiewicz, Aleksandra TKU006 and conversion of marine wastes by these enzymes.
Burkowska, Maciej Walczak (2014), Chitinolytic Microorganisms Mar Biotechnol 11:334-344
and Their Possible Application in Environmental Protection, Curr 20. Wang SL, Chang WT (1997) Purification and characterization of
Microbiol, 68:71-81 two bifunctional chitinases/lysozymes extracellularly produced
2. Prapagdee B, Kuekulvong C, Mongkolsuk S (2008) Antifungal by Pseudomonas aeruginosa K-187 in shrimp and crab shell
potential of extracellular metabolites produced by Streptomyces powder medium. Appl Environ Microbiol 63:380-386
hygroscopicus against phytopathogenic fungi. Int J Biol Sci 4:330- 21. Swiontek Brzezinska M, Lalke-Porczyk E, Donderski W (2008)
337 Occurrence and activity of microorganisms in shrimp waste. Curr
3. Sharma N, Sharma KP, Gaur RK, Gupta VK (2011) Role of Microbiol 57:580-587
chitinase in plant defense. Asian J Biochem 6:29-37 22. Aunpad R, Panbangred W (2003) Cloning and characterization
4. Hartl L, Zach S, Seidl-Seiboth V (2012) Fungal chitinases: of the constitutively expressed chitinase C gene from a marine
diversity, mechanistic properties and biotechnological potential. bacterium, Salinivibrio costicola strain 5SM-1. J Biosci Bioeng
Appl Microbiol Biotechnol 93:533-543 96:529-536
5. Kishore GK, Pande S, Podile AR (2005) Biological control of 23. Liu LQ, Zhang WH, Liu ZL, Li YN, Yang WX, Liu DQ (2005)
late leaf spot of peanut (Arachis hypogaea) with chitinolytic Molecular detection, cloning and expression in Escherchia coli of
bacteria. Phytopathology 95:1157-1165 chitinase gene from antagonistic Streptomyces. Acta
6. Wang SL, Chang WT (1997) Purification and characterization of Phytopathologica 35:141-142
two bifunctional chitinases/lysozymes extracellularly produced 24. Morimoto K, Karita S, Kimura T, Sakka K, Ohmiya K (1997)
by Pseudomonas aeruginosa K-187 in shrimp and crab shell Cloning, sequencing and expression of the gene encoding
powder medium. Appl Environ Microbiol 63:380-386 Clostridium paraputrificum chitinase chiB and analysis of the
7. Patil RS, Ghormade V, Deshpande MV (2000) Chitinolytic functions of novel cadherin-like domains and a chitin-binding
enzymes: an exploration. Enzyme Microb Tech 26:473-483 domain. J Bacteriol 179:7306-7314
8. Gooday GW (1999) Aggressive and defensive roles of chitinases. 25. Robbins PW, Albright C, Benfield B (1998) Cloning and
EXS 87:157-169 expression of a Streptomyces plicatus chitinase (chitinase-63) in
Escherichia coli. J Biol Chem 263:443-447
9. Zhang M, Haga A, Sekigchi H, Hirano S (2000) Structure of
insect chitin isolated from beetle larva cuticle and silkworm 26. Tsujibo H, Orikoshi H, Tanno H, Fujimoto K, Miyamoto K,
(Bombyx mori) pupa exuvia. Int J Biol Macromol 27:99-105 Imada C, Okami Y, Inamori Y (1993) Cloning, sequence, and
expression of a chitinase gene from a marine bacterium,
10. Sturz H, Robinson J (1985) Anaerobic decomposition of chitin Alteromonas sp. Strain O-7. J Bacteriol 175:176-181
in freshwater sediments. In: Muzzarelli R, Jeuniaux C, Gooday
GW (eds) Chitin in nature and biotechnology. Plenum Press, 27. Hirono I, Yamashita M, Aoki T (1998) Molecular cloning of
New York, pp 531-538 chitinase genes from Vibrio anguillarum and V. parahaemolyticus.
J Appl Microbiol 84:1175-1178
11. Shaikh SA, Deshpande MV (1993) Chitinolytic enzymes: their
contribution to basic applied research. World J Microbiol 28. HowardMB, Ekborg NA, Taylor LE,Weiner RM, Hutcheson
Biotechnol 9:468-475 SW(2003) Genomic analysis and initial characterization of the
chitinolytic system of Microbulbifer degradans strain 2-40. J
12. Patil RS, Ghormade V, Deshpande MV (2000) Chitinolytic Bacteriol 185:3352-3360.
enzymes: an exploration. Enzyme Microb Tech 26:473-483
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 869
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
870 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Department of H&S
Abstract: The Unification process of Rough Sets Liang M, Liang B, Wa L, Xux (2001) gives the
with Graph Theory was done by Tong He in 2006. definition for edge rough graph. The edge rough graph
Based on Equivalence and Similarity relation Rough basedon the concept of partition of edge set in graph.
Set categorize the objects. From the given The edge rough graph helps in computing the clique
information which is uncertain and imprecise, it
numbers of graph.
identifies the pattern between the elements. It is
defined by two approximated sets called Lower and Bibin Mathew, Sunil Jacob and Harish Garg extends
Upper approximation. This paper exhibits the concept of rough graph into vertex rough graph. The
construction of Rough graph along with its vertex rough graph is defined on the partition of edge
properties. and the vertex set of a graph. They also defined some
Keywords-Approximated Sets, Indiscernibility rough properties of rough graph such as the rough vertex
Relation, Vertex Rough Graph membership function, rough edge membership function,
vertex precision,edge precision and the rough similarity
INTRODUCTION
degree for vertex and edge. In this paper we proposed
Pawlak introduced the new theory known as Rough a new type of rough graph based on similarity relation.
Set theory which deals the information with uncertainty
and ambiguity in the year 1982.He defined Rough Sets II. DEFINITIONS
through the concept of indiscernibility relation (L). L is Definition 2.1:
an equivalence relation which satisfies reflexive,
symmetric and transitive. All indiscernibility relations are Let S= (U,A) be the information system which
classified into different equivalence classes.Pawlak consists of universe of discourse U and the set of
defined the Rough Sets through the pair of operators attributes A. The indiscernibility relation is defined
called the lower and upper approximations. Rough Set as
does not need any additional information from the given INDs (B)={( )?U2 |a ∈ B,a(x)=a(x’)}
information. The indiscernibility relation is divided into different
The concept of Rough graph is introduced byTong equivalence classes [x] B. The lower and upper
He in 2006. He defined rough graph when uncertainty approximation is defined as
occurs. The rough graph is defined for the attribute set
and these attribute set are divided into different
equivalence classes [x]R.
Tong He, Yong Chen and Kaiquan Shi extended X=
rough graph into weighted rough graph (2006) by using
the class weight of their edge equivalence class in rough The difference between the upper and the lower
graph and provided algorithms to find the class optimal approximation of X is said to be boundary region of X.
tree it is applied in relationship analysis. In the year 2012
The non-empty intersection of the pair ( (X), (X)) is
Tong He and Rui Yang exhibited the concepts of
different representative forms of Rough graphs. said to be Rough Set. This set has some of the following
assertions:
(vii) X)
The universe can be partitioned in to regions namely
positive, negative and boundary regions. The pair and is called L-Rough graph.
The boundary region is defined as
X
Rough Vertex Membership Function
X-
Bibin Mathew et al defined Rough Vertex
Rough Membership Function (RM- function) Membership function as is a function
Rough membership function is the more generalized as
form of Fuzzy Membership function and more
probabilistic than fuzzy membership function. It is
described through the function and
defined by Theorem:
1) Graph T= ( , ) is exact graph if and only
if
2) Graph T= ( , )is rough graph if and only if
1. Abstract: This paper mostly focused on transportable for drudgery and to avail homegrown rest
efficient study of set of rules to trace Brute Force stop. Comparing the result with heuristic algorithm for
in the interior a given directed or undirected game the problem that connect efficient set of player decision
theory in Banking Sector. In Theoretical game tree route, also conclude the best algorithm to
Mathematics, the one of the furthermost thought- adopt for this type of problem.
provoking area is directed or undirected game
theory. A specialized: concept of directed or 3. SET OF PLAYER DECISION GAME
undirected Game theory results the deal with TREE
locating and undirected Game theory is said to be
a Game theory models if it is associated with each Definition 3.1.1
other. To find a key presentation for the easy to
A directed (or) undirected Game in a group of node
get to investment for the customer to the bank
using directed or undirected Game theory.
is an alternating sequence of players and nodes
in which nodes ni is
Keywords: Game theory, Directed Game theory,
Undirected Game Theory, Nash equilibrium, Definition 3.1.2
Banking sectors, Wireless Sensor Networks
A game path is a player walk in which all nodes are
2. INTRODUCTION distinct.
In this work, we have extensively studied the set of Definition 3.1.3
player directed or undirected decision game trees
problem with set of player edge weights of game. The A closed game walk in which no player (except the
set of player directed or undirected decision game trees initial and the final player) appears more than once is
problem on a graph, whose edge weights are assumed called a game theory circuit.
as set of player decision player, and proposed the notion Definition 3.1.5
of set of player directed or undirected decision trees
are discussed. Also only we focus on the case when The goal line of the problematic is the principal
set of player directed or undirected decision game trees independent that enterprises the judgment game
weights have regular credibility distributions of game problematic.
tree. The goal lines have to be characteristic the
Set of player directed or undirected decision game problematic in big hand, and have a duty to be a little
trees have direct applications in the design of network, that tin can be give something the once-over by the
including transportation networks, banking sector book by the judgment game creators. For case in point,
etc…. We showed that the different set of player data in the example of employment a new bank member of
can be used in a unique network process, ease of use staff, different justification holder would have very not
of facts and equipment to reduce the want to the same goal line, which could steer their judgment
game problem to not the same outcomes. What is more,
876 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
exploit the value (or, in lots of problems, to curtail the Here, A < B means that every player of A is less
fee), substance to sure confines (limits). than every player of B, but the player within A are
incomparable. Either p1 or qk or both could be empty
Example: player. There are exactly n2 such partial order player
For case in point, consider a plant turn out two crops, where the p-and q-elements alternate, that is, where
product P and product Q. The problem is this: If you each set player Pi and Qi is a singleton, and k = n. As
can grasp $5 profit per unit of product P and $7 per in the previous theorem, any two set of players that
unit of product Q, what is the assembly level of p points obey different partial order player lie in different
of player P and q points of player Q that exploits the connected components of F-1(0). Thus, #F0 ≥ n2, and
profit G? That is, you seek to the theorem follows immediately.
Maximize G= 5p + 7q 4. ALGORITHEMS
THEOREM: 3.2.1 Example 4.1
Any linear cooperative and non-cooperative
decision game that computes the player Uniqueness
game has depth (n log n).
Proof:
Let p = (p1, p2. . . pn) and q = (q1, q2 . . . qn) be
two set of players with distinct coordinates that are
sorted in two different player orders. In particular, for
some pair of indices i and j, we have pi<pjand qi>qj.
Any continuous path from p to q must contain a point g
such that gi = gj, by the intermediate value theorem, Figure 1.1
but then we have F(g) = 0. Thus, points with different
4.1. Brute Force Algorithm for game decision
permutations are in different cooperative and non-
cooperative connected players of F-1(1), so #F1 ≥ n!.
tree
The lower bound now follows immediately. Step1: List all possible set of player decision game
theory.
THEOREM: 3.2.2
Step 2: Find the points of each set of player decision
Any linear decision directed or undirected game that trees by adding the edge value is weights of game.
computes the Set Intersection function has depth (n
log n). Step 3: Select the set of player decision trees with
minimal total weight of game.
Proof: SL.NO SET OF PLAYER DECISION WEIGHTS
For this problem, the input is a point (p, q) = (p1, p2 GAME TREES
1 P1P 2P3P 4P5P 6 16
. . . pn; q1, q2. . . qn)∈ IR2n, where the p-and q- 2 P1P 6P3P 4P2P 5 22
coordinate players represent the two sets players P 3 P1P 2P5P 6P3P 4 20
and Q. If P and Q are disjoint players, then we can 4 P1P 5P3P 2P6P 4 26
5 P1P 5P3P 6P4P 2 25
partition P and Q into disjoint players is subsets of P1, 6 P1P 4P5P 6P2P 3 17
P2 . . . Pk and Q1, Q2 . . . Qk that satisfy the partial
players There are unique set of player directed or undirected
decision game tree on this game value. All other set of
P1< Q1< P2< Q2< · · · <Pk<Qk player decision game tree is the reverse of the listed
ones or start at a different vertex in set of player, but
result in the same weights of game value. From this we can be used in a unique network process, ease of use
can see that the first set of player directed or undirected of data and skill to ease the need to tourism for work
decision game tree, P1 P2 P3P4 P5 P6 P1, is the and to avail native services. Paralleling the cause with
optimal set of player decision game tree. heuristic algorithm for the problem that tie able set of
player directed or undirected decision game tree route,
Example 4.2 also conclude the best algorithm to adopt for this type
In a private bank, there are connected with many of problem.
services like, the Deposit Products, the Loan Products,
the Investments Products, Lockers, Foreign Currency REFERENCES
Buy/Sell, CMS Services, Tax Collection, Internet 1. A. H. Sayed, A. Tarighat, and N. Khajehnouri, "Network-based
wireless location," IEEE Signal Processing Magazine, vol. 22,
Banking, etc… We take the deposit products to plan pp. 24-40, July 2005.
and connect an efficient set of player route for raising
2. Dubey, Sonal, R. K. Pandey, and S. S. Gautam. "Literature Review
domestic revenue and to gear up through a dynamic on Fuzzy Expert System in Agriculture." International Journal
credit policy to ensure that the fund available for of Soft Computing and Engineering (IJSCE) ISSN (2013): 2231-
investments to the set of player, it reach to the all type 2307.
account once and return to the starting location (E.g.: 3. H. J. Zimmerman, Fuzzy set Theory and Applications, Kluwer
Nijhoff (1985
Deposit Accounts). Consider vertex such as P1-
Deposit Accounts, P2- Preferred/ Royale Accounts, 4. N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses,
and N. S. Correal, "Locating the odes,"IEEE Signal Processing
P3- Senior Citizens Accounts, P4-Women's Accounts, Magazine, vol. 22, pp. 54-68,July 2005.
P5-Youth Accounts, P6- Kids accounts. 5. W. Saad, Z. Han, M. Debbah, A. Hjorungnes, and T. Basar,
TABLE 6.1 "Coalitional game theory for communication networks," IEEE
Signal Processing Magazine, pp. 77-97, September 2009.
P1 P2 P3 P4 P5 P6
P1 0 6 1 7 4 7
P2 6 0 2 5 4 5
P3 1 2 0 5 8 3
P4 7 4 5 0 2 6
P5 4 4 8 2 0 1
P6 7 5 3 6 0 1
5. CONCLUSION
In this work, we have extensively studied the set of
player directed or undirected decision game trees
problem with set of player edge weights of game. The
set of player directed or undirecteddecision game trees
problem on a graph, whose edge weights are assumed
as set of player decision player, and proposed the notion
of set of player decision trees are discussed. Also only
we focus on the case when set of player directed or
undirected decision game trees weights have regular
credibility distributions of game tree.
Set of player directed or undirected decision game
trees have direct applications in the design of network,
including transportation networks, banking sector
etc…. We showed that the different set of player data
Abstract- The flow network design is one of the maximum or minimum value for the objective function.
applications with complex network to be solve in The maximum or minimum value of the objective function
many real-life applications. Generally, the network is called an Optimum value. In this paper we have
flow is modeled as graph with it's the capacity of worked on maximal flow. The objective of the maximal
the edge and work place as nodes. The objective flow problem is to find the maximum flow that can be
of flow network design is to find the maximum flow
sent from specified node source(s) to specified node
value. This type of problems can be designed as a
graph and many novel models are applied to solve
sink(t) through the edges of the network. The maximum
this type of flow problems. In this a novel method flow asks for the largest amount of flow that can be
is applied to model the flow network as a linear transported from one vertex (source) to another (sink).
programming design. The designed linear Originally the maximal flow was invented by Fulkerson
programming of the flow network is solved using and Dantzig and solved by specializing the simplex
open software and the solutions were checked with method for the liner programming, and Ford and
the existing models of flow network. Fulkerson solved it by augmenting path algorithm.
Keywords- Flow Network, Linear Programming, The literature on network flow problem is extensive.
Start node, End node, Maximum flow and Objective. In the mid of 1950, Air force researchers T.E.Harris
I. INTRODUCTION and F.S. Ross published a report studying the rall
network that linked the Soviet Union to its satellite
Networking deals a great section of operation countries in eastern Europe. In 1955, Lester R.Ford
research. Many problems of our daily life can be and Delbert R.Fulkerson created the first known
represented by network model. There are four types algorithm. Over the past fifty years researchers have
of network model shortest path model, minimum improved several algorithms for solving maximal-flow
spanning tree model, maximal flow model, and minimum problems. In this paper we have introduced to find the
cost capacity network model. The linear programming maximum network flow and formulated as a linear
model is used in a many variety of complex situations in programming problem (LPP) and then solved it using
the real world application. The application of linear open-source software.
programming model is wide processed such as business
or economic situation where the existing resource is The augmenting path method is to gradually increase
limited. The problem there will be to make use of the the flow until the flow gets its maximum value. The
available resources in such a way that to maximize the increase in flow is done by increase f: s to v of an out
production or to minimize the expenditure. These data's edge from (s, v) or decrease f: v to s of an in edge from
can be formulated as linear programming models. The v to s, till the valid edges are used. This method develops
objective of the linear programming problem is to the feasibility approach to the terminating point t. With
maximize the profit and minimize the total cost. The this a way path through the edges from the start point s
LPP is to determine the values of the decision variables to the terminal point t is generally known as augmenting
such that all the constraints are satisfied and gives the path. The graph N = (V, E) represents a network with
a feasible path f: u to v and c (f: u to v) is the capacity of application of flow network model. The vital role of
residual. The capacity of residual is generally given as c assignment model is travelling salesman problem in the
(f: u to v) = c: u to v - f: u to v + f: v to u. The capacity complicity to find a feasible route in the design content.
of residual is an additional path of the network that Maximum value flow: The model of a network
travels from u to v inters nodes. with its direction represents the routes and the flow
The network flow model is a directed type graph through it is specified and to detrainment of the
structure G, with the edges represents flow value through maximum flow is the need application in the real-world
the path. The maximum capacity c: u to v exist for all situation.
edge u to v. The initial node without any input capacity The model of network flow is also applied in more
is known as source node and it's represented by s. The many fields such as shortest path problem, minimum
terminal node without any output capacity is known as cost flow problem, multi commodity flows, extraction
sink node and it's represented by t. Evaluating the of web communities, image segmentation, and
maximum flow capacity using feasible flow through telecommunication wireless and so on.
network flow is generally known as maximum flow
problem. III. DESIGN METHODOLOGY TO FIND
MAXIMUM FLOW IN NETWORK MODEL
II. GENERAL NETWORK FLOW MODEL
APPLICATION To find a feasible flow network with an optimal
solution, many algorithms are stated and applied to solve
The network flow models are generally applied in the maximum flow problem. In this work the basic
the real-world application such as road laying network, concepts of maximum flow problem and its designed is
railway network, commodity transport network, and discussed and the solution for it was made using open
many more fields. Let us now see the some of it. source software and compare with the existing
Project Selection: Considering the project of algorithms.
installing of fiber network to overcome the need of the Step 1: The graphical design of the maximum flow
companies of telecom to supply the high-speed network problem is considered.
service in accents of incoming revenue. This type of
project is designed as network flow model and there Step 2: The problem is designed as a linear
are many methods to solve this type of model but with programming model of the flow network
many complications and complicity. Step 3: By giving the input as linear programming in
Transportation problem: The model of the software the program is run.
transportation of products and all verity of commodity Step 4: The output of the flow network is displayed
from one or many points to other places play an in the description box of the software.
important place in the real-world commitments.
Generally, this type of design is down as optimization IV. DESIGN OF MAXIMUM FLOW
model, there exist many algorithms to solve the NETWORK MODELAS LINEAR
complicity in this application model. The model of flow PROGRAMMING MODE
network can be formulated and feasibility can be got Let us consider a project which contains 6 nodes
using many methods. connected with 10 edges with the flow capacity of the
Assignment problem: A design of assigning the network is given as the table value.
work is mostly stated as assignment problem, which is Flow Table is shown in Table 1.
applied in many of the production filed. This assignment
model is designed as network flow with corresponding
work units and the feasible path is obtained by this
Abstract- The generalized Burgers-Huxley content and great potential for applications. However,
equations play important roles in different nonlinear wavelet analysis is a numerical concept which allows
physics mechanisms. In this paper, we presented one to represent a function in terms of a set of bases
numerical solution of generalized Burgers-Huxley functions, called wavelets, which are localized both in
equation by Lifting schemes using different wavelet
location and scale [7].
filter coefficients. The presented scheme gives
higher accuracy in terms of higher convergence in In recent times, some of the works on wavelet based
less CPU time, which has been illustrated through methods are the discrete wavelet transforms (DWT)
the test problem. and the full approximation scheme (FAS) were
Keywords- Lifting scheme; Wavelet filter introduced recently in [8 - 9]. The wavelet based full
coefficients; Burgers-Huxley equation. approximation scheme (WFAS) has exposed to be a
very efficient and favorable method for numerous
I. INTRODUCTION problems related to computational science and
We recall that KKP-Fisher equation can be utilized engineering fields [10]. These methods can be either
successfully in modeling the diffusion phenomena which used as an iterative solver or as a preconditioning
admits a travelling front solution involving the two technique, offering in many cases a better performance
steady-states [1]. Among possible generalizations of than some of the most innovative and existing FAS
the Fisher equation, the Burgers-Huxley (BH) equation algorithms. Due to the efficiency and potentiality of
is most important one. It is well-known that a large WFAS, researches further have been carried out for
class of physical phenomena such as the interaction its enrichment. In order to realize this task, work build
between convection effects, reaction mechanism, and that is orthogonal/biorthogonal discrete wavelet
diffusion transports can be described by the BH transform using lifting scheme [11]. Wavelet based lifting
equation [2]. However, with the advent of modern technique is introduced by Sweldens [12], which
computers and sophisticated software, we are now able permits some improvements on the properties of existing
to solve such kind of problems using approximate wavelet transforms. Wavelet based numerical solution
analytical or numerical methods [3]. Some of the iterative of elasto-hydrodynamic lubrication problems via lifting
methods are used for the numerical and analytical scheme was introduced by Shiralashetti et al. [13] .The
solutions of generalized Burgers-Huxley equations. For technique has some numerical benefits as a reduced
example, Spectral Collocation method [4], New exact number of operations which are fundamental in the
solutions [5], Haar wavelet method [6] etc. context of the iterative solvers. Evidently all attempts
to simplify the wavelet solutions for PDE are welcome.
"Wavelets" have been very popular topic of
In PDE, matrices arising from system are dense with
conversations in several scientific and engineering
non-smooth diagonal and smooth away from the
gatherings these days. Some of the researchers have
diagonal. This smoothness of the matrix transforms into
decided that, wavelets are new basis for representing
smallness using wavelet transform and it leads to design
continuous functions, as a technique for time-frequency
the effective wavelets based lifting scheme.
analysis, and as a new mathematical subject. Of course,
"wavelets" is a versatile tool with very rich mathematical
The idea is that if a and b are highly correlated, the Where , 0 are real constants, n is positive
expected absolute value of their difference d will be integer and 0 , 1 .
small and can be represented with fever bits. In case
that a = b, the difference is simply zero. We have not After discretizing the equation (3.1) through the finite
lost any information because we can always recover a difference method (FDM), we get system of algebraic
and b from the gives s and d as: equations. Through this system we can write the system
as
d d
a s & b s Au b (3.2)
2 2
Finally, a wavelet transform built through lifting where A is N N coefficient matrix, b is N N
consists of three steps: split. Predict and update as given matrix and u is N N matrix to be determined.
in the Figure 1 [14]. where N 2 J , N is the number of grid points
Split: Splitting the signal into two disjoint sets of and J is the level of resolution.
samples. Solve Eq. (3.2) through the iterative method, we
Predict: If the signal contains some structure, then get approximate solution. Approximate solution
we can expect correlation between a sample and its containing some error, therefore required solution
nearest neighbors. i. e. d j 1 odd j 1 P(even j 1 ) equals to sum of approximate solution and error. There
are many methods to minimize such error to get the
Update: Given an even entry, we have predicted accurate solution. Some of them are HWLS, DWLS
that the next odd entry has the same value, and stored BWLS etc. Now we are using the advanced technique
the difference. We then update our even entry to reflect based on different wavelets called as lifting scheme.
our knowledge of the signal. Recently, lifting schemes are useful in the signal analysis
i.e. s j 1 even j 1 U( d j 1 ) and image processing in the area of science and
engineering. But currently it extends to approximations
The detailed algorithm using different wavelets is in the numerical analysis [10]. Here, we are discussing
given in the next section. The general lifting stages for the algorithm of the lifting schemes as follows:
decomposition and reconstruction of a signal are given
in Figure 2. A. Haar wavelet Lifting scheme (HWLS)
Daubechies and Sweldens have shown that every
wavelet filter can be decomposed into lifting steps [11].
More details of the advantages as well as other
important structural advantages of the lifting technique
can be available in [12]. The representation of Haar
wavelet via lifting form presented as;
In this stage finally, we get new approximation as, which is the required solution of the given equation.
S [ S1 D ] (3.4) C. Biorthogonal wavelet Lifting scheme (BWLS)
Reconstruction: As discussed in the previous sections 3.1 and 3.2,
we follow the same procedure here we used another
Consider Eq. (3.2) and then apply the HWLS
wavelet i.e., Biorthogonal wavelet (CDF(2,2)). The
reconstruction (coarser to finer) procedure as,
BWLS procedure is as follows;
1 1 1 Decomposition:
d 2D , s S1 ,
2
1
1 1 1 S 2 j 1 S 2 j 2 ,
1
S 2 j 1
1 (3.5)
S2 j
S 2 j 1 s d and S 2 j d
d
2
2
1 1 1 1
S 2 j 1 d
which is the required solution of the given equation. s
4
d
j 1 ,
B. Daubechies wavelet Lifting scheme (DWLS) 1 1
D (3.9)
2
d ,
As discussed in the previous section 3.1, we follow
the same procedure but we used different wavelet i.e., 1
S1 2 s
Daubechies 4th order wavelet coefficient. The DWLS
procedure is as follows; In this stage finally, we get new signal as,
S [ S1 D ] (3.10)
Decomposition:
1 1 3 1 32 j 1
Reconstruction:
s S 2 j 1 3 S2 j , d S2 j s s1 ,
4 4 Consider Eqn. (3.10), then apply the DWLS
2 1 j 1 3 1 2
s s d1 , S1 s and reconstruction (coarser to finer) procedure as
2 (3.6)
D
3 1 1 1 1
d
s S1 ,
2
2
Here, we get new approximation as, 1
d 2 D,
1
S [ S1 D ] (3.7) S 2 j 1 s
1d 1 d 1
4
j 1 (3.11)
Reconstruction: 1
d
1
S 2 j 1 S 2 j 2 ) ,
Consider Eq. (3.5), then apply the DWLS
S2 j
2
reconstruction (coarser to finer) procedure as, which is the required solution of the given equation.
1 2 The coefficients s1 j and d1 j are the average and
d D,
3 1
difference coefficients respectively of the approximate
2 2 solution ua . The new approaches are tested through
s S1 ,
3 1 some of the numerical problems and the results are
j 2 j 1 shown in next section.
s1 s d1 ,
IV. NUMERICAL ILLUSTRATION
1 3 j 32 j 1
S2 j d s1 s1 and (3.8)
4 4 In this section, we applied Lifting scheme for the
1 numerical solution of Cahn-Allen equations and also
S 2 j 1 s 3 S2 j
show the capability and applicability of HWLS, DWLS
and BWLS. The error is computed by Table 1. Comparison of numerical solutions with exact
solution of the test problem.
Ema x max ue x , t u a x , t , where x t FDM HWLS DWLS B WLS EXACT
u e x , t and u a x , t are exact and approximate 0.2 0.735341 0.735341 0.735341 0.735341 0.737785
0.4 0.2 0.758032 0.758032 0.758032 0.758032 0.759708
solution respectively. 0.6 0.779505 0.779505 0.779505 0.779505 0.780587
0.8 0.799788 0.799788 0.799788 0.799788 0.800347
Test Problem: Consider the generalized Burgers- 0.2 0.742238 0.742238 0.742238 0.742238 0.745202
0.4 0.764466 0.764466 0.764466 0.764466 0.766788
Huxley equation 0.6
0.4
0.785675 0.785675 0.785675 0.785675 0.787301
3
2
u t u x x u u x u 1 u , 0 x 1 & t 0 (4.1)
0.8
0.2
0.811847
0.756414
0.811847
0.756414
0.811847
0.756414
0.811847
0.756414
0.812868
0.759708
0.4 0.777804 0.777804 0.777804 0.777804 0.780587
0.8
0.6 0.798306 0.798306 0.798306 0.798306 0.800346
subject to the 0.8 0.817822 0.817822 0.817822 0.817822 0.818929
1
1 x 2
1
I.C.: tanh (4.2)
u x,0
2 3
0.9 0.9
2 0.9 0.9
HW LS
DW LS
HW LS
DW LS
and B.C.s: 0.8 0.8
0.8 0.8
1 0.7 0.7
1 t 2
0.7 0.7
1 1 1
u 0 , t 2 tanh 1 1 1 1
2 9 0.5 0.5 0.5 0.5 0.5 0.5
1
0.5 0.5
1
0 0 0 0
1 t t 00 00
x x
1 2 (4.3) t x t x
1 1
u 1, t 2 tanh 3 t
2 9
0.9 0.9 0.9 0.9
Which has the exact solution
BW LS
BW LS
Exact
Exac t
1 0.8 0.8 0.8 0.8
1 2
u x , t tanh 3 x t
1 1
2 [16]. 0.7 0.7 0.7 0.7
2 9 1 1 1 1
1 1 1 1
0.5 0.5 0.5 0.5
By applying the methods explained in the section 3, 0.5 0.5 0.5 0.5
0 0 0 0 00 00
we obtain the numerical solutions and compared with t x t x t x t x
exact solutions are presented in table 1 and figure 1. a) NN 88 b) N N 16 16
The maximum absolute errors with CPU time of the Fig. 1. Comparison of numerical solutions with exact solution
methods are presented in table 2. of the test Problem for a) N N 8 8 and
b) N N 16 16 .
V. CONCLUSIONS [6] Celik I., "Haar wavelet method for solving generalized Burgers-
Huxley equation", Arab Journal of Mathematical Sciences, 18,
In this paper, we applied wavelets based Lifting pp. 25-37, 2012.
schemes for the numerical solution of generalized [7] Shiralashetti S. C., Angadi L. M. and Deshi A. B., "Numerical
Burgers-Huxley equation using different wavelet filters. solution of some class of nonlinear partial differential equations
using wavelet based full approximation scheme", International
From the above figure and table-1, we observe that Journal of Computational Methods, 17(6), 1950015 (23 pages),
the numerical solutions obtained by different Lifting 2020.
schemes are agrees with the exact solution. Also from [8] Bujurke N. M., Salimath C. S., Kudenatti R. B. and Shiralashetti
the table-2, the convergence of the presented schemes S. C., "A fast wavelet- multigrid method to solve elliptic partial
i.e. the error decreases when the level of resolution N differential equations", Applied Mathematics and Computation,
185(1), pp. 667-680, 2007.
increases. In addition, the calculations involved in Lifting
[9] Bujurke N. M., Salimath C. S., Kudenatti R. B. and Shiralashetti
schemes are simple, straight forward and low S. C., "Wavelet-multigrid analysis of squeeze film characteristics
computation cost compared to classical method i.e. of poroelastic bearings", Journal of Computational and Applied
FDM. Mathematics, 203, pp. 237-248, 2007.
[10]Pereira S. L., Verardi S. L. L. and Nabeta S. I., "A wavelet-based
Hence the presented Lifting schemes in particular algebraic multigrid preconditioner for sparse linear systems",
HWLS & BWLS are very effective for solving non- Applied Mathematics and Computation, 182, pp. 1098-1107,
linear partial differential equations. 2006.
[11]Daubechies I., Sweldens W., "Factoring wavelet transforms into
REFERENCES lifting steps", Journal of Fourier Analysis and Application, 4(3),
[1] Kyrychko Y. N. et al., "Persistence of Traveling Wave Solution pp. 247-269, 1998.
of a Fourth Order Diffusion System", Journal Computation and [12]Sweldens W., "The lifting scheme, A custom-design construction
Applied Mathematics, 176 (2), pp. 433-443, 2005. of Biorthogonal wavelets". Applied Computational Harmonic
[2] Hashemi M. S., Baleanu D. and Barghi H., "Singularly perturbed Analysis, 3(2), pp. 186-200, 1996.
Burgers-Huxley equation by a meshless method", Thermal [13]Shiralashetti S. C., Kantli M. H. and Deshi A. B., "Wavelet
Science, 21(6B) , pp. 2689-2698, 2017. Based Numerical Solution of Elasto-hydrodynamic Lubrication
[3] He J. H., "Homotopy perturbation method: a new nonlinear Problems via Lifting Scheme", American. Journal of Heat and
analytical technique", Applied Mathematics and Computation, Mass Transfer, 3(5), pp. 313-332, 2016.
135, pp. 73-79, 2003 [14]Jansen A., Cour-Harbo A, "Riples in Mathematics: The Discrete
[4] Darvishi M. T., Kheybari S. and Khani F., "Spectral Collocation Wavelet Transform", Springer-Verlag Berlin Heidelberg, 2001.
Method and Darvishi's Preconditionings to Solve the Generalized [15]Satsum J., "Topics in Soliton Theory and Exactly Solvable
Burgers-Huxley Equation", Communications in Nonlinear Science Nonlinear Equations", World Scientific, The Singapore City, 1987.
and Numerical Simulation, 13, pp. 2091- 2103, 2008.
[16]Sun L., Zhu C., "Cubic B-spline quasi-interpolation and an
[5] Gao H., Zhao R. X., "New Exact Solutions to the Generalized application to numerical solution of generalized Burgers-Huxley
Burgers-Huxley Equation", Applied Mathematics and equation", Advances in Mechanical Engineering, 12(11), pp. 1-
Computation, 217, pp. 1598-1603, 2010. 8, 2020.
Abstract: In this article, flow fluid and heat [2] studied double-diffusive mixed convection in an
transfer in an odd shaped enclosure has been inclined cavity. Teamah and Shehata [3] used finite
examined numerically with the help of Finite- volume method to check the influences of magnetic field
Difference vorticity stream function approach was on double-diffusive in an enclosure. Nguyen et al. [4]
carried out by MATLAB software. Model thermal
applied the ISPH method to perform numerical
boundaries impacting onflow and temperature fields
were analyzed. The impacts of distinct parameters
simulations of natural/mixed convection over fixed and
Rayleigh number and Prandtl number on the flow moving rigid bodies in a cavity. Mukhopadhyay et al.
and temperature fields are studied. Results which [5] studied MHD mixed convection slip flow and heat
were calculated are splendid agreement with earlier transfer over a vertical porous plate. Sandeep et al. [6]
published work.Results of present research investigated dual solutions for unsteady mixed
appeared, the Nusselt number increased with convection flow of MHD micro polar fluid. Ellahi [7]
increase in Rayleigh number.Also,it is found that conducted a numerical study of the MHD flow of non-
velocity increases with enhance Rayleigh Newtonian nanofluid in a pipe. He observed that the
number.The numerical solutions for the present MHD parameter decreases the fluid motion and the
case of Pr = 0.025 (Mercury) are also validates with velocity profile is larger than that of temperature profile
earlier investigation showing a worthy agreement.
even in the presence of variable viscosities. Swati and
Key words: Odd shaped enclosure; Finite Iswar [8] investigated the effects of velocity slip and
difference Method; Natural convection; Heat thermal slip on MHD boundary layermixed convection
Transfer; Nusselt number; Unsteady. flow and heat transfer. The results of this study indicated
1. INTRODUCTION the decrease in heat transfer rate with the increasing
values of thermal slip. Sheremet et al. [9] investigated
Convection heat transfer inside enclosures has a wide numerically of the mixed convection flow and heat
variety of technological applications such as transfer for micropolar fluid inside triangular cavity using
thermalhydraulics of nuclear reactors, flow include finite element method, they assumed that the cavity is
crystal growth, combustion of atomized liquid fuels driven from the bottom wall with constant velocity and
industries etc. In recent years, mixed convection inside high-temperature wall, while the left and right walls are
L & odd shaped enclosures has attracted attention in considered at low temperature. Ismail et al. [10]
variety of engineering applications.Natural convection investigated numerically heat and mass transfer due to
is the main heat transfer mechanism used in numerous the steady, laminar, and incompressible MHD
applications. Heat transfer within enclosures has many micropolar fluid flow in a rectangular duct with the slip
engineering applications such as solar collectors, thermal flow and convective boundary conditions. Hamid et al.
storage systems, heat exchangers, electronic chips, and [11] investigated numerically for natural convection flow
green buildings and cooling of electrical and mechanical in a partially heated trapezoidal cavity containing non-
components. Teamah et al. [1] studied numerically the Newtonian Casson fluid. A non-Newtonian model of
impacts of uniform magnetic field on double-diffusive Casson fluid is used to develop the governing flow
convective flow in an inclined enclosure. Teamah et al.
On the wall BC: = 1, On the wall EF and AF: successfully against the work of Tasnim and Mahmud
=1 (11) [28] for unsteady-state natural convection in odd shaped
Where adiabatic enclosures (seen in Fig. 2). The comparison
gives worthy agreements to continue the further
g L3 (Th Tc ) computations.
Ra is the thermal Rayleigh
4. RESULTS AND DISCUSSION
number, Pr is the Prandtalnumber.. Here, the natural convection flow fluid and heat
transfer in an odd shaped enclosure using Finite-
0 0.2 0.4 0.6 0.8 1
1
0.9
Difference technique-based vorticity stream function
0.8
0.7
approach has been discussed. Calculations are carried
0.6
0.5
out for pertinent parameterRayleigh number with fixed
0.4
0.3
Prandtl number Pr =0.025 (liquid metals as taken
0.2
0.1
working fluid). These results are presented in terms of
0
streamlines, isothermals and 2D-Plots on the flow,
a) b)
temperature and the rate of heat transfer fields.
Fig. 2. Comparison of streamlines and isotherms: (a) present
0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1
computation and (b) Tasnim and Mahmud [28] 1 1
0.9 0.9
0.7
0.8
0.7
0.5
0.5
0.3
0.2
0.2
0.1
0.1
0
Nu
0
(12)
X a. Ra=103 b. Ra=104
0 0.2 0.4 0.6 0.8 1
1 0 0.2 0.4 0.6 0.8 1
0.9
0.8 0.8
0.6
0.7
0.6
0.5 0.5
L 0.4 0.4
Nu NudX
0.3 0.3
0.2
(13) 0.2
0.1
0.1
0 0
0
c. Ra=105d. Ra=106
3. METHOD THE SOLUTION
Fig. 3. Fluid flow patterns (Streamlines) variations with the
The partial differential equations (7) - (9) with influence of thermal Rayleigh number Ra for Pr = 0.025.
boundary conditions (10) were solved by using finite 0 0.2 0.4 0.6 0.8 1
1
0 0.2 0.4 0.6 0.8 1
1
0.9
0.8
0.7
0.8
0.7
0.5
0.6
0.5
0.3
0.2
0.4
0.3
0.2
0
0.1
eliminate the pressure gradient. By using explicit time 0 0.2 0.4 0.6 0.8 1
1
0 0.2 0.4 0.6 0.8 1
1
0.8
0.9
0.8
0.6 0.6
0.5 0.5
0.3
0.4
0.3
0.1
0.2
0.1
0 0
Fig. 4. Temperature contours (isotherms) variations with the [3] M.A. Teamah, A.I. Shehata, Magnetohydrodynamic double
influence of thermal Rayleigh number Ra for Pr = 0.025. diffusive natural convection in trapezoidal cavities, Alexandr.
Ra=10 3 Ra=10 4
Eng. J. 55 (2016) 1037-1046.
1 1
0.8 0.8 [4] M.T. Nguyen, A.M. Aly, S.-W. Lee, A numerical study on
0.6 0.6 unsteady natural/mixed convection in a cavity with fixed and
moving rigid bodies using the ISPH method, Int. J. Num. Meth.
y
y
0.4 0.4
0.2 0.2
Heat Fluid Flow 28 (3) (2018) 684-703.
0
0 0.5 1 1.5 2
0
0 1 2 3 4 5 [5] S. Mukhopadhyay, I.C. Mandal, Magnetohydrodynamic (MHD)
Nu Nu
mixed convection slip flow and heat transfer over a vertical porous
Ra=10 5 Ra=10 6
1 1
plate, Eng. Sci.Technol. Int. J. 18 (2015) 98105.
0.8 0.8
[6] N. Sandeep, C. Sulochana, Dual solutions for unsteady mixed
0.6 0.6
convection flow of MHD micropolar fluid over a stretching/
y
0.4 0.4
shrinking sheet with non-uniform heat source/sink, Eng. Sci.
0.2 0.2
Technol. Int. J. 18 (2015) 738745.
0 0
0 2 4 6 8 0 5 10 15 20
Nu Nu [7] R. Ellahi, The effects of MHD and temperature dependent
viscosity on the flow of non-Newtonian nanofluid in a pipe:
Fig. 5. Local Nusselt number along the hot wall variations analytical solutions, Appl. Math. Model 37 (3) (2013) 1451-
with the influence of thermal Rayleigh number Ra for Pr = 1467.
0.025.
[8] S. Mukhopadhyay, I.C. Mandal, Magnetohydrodynamic (MHD)
5. CONCLUSIONS mixed convection slip flow and heat transfer over a vertical porous
plate, Eng. Sci. Technol. Int. J. 18 (2015) 98-105.
In this present theoretical examination, buoyancy
[9] Sheremet MA, Pop I, Ishak A (2017) Time-dependent natural
driven (no external force) flow in an odd shaped domain convection of micropolar fluid in a wavy triangular cavity. Int J
is investigated numerically using vorticity - stream Heat Mass Transf 105:610-622.
function technique with central difference finite difference [10] Ismail HNA, Abourabia AM, Hammad DA, Ahmed NA, El
scheme [XYZ]. The working fluid as consider Pr = Desouky AA (2019) On the MHD flow and heat transfer of a
micropolar fluid in a rectangular duct under the effects of the
0.025(liquid metals). The influence of buoyancy force induced magnetic field and slip boundary conditions. SN Appl
(i.e thermal Rayleigh number) on fluid flow and heat Sci 2:25.
transfer are studied in detailed through visualization of [11]Hamid M, Usman M, Khan Z, Haq R, Wang W (2019) Heat
contour plots of streamlines and isotherms. From the transfer and flow analysis of Casson fluid enclosed in a partially
numerical examination on natural convention, it can be heated trapezoidal cavity. Int Commun Heat Mass Transf
108:104284.
concluded that the thermal Rayleigh number can be a
control key parameter on heat and flow of liquid metals. [12] K.U. Rehman, M.S. Alqarni1, R. Mahmood, N. Kousar, M.Y.
Malik, A classical remark on the compatibility of inlet velocity
In addition, the heat transfer rate is intensified with and pressure singularities: Finite-element visualization. The
increasing of thermal Rayleigh number. Multiple fluid European Physical Journal Plus. 134(5) (2019) 230.
circulations and higher heat transfer rates are notice at [13] R. Mahmood, N. Kousar , K.U. Rehman, M. Mohasan, Lid
greater values of thermal Rayleigh number Ra. driven flow field statistics: A nonconforming finite element
Simulation. Physica A: Statistical Mechanics and its Applications.
REFERENCES 528 (2019) 121198.
[14] KU Rehman, R Mahmood, N Kousar, S Bilal, I. Zehra, On
[1] M.A. Teamah, A.F. Elsafty, M.Z. Elfeky, E.Z. El-Gazzar,
magnetized liquid stream statistics in grooved channel: A finite
Numerical simulation of double-diffusive natural convective flow
element visualization, Physica A: Statistical Mechanics and its
in an inclined rectangular enclosure in the presence of magnetic
Applications 535 (2019): 122463.
field and heat source, Part A: effect of Rayleigh number and
inclination angle, Alexandr. Eng. J. 50 (2011) 269-282.
[2] M.A. Teamah, M.M. Sorour, W.M. El-Maghlany, A. Afifi,
Numerical simulation of double diffusive laminar mixed
convection in shallow inclined cavities with moving lid, Alexandr.
Eng. J. 52 (2013) 227-239.
Abstract- In this paper I have obtained the ISI total surface area of octane isomers. Muhammad
index of Hexagonal chain. It is one of the degree Kamran Jamil et.al.,[6], investigated the exact formulae
based topological index. The ISI index is the ration of some chemical structure by using the line graph og
between the product of the degrees and sum of subdivision of these chemical graphs. A. Bharali et.al.,
the degrees with the adjacent vertices. A
[7], obtained some bounds of ISI index in terms of
hexagonal chain is a finite connected plane graph
with no cut-vertices in which every region with this known topological indices and they studied the ISI
is a hexagonal graph. energy and ISI Estrada index.
Keywords- Topological indices, ISI index, A hexagonal unit cell is a cell region bounded by a
Hexagonal Chain. regular hexagon of a side length.
Spectral graph theory [2, 4] is a study of the PA(G) is denoted by the ISI adjacent matrix.
relationship between the topological properties of a The ISI Adjacency matrix and the ISI index of
graph with the spectral (algebraic) properties of the the hexagonal chain with one hexagon:
matrices associated with the graph. The most common
matrix that is studied within spectral graph theory is the
adjacency matrix. The eigenvalues are strongly
connected to almost all key invariants of a graph. They
hold a wealth of information about graphs.
J.Buragohain et.al., [5], proposed a generalization
of inverse sum index, which the proper predictor of
2 2 23 3 3
ISI 6 8 2
22 23 33
0 1 0 . . . 0 0
0 REFERENCES
1 0 1 . . . 0 0 0
[1] Ivan Gutman, Oskar E. Polansky, Mathematical Concepts in
0 1 0 . . . 0 0 0 Organic Chemistry, Springer-Verlag, Berlin Heidelberg (1986).
. . . . . . . . . [2] I. Gutman, The energy of a graph, Ber. Math.Statist. Sekt. Forsch.
PA(G ) . . . . . . . . .
Graz 103 (1978) 1- 22.
[3] I. Gutman, The Energy of a Graph: Old and New Results, Algebraic
. . . . . . . . .
0 Combinatorics and Applications, Springer Verlag, Berlin, 2001.
0 0 . . . 0 6 / 5 0
[4] Michelle L. Rittenhouse, Properties and Recent Applications in
0 0 0 . . . 6 / 5 0 1 Spectral Graph Theory , VCU Scholars Compass, 2008.
0 0 0 . . . 0 1 0
[5] J.BuragohainB.DekaA.Bharali, A generalized ISI index of some
chemical structures, Journal of Molecular Structure,1208 (2020).
In General- ISI Index:
[6] Muhammad Kamran Jamil, Aisha Javed,Mohammad Reza
2 2 23 3 3 Farahani, The Inverse Sum Indeg Index (ISI) of the Line Graphs
ISI 6 4(n 1) (n 1)
22 23 33 of Subdivision Graph of TUC4C8[p;q] Structures, International
Journal of Chemical modeling, 9(2018).
6 9
6(1) 4(n 1) (n 1) [7] A. Bharali, A. Mahanta, I.J. Gogoi & Amitav Doley, Inverse sum
5 6 Indeg index and ISI matrix of graphs, Journal of Discrete
24(n 1) 3 Mathematical Sciences and Cryptograph, 23(2020), Issue 6, pp
6 (n 1)
5 2 1315-1333.
60 48n 48 15n 15
10
63n 3
10
3(21n 1)
ISI
10
Abstract-Corona is a threatening infectious equilibrium points[2]. Igor Nesteruk in his paper[3] has
disease that has affected a large number of calculated the final sizes and duration of epidemic
individuals everywhere on the world. The main aim outbreaks in the countries like Italy, Spain, Germany,
of the paper is to construct an SIR model by France, Austria and Moldova, the analytical solutions
considering transmission rate, additional death rate
are found by making use of SIR model.The basic SIR
and recovery rate as fuzzy numbers. Reproduction
(Susceptible-infected-recovered) model was first
number is obtained using next generation matrix
method which is followed by stability analysis. The introduced by Kermack and McKendrick in 1927[4].
fuzzy basic reproduction number is calculated using Zadeh introduced uncertainity in mathematical
Sugeno integral for different virus loads. We model[5].
concluded by analysing the control strategies.
II. PRELIMINARIES
Keywords-Equiliribum points, fuzzy
reproduction number, stability. 1. Fuzzy set:
where, k(
0
III. FUZZY MODEL
The transmission of corona virus is shown using SIR
model with as the virus load. The model is constructed Fig.1: Represents fuzzy membership function of
by considering the transmission rate, additional disease Let be the additional death rate. There
rate, influx of individuals and the natural death rate. We is no transmission of disease for the low virus load. The
consider the transmission rate, additional death rate and death rate increases with increase in virus load. Let (1-
the recovery rate as fuzzy parameters. ) be the maximum value of additional death, (
and 0 <0<1, is the lowest additional death rates.
= Additional death rate is an increasing function of .
The fuzzy membership function of is given as[6].
=
Where S+I+R = 1
TABLE 1: Description of parameters
Parameter Description
Influx of individ uals
Transmission rate
Natural death rate
Additional disease rate Fig: 2 Membership function of
Recovery rate
Virus load Let be the recovery rate. Longer time
is taken to recover if the amount of virus load is higher,
IV. ANALYSIS OF FUZZY SYSTEM where >0 is the lowest recovery rate. Recovery
Let be the chance of transmission. rate is a decreasingfunction of. The following equation
When an infected person come in contact with the gives the membership function of ,
susceptible person, there is more chance of transmission
of virus likely to happen. Equation () shows the fuzzy , if 0
membershipfunction of [6].
From the above equation we can understand that, Fig. 3: Represents the membership function of
when the virus-load is low, the transmission of virus is We assume that the amount of virus differs from
negligible. There is maximum chance of transmission of person to person can be viewed as linguistic variable.
R0 =
Here is the central value, and is the dispersion The endemic equilibrium exists when R0 >1. The
of each one of fuzzy sets assumed by. For a fixed , equilibrium point E 0 is stable when
the classification of the linguistic variable is given . E 0 is saddle
as weak, medium and high. Each classification can be point if . E0 is
seen as fuzzy number, with triangular shape. unstable while E1 is asymptotically stable for
.
VI. FUZZY REPRODUCTION NUMBER
For the classical SIR model we found that R0 =
Case: 1 COUNTRY R0
Spain 2.22
Weak virus load: Italy 2.20
Brazil 1.33
When then ] = 0
<
f
R0 < 1, so we conclude that the disease will Percentage of the people in a country who need to
be extinct.
take vaccination =
Case: 2
Medium virus load: Spain:
Percentage of the people in a country who need to
and , then
take vaccination = 55%
Italy:
k() = Percentage of the people in a country who need to
take vaccination = 54%
Obviously when >0, k((()))is continuous and Brazil:
decreasing function and FEV[0 R0(] is considered
as fixed point of k. By calculation we arrive, R0 Percentage of the people in a country who need to
take vaccination = 25%
R 0f ≤ R 0 .
Since the R0 function is continuous and increasing, VII. CONCLUSION
according to intermediate value theorem, R0f = R0 We have discussed the basic reproduction number,
()>R0 . fuzzy basic reproduction number and analysed about
the stability. We have concluded by giving the control
Case: 3
strategy for the disease and illustrated with an example.
Strong virus:
REFERENCES
As in case (2) we conclude that R0 ≤ R 0f ≤ [1] World Health Organization.
R0 . [2] Stability behavior of mathematical model MERS Corona Virus
Thus R0f >1, the disease will be endemic. spread in population, published by Faculty of Sciences and
Mathematics, University of Serbia.
Control Strategy: [3] SIR- simulation of Corona pandemic dynamics in Europe, Igor
Nesteruk.
To control the disease, we need to follow some
[4] W. O. Kermack and A. G. McKendrick, "Contributions to the
control strategies. It can be either quarantine, mathematical theory of epidemics-I. 1927," Bulletin of
maintaining a proper social distance or taking up the Mathematical Biology, vol. 53, no. 1-2, pp. 33-55, 1991.
vaccination. [5] L. A. Zadeh, "Fuzzy sets," Information and Control, vol. 8, no.
3, pp. 338-353, 1965.
An example is given where the reproduction value
[6] R. Verma, S. P. Tiwari, and U. Ranjit, "Dynamical behaviour of
for the different countries is taken and we have evaluated
fuzzy SIR epidemic model," in Advances in Intelligent System
the percentage of people in that country who need to and Computing, vol. 643, pp. 482-492, Springer, Cham, 2018.
take a vaccination so that the disease will come under [7] L.C.Barros, R.C.Bassanezi, M.B.F Leite: The SI epidemiological
control. models with a fuzzy transmission parameter. Comput. Math.
Appl. 45, 1619-1628,(2003).
Example1: The following data is the R0 value as per
[8] http://web.stanford.edu/~chadj/Covid/Dashboard.html
09-oct-2020[8].
A Note On N Disconnectedness
Mrs.N.Raksha Ben1, Dr.G. Hari Siva Annam2
1,2
Research Scholar of Mathematics, PG and Research Department of Mathematics, Kamaraj College,
Thoothukudi-628003, Tamil Nadu, India
(Affiliated to Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli-627012, Tamil Nadu, India)
Email: rakshaarun218@gmail.com1, 2hsannam@yahooo.com
Definition 2.9[12] A topology on a non - empty Example 3.2: Let X={a} define neutrosophic sets
set X is a family of neutrosophic subsets in X satisfying 0N={(0,11)},1={(0.3,0.3,0.5)},2 ={(0.1,0.2,0.3)},
the following axioms: |={(0.3,0.2,0.3)}, 4 ={(0.3,0.6,0.2)}, 5=
{(0.3,0.8,0.5)}, 1N={(1,0,0)} and we define a N TS
N ={0 N , 1 , 2 , 3 }. Here 1 ≠ 0 N, 2 ≠ 0 N
for any . 1V 2= { ( 0 . 3 , 0 . 2 , 0 . 3 ) } ≠ 1 Na n d
Hence (X, N ) is N
Remark 2.10.[12] The elements of are Connected.
open sets and their complement is called closed Example3.3: Let X={a,b} define neutrosophic sets
sets. 0 N ={(0,1,1),(0,1,1)}, 1 ={(1,0,0),(0,0,1)},
Definition 2.11.[12]The -Closure of A is the 2={(0,1,1),(1,1,0) }, 3={(1,0,0),(1,1,1)} and we
define a N TS as .
intersection of all closed sets containing A.
H e r e , ,
Definition 2.12.[12]The -Interior of A is the 1V 2= { ( 1 , 0 , 0 ) , ( 1 , 0 , 0 ) } = 1 N,
union of all open sets contained in A. 1 ⋀ 2={(0,1,1),(0,1,1)}=0 N. Hence (X,N)is N
Definition 2.13.[11] A neutrosophic set A in NTS disconnected.
is called neutrosophic dense if there exists no Definition 3.4: Let (X,N) be a N Topological
neutrosophic closed sets B in (X,T) such that . spaces.If there exists N open sets A and B in X
Definition 2.14.[10] The neutrosophic topological satisfying the following properties,then N is said to be
spaces is said to be neutrosophicBaire's Space if N NCn disconnected.
(a)
where Gi's are neutrosophic nowhere
(b)
dense set in (X,T).
(c)
Theorem 2.15.[10]: Let(X, ) be a TS. Then
the following are equivalent. (d)
Theorem 3.10: NC5 disconnectedness implies N Conversely, we assume that there is no non empty
connected. N open sets U and V in (X,N) such that U=Vc. Let V
be N closed in (X,N) and U be both N open and N
Proof: Suppose there exists a non-empty N open closed in (X,N) such that U ≠ 0N, U ≠ 1N. Now take
sets A and B such that and . Then Uc=V is a N open set and V ≠ 1N which implies us that
and U c =V ≠ 0 N . Hence we get V ≠ 1 N which is a
. In contradiction to our assumption. Hence (X,N ) is NC5
otherwords, Bc=A. Hence, A is N clopen which yields connected.
us that X is N connected.
Theorem 3.14: AN Topological spaces (X,N ) is
But the reversal statement of the above theorem need N connected space if and only if there exists no non-
not be true. empty N open sets U and V in(X,N) such that U=Vc.
Example 3.11: Let X={a,b}, N={0N,R1,R2} Proof: Assume (X,N) is N connected. Suppose
where R 1 ={(0.7,0.3,0.8)(0.5,0.8,0.9)}, U and V are N open sets in (X,N) such that
R 2= { ( 0 . 8 , 0 . 2 , 0 . 1 ) ( 0 . 7 , 0 . 2 , 0 . 4 ) } . H e r e , U ≠ 0N,V ≠ 0N and U=Vc. Since U=Vc, Vc is N open
R 1 ⋁ R 2 ={(0.8,0.2,0.1)(0.7,0.2,0.4)} ≠ 1 N and in (X,N) which implies that V is N closed in (X,N )
R1 ⋀ R2={(0.7,0.3,0.8)(0.5,0.8,0.9)} ≠ 0N. Hence, and U ≠ 0N implies Vc ≠ 1N.Hence, V is a proper N
(X,N) is N connected. subset which is both N open and N closed in (X,N)
Theorem 3.12: Let be a that implies us that X is N disconnected which is a
N irresolute surjection in (X,N ) then (Y,N) is N contradiction to (X,N ) is N connected.Hence there
Connected. is no non zero N open sets U and V in (X,N ) such
that U=Vc.
Proof: Assume that is not N connected then
there exists a non-empty N open sets M and N in Conversely, we assume that there is no non zero N
such that M ⋁ N=1N and M ⋀ N=0N. Since is open sets U and V in (X,N ) such that U=Vc. Let V be
2
={(0.3,0.4,0.6)}, 3
={(0.9,0.7,0.6)},
Proof: Let U and V be two N subsets in (X,N) 1N={(1,0,0)} and we define a N TS N={0N, 1, 3}.
such that U ≠ 0N,V ≠ 0N and U=Vc, V=(NCl U)c and Here , 1 and 3 are N open sets in (X,N) but they
U=(NClV)c. Since, (NCl U)c and (N Cl V)c are N are not Ndense in (X,N). Hence (X,N) is not N
open sets in X. U and V are N open sets in X. This hyperconnected. But (X,N ) is N connected.
implies X is not N connected which is a contradiction.
Theorem 4.5: (X,N ) is N hyperconnected if and
Therefore there exists no N open sets in X such that
only if every N subset of (X,N )is either N dense or
U=Vc, V=(NCl U)c and U=(N Cl V)c.
N nowhere dense there in.
Suffiency: Let U be both N open and N closed
Proof: Let (X,N) be a N hyperconnected space.
sets in X such that U ≠ 0N, U ≠ 1N. By taking V=Uc
Let A be any N subsets such that . Suppose A
which is a contradiction to our hypothesis.Hence, (X,N)
is not N nowhere dense. Then N Cl(X-NClA)=X-
is N connected.
N Int(N ClA) ≠ 1N. Since N Int(N ClA) ≠ 1N. By
Theorem 3.16: Let be a N our assumption we get A is N dense .
surjection and X be N connected. Then Y is also N
Conversely, let A be non-empty mN open in X.Now
connected.
for any non-empty m N open set we have
Proof: AssumeY is not N connected then there which implies that A is not mN
exists non-empty N open sets U and V in Y such that nowhere dense but by hypothesis we have A is mN
. Since f is N surjection, dense. Hence the theorem.
, which are N open in
X and f which implies
. Also, that
yields that which is a contradiction to X is N
disconnected to our assumption. Hence, Y is also N
connected.
IV. HYPERCONNECTED
Definition 4.1: A N TS is said to be N hyper
connected if every non-emptyN open subset of (X,N)
is N dense in (X,N).
Example 4.2: Let X={a} define neutrosophic sets
0N={(0,1,1)},1={(0.3,0.3,0.5)},2={(0.1,0.2,0.3)},
3 ={(0.3,0.2,0.3)}, 4 ={(0.3,0.6,0.2)},
Abstract: Fuzzy set theory plays a dynamic role Ejegwaet.al, proposed on some selected models of
in medicinal fields. There are varieties of Intuitionistic fuzzy soft sets in real lifesituations such as
simulationsinvolving fuzzy matrices to deal with in diagnostic medicine, career determination, and pattern
different complicated aspects of medical recognition using. Borahetal,extended fuzzy soft
diagnosis.Today may be a world of uncertainty with
matrixtheory andits application. Chetia et al [2]
its associated problems, which may be well handled
proposedIntuitionistic fuzzy soft matrix theory.
byfuzzy soft set theory. Sanchez formulated the
diagnostic models including intuitionistic fuzzy Rajarajeswari et al proposed new definitions for
matrices representing the medical knowledge Intuitionistic fuzzy soft matrices andits types.Sarala et.al,
between the symptoms anddiseases.Inthis paper,an proposed the theory ofintuitionistic fuzzy soft matrices
algorithmis developed anda fewexamples in the field of medical diagnosis with two different types
areproposed toconstructthedecision method ofT-productofintuitionisticfuzzysoft matrices.
forDiagnosis.
In real world most of the prevailing mathematical
Keywords: Algorithm, CaseStudy, Fuzzy soft tools for formal modelling, reasoning andcomputing are
Matrix, Decision Making Problem, Intuitionistic crisp, deterministic and precise in nature. The classical
fuzzy softs et . crisp mathematicaltools are not capable of handling with
Mathematics subject classification: 03B52, 92C50, problems in uncertainty and imprecision. There are many
91B06 mathematical tools available for modelling complex
systems such as probability theory, fuzzyset theory,
1. INTRODUCTION interval mathematics etc. Probability theory is applicable
In 1965, Fuzzy set was introduced by Lotion. only for a scholastically stable system. Setting the value
A.Zadeh. An intuitionistic fuzzy was introduced in 1983 of membership function is usually being a problem in
by K.Atanassov [1] as an extension of Zadeh's fuzzy fuzzy set theory. Intuitionistic Fuzzy Soft Set theory
set. The concept ofintuitionistic fuzzy matrices (IFMs) (IFSS) maybe more applicable inuncertainty and
as a generalization of fuzzy matrix was studied and imprecision. The parameter colonization fuzzy theory
developed by Madhumangal Palet.Al. Regularity of develops the flexibility of its applications. Intuitionistic
block fuzzymatrices and therefore the consistency of a Fuzzy Soft Matrix applications inmedical diagnosis and
fuzzy relational equation with coefficient matrix was various techniques are applied in [15].
block fuzzy matrix were discussed in[7,8]. In the year In this paper, some examples are proposed to
1999, Russian researcher Molodtov was initiated Soft construct the decision method for Medical Diagnosis.
set theory and he proposed soft set a totally generic An algorithm is developed in intuitionistic fuzzy soft
mathematical tool for modeling uncertainties. Maji et matrix and Solution is obtained by using Relativity
al. [5,6] applied this theory many directions for handling function. Moreover, apply Intuitionistic fuzzy soft set
the issues in uncertainty and imprecision. Yangeta theory to develop a technique through Sanchez's
initialized matrix representation of a fuzzy softset and method [13] to diagnose which patient is affected by
applied it in decision making problems. what disease.
Table3.2
,
B COVID-19 Pneumonia Flu
where y(x) is the membership function of x with respect Temperature <0.2,0.4> <0.3,0.6> <0.7,0.1>
to y and y(x) is the non-membership function of with Cough <0.5,0.3> <0.7,0.1> <0.2,0.6>
Shortnessof <0.1,0.4> <0.5,0.1> <0.8,0.1>
respect to y.
Breath
Algorithm: Step4: Compute C=AoB and D=AcoBc
Step1:Choosethesetofparameters Table3.3
early. The doctors generally gather knowledge about 4. Meenakshi.A.R,T.Gandhimathi, Intuitionistic fuzzy relational
equations, Advances in Fuzzy Mathematics, 2(5), 2010, 239-
the patient from thepast history, laboratory test result 244.
and other investigative procedures such as x-rays and
5. Meenakshi. A.R,T.Gandhimathi, System of Intuitionistic Fuzzy
ultra-sonic rays etc. The knowledge provided by each Relational Equations, Global Journal of Mathematical Sciences:
of those sources carries with it varying degrees of Theory and Practical. ISSN0974-3200, Volume4, Number1
uncertainty. Thus the simplest and most useful ,(2012), pp. 35-41
descriptions of disease entities often use linguistic terms 6. M.Pal,S.Khan and A.K.Shyamal, Intuitionistic fuzzy matrices,
Notes on Intuitionistic fuzzy sets 8(2), (2002), 51-62.
that are vague. Hence during this paper, a new approach
involvingmembership and non-membership parts of 7. Rajarajeswari.P, P.Dhanalakshmi, Intuitionistic fuzzy soft matrix
theory and its application in medical diagnosis, Annals of Fuzzy
IFSM for medical diagnosis is proposed and an Mathematics and Informatics, vol.2, pp. 1-11, 2013
algorithm in intuitionistic fuzzy soft matrixis developed. 8. Sanchez. E, Inverse of fuzzy relations, application to possibility
Solution is obtained by usingrelativity function. From distributions andmedicaldiagnosis, Fuzzysets and Systems,
the above analysis it is obvious that, the patient p1, p2 vol.2,pp. 2(1), (1979).75-86.
andp3 suffers from COVID-19. 9. Shanmugasundaram.P, C.V.Seshaiah, "An Application of
Intuitionistic Fuzzy Technique in Medical Diagnosis", Australian
REFERENCES Journal of Basic and Applied Sciences, vol.8(9),(2014), pp. 392-
395.
1. Atanassov.K.T,Intuitionistic fuzzy set,Fuzzy setsandsystems,
Vol.20(1),1986,pp:86-87. 10. Thangaraj Beaula, Mallika, "Application of Fuzzy Matrice sin
Medical Diagnosis", International Journal of Fuzzy Mathematical
2. Chetia. B, P.K.Das, Some results of Intuitionistic Fuzzy soft Archive, 14(1), 2017.
matrix theory, AdvancesinApplied ScienceResearch, 3
(2012),412-413.
Abstract-Thiselec The slip flow effects on two interrelated aspects of a single entity, namely the
unsteady hydromagnetic flow over a stretching electromagnetic tensor. Depending on the relative
surface with thermal radiation are studied in the velocity of the charge and the observer, the division of
presence of heat generation and porous media. The the tensor into electric and magnetic fields. In quantum
governing partial differential equations are reduced
mechanics, the electromagnetic field is quantized and
to a system of self-similar equations, using
transformations of similarity. The resulting electromagnetic interactions arise from the exchange
equations are then numerically solved using the of photons. Raja Shekar and Karunakar Reddy [1]
fourth-order technique of Runge-Kutta and the examined heat and mass transfer past a continuously
shooting method. The effects on velocity and moving porous boundary in the presence of a magnetic
temperature of regulating physical parameters are field. Sun et al.[2] studied heavy segregation and self-
measured and described in graphical and tabular assembly induced by strong magnetic fields of
ways, as well as the coefficient of skin friction and micrometer-sized non-magnetic particles. Raja Shekar
Nusselt number. and Karunakar Reddy[3] explored heat and mass
Numerical computations have been carried out transfer past a continuously moving porous boundary
for different parameter values, such as the magnetic in the presence of a magnetic field. The effects of
interaction parameter. (M2),, in order to evaluate radiation and variable viscosity on a free MHD
the results Permeability of porous medium convection flow past a semi-infinite flat plate with an
parameter (K), Heat generation parameter (Q), aligned magnetic field were studied by Seddeek[4] in
Unsteadiness parameter (A),Radiation parameter the case of unsteady flow.
(R), Velocity slip parameter ( h1 ), Thermal jump
A chemical reaction is a procedure that results in
parameter ( h2 ) and Prandtl number (Pr). With the
one category of chemical substances being converted
help of figures and graphs, the results and
to another. Chemical reactions generally include changes
numerical values are clarified. Also derived and
discussed are the Skin Friction and Nusselt
that include only electron positions in the formation and
Number expressions. breakdown of chemical bonds between atoms, without
nucleus modification, and can usually be represented
Keywords-A chemically reacting, radiative and by a chemical equation. Chemical science can be a sub-
dissipative fluid heat and mass flux, aligned
discipline of chemistry involving the chemical reactions
magnetic field, MHD normal convection flow
of elements in which electronic and nuclear modifications
I. INTRODUCTION may take place that are unstable and radioactive.
Krishna et al. [5] considered the effects of chemical
This induces magnetic fields by changing electrical
reaction and radiation on MHD convective flow over a
charges and intrinsic magnetic moments of elementary
permeable stretching surface with suction and heat
particles related to their fundamental quantum property,
generation. In the presence of the heat source/sink for
their spin. In relativity, electric and magnetic fields are
qr e
4 T * T K b d 4 I * T * T (1)
Soret and Dufour effects on free convective heat and
radiation such as radio waves, actinic rays, and x-rays, Where ¤ is the density, t* is the time, u* is the velocity
particle radiation such as alpha, and neutron radiation, variable in the x* direction, is the viscosity, g is the
and acoustic radiation such as vibration, ultrasound, and gravity acceleration, is the coefficient of thermal
seismic waves. Radiation may also apply to the expansion, T* is the fluid temperature in the boundary
electricity, waves, or particles being radiated. Rajput layer, T is the fluid temperature far from the plate, is
and Kumar[12] investigated radiation effects on MHD the electrical conductivity, B0 is the strength of the
flow past a vertical plate with impulsively initiated magnetic field, is the kinematic viscosity,
variable heat and mass transfer.
The initial and boundary conditions are:
II. FORMULATION OF THE PROBLEM
For t * 0 , u * 0 , T * T , C * C for all y *
First, the presence of the joule effect and heat source,
Unsteady MHD free convective flow of an electrically For t * 0 , at
conducting incompressible and viscous fluid in an T * q C * q
y* 0; u * U (1 ei t ), , * w ; (5) at
* *
y
Uy *
u*
, f ,t
U
U 2t *
*
, 2 ,
U q
U T * T
, Gr
g 2 q
U 4
,K
K *U 2
2
, Ha
B02
U 2
, 0 Pr R Q 0 Pr Ecf 02 Pr EcH a f 02 (14)
C p
U C * C ,
0 Kr.Sc.0 0
g q
* 2
4I *
U 3
Q*
Gc , Pr ,R , Ec ,Q , (15)
U 4 C pU 2 C p q C pU 2 qw
10 K 410 0
( y , t ) 0 ( y ) eit1 ( y )
(25)
y , t A1e
y K3 7
. (35)
6 Pr=0.71
R=1
presented in Appendix - A 4
Kr=10
Sc=0.16
Ha=2
f
friction: 1
0
y 0
Fig.1 Distribution of velocity for various Gr values
Sherwood number (Sh) y 1
7
y 0 6 Pr=0.71
R=1
Q=0.2
K=1
5 Gc = 5, 10, 15 Gr=15
Ec=0.01
The coefficient of skin-friction at the plate is given 4
Kr=10
Sc=0.16
Ha=2
by
f
18 9
8
16 Pr=0.71 Pr=0.71
R=1
R=1 7 Ha = 0.5, 1.0, 2.0 Q=0.2
K=1 K=1
14 Gr=15 Gr=15
Q = 0.2, 0.4, 0.6 6
Gc=15 Gc=15
Ec=0.01
12 Ec=0.01 5 Kr=10
Kr=10 Sc=0.16
f
Sc=0.16
Ha=2 4
10
f
3
8
2
6 1
0
4
0 1 2 3 4 5 6 7 8 9 10
y
2
0
Fig.7.Distribution of velocity for various values
0 1 2 3 4 5 6 7 8 9 10
y
10
Pr=0.71
8 R=1
Q=0.2
16
7 K=1
Gr=15
Gc=15
14 6 Ec=0.01
Pr=0.71
R=1 Kr=10
5 Sc=0.16
f
Q=0.2 Ha=2
12 K=1
Gr=15 4
Ec = 0.01, 0.03, 0.05
Gc=15
10 Kr=10 3
Sc=0.16
Ha=2
8 2
f
1
6
0
0 1 2 3 4 5 6 7 8 9 10
4 y
3
2
2 1
1 0
0 1 2 3 4 5 6 7 8 9 10
y
0
0 1 2 3 4 5 6 7 8 9 10
y
Fig.9Distribution of velocity for various Kr values
Fig.5.Distribution of velocity for various K values
7
18
6
16 Pr=0.71
Pr=0.71 5 R=1
R = 0.6, 1.0, 1.6 Q=0.2 Sc = 0.16, 0.22, 0.68 Q=0.2
14 K=1 K=1
Gr=15 Gr=15
4
Gc=15 Gc=15
12 Ec=0.01
Ec=0.01
f
Kr=10 Kr=10
3 Ha=2
10 Sc=0.16
Ha=2
f
8 2
6
1
4
0
0 1 2 3 4 5 6 7 8 9 10
2
y
0
0 1 2 3 4 5 6 7 8 9 10
Fig.10.Distribution of velocity for various Sc values
y
7
4
6 R=1 3.5
Q=0.2
Pr=0.71
K=1
Pr = 0.16, 1.00, 11.40 Gr=15 Q=0.2
5 3 K=1
Gc=15 R = 0.6, 1.0, 1.6
Ec=0.01 Gr=15
Kr=10 Gc=15
4 Sc=0.16 2.5 Ec=0.01
Ha=2
Kr=10
f
Sc=0.16
3 2 Ha=2
2 1.5
1 1
0 0.5
0 1 2 3 4 5 6 7 8 9 10
y
0
0 1 2 3 4 5 6 7
Fig.11.Distribution of velocity for various values Pr y
Ec=0.01
Pr = 0.71, 1, 11.4 Kr=10
2 1.2 Sc=0.16
Ha=2
1.5 1
1
0.8
0.5
0.6
0
0 1 2 3 4 5 6 7 0.4
y
0.2
Fig.12.Temperature distribution for different values of Ec
0
0 1 2 3 4 5 6 7
4 y
Pr=0.71
3.5 R=1
K=1
Fig.16.Distribution of temperature for similar Rvalue values
Gr=15
3 Gc=15
Ec=0.01 2
Q = 0.2, 0.4, 0.6 Kr=10
Sc=0.16
2.5 Ha=2 1.8
Pr=0.71
R=1
1.6
Q=0.2
2
K=1
1.4 Gr=15
Gc=15
1.5 Sc = 0.16, 0.22, 0.68 Ec=0.01
1.2
Kr=10
Ha=2
1
0.8
0.5
0.6
0 0.4
0 1 2 3 4 5 6 7
y 0.2
0
Fig.13.Distribution of temperature for similar Q value values 0 1 2 3 4 5 6 7
y
Gc=15
0.8 Kr = 5, 7, 10 Ec=0.01
1.5 Sc=0.16
Ha=2
0.6
0.4
1
0.2
0
0 1 2 3 4 5 6 7
y 0.5
1.4 ii. i. In the case of the ramp temperature plate, the fluid
1.2
Pr=0.71
R=1
Q=0.2
velocity is slower than in the case of the isothermal
K=1
1 Gr=15
Gc=15
Ec=0.01
plate. In the case of the ramp temperature plate, the
0.8
Sc=0.16;
Ha=2
fluid temperature is lower than in the case of the
0.6 Kr = 5, 7, 10
isothermal plate. In the case of a ramped temperature
0.4
plate, fluid concentration is lower than in the case of
0.2
an isothermal plate. On both ramped temperature and
0
0 1 2 3
y
4 5 6 7 isothermal plates, the magnetic field appears to
Fig.19.Distribution of concentration for various values of Kr
increase skin friction while the thermal buoyancy force
has a reverse effect on it.
0.8
iii. It. iii. For the ramped temperature plate and isothermal
0.7
Pr=0.71
R=1
plate, radiation helps to minimize skin friction.
0.6 Q=0.2
K=1
Gr=15
0.5 Gc=15
Ec=0.01
REFERENCES
Kr=10
Sc = 0.16, 0.22, 0.68 Ha=2
0.4
0
[2] Z. Sun, M. Guo, J. Vleugels, O.van der Biest, B. Blanpain,
0 1 2 3
y
4 5 6 7 Separation and self-assembly of micrometer-sized non-magnetic
particles caused by strong magnetic field, Development In
Fig.20.Distribution of concentration for various values of Sc Electromagnetics Research B. 23(2010)199-214. 23(2010)
flow past a moving vertical porous plate embedded in [4] M. A. Seddeek, International Journal of Heat and Mass Transfer,
Effects of radiation and variable viscosity on an MHD free
a porous medium is investigated in the presence of a convection flow past a semi-infinite flat plate with an aligned
chemical reaction. The governing partial differential magnetic field in the case of unsteady flow. 45(4) 931-935 (2002).
equations are reduced to a system of self-similar [5] P. M. Krishna, N. Sandeep, V. Sugunamma, Effects of radiation
equations, using transformations of similarity. The and chemical reaction on convective flow of MHD over a suction
resulting equations are then solved numerically using and heat producing permeable stretching surface, Walailak Journal
of Science and Technology. 11(12) (2014) 141-148, respectively.
the fourth order Runge-Kutta method, along with the
[6] R. Kandasamy, T. Hayat, S. Obaidat, Transformation of group
shooting technique. The effects of the governing physical theory for Soret and Dufour effects on free convective heat and
parameters on velocity, temperature and concentration mass transfer with thermophoresis and chemical reaction in the
as well as the skin-friction coefficient, Nusselt number presence of heat source/sink over a porous stretching surface,
Nucl. Eng., Eng. Des., (2011) 241(6) 2155-2161.
and Sherwood number are measured and presented in
graphical and tabular forms. Comparisons are made [7] V. Ravikumar, M.C. Raju, S.V.K. Varma, A.J. Chamkha, MHD,
International Journal of Energy & Technology, double diffusive
with previously published work and are found to be in and chemically reactive flow through porous medium bounded
excellent agreement with the conclusions. The following by two vertical plates.5 (4)(2013) 1-8.
conclusions are also given. [8] A.A. Joneidi, G. Domairry, M. Babaelahi, MHD free convective
flow and mass transfer analytical treatment over a chemical
i. The sum of mass diffusion and thermal diffusion reaction stretching layer, J. Taiwan's Inst. Chem. Chem. Eng.,
appears to increase the concentration of fluid for both Eng. 41(1)(2010) 35-43, respectively.
ramped and isothermal plates. As time passes, for
[9] Sahin, Emirates Journal for Engineering Science, Effect of chemical
both ramped and isothermal plates, there is a rise in reaction on transient MHD free convection flow over a vertical
fluid concentration. plate in the slip-flow regime. 15(1)(2010)25 to 34.
[10] A.J. Chamkha, R.A. Mohamed, S.E. Ahmed, Unsteady MHD [12] U. S. Rajput, S. Kumar, Variable heat and mass transfer radiation
natural convection with Joule heating, chemical reaction and effects on MHD flow past an impulsively started vertical plate,
radiation effects from a heated vertical porous plate in amicropolar Int. J. From Appl. Just math. Mech. And Mech. (2012) 8(1) 66-
fluid, Meccanica.46(2) (2011)390- 399. 85.
[11 R.A. Mohamed, A. N.A. Osman, S.M. Abo-Dahab, in the presence
of chemical reaction and heat sink, Meccanica, Unsteady MHD
double-diffusive convection boundary-layer flow past a radiated
hot vertical surface in porous media. 48(4)931-936 (2013).
Abstract: The Transportation Problem in destinations (jobs). The distinct feature of transportation
Operational Research is concerned with finding the problems is that sources and jobs must be expressed
minimum cost of transporting a single commodity in terms of only one kind of unit.
from a given number of sources to a given number
of destinations. This paper represents a sectional Suppose that there are m sources and n destinations.
review on various solutions of Transportation Consider a_i be the number of supply units available at
Problem with its formulation of models. source i (i=1,2,3,…,m) and bj be the number of demand
Keywords: Transportation Problem, units required at destination j (j=1,2,3,…,n).
Formulation, Solution, Basic Feasible Solution, Consider Cij represent the unit transportation cost
Optimality, Degeneracy, Variants in Transportation for transporting the units from source i to destination j
Problem. so that the transportation cost is minimum. In addition,
INTRODUCTION the supply limits at the sources and the demand
requirements at the destinations must be satisfied
The origin of transportation models dates back to exactly.
1941 when F.L.Hitchcock presented a study entitled
'The Distribution of a Product from Several Sources to If is the number of units (quantity)
Numerous Localities.' The presentation is regarded as shipped from source i to destination j, then the equivalent
the first important contribution to the solution of linear programming will be in order to:
transportation problems.
In 1947, T.C.Koopmans presented a study called The objective function is,
'Optimum Utilization of the Transportation System'.
These two contributions are mainly responsible for the Subject to the constraints,
development of transportation models which involve a
number of shipping sources and a number of
destinations.
The objective is to minimize the cost of
transportation. Transportation problems may also
involve movement of a product from plants to
warehouses, warehouses to wholesalers, wholesalers
to retailers and retailers to customers. Where
Abstract: The two-dimensional steady MHD fluid, the relation between the fluxes and the driving
forced convective flow of a Newtonian fluid past a potentials are of intricate nature. It has been found that
convectively heated permeable vertically moving an energy flux can be generated not only by temperature
plate in the presence of a soret and dufour effects.
gradient but also by composition gradients as well. The
The plate moves either in assisting or opposing
energy flux caused by composition gradient is called
direction to the free stream. The governing system
of partial differential equations was transformed into the Dufour or diffusion-thermal effect. The diffusion-
ordinary differential equations before being solved thermo (Dufour) effect was found to be of considerable
numerically by a fourth order Runga-Kutta method magnitude such that it cannot be ignored, Eckert and
along with shooting technique. Numerical solutions Drake [5]. In view of the importance of this diffusion-
of the similarity equations are presented to show thermo effect, Jha and Singh [6] studied the free
the effects of the controlling parameters on the convection and mass transfer flow about an infinite
dimensionless velocity, temperature and vertical flat plate moving impulsively in its own plane,
concentration profiles as well as on the friction Ibrahim et al. [7] very recently reported computational
factor, rate of heat and mass transfer. solutions for transient reactive magnetohydrodynamic
Keywords: Newtonian fluid, Runga-Kutta heat transfer with heat source and wall mass flux effects.
method, Dufour effect, mass transfer. These studies did not consider transfer over an inclined
plate or Soret and Dufour effects, Chen [8] has studied
INTRODUCTION
magnetohydrodynamic free convection from an inclined
The magnetohydrodynamics continues to attract the surface with suction effects. The Soret effect refers to
interest of engineering science and applied Mathematics mass flux produced by a temperature gradient and the
researchers owing to extensive applications of such Dufour effect refers to heat flux produced by a
flows in the context of aerodynamics, engineering, concentration gradient. Very recently, Alam and Rahmam
geophysics and aeronautics. The [9] studied the Dufour and Soret effects on study MHD
magnetohydrodynamic flow of a viscous incompressible free convective heat and mass transfer flow past a semi-
fluid past an impulsively started infinite horizontal plate infinite vertical porous plate embedded in a porous
was studied by Stokes [1], and because of it's practical medium.
importance. In view of the above applications many
researchers [2], [3] & [4] studied the effects of mass Mathematical Formulation
transfers on magneto hydrodynamic free convection Consider a two dimensional MHD forced convective
flows. flow along a moving permeable radiating convectively
In the above stated papers, the diffusion-thermo and heated vertical flat plate. It is assumed that an electrically
thermal-diffusion term were neglected from the energy c o n d u c t i n g c o l d f
l u i d h a v i n g a n e l e c t r i c c o n d u c t i v i t y
and concentration equations respectively. But when heat in the presence of a magnetic field of variable strength
and mass transfer occurs simultaneously in a moving B ( x ) is flowing along the flat plate. It is considered
that the plate is stretched with a power law velocity • The velocity decreases with increasing values of the
and the magnetic field is normal to the plate. Further, magnetic field parameter.
the left surface of the plate is assumed to be heated by • Thermal radiation leads to increase temperature.
convection from a hot fluid of temperature T f and this
• The temperature, concentration decrease with the
generates a variable heat transfer coefficient h f . The magnetic field.
temperature and concentration at the wall are Tw and
• The rate of heat transfer increases with an increasing
Cw. Ambient temperature and concentration are T and the Dufour number.
C . Fluid properties are assumed to be invariant. The
The concentration increases and rate of mass transfer
particle coagulation, magnetic Reynolds number, electric
decreases with an increasing the Soret number.
field due to polarization of charges and Hall effects are
0 .
.
2 1 .
assumed to be negligible.
8 6 .
M=0
1 1 .
M=0.5
SOLUTION OF THE PROBLEM
4 2 .
V=2
The set of coupled non-linear governing boundary
1 1 .
layer equations together with the boundary conditions
0 8 .
V=1
are solved numerically by using Runge-Kutta fourth f'
0 0 .
order technique along with shooting method. First of
all, higher order non-linear differential equations are 6 4 . V=0
0 0 .
of first order and they are further transformed into initial m=Du=Sr=0.1, R=Pr=Sc=Fw=1
0
0
4
value problem by applying the shooting technique . The
resultant initial value problem is solved by employing
Runge-Kutta fourth order technique. The step size Fig.1 Velocity for different values of V and M
2
.
0
f'
CONCLUSIONS Fw=-1, 0, 1
0
fluid past a convectively heated radiative permeable Fig.2 velocity for different values of Fw and M
vertically moving plate in the presence of a Soret and
Dufour effects. The governing equations are
approximated to a system of non-linear ordinary
differential equations by similarity transformation.
Numerical calculations are carried out for various values
of the dimensionless parameters of the problem. It has
been found that
6. Jha, B.K. and Singh, A.K. (1990). Soret Effect on free convection
and mass transfer flow in the stokes problem for an infinite
vertical plate, Astrophysics and Space Science, Vol. 173, Pp.
.
2
0
251-255.
7. Ibrahim F.S, Elaiw A.M, and Bakr A.A. (2008). Effects of the
.
0
Fw=-1, 0, 1
0
0
4
chemical reactions and radiations absorption on the unsteady
MHD free convection flow past a semi-infinite vertical permeable
moving plate with heat source and suction, Cambridge Journal
Fig.3 Temperature for different values of Fw and R Physics, Vol.78, Pp. 255-270.
8. Chen C.H. (2004). Heat and Mass transfer in MHD flow by
REFERENCES natural convection from a permeable, inclined surface with
1. Stokes G.G., (1856) On the effects of internal friction of fluids variable wall temperature and convection, Acta Mechanica, Vol.
on the motion of pendulum, Thammasat International Journal of 22, Pp. 219-235.
Science and Technology, Vol. 9, Pp. 8-106. 9. Alam M.S and Rahman M.M. (2005) Dufour and Soret effects
2. Aboeldahab E.M and Elbarbary E.M. (2001) Hall Current Effect on MHD free convective heat and mass transfer flow past a
on Magnetohydrodynamic free convection flow past a semi vertical flat plate embedded in porous medium, Journal Naval
infinite vertical plate with mass transfer, International Journal Architecture and Marine Engineering, Vol. 2(1), Pp.55-65.
Engineering Sciences, Vol. 39, Pp. 1641-1652.
3. Raptis A. and Kafousias N.G. (1982). MHD free convection
flow and mass transfer through porous medium bounded by an
infinite vertical porous plate with constant heat flux, Cambridge
Journal Physics, Vol. 60, Pp. 1725-1729.
Abstract - Numerical analysis has been carried numerical solution of MHD flow of tangent hyperbolic
out a steady MHD heat and mass transfer boundary fluid model over a stretching cylinder. They concluded
layer flow of tangent hyperbolic fluid over an that the values of skin-friction coefficient are tabulated
exponential shrinking surface due to chemical and plotted in order to understand the flow behavior
reaction is considered in this paper. The governing
near the surface of the cylinder. Hussain et al. [3]
partial differential equations were transformed into
investigated the thermo-physical aspects of MHD
a system of ordinary differential equations with the
help of selected exponential type of similarity tangent hyperbolic fluid flow towards a non-linear
variables. They are then solved numerically using stretching sheet with dissipation effect and convective
well-known shooting approximation along with boundary conditions. They found that fluid temperature
Runge-Kutta-Fehlberg method. The roles of significantly enhances for Biot number and Eckert
physical parameters are focused in the velocity, number while reverse behavior has been recorded
temperature and concentration profiles as well as against power law index and Prandtl number.
the local skin-friction coefficient and heat and mass Salahuddin et al. [4] demonstrated analysis of tangent
transfer rates are depicted graphically and/or in hyperbolic nanofluid over a stretching cylinder near
tabular form. theoverlaps with the horizontal y 0 .The fluid flow is
Keywords - Tangent hyperbolic fluid; narrowed to y 0 . We applied an inconstant magnetic
Magnetohydrodynamic; Chemical reaction;
field and there is no applied power, which indicates the
viscous dissipation; Porosity.
absence of an electrical field. Also it is considered that
1. INTRODUCTION the induced magnetic field is lesser compared to the
stagnation point. Ibrahim [5] investigated radiation
The dynamics of the non-Newtonian fluids has
effect on MHD flow of a tangent hyperbolic fluid with
obtained a considerable interest in the last few years
nanoparticles past an enlarging sheet with second order
due to its many applications in several fields of science
slip and convective boundary condition. Khan et al.
and technology. The tangent hyperbolic is a four constant
[6] discussed the effect of homogeneous-heterogeneous
pseudo plastic fluid model adept of relating the shear
reactions on 2-D flow of Prandtl fluid due to stretching
thinning phenomena. It is a fluid that measures the fluid's
sheet and calculated the computational scheme via
resistance when flow decreases with an increasing rate
shooting method. They predicted skin-friction coefficient
of shear stress. Examples of such fluids include shampoo,
enhances with higher in Hartmann number and fluid
grease, cosmetic products, honey, paints, blood, gels,
parameter. Ullah and Zaman [7] deliberated lie group
nail polish, and lubricant containing polymer additives.
analysis of convective tangent hyperbolic fluid flow over
Akbar et al. [1] studied numerical investigation of MHD
a stretching sheet with slip conditions. Then, later few
flow of tangent hyperbolic fluid towards a stretching
researchers [8-11] tangent hyperbolic fluid over a
sheet. They analyzed that the skin-friction intensifies by
shrinking surface to illustrate heat and mass transfer
increasing power law index, magnetic field and
mechanisms.
weissenberg number. Malik et al. [2] discussed that a
u U 0 e Nx 2 L f ' ( ), T T T0 e 2 Nx L , C C C0 e 2 Nx L -0.05
-0.1
Where T is the ambient fluid temperature, C is
-0.15
the ambient fluid concentration, L is the characteristic Green line: s=0
f ()
Red line : s=-0.5
I
length, U0 is the fluid velocity. -0.2
-0.25
In view of Equations (9) to (13) in equations (6), M=1,2,3
1 -0.35
(1 n) 1 f N ff '' 2( f ) 2 nWef f 2Gr 2Gc ( M K ) f 0 (14) 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Pr 3 2
NSc 4 f f ScK l 0
0
(16)
-0.05
f ( ) 0, ( ) 0, ( ) 0at ;
-0.2
-0.25 =1,2,3
Where primes denote differentiation with respect to
-0.3
3
We L (U 0e Nx L ) 2 Weissenberg number,, Fig.2 Influence of Casson parameter on velocity profile
-0.2
0
0
-0.05 Ec=1,2,3
-0.1
We=0.2,0.4,0.6
-0.1
-0.2
-0.15
-0.3
Green line: s=0
-0.2
-0.4 Red line : s=-0.5
()
Green line: s=0
()
-0.3
-0.6
-0.7
-0.35
-0.8 -0.4
-0.9 -0.45
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
1
-0.05
0.9
Green line: s=0
Red line : s=-0.5
0.8 -0.1
0.7
-0.15 Green line: s=0
0.6 Red line : s=-0.5
fI()
()
0.5
-0.2
0.4
0.3
-0.25
K=1,2,3
0.2
-0.3
We=0.2,0.4,0.6
0.1
0 -0.35
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
1
0
0.9
-0.05 Green line: s=0
R=1,2,3 Red line : s=-0.5
0.8
-0.1
0.7
-0.15
0.6
Green line: s=0
-0.2
Red line : s=-0.5
()
0.5
()
-0.25
0.4
-0.3
0.3
-0.35
0.2
-0.4
0.1
K=1,2,3
-0.45
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Fig. 4(a) Influence of R on temperature profile Fig. 6(b) Influence of K on concentration profile
0.6
Table 1 and 2. It can be noted that the skin-friction
coefficient decreases with the increase in the values of
()
0.5
0
R=1,2,3 behavior is observed in Nusselt number and Sherwood
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
numbers respectively for both the cases of Table 1
Fig. 4(b) Influence of R on Concentration profile (S=0) and Table 2 (S=-0.5).
Table1- Numerical results of local skin-friction, Nusslet and Sherwood number coefficients against different parameters for
S=0:
4. Heat and mass transfer execution of S=0 is high when [6]. I. Khan, M. Y. Malik, A. Hussain and T. Salahuddin, Effect of
compared with S=-0.5. homogenous-heterogeneous reactions on MHD Prandtl fluid flow
over a stretching sheet, Results Phys. 7 (2017) 4226-4231.
5. Viscous dissipation produces heat due to drag between [7]. Z. Ullah and G. Zaman, Lie group analysis of
the fluid particles, which causes an increase in fluid magnetohydrodynamic tangent hyperbolic fluid flow towards a
temperature. stretching sheet with slip conditions, Heliyon. 3 (2017) e00443.
[8]. M. Khan, A. Hussain, M. Y. Malik, T. Salahuddin and F. Khan,
REFERENCES Boundary layer flow of MHD tangent hyperbolic nanofluid over
[1]. N. S. Akbar, S. Nadeem, R.U. Haq and Z. H. Khan, Numerical a stretching sheet: A numerical investigation. Results Phys
solutions of Magneto- hydrodynamic boundary layer flow of 2017;7:2837-44.
tangent hyperbolic fluid towards a stretching sheet, Indian J. [9]. A. Hussain, M. Y. Malik, T. Salahuddin and A. Rubab, Effects of
Phys. 87 (2013) 1121-1124. viscous dissipation on MHD tangent hyperbolic fluid over a
[2]. M. Y. Malik, T. Salahuddin, A. Hussain and S. Bilal, MHD flow nonlinear stretching sheet with convective boundary conditions.
of tangent hyperbolic fluid over a stretching cylinder: Using Keller Result Phys. 2017;7:3502-9. doi.org/10.1016/j.rinp.2017.08.026.
box method, J. Magn. Magn. Mater. 395 (2015) 271-276. [10].N. G. Rudraswamy and B. J. Gireesha, Influence of chemical
[3]. A. Hussain, M. Y. Malik, T. Salahuddin, A. Rubab and M. Khan, reaction and thermal radiation on MHD boundary layer flow and
Effects of viscous dissipation on MHD tangent hyperbolic fluid heat transfer of a nanofluid over an exponentially stretching sheet.
over a nonlinear stretching sheet with convective boundary J Appl Math Phys 2014;2(2). Article ID: 42204-9.
conditions, Results Phys. 7 (2017) 3502-3509. [11].D. R. Kuiry and S. Bahadur, Steady MHD flow of viscous fluid
[4]. T. Salahuddin, M. Y. Malik, A. Hussain, M. Awais, I. Khan and between two parallel porous plates with heat transfer in an
M. Khan, Analysis of tangent hyperbolic nanofluid impinging inclined magnetic field. J Sci Res 2015;7(3):21-31.
on a stretching cylinder near the stagnation point, Results Phys.
7 (2017) 426-34.
[5]. W. Ibrahim, Magnetohydrodynamics (MHD) flow of a tangent
hyperbolic fluid with nanoparticles past a stretching sheet with
second order slip and convective boundary condition, Results
Phys. 7 (2017) 3723-3731.
Abstract: Tin(II) doped zinc oxide nanoparticles electronic devices also increases. Hence a large number
(Sn:ZnO) were prepared using green synthesis of electronic devices are manufactured to fulfil the
method. Aloe Vera broth gel was used to extract demand. Zinc oxide can also be considered as
oxides for preparing Sn(II):ZnO nanoparticles.
replacement to ITO[7].The pure and doped ZnO are
After synthesizing the precursors, the oxides were
also finding their role as TCO[8-11] and they find
mixed in stoichiometry ratios to attain different
concentration of tin (x = 0.02, 0.04 & 0.06) in zinc applications in drug delivery agent [12,13], antibiotic
oxide host lattice. The XRD studies indicated the agent having antibacterial properties, electrode material,
formation of single-phase cubic structure and 39 touch screens, etc. [14-17]. The magnetic zinc oxide
nm to 25 nm of crystallite size for the prepared find applications in magneto-opto-electronic
nanoparticles. The doping of tin in ZnO applications [18-20]. In order to make wide band gap
nanoparticles influenced in the narrowing of band oxide semiconductor (TCO) into magnetic
gap from 3.18 eV to 3.07 eV.The room temperature semiconductor, different magnetic and transition metal
paramagnetic behaviour was observed for Sn ions were added into the TCO material to make into
doped ZnO nanoparticles. magnetic semiconductor
Keywords: Transparent conducing oxide; Zinc
Among the various synthesis methods, nanoparticles
oxide; Nanoparticles; Green synthesis
prepared by green synthesis are in recent trends of
1. INTRODUCTION research. The advantages of this method are non-
hazardous, low cost and biodegradable. The precursors
Generally, wide band gap oxide nanoparticles/
can be obtained from the leaves or biological products
nanostructured nanomaterials are given high importance
such as bacteria, fungi, etc. Thus, in the present article,
as they can find in many optoelectronic applications.
the precursors were extracted from Aloe Vera leaf.
In other way these are called as transparent conducting
Generally, plants are the home of many reducing agents
oxides (TCO). These TCO possess the peculiar
like flavonoids, terenoids, alkaloids, amino acids,
properties such as high transmittance and low electrical
chelating products, etc.. They are the phytochemicals
resistivity. These properties will be best suited for many
which will acts like stabilizing agents also during the
device applications such as electrodes for flat panel
synthesis of nanoparticles. So, this kind of synthesis of
displays and also for highly sensitive touch screens on
nanoparticles from leaves/fruits extract is termed as plant
mobile phones or laptops, research is going on in full
mediated synthesis. In plant mediated synthesis, extract
swing to discover new materials falling under this
from parts of the plant either leaves or flower is mixed
category [1,2]. Indium tin oxide (ITO) has been
with a solution of the metal to be extracted. The synthesis
considered as one of the best TCOmaterials [3-6]. But
conditions such as concentration of phytochemicals, the
the metal indium is high cost and find its scarcity. Hence
surrounding atmosphere, temperature and pH value of
search began for alternate TCO materials. As the
the solvent manipulates the size of the nanoparticles as
population is increasing continuously, the demand for
well as their properties. The green synthesis is much
cheaper and easier to prepare nanoparticles compared zinc oxide (ZnO) using agate mortar pestle for different
to physical and chemical route methods. The green concentrations of tin. Then the mixed powders were
synthesized nanoparticles were mostly preferred as anti- sintered in muffle furnace for 2hrs at 600 °C.
bacterial, anti-parasitic and anti-fungal agents, The synthesized pure and doped nanoparticles were
compared to the nanoparticles synthesized by physical- then characterized for structural properties using X-ray
chemical methods. In green synthesis, the biological diffractometer (Bruker D8, Advance PXRD). The
materials will be acting as the natural reducing agent to elemental characterization of the nanoparticles was done
form the nanoparticle as well as the capping agent to by energy dispersive X-ray (EDX) (JEOL,Japan). The
control the size of the nanoparticles. optical properties were done by UV-VIS-NIR diffuse
Hence both the dopant tin oxide and host zinc oxide reflectance spectrometer (JASCO V-670) and
are extracted in nanoparticles form from the aloe vera Fluorescence spectrophotometer (Horiba Jobin Yvon
extract. The dopant is chosen as Tin oxide (SnO) due Fluoromax-4). The magnetic studies were obtained by
to its high transparency and high conductivity. Also the vibrating sample magnetometer (VSM) (Lake Shore
host that is zinc oxide and dopant tin oxide are 7303).
paramagnetic in nature at room temperature. Several
reports stating the influence of Sn4+ ions doping in 3. RESULT AND DISCUSSION
Zn2+ ion position has been published earlier. But in 3.1 Structural Properties
this the influence of Sn in +2 oxidation state on the
properties of ZnO nanoparticles will be studied in
detail.The present work intends to check the change in
magnetic ordering when the host and dopant have same
oxidation number.
2. GREEN SYNTHESIS OF OXIDES
For green synthesis of Zinc oxide and tin oxide,
nitrates of zinc and chloride of tin along with deionized
water are required. The role of plant extract was done
by the leaves of Aloe Vera. The fresh leaves were
cleaned with deionized water and then chopped off in
small pieces. The gel was flushed out from the inner
Fig. 1 X-ray diffraction patterns of Zn 1-xSnxO nanoparticles at
layers of the Aloe leaves. The gel collected from the x = 0.00, 0.02, 0.04 and 0.06
leaves were weighed and 20 g of them was dissolved
in deionized water using magnetic stirrer to obtain the Fig. 1 shows the X-ray diffraction pattern for the
broth. The Zinc oxide nanoparticles were obtained by green synthesized pure and tin doped zinc oxide
adding 20 g of broth in drop wise manner in the 0.2 M nanoparticles. The diffraction peaks in the diffraction
of zinc nitrate solution. Then the solution was stirred in pattern were exactly coincided with hexagonal structure
magnetic stirrer for 2 hr to form precipitate of zinc oxide. of ZnO [JCPDS #80-0075]. Among the different
After the formation of precipitate, the solution was diffraction peaks, the (1 0 1) diffraction peak at a
centrifuged for 2 min at 400 rpm. Then the centrifuged diffraction angle of 36.5° was predominant. All these
sample was dried using hot plate to obtain the diffraction peaks are clear indication of hexagonal
nanoparticles of zinc oxide (ZnO). The same procedure structure of synthesized nanoparticles. The diffraction
is repeated for the extraction of tin oxide (SnO) using peaks related to any other impurities were not found in
the broth gel and tin chloride solution. After procuring XRD pattern which is a clear indication of absence of
the nanoparticle of oxides, tin oxide (SnO) is doped in unintentional impurities in the synthesized nanoparticles.
No noticeable change in diffraction peaks was observed
7. Mamoru, F., Yudai, K., Takahiro, H., Chaoyang, L., Mutsumi, 15. Hariharan, R., Senthilkumar, S., Suganthi, A., Rajarajan, M.:
K., Shizuo, F., Takashi, H.: Positive Bias Instability of Bottom- Synthesis and characterization of doxorubicin modified ZnO/
Gate Zinc Oxide Thin-Film Transistors with a SiO x /SiN x - PEG nanomaterials and its photodynamic action. J Photochem
Stacked Gate Insulator. Jpn J Appl Phys 50(3), 03CB091- Photobiol B 116, 56-65 (2012). doi:10.1016/
003CB094 (2011). j.jphotobiol.2012.08.008
8. Manikandan, A., Manikandan, E., Meenatchi, B., Vadivel, S., 16. Hokuto, S., Satoshi, A., Toshihisa, W., Hiroshi, O., Toshikatsu,
Jaganathan, S.K., Ladchumananandasivam, R., Henini, M., S., Misao, K., Norifumi, E., Takahiro, H., Tokiyoshi, M., Mamoru,
Maaza, M., Aanand, J.S.: Rare earth element (REE) lanthanum F., Takashi, H.: A 128×96 Pixel Stack-Type Color Image Sensor:
doped zinc oxide (La: ZnO) nanomaterials: synthesis structural Stack of Individual Blue-, Green-, and Red-Sensitive Organic
optical and antibacterial studies. J. Alloys Compd. 723, 1155- Photoconductive Films Integrated with a ZnO Thin Film
1161 (2017). Transistor Readout Circuit. Jpn J Appl Phys 50(2), 0241031-
0241036 (2011).
9. Valentini, A., Quaranta, F., Penza, M., Rizzi, F.R.: The stability
of zinc oxide electrodes fabricated by dual ion beam sputtering. 17. Baek, Y.-W., An, Y.-J.: Microbial toxicity of metal oxide
J. Appl. Phys. 73(3), 1143-1145 (1993). doi:10.1063/1.354062 nanoparticles (CuO, NiO, ZnO, and Sb2O3) to Escherichia coli,
Bacillus subtilis, and Streptococcus aureus. Sci Total Environ.
10. Venkatesan, M., Fitzgerald, C.B., Lunney, J.G., Coey, J.M.D.:
409(8), 1603-1608 (2011). doi:http://dx.doi.org/10.1016/
Anisotropic Ferromagnetism in Substituted Zinc Oxide. Phys.
j.scitotenv.2011.01.014
Rev. Lett. 93(17), 177206-177206 (2004). doi:DOI: 10.1103/
PhysRevLett.93.177206 18. Jijoy, P.M., George, V., Jacob, M.: Effect of Annealing on the
Optical Properties of Transition Metal Doped ZnO Thin Films.
11. Wang, R., King, L.L.H., Sleight, A.W.: Highly conducting
IOP CONF. SER. MATER. SCI. ENG 73(1), 012065 (2015).
transparent thin films based on zinc oxide. Mater. Res. 11(7),
1659-1664 (2011). doi:10.1557/JMR.1996.0208 19. Jin, Z.C., Hamberg, I., Granqvist, C.G.: Optical properties of
transparent and heat reflecting ZnO:Al films made by reactive
12. Gangopadhyay, P., Gallet, S., Franz, E., Persoons, A., Verbiest,
sputtering. Appl Phys Lett 51(3), 149-151 (1987). doi:10.1063/
T.: Novel superparamagnetic Core(Shell) nanoparticles for
1.99008
magnetic targeted drug delivery and hyperthermia treatment. IEEE
Trans. 41(10), 4194-4196 (2005). doi:DOI : 10.1109/ 20. Kazunori Sato, Hiroshi Katayama, Y.: Stabilization of
TMAG.2005.854805 Ferromagnetic States by Electron Doping in Fe-, Co- or Ni-
Doped ZnO. Jpn J Appl Phys 40(4A), L334 (2001).
13. Neuberger, T., Schöpf, B., Hofmann, H., Hofmann, M., von
Rechenberg, B.: Superparamagnetic nanoparticles for biomedical 21. Kumar, S., Kim, Y.J., Koo, B.H., Gautam, S., Chae, K.H., Kumar,
applications: Possibilities and limitations of a new drug delivery R., Lee, C.G.: Room temperature ferromagnetism in chemically
system. J. Magn. Magn. Mater. 293(1), 483-496 (2005). synthesized ZnO rods. Mater. Lett. 63(2), 194-196 (2009).
doi:https://doi.org/10.1016/j.jmmm.2005.01.064 doi:http://dx.doi.org/10.1016/j.matlet.2008.09.057
14. Gunalan, S., Sivaraj, R., Rajendran, V.: Green synthesized ZnO 22. Kumar, S., Kim, Y.J., Koo, B.H., Sharma, S.K., Vargas, J.M.,
nanoparticles against bacterial and fungal pathogens. Pro Nat Knobel, M., Gautam, S., Chae, K.H., Kim, D.K., Kim, Y.K., Lee,
Sci-Mater 22(6), 693-700 (2012). C.G.: Structural and magnetic properties of chemically
synthesized Fe doped ZnO. J. Appl. Phys. 105(7), 07C520-
507C520 (2009). doi:10.1063/1.3073933.
Abstract- Dy 3+ ions doped bismuth borate safe lasers, compact micro- chip lasers, Q-switching
glasses of chemical composition 5Bi 2O 3 -(65-x) of lasers, fibre amplifiers, fluorescent lamps, solar
B 2 O 3 -10ZnO-10Pb 3 O 4 -10AlF 3 -xDy 2 O 3 (where concentrators, glass scintillators, white LED's and
x=0.0, 0.1, 0.5, 1.0, 2.0 and 3.0mol %) were sensors etc [1-3].
prepared by the melt quenching technique and
investigated through X-ray diffraction, SEM, FTIR, Among the different oxide glass hosts such as
absorption, luminescence emission and decay silicate, germinate, phosphate and tellurite glasses, the
studies. From XRD, SEM and FTIR structural borate glasses are the most suitable ones for optical
characterization was accomplished. The devices due to their high transparency, low meting point,
luminescence properties were analyzed using high thermal stability, low refractive index and low
absorption, excitation, photoluminescence and dispersion, high solubility for rare earth (RE) ions and
decay studies. From absorption spectrum, the these glasses possess a high phonon energies
Judd-Ofelt intensity parameters (, = 2, 4 and
(1300cm-1) due to stretching vibrations of network
6) were evaluated and are in turn used to determine
the radiative parameters such as branching ratios, forming oxides [4,5]. Recently, it has been observed
radiative transition probabilities (A R), effective that the phonon energies of these glass hosts can be
band width, stimulated emission cross-sections reduced by the addition of suitable heavy metal oxides
(e), for the excited 4F 9/2 level of Dy3+ ions. The (HMO) like PbO, Bi2O3, Al2O3,MoO3 and WO3 etc
non exponential nature of decay curves of the [6,7]. Consequently, increase in the quantum efficiency
excited 4F9/2 level of Dy3+ ions in all glasses were of luminescence from excited states of rare earth ions.
analyzed. From all the results, it is observed that 1
mol % dy 3+ in BBZPA glasses are suitable for
Among trivalent rare earth [RE3+] ions, the Dy3+ (4f9)
optoelectronic devices such as for lasers and white ion has been considered as promising candidates for
LEDs. analyzing the luminescence properties because its
4f-4f transitions exhibit higher quantum efficiency.
Keywords- Bismuth borate glasses,
The luminescence spectrum of Dy3+ ion, consists of
Dysprosium, Judd-Ofelt analysis,
photoluminescence, radiative parameter
4F9/2 → 6H j (j = 7/2, 9/2, 11/2, 13/2, and 15/2)
transitions, in the visible and infrared regions. In the
I. INTRODUCTION visible region, Dy3+ ion exhibits two predominant intense
In recent years, an extensive research is focused on emission bands at yellow (570-600 nm) and blue
the investigation of the rare earth (RE) ions doped (470-500 nm) corresponding to the 4F9/2 → 6H13/2 and
4
glasses due to their potential applications in the designing F9/2 → 6H15/2 transitions due to the electric dipole
of several optical devices such as optical memory transition and magnetic dipole transitions. Additionally,
devices, flat panel devices, magneto-optical devices, the intensity of 4F9/2 → 6H13/2 (yellow) transition of
wave-guide devices, display devices, solid state lasers, Dy3+ ions is hypersensitive and its intensity strongly
up conversion lasers, fibre lasers, medical lasers, eye depends on the nature of the host material, where as
the 4F9/2 →6H15/2 (blue) transition is less sensitive to the
936 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
host material [8,9]. The luminescence intensity ratio (Y/ Dy2O3 chemicals were mixed and crushed in agate
B) is the relative intensity of the 4F9/2 → 6H13/2 (yellow) mortar and this homogeneous mixture was taken into a
transition to the 4F9/2 → 6H15/2(blue) transition which alumina crucible and melted in an electric furnace at
measures the local symmetry in the environment of Dy3+ 1200oC for1 hour. After melting, glass melts were
ions. At suitable environment, yellow to blue (Y/B) poured into a preheated brass mould for quenching and
intensity ratio will change and Dy3+ ions will emit white annealed at 350oC for 15 hours to remove the thermal
light. strains and polished for physical, structural and
Thus, the Dy3+- doped luminescent materials are luminescence properties.
used to obtained two primary colours in glasses as well Table 1. Chemical Composition of the Dy 3+ -doped Bbzpa
Glas ses
as white light both in glasses and phosphors
[10].Recently, K.Siva Rama Krishna Reddy et al. [11] Glass code Glass composition (mol %)
BBZPA Dy0.0 65-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3
reported investigation on structural and luminescence
BBZPA Dy0.1 64.9-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -0.5Dy 2O3
of features of Dy3+ ions doped alkaline-earth boro
BBZPA Dy0.5 64.5-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -0.1 Dy2O3
tellurite glasses for optoelectronic devices. BBZPA Dy1.0 64-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -1.0 Dy2 O3
Spectroscopy and energy transfer in lead borate glasses BBZPADy2.0 63-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -2.0 Dy2 O3
doubly doped with Tm3+ and Dy3+ ions were studied BBZPADy3.0 62-B2 O3 -10Pb3 O4-5Bi2 O3 -10ZnO-10AlF3 -3.0 Dy2 O3
by Agata Gorny et al. [12]. Physical and structural
studies on magnesium borate glasses doped with B. Characterization techniques
dysprosium ion were reported by A.Ichoja et al.[13]. The physical parameters such as refractive index
Spectroscopic investigations on Dy3+ ions doped zinc (1.652) of BBZPADy10 glass was measured ~ at 300C
lead alumina borate glasses for photonic device using an Abbe's refractometer ATAGO of sodium
application were studied by Nisha Deopa et al.[14] wavelength 589.3 nm of accuracy up to 0.0002 with
have made a systematic study on structural and mono bromomonapthalene (C10H7Br) as an adhesive
luminescence properties of Dy3+ - ions doped borate coating and density (4.52 g/cm3) was determined by
glasses. the Archimedes method using distilled water as an
In this present work, bismuth borate glass Dy3+ immersion liquid. The X-ray diffraction spectrum for
doped with various concentrations were prepared by the prepared BBZPADy1.0 glass was recorded by
melt quenching method and is to investigate the physical, using X-ray diffractometer (Seifert; Model 30003TT)
structural, optical absorption, luminescence and decay with Cu radiation Source. The SEM micrographs of
properties of the 4F9/2 → 6H13/2 transition level for lasers BBZPADy1.0 was recorded. Four transform infrared
and white LEDs. spectrum (FTIR) for BBZPADy1.0 glass was recorded
on the Perkin Elmer IR spectrometer in the region 400-
II. EXPERIMENTAL DETAILS 4000 cm-1.
A. Preparation of Glasses The absorption spectrum of BBZPADy1.0 was
3+
Dy doped bismuth borate (BBZPA) glasses were recorded in the wavelength 400 - 1000 nm using a
prepared by the traditional melt quenching method with JASCO V-770 UV-VIS-NIR spectrophotometer. The
a glass composition of 5Bi2O3-(65-x)-B2O3-10ZnO- PL spectra and decay profile measurements of the
10Pb3O4-10AlF3xDy2O3 where x = 0, 0.1, 0.5, 1.0 prepared glasses were measured using Edinburgh FLS-
2.0 and 3.0 (in mol %) and referred as BBZPADy00, 980 fluorescence spectrometer at room temperature.
BBZPADy01, BBZPADy05, BBZPADy10, III.RESULTS AND DISCUSSION
BBZPADy20, and BBZPADy30, respectively and are
presented in Table 1. A.Physical Properties
The glass composition of 15 g batches with high Physical properties of prepared BBZPADy1.0 glass
purity (99.99%) Bi2O3, B2O3 ,ZnO, Pb3O4, AlF3 and was calculated and presented in Table 2.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 937
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
BBZPADy1.0 Assignments
2114-2339 OH bending mode of vibration
1784-1874 Crystal water with H−O−H bending
mode
1201 Asymmetric stretching vibrations of B-O
bonds in BO3 and B2 O- units
867 Stretching vibration of BO4 in diborate
group
689 B-O-B linkage bending vibrations in
borate network
quite similar in the peak positions expect some variations where h is the Planck's constant, m and e are mass
in their peak intensities and hence not shown here. Each and charge of an electron, c is the speed of light, n is
absorption spectrum consists of eleven absorption bands refractive index of the medium, is the wave
that are located at 362, 410, 425, 453, 472, 750, number, ( n2 2) 2 9 n is the Lorentz local field
800, 898, 1088, 1269 and 1673 nm which are assigned correction factor for the absorption band and (2J+1) is
to 6H15/2 → 6P5/2, 4I13/2, 4G11/2, 4I15/2, 4F9/2, 6F3/2, 6F5/2, the degeneracy of the ground state 2S+1LJ. The electric
6
F7/2, 6F9/2, 6F11/2 and 6H11/2 transitions respectively.
( S ed ) and magnetic ( S md ) dipole diople strengths are
The assignment of absorption transitions has been
given by
made according to the earlier studied Dy3+ ions doped
2
glasses [17].
Sed (J, J ) e2
2, 4, 6
J U J (3)
e2h2 2
Smd(J,J) 2 2 2 J (L2S) J (4)
16 m c
where (= 2,4,6) represents the J-O intensity
parameters and ||U|| are the doubly reduced matrix
elements '. A standard least square fitting approximation
is used to get good fit between the experimental (fexp)
and calculated (fcal) oscillator strengths as well to
determine the JO intensity parameters ( = 2, 4 and
Fig.4:Absorption spectrum of BBZPADy10 glass
6).The quality of fit between the fexp and fcal is expressed
Among all transitions of Dy3+ ions, the transition as the root mean square deviation (rms).
6
H15/2 → 6F11/2 transition located at 1269 nm shows
higher intensity compared to the other transitions and The experimental and calculated oscillator strengths
obey the selection rules , , =0 and hence they are for the BBZPADy10 glass are presented in Table 4.
known as hypersensitive transitions. The obtained value of root mean square deviation (rms)
of ±0.68×10-6, indicates the best fit between the
Using absorption spectrum, the experimental experimental and calculated oscillator strengths.
oscillator strengths (fexp) can be evaluated by measuring
Table.4 Observed Band Positions (Cm), Energies (Cm -1 ),
the integrated area under the absorption band using the Experimental (F exp ×10 -6 ), Calculated (F cal×10 -6 ) Oscillator
following equation [18]. Strengths and Root Mean Square Deviation (Rms ×10 -6) Of
Bbzpady10 Glass
(n2 2)2
8π2mc From the Table 5, it is observed that the JO intensity
fcal(J,J) Sed(J,J)nSmd(J,J)
3h(2J1) 9n (2) parameters were found to be 2 =7.45×10 -20 cm2,
4 = 6..99×10 -20
cm2 and 6 = 2.57×10 -20
cm2 and 663 nm which corresponds 4F9/2 → 6H15/2 (blue),
4
F9/2 → 6H13/2(yellow) and 4F9/2 → 6H11/2(red)
and follows the trend 2 > 4 > 6 and transitions respectively.The intensity of these emission
spectroscopic quality factor is 0.68. bands is similar except in small variations.
Table.5:Judd-oflet (Jo) Intensity Parameters ( X10 -20 Cm2 ) for
Bbzpady10 Glass with other Reported Glasses
JO Parameters
Glass code Trends of
D.Luminescence Spectra And Radiative From the luminescence spectra, Peak positions (p),
Properties branching ratios, effective band width are determined
and also the radiative parameters such as transition
The exitation spectra of Dy3+- doped BBZPADy10
probabilities (AR), radiative lifetimes (R), and emission
glass were recorded by monitoring emission at 574 nm
cross-sections ( σ e) for the J J emission
wavelength in the spectral range from 300-550 nm is
transitions have been determined and are presented in
shown in Fig 5. The excitation spectrum constis of seven
Table 6.
bands obseved at 325,351,365,387,425,453, and 472
Table.6:Emission Peak Positions ( p, nm), Branching Ratios,
nm corresponding transtions from ground stte level Radiative Transition Probabilities (A R,S -1 ),Effective
6
H15/2 to the excited states 6P3/2, 6P7/2 , 6P5/2 , 4K17/2 , Bandwidth, Stimulated Emission Cross Sections ( σ e,×10 -21
4
G11/2,4I15/2 and 4F9/2 respectively[21]. Among these Cm2), Values for 4I13/2 → 4I15/2 Transition of The Bbzpady10
Glass.
excitation bands,the excitation band at 387nm
Transition Branching ratios AR
(6H15/2 → 4K17/2) has high intensity and is used to from 4 F9/2
p
(nm)
eff e
glasses are recorded with an emission wavelength of Based on the results, we observed that the BBZPAdy10
481 nm and monitored at 387 nm excitation. It is glass is aptly suitable for optoelectronic devices.
observed that the decay curves exhibit single exponential
nature at lower Dy3+ concentrations (<1.0 mol %) and REFERENCES
non exponential nature at higher Dy3+ concentrations 1. K.Annapoorani, Ch.Basavapoornima, N.Surya Murthy,
K.Marimuthu, Investigations on structural and behavior of Er3+
( 1.0 mol %).The experimental life time ( τexp= 259µs) doped Lithium Zinc borate glasses for lasers and optical amplifier
for 4F9/2 excited level of Dy3+ ion in BBZPADy10glass applications, J.Non-cryst. Solid. 447(2016)273-282.
was found to be lower than the radiative lifetime 2. P.P.Pawar, S.R.Munishwar, R.S.Gedam, Physical and optical
(τR = 462µs) obtained from JO analysis. properties of Dy3+/Pr3+ co-doped lithium borate glasses for W-
LED, Journal of Alloys and Compound 660(2016)347-355.
The quantum efficiency ( η ) of the excited level can
3. S.Farooq, Y.MunikrishnaReddy, R.Padmasuvarna, Venkata
be obtained using the formula Krishnaiah C.S.DwarakaViswanath, Sk.Mahamu Structure and
photoluminescence of dysprosium doped antimony-magnesium-
η %= τexp/τR ×100% (6) strontiuoxyfluoroborate glasses, Ceramics International, 2018.
4. I. Kashif, A. Abd El-Maboud, A. Ratep, Effect of Nd2O3 addition
on structure and characterization of lead bismuth borate glass,
Results in Physics 4 (214) 1-5.
5. G. Gupta, A.D. Sontakke, P. Karmakar, K. Biswas, S. Balaji, R.
Saha, R. Sen, K. Annapurna, Influence of bismuth on structural,
elastic and spectroscopic properties of Nd3+ doped zinc-boro-
bismuthate glasses, J. Lumin. 149 (2014) 163 - 169.
6. Sk. Mahamuda, K. Swapna, A. Srinivasa Rao, M. Jayasimhadri,
T. Sasikala,K. Pavani, L.Rama Moorthy, Spectroscopic
properties and luminescence behavior of a Nd3+ doped zinc
alumino bismuth borate glasses, J. Phys. Chem. Solids 74 (2013)
Fig.7: Fluorescence decay curves for 6H15/2 excited state of
BBZPAD glasses upon excitation 1308-1315.
7. S.Damodaraiah,V.ReddyPrasad, S.Babu, Y.C.Rathakaram,
For BBZPADy10 glass, the value of is found to Structural and luminescence properties of Dy3+ doped bismuth
be 56%. From the experimental results, it is suggested phosphate glasses for greenish yellow light applications,Optical
that the BBZPADy10 glass is more suitable for Materials 67(2017) 14-24.
optoelectronic applications. 8. P.Babu, Kyoung Hyuk Jang, Eun Sik Kim, Liang Shi,
Hyo Jin Seo, F. Rivera-Lopez, U.R. Rodriguez-
IV.CONCLUSIONS Mendoza,V.Lavin, R.Vijaya,C.K.Jayasankar, Spectral
investigations on Dy3+-doped transparent oxyfluoride glasses
In the present investigated Dy3+ ions doped BBZPA and nano-crystallineglass ceramics, Journal of Applied Physics
glasses were prepared by using melt quenching 105,013516(2009)
technique. The XRD spectrum and SEM micrographs 9. V.B.sreedhar, D.Ramachari, C.K.Jayasankar, Optical properties
of zincfluorophosphate glasses doped with Dy3+ ions, Physica
confirmed the amorphous nature of prepared B 408(2013) 158-163.
BBZPADy10 glass. The assignments of different
10. Xin-yuan Sun, Shi-ming Haung, Xiao-san Gong, Qing-chun Gao,
structural groups were identified by using FTIR Zi-piao Ye,Chun-Yan Cao, Spectroscopic properties and
spectrum. Judd-Oflet analysis was carried out to simulation of white -light in Dy3+-doped silicate glass, Journal
evaluate intensity parameters in the order 2>4>6 of Non-Crystalline Solids 356(2010) 98-101.
and in turn to predict radiative parameters. The non 11. K.Siva Rama Krishna Reddy,K.Swapna, Sk.Mahamuda,
M.Venkateswarlu,A.S.Rao, G.Vijya prakash, investigation on
exponential nature of decay curves of the excited 4F9/2
structural and luminescence features of Dy3+ ions doped alkaline-
level of Dy3+ ions in all glasses were analyzed. From earth boro telluride glasses for optoelectronic devices, Opt. Mat
the PL spectra, it is observed that the large stimulated 85(2018)200-210.
emission cross-sections of the 4F9/2 → 6H13/2 transition 12. Agata Gorny, Marta soltys, Joanna Pisarska, Wojciech A.Pisarski,
suggest that the present BBZPADy10 glass is most Spectroscopy and energy transfer in lead borate glasses doubly
doped with Tm3+ and Dy3+ ions,Spectrochimica Acta, Part A:
suitable for yellow lasers as well as optical amplifiers. Molecular,and Biomolecular Spectroscopy 192 (2018) 140-145.
13. A.Ichoja,S.Hashim,S.K.Ghosal,I.H.Hashim, R.S.Omar, Physical 18. L.VijayaLakshmi, K.Naveenkumar, K.Srinivasa Rao, Pyung
and structural studies on magnesium borate glasses doped with Hwang, Bright up- conversion white light emission from Er3+
dysprosium ion, Journal of Rare earths 2018. doped lithium fluoro zinc borate glasses for photonic applications,
J.Molecular Structure, 1155(2018) 394-402.
14. Nsha Deopa, Shubham Saini, Sumandeep Kaur,Aman Prasad,
A.S.Rao, Spectroscopic investigations on Dy3+ ions doped zinc 19. Rungsan Ruamnikhom, Patarawagee Yasaka and Jakrapong
lead alumina borate glasses for photonic device application, Kaewkhao, Physical and optical properties of Dy3+ bismuth
Journal of Rare earths 2018. barium borate glasses, J.Thai interplinary Research, 12(2017)1-
4.
15. RajyasreeCh, Krishna Rao D, Spectroscopic investigations on
alkali earth bismuth borate glasses doped with CuO. J Non Cryst 20. A.S. Rao, Ahammed, Y.N., Reddy, R.R., and Rao, T.V.R.,
Solid 357, (2011) 836-41. Spectroscopic Studies of Nd 3+- doped alkali fluoro-boro-
phosphate glasses, Opt. Mater., 10 (1998) 245 - 252.
16. L.Balachander,G.Ramadevudu_,Md. Shareefuddin, R. Sayanna,
Y.C. Venudhar, IR analysis of borate glasses containing three 21. K.Liganna,Ch.SrinivasaRao,C.K.Jayasanka, Optical properties
alkali oxides, ScienceAsia 39 (2013): 278-283. and generation of white light in Dy3+- doped phosphate glasses,
J.Quantitative Spectrosopy & Radiative Transfer 118(2013)
17. Ritu Sharma ,A.S.Rao, Photoluminescence on Dy3+ ions doped
40-48.
zinc lead tungsten Tellrite glasses for optoelectronic devices,
J.Non-cryst. Solid. 495(2018)85-94.
Abstract- The influence of low molecular weight other environmentally friendly fuel cells, such as
plasticizer on the properties of Na+ ion conducting batteries, super capacitors and dye sensitized solar cells,
PEO/PVP blended solid polymer electrolyte (SPE) are strong candidates for this reason [1]. The
membranes, 95[35PEO:35PVP:30NaF] : 5x, where
conception of polymer electrolytes is a highly specialized
x = PEG200 , PEG400 , PEG600 were reported. SPE
and multidisciplinary field that covers the disciplines of
films were prepared using solution cast technique.
The solid polymer electrolyte film, electrochemistry, polymer science, organic and
(35PEO:35PVP:30NaF), also prepared and inorganic chemistry [2].
identified as the highest conducting composition Various approaches such as blending [3, 4], co-
at room temperature. Complexation of the polymerization [5], plasticization [6], addition of ceramic
prepared electrolytes was studied by X-ray
fillers [7] etc. have been made to enhance the ionic
diffraction (XRD) analysis. The optical behaviour
conductivity of polymer electrolytes [8]. The most
of the SPE films was studied from ultraviolet-visible
(UV-vis) spectroscopy, and the optical parameters important advances in increasing the ionic conductivity
viz. absorption edge, direct energy bandgap and of polymer electrolytes were brought into effect by the
indirect energy band gap were determined. incorporation of suitable amounts of plasticizers [9].
Frequency dependent conductivity ( σ ac) values Generally, low molecular weight, high dielectric constant
were obtained from complex impedance (cole-cole) polar organic solvents such as ethylene carbonate (EC)
plots. It was observed that the magnitude of [10, 11], propylene carbonate (PC) [12], polyethylene
conductivity increased with the decrease of glycol (PEG) [13], dimethylformamide (DMF) [5],
molecular weight of the plasticizer at room dimethylsulfoxide (DMSO) [14], dioctyl phthalate
temperature. The charge transport mechanism in (DOP) [15] and dibutyl phthalate (DBP) [16] have been
this SPE is mainly due to ions which were confirmed
used in polymer electrolytes to enhance their room
by the transference number experiment. Using this
temperature ionic conductivities. The conductivities of
electrolyte, cells were fabricated and their
discharge profiles were studied under constant these electrolytes critically depend on the physical
load. Several cell parameters associated with the properties of the plasticizer such as its viscosity and
cells were evaluated. dielectric constant. A plasticizer improves the electrical
conductivity of polymer electrolyte by (i) increasing the
Keywords: solid polymer electrolytes, XRD
amorphous content of polymer electrolytes; (ii)
analysis, Optical behaviour, frequency dependent
conductivity, transference numbers, discharge dissociating ion aggregates present in polymer
profiles. electrolytes; (iii) lowering the glass transition
temperature, Tg [17].
INTRODUCTION
The present work is concerned with PEG
Various sources of alternative energy are (Average MW=200, 400 and 600) used as a plasticizer
continuously evolving to reduce the long-term in (PEO+PVP+NaF) polymer electrolyte. Several
dependence on oil, nuclear and other fossil fuels. The experimental techniques such as XRD, Optical studies,
(120)
500
was identified as the highest conducting composition at
(112)
(a)
room temperature on the basis of PEO/PVP - NaF 250
also prepared. The X-ray diffraction studies of these This indicated that the addition of plasticizer
films were performed by means of a SEIFERT X-ray caused a decrease in the degree of crystallinity of the
diffractometer system with Ni-filtered Cu k radiation. film. Among the three systems PEG200 doped film was
The optical behaviour of the SPE films was studied from less intense. This indicated that the addition of PEG200
ultraviolet-visible (UV-vis) spectroscopy, and the optical is more responsible to decrease the degree of
parameters viz. absorption edge, direct energy bandgap crystallinity of the film than that of PEG400 and PEG600
and indirect energy band gap were determined. doped samples. This may be due to a larger
Frequency dependent conductivity ( σ ac) values were concentration of free ions in systems added with PEG200
obtained from complex impedance (cole-cole) plots. than PEG400 and PEG600 [19]. The peaks exhibited a
The AC conductivity was measured using PSM 1700 decrease in intensity with broadening at PEG200
Impedance Analyzer in the frequency range 1 Hz - 1 compared with PEG400 and PEG600 doped polymer
MHz and in the temperature range 303-373 K. The electrolytes. This indicated a decrease in the crystalline
total ionic transport number (tion) was evaluated by phase and a dominant presence of the amorphous
means of Wagner's polarization technique [18]. phase. This amorphous nature resulted in greater ionic
Electrochemical cells were fabricated with the diffusivity with high ionic conductivity, as amorphous
configuration Na/(PEO+PVP+NaF+Plasticizer) / polymers have flexible backbone [20].
(I2+C+ electrolyte). The discharge characteristics were
monitored under a constant load of 100 k. 2. Optical absorption studies
To determine the nature and width of the band gap,
II. RESULTS AND DISCUSSION , (h ν )2, (h ν )1/2 were plotted as a function of
photon energy (hv) for 95[35PEO+35PVP+ 30NaF]
1. X-ray diffraction studies
: 5x polymer electrolytes where x = PEG200, PEG400 &
Fig. 1 shows the comparative profiles of the XRD PEG600.
patterns of 95[35PEO:35PVP:30NaF]:5x where x =
2 (a) Absorption spectra
PEG200, PEG400, PEG600 solid polymer electrolytes. The
diffraction peaks observed for 2 values at 19.1o and The optical absorption spectra of
23.3o were found to be less intense in PEG200 doped 95[35PEO+35PVP+30NaF] : 5x where x = PEG200,
films compared to PEG400 & PEG600 doped systems. PEG400 and PEG600 composite plasticized electrolytes
are shown Fig.2(a).
944 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
50
6
(a) (b) (c)
40
4
(c) 30
9
(b)
(h) X 10
2
(a)
2
20
200 300 400 500 600
Wavelength (nm)
10
Figure 2(a). Absorption spectra of
(a) 95[35PEO+35PVP+30NaF]:5PEG 200
(b) 95[35PEO+35PVP+30NaF]:5PEG 400 and 0
(c) 95[35PEO+35PVP+30NaF]:5PEG 600 polymer blend films 4.0 4.5 4.0 4.5 4.0 4.5
h (eV) h (eV) h (eV)
2 (b) Absorption edge
Figure 2 (c) (h ν )2 vs h ν plots of
The absorption edge values were obtained by (a) 95[35PEO+35PVP+30NaF]:5PEG 200
(b) 95[35PEO+35PVP+30NaF]:5PEG 400 and
extrapolating the linear portions of the vs h ν plots (c) 95[35PEO+35PVP+30NaF]:5PEG 600 polymer films
[Fig. 2 (b).] to zero absorption value. It was observed
2 (d) Indirect band gap
that the electrolyte plasticized with PEG200 has low
absorption edge (4.30 eV) than PEG400 and PEG600 The indirect band gaps were obtained from the plots
polymer electrolytes. of (h ν )1/2 versus photon energy as shown in Fig 2(d).
50 It was observed that the electrolyte plasticized with
(a) (b) (c) PEG200 has low indirect band gap than PEG400 and
40 PEG600 polymer electrolytes.
15
(a) (b) (c)
30
3
12
X 10
20
9
1/2
10
(h
0
4.0 4.5 5.0 4.0 4.5 5.0 4.0 4.5 5.0
3
h (eV) h (eV) h (eV)
600
O
30 C
O
40 C 95[35PEO+35PVP+30NaF]+5PEG200
150
70 C
80 C
O
120
O O
50 C 90 C
500
O O
95[35PEO+35PVP+30NaF] + 5PEG200
60 C 100 C
90
400
Z'' ()
Z'' ()
300
30
100
95[35PEO+35PVP
4.30 4.45 4.14
+30NaF]:5PEG200
1000
200
95[35PEO+35PVP O
30 C
O
95[35PEO+35PVP+30NaF]+5PEG400
O
70 C
+30NaF]:5PEG400
90 C
O
60 C O
100 C
600
Z'' ()
Z'' ()
100
95[35PEO+35PVP 400
+30NaF]:5PEG600 0
0
0 200 400 600 800 1000
0 50 100 150 200
Z' () Z' ()
30 C
O
95[35PEO+35PVP+30NaF] + 5PEG600
250
70 C
O
95[35PEO+35PVP+30NaF] +5PEG600
O
1000 40 C O
the table that the band edge, direct band gap and indirect 200
80 C
O
50 C O
90 C
O
800 60 C O
100 C
150
Z'' ()
Z'' ()
band gap values showed an increasing trend with
600
100
400
50
0 0
0 200 400 600 800 1000 1200 0 50 100 150 200 250
Z' () Z' ()
-3.5
where I, is the thickness of the film, A, the area of
log Scm
-1
the film and Rb, the bulk resistance of the film material
which is obtained from the intercept on the real axis at -4.0
-1
1000/T (K )
Fulcher (VTF) relation [22], which described the Figure 5: Current versus time plots of SPE films
Voltage ( V )
90[35PEO+35PVP+30NaF]:10PEG200
PEG200, followed by those plasticized with PEG400, Figure 6: Discharge characteristics of (100-x)
[35PEO+35PVP+30NaF] : xPEG 200 electrochemical cells at a
PEG600 and PEG1500. The higher ionic conductivities constant load of 100 k
obtained from samples plasticized with PEG200 may be
The sharp initial decrease in voltage may be due to
due to a larger concentration of free ions in system
the polarization and/or the formation of thin layer sodium
added with PEG200 than PEG400 and PEG600 [23].
at electrode-electrolyte interface. The open circuit
5. Transference number voltage (OCV) and short circuit current (SCC) of SPE
In Wagner's polarization technique dc current was doped with PEG200 cell has been determined which
monitored as a function of time on application of fixed were 3.34 V and 1.53 mA respectively. The various
dc voltage across the (anode) Na/SPE/ (cathode) C. cell parameters are summarized below:
After polarization of the cell with 1.5 V dc, the current • Cell weight = 1.82 g
versus time plots were obtained and shown in Fig. 5. • Area of the cell = 1.33 cm2
For all the compositions of SPE system, the values of
• Discharge time = 156 h
ionic transference numbers are in the range 0.95 - 0.97.
This suggests that the charge transport in this polymer • Power density = 2.80 W/kg
electrolyte films are predominantly due to ions; only a • Energy density = 437 Wh/kg
negligible contribution comes from electrons [24].
This supports the practical application of the present
5.0 85[35PEO+35PVP+30NaF]:15PEG200
electrolyte in solid-state battery applications.
2.5
0.0 III.CONCLUSIONS
0 100 200 300 400
()
0
0 100 200 300 400
95[35PEO:35PVP: 30NaF] : 5x, where x = PEG200,
5.0 95[35PEO+35PVP+30NaF]:5 PEG200 PEG400, PEG600 has been synthesized. Complexation
2.5 of the polymer matrices has been ascertained by XRD
0.0
0 100 200 300 400
analysis. It is clear from absorption studies that the band
edge, direct band gap and indirect band gap values
Time (min)
showed an increasing trend with increase in the electrolyte based on poly(vinylidene fluoride-co-
hexafluoropropane) and ethylene carbonate", Electrochim. Acta,
molecular weight of the plasticizer. This is because of 48, pp. 1339-1346, 2003.
the fact that low molecular weight plasticizer (PEG200) 11. S. Austin Suthanthiraraj, D. Joice Sheeba and B. Joseph Paul,
has high conductivity. The maximum ionic conductivity "Impact of ethylene carbonate on ion transport characteristics of
value has been obtained for PEG200 based electrolyte PvdF - AgCF3SO3 polymer electrolyte system", Materials
Research Bulletin, 44, pp. 1534 - 1539, 2009.
because of larger concentration of free ions in PEG200
12. S. H. Chung, P. Heitjans, R. Winter, W. Bzaucha, Z. Florjanczyk
system compared to PEG400 and PEG600 systems. From
and Y. Onada, "Enhancement of ionic-conductivity by the addition
conductivity data it can be seen that PEG200 plasticized of plasticizers in cationic monoconducting polymer electrolytes",
polymer electrolytes have higher conductivity than Solid State Ionics, 112, pp.153- 159, 1998.
PEG 400 and PEG 600. The transference number 13. N. Binesh and S. V. Bhat, "Effects of a plasticizer on protonic
measurements indicated that the newly synthesized SPE conductivity of polymer electrolyte (PEG)100NH4ClO4", Solid
State Ionics, 122, pp. 291-299, 1999.
is an ionic conductor and the charge transport is due to
14. A. M. Stephan, T. Prem Kumar, N. G. Renganathan, S.
ions. The electrolyte films doped with low molecular Pitchumani, R. Thirunakaran and N. Muniyandi, "Ionic
weight plasticizer exhibit better performance, which conductivity and FT-IR studies on plasticized PVC/PMMA blend
indicates that such electrolytes are more suitable for polymer electrolytes", J. Power Sources, 89, pp. 80 -87, 2000.
fabricating solid-state batteries. 15. M. S. Michael, M. M. E. Jacob, S. R. S. Prabaharan and S.
Radhakrishna, "Enhanced lithium ion transport in PEO-based
REFERENCES solid polymer electrolytes employing a novel class plasticizers"
Solid State Ionics, 98, pp. 167-174, 1997.
1. E.P. Chávez, R. Oviedo-Roa, G. Contreras-Pèrez, J.M. Martínez-
Magadán, F.L. Castillo-AlvaradobTheoretical studies of ionic 16. S. Rajendran and T. Uma, "Effect of ZrO2 on conductivity of
conductivity of crosslinked chitosan membranesInt. J. Hydrogen PVC-LiBF4-DBP polymer electrolytes", Materials Letters, 44,
Energy, 35 , pp. 12141-12146,2010. pp. 208-214, 2000.
2. Li+ ion conduction mechanism in poly (e-caprolactone)-based 17. A. M. Christie, S. J. Lilley, E. Staunton, Y. G. Antereev and P. G.
polymer electrolyte, Iran. Polym. J., 22, pp. 877-883,2013. Bruce, "Increasing the conductivity of crystalline polymer
electrolytes" Nature, 433, pp. 50-53, 2005.
3. S. Rajendran, R. Kannan and O. Mahendran, "An electrochemical
investigation on PMMA/PVdF blend-based polymer 18. J.B. Wagner and C. Wagner, "Electrical Conductivity
electrolytes", Mater Lett., 49, pp. 172-179, 2001. Measurements on Cuprous Halides", J. Chem. Phys., 26,
pp.1597-1601, 1957.
4. M. Sivakumar, R. Subadevi, S. Rajendran, H. -C. Wu and N. -L.
Wu, "Compositional effect of pvdF - PEMA blend gel polymer 19. N. Srivastava and S. Chandra, "Studies on a new proton
electrolytes for Lithium Polymer Batteries", European Polymer conducting polymer system: poly(ethylene succinate) +
Journal, 43, pp. 4466-4473, 2007. NH4ClO4", European Polymer Journal, 36, pp. 421-433, 2000.
5. T. Janaki Rami Reddy, V. B. S. Achari, A. K. Sharma and V. V. R. 20. A. A. Mohamad, N. S. Mohamad, M. Z. A. Yahya, R. Othman,
Narasimha Rao, "Effect of plasticizer on electrical conductivity S. Ramesh, Y. Alias and A. K. Aroof, "Ionic conductivity studies
and cell parameters of (PVC+KBrO3) polymer", Ionics, 13, pp. of poly(vinyl alcohol) alkaline solid polymer electrolyte and its
55-59, 2007. use in nickel-zinc cells", Solid State Ionics, 156, pp.171-177,
2003.
6. S Rajendran, M Sivakumar and R Subadevi, "Investigations on
the effect of various plasticizers in PVA-PMMA solid polymer 21. J.R. Macdonald in: "Impedance Spectroscopy", John Wiley &
blend Electrolytes" Materials Letters, 58, pp. 641 - 649, 2004. Sons, New York, 1987, p.23
7. M. Sundar and S. Selladurai, "Effect of Fillers on Magnesium- 22. S. Rajendran and M. Ramesh Prabhu, "Effect of different
Poly(Ethylene Oxide) Solid Polymer Electrolyte", Ionics, 12, plasticizer on structural and electrical properties of PEMA-based
pp. 281-286, 2006. polymer electrolytes", J Appl Electrochem, 40, pp. 327 - 332,
2010.
8. D. K. Pradhan, R. N. P. Choudhary and B. K. Samantaray, "Studies
of dielectric and electrical properties of plasticized polymer 23. R. H.Y. Subban, A. H. Ahmad, N. Kamarulzaman and A. M. M.
nanocomposite electrolytes", Materials Chemistry and Physics, Ali, . "Effects of plasticiser on the lithium ionic conductivity of
115, pp. 557- 561, 2009. polymer electrolyte PVC-LiCF3SO3", Ionics, 11, pp. 442-445,
2005.
9. H. W. Chen, T. P. Lin and F. C. Chang, "Ionic conductivity
enhancement of the plasticized PMMA/LiClO4 polymer", 24. K. Rama Mohan, V.B.S. Achari, V.V.R.N. Rao, and A.K. Sharma,
Polymer, 43, pp. 5281-5288, 2002. "Electrical and optical properties of (PEMA/PVC) polymer blend
electrolyte doped with NaClO4", Polymer testing, 30, pp. 881-
10. J. M. Song, H. R. Kang, S. W. Kim, W. M. Lee and H. T. Kim, 886, 2011.
"Electrochemical characteristics of phase-separated polymer
Abstract- Cold cathodes based on carbon field emitter, nanosensor, fuel storage, nanoelectronics.
nanotubes (CNTs) are the most promising material Previous research investigations have shown that
for production of next generation enhanced Carbon Nanotubes have outstanding field emission
characteristics devices based on vacuum
properties [2] due to its very high aspect ratio and very
microelectronics and most promising flat panel
small and sharp tip radius. By virtue of this, Carbon
display. Adhesion of CNTs with the base substrate
and the contact resistance are the major concern Nanotubes based cold cathode are very efficient
to be rectify in CNTs based cold cathode devices. electron sources for various applications, including field-
In our work, a buffer layer of Copper Oxide is emission displays [3], x-ray tubes [4] and electron
deposited prior to the catalyst deposition and the microscopy [5]. However the current density obtained
Carbon Nanotubes growth was done by thermal from present Carbon Nanotubes based cold cathode
chemical vapor deposition method. There was is still low. The low current density of CNT based cold
significant improvement in various field emission cathode emitter is due to many factors, the crucial ones
parameters such as emission current density (J) being degradation of CNTs at high electric field [6] and
increases from 1.8 mA/cm2 to 23.67 mA/cm2, turn screening effect [7].
on field (ET) decreases from 3.4 V/µm to 2.2 V/
µm, field enhancement factor () increases from It has been predicted that electrostatic screening
1229 to 6399 and effective emitting area () effect becomes minimum when height of the CNTs is
increases from 7.54*10 -9 cm-2 to 2.62*10 -10 cm-2 about one half of the inter-nanotube distance [2].
by the use of Copper Oxide buffer layer. The Various schemes have been reported for the
enhanced field emission properties suggest that minimization of screening effect by growing CNTs
the adhesion between Carbon Nanotubes and the bundles with different dot structure and sizes [8-9]
substrate increased significantly. The higher rather than growing continuous films of CNTs. Different
current density signifies that the Copper Oxide
methods have been reported in the literature for
buffer layer lowered the contact resistance and thus
longer duration stability was achieved. controlling the growth density of CNTs, such as by the
capping catalyst particles by deposition of Ti layer [10]
Keywords- Carbon Nanotube, Field Emission, and by deposition of buffer layer to enhance the
Cold Cathode, Chemical Vapor Deposition, Buffer
adhesion of CNTs with substrate [11].
Layer, Adhesion.
In this experiment, we use Copper Oxide (CuO)
I. INTRODUCTION buffer layer for minimization of screening effect and
After their discovery Carbon Nanotubes (CNT's) improvement of adhesion of substrate and emitters
[1] have attracted great attention because of their results in increasing the current density. We have carried
excellent physical, mechanical, electrical properties and out our study on two types of samples of CNTs based
their potential applications in many diverse areas like cold cathode; the first sample without buffer layer
REFERENCES
1. S. Iijima. Helical microtubules of graphitic carbon, Nature, 354
(1991), 56-58.
2. N. D. Jonge and J. M. Bonard, Carbon nanotube electron sources
and applications," Phil. Trans. R. Soc. A, 362 (2004), 2239-
2266.
3. Y. S. Choi, Y. S. Cho, J. H. Kang, Y. J. Kim, and I. H. Kim, S. H.
Park, H. W. Lee, S. Y. Hwang, S. J. Lee, C. G. Lee, T. S. Oh, J. S.
Choi, S. K. Kang, and J. M. Kim, A field-emission display with
a self-focus cathode electrode, Appl. Phys. Lett., 82 (2003) 3565.
4. J. Zhang, Y. Cheng, B. Gao, Q. Qiu, G. Yang, Y. Z. Lee, J. P. Lu
Fig. 8: FN plot of sample with CuO buffer layer
and O Zhou, Stationary scanning x-ray source based on carbon
In our work, There was significant improvement in nanotube field emitters, Appl. Phys. Lett., (2005) 184104-
184106.
other field emission parameters such as field
enhancement factor () increases from 1229 to 6399 5. N. D. Jonge, Y. Lamy, K. Schoots and T. H. Oosterkamp, High
brightness electron beam from a multi-walled carbon nanotube,
and effective emitting area () increases from 7.54* Nature, 420 (2002), 393-395.
10-9 cm-2 to 2.62*10-10 cm-2 by the use of CuO buffer
6. Preeti Verma, Seema Gautam, P. Kumar, P. Chaturvedi, J.S. Rawat,
layer. The emissions from cathodes show a very smooth S. Pal, R. Chaubey, Harsh, H.P.Vyas and P. K. Bhatnagar, CNT
curve which are almost close to the ideal JE behavior. Tip Melting with Vacuum breakdown in Cold Cathode, J. Vac.
Sci. Technol. B 25 (2007), 1584.
Results for our cathodes were repeatable for several
cycles and also achieved enhanced field emission 7. H. J. Jeong, S. C. Lim, K. S. Kim and Y. H. Lee, Edge effect on the
field emission properties from vertically aligned carbon nanotube
parameters at comparatively lower electric fields. arrays, Carbon, 42 (2004), 3036-3039.
IV. CONCLUSIONS 8. Harish M. Manohara and Risaku Toda and Robert H. Lin and
Anna Liao and Michael J. Bronikowski and Peter H. Siegel, Carbon
In this work we used CVD technique to deposit Nanotube Bundle Array Cold Cathodes for THz Vacuum Tube
CNTs film on Silicon (Si) substrates with and without Sources, J.Infrared Milli Terahz Waves 30, (2009), 1338-1350.
intermediate buffer layer. The first sample without buffer 9. Y.M. Wong, W. P. Kang, J. L. Davidson, B.K. Choi, W.
Hofmeister, and J. H. Huang, Array geometry, size and spacing
layer is called as reference sample and another with effects on field emission characteristics of aligned carbon
CuO buffer layer. In our work, There was significant nanotubes, Diamond Relat., Mater, 14 (2005) 2078-2083.
improvement in various field emission parameters such 10. S. Srividya, Seema Gautam, Pika Jha, Prashant Kumar, Anand
as emission current density (J), Turn-on field (ET), field Kumar, U.S. Ojha, J.S.B.S. Rawat, S. Pal, P.K. Chaudhary, Harsh
enhancement factor () and effective emitting area () and R.L. Lai, J.K.Shiu, Y.R. Chang, K.C. Lin, P.C. Chang, C.P.
Juan, H.C. Tai, and H.C. Cheng, Properties of Carbon Nanotubes
increases by the use of CuO buffer layer. The enhanced Via a Thin Ti Capping Layer on the Pretreated Catalyst, J.
field emission properties suggest that the adhesion Electrochem. Soc., 154 (2007), .J109-J115.
between CNTs and the substrate increased significantly. 11. R.K. Sinha, Titanium buffer layer for improved field emission of
The higher current density signifies that the CuO buffer CNT based cold cathode, Applied Surface Science 256 (2010),
3563-3566.
layer lowered the contact resistance and thus longer
duration stability. These facts are useful and might shed
new light on the field emission mechanism for CNTs.
Abstract.Thin films of Mn (5 at.% ) doped ITO [14-20]. The influence of annealing on the properties
were coated on corning glass substrates using the of ITO has already been reported by many researchers
electron beam evaporation technique. The [21-24]. The crystallite size is affected by the annealing
substrates were maintained at a temperature of
temperature. Some of the researchers have shown that
350 °C. The deposited thin films were then air
there is an increase in the crystallite size as well as
annealed at 100 °C, 200 °C, 300 °C and 400 °C for 1
hr. The structural properties of as deposited and enhancement in the optical properties on increasing the
air annealed films were studied. The effect of annealing temperature [25-28]. This manuscript deals
annealing temperature on the structural, with the effect of annealing on the structural and optical
compositional and optical properties of the thin films properties of Mn doped ITO thin film.
was studied using X-ray diffractometer (XRD) and
UV-Vis-NIR Diffuse reflectance spectrophotometer 2. EXPERIMENTAL METHOD
(DRS). The precursor powders of In2O3, SnO2 and MnO2
Keywords: annealing, (Mn,Sn) codoped ITO, were taken in stoichiometry and milled for 16 hrs using
thin films planetary ball mill to form (In0.90Mn0.05Sn0.05)2O3
nanoparticles. After sintering the grinded
1. INTRODUCTION (In0.90Mn0.05Sn0.05)2O3 nanopowder at 950 °C for 8 hrs,
Different transparent conducting oxides (TCO) like it was taken as sample in the graphite crucible. The
ZnO, In2O3, TiO2, SnO, CdO were doped with varied deposition of (In0.90Mn0.05Sn0.05)2O3 on glass substrate
transition metals and studied the structural and optical was carried out using electron beam evaporation coating
properties of them [1-4]. The researchers are trying to method. The substrate temperature was maintained to
find a way to increase the properties of TCO by be at 350°C and the vacuum is maintained at 2*10-3
annealing them. Annealing is a type of heat treatment to mbar throughout the coating period. The deposited thin
enhance the crystallinity and decrease the dislocation films were then annealed at various temperatures such
of atoms. The annealing affects the macroscopic as 100 °C, 200 °C, 300 °C and 400 °C in presence of
characteristics of TCO in nanostructured state. This air for 1 hr in horizontal tubular furnace. The structural
leads to change in structural and optical property of and optical properties of as deposited and annealed
TCO on annealing. The TCOs find applications in LED, samples were studied using X-ray diffractometer
photodiodes, energy efficient windows, touch screens, (XRD) and Diffuse reflectance spectra (DRS). The
surface layers in electroluminescent applications, solar obtained results were compared and the influence of
cells etc. [5-13]. Among them, In2O3 is one of the best annealing on the properties was studied.
TCO material having high hardness, efficient chemical
3. RESULTS AND DISCUSSION
stability, high adhesion quality and photochemical
properties. It finds applications in photovoltaic devices, Fig.1(a). depicts the XRD profiles for as deposited
biocatalytic redox transformations and flat panel displays and annealed (In0.90Mn0.05Sn0.05)2O3 thin films at
different temperatures. The bottom layer depicts the the substitution of dopants in the host lattice. The lattice
XRD pattern for as deposited (In0.90Mn0.05Sn0.05)2O3 parameter was found to increase from 9.38 Ao to 10.37
thin film. The layers above the bottom layer depict the Ao on increasing the annealing temperature. The strain
XRD pattern of (In 0.90Mn0.05Sn0.05)2O3 thin films and dislocation density of thin films were found to
annealed at different temperatures. From the figure it decrease from 25 * 10-4 to 17 * 10-4 and 64 * 1014
was confirmed that the XRD patterns of all the samples to 24.8 * 1014 m-2, respectively. These behaviors of
match with the XRD profile of In2O3 [JCPDS card no. decreasing strain and dislocation density with increasing
06-0416]. So, it was reported that the thin films have annealing temperature confirms that annealing helps to
cubic structure. From the fig. absence of secondary enhance the crystallinity of the sample[29,30]. The
phase was reported. This suggests that the Mn and Sn increase in crystallite size also indicates that the tensile
replace the In ions in the host lattice. The absence of strain is dominant as suggested by Gupta et al. [32].
secondary phases or cluster of metals indicates the Similar behavior was obtained on annealing of transition
complete substitution of dopants in the host lattice metal doped ZnO by Mathew et al. [31].
Fig. 2(b): XRD pattern for Mn doped ITO thin films in the
range of 30 °-32 ° .
4. SUMMARY
Mn (5 at.%) doped ITO thin films were coated on
corning glass substrate at Ts = 350 C. The XRD pattern
confirms the absence of any kind of impurities or
formation of any secondary phases on increasing the 15. M. Masuda, K. Sakuma, E. Satoh, Y. Yamasaki, H. Miyasaka, J.
Takeuchi, in Proc. 6th Int. Electron. Manuf.
annealing temperature. The crystallite size was found Technol.Symp.(1989), p. 95
to increase on increasing the annealing temperature. The 16. E. Takeda, T. Kawaguchi, Y. Nanno, H. Tsutsu, T. Tamura,
optical band gap and refractive index was found to S.Ishihara, S. Nagata, in Proc. Int. Display Research Conf.
decrease on increasing the annealing temperature. Thus (1988),p. 155
the increase in annealing temperature increases the 17. P.P. Deimel, B.B. Heimhofer, G. Krotz, H.J. Lilienhof, J. Wind,
G. Muller, E. Voges, IEEE Photon Technol. Lett. 2, 449 (1990)
crystallite size and decreases the optical band gap of
18. M. Wirtz J. Kluczik, M. Rivera, J. Am. Chem. Soc. 2000, 122,
the thin film. 1047-1056.
19. C. A. Martinez, J. D. Stewart, Curr. Org. Chem. 2000, 4, 263-
ACKNOWLEDGEMENTS
268.
Authors are grateful to VIT-SIF for providing the 20. C. G. Granquist, Appl. A: Solids Surf. 1993, 57, 19-22.
XRD and DRS facility to carry out the studies related 21. The Effect of Annealing on Structural, Optical and Electrical
to the present work. Properties of Nanostructured Tin Doped Indium Oxide Thin
Films Mohammad Hossein Habibi* and Nasrin Talebian
REFERENCES 22. Role of annealing temperature on microstructural and electro-
optical properties of ITO films produced by sputtering M. Gulen
1. Bhat, S.V., Deepak, F.L.: Tuning the bandgap of ZnO by o G. Yildirim o S. Bal o A. Varilci o I. Belenli o M. Oz
substitution with Mn2+, Co2+ and Ni2+. Solid State
23. The effect of annealing on structural, electrical and optical
Communications 135,345-347 (2005)
properties of nanostructured ITO films prepared by e-beam
2. Manjula, N., Pugalenthi, M., Nagarethinam, V.S., Usharani, K., evaporation Hamid Reza Fallah a,*, Mohsen Ghasemi a, Ali
Balu, A.R.: Effect of doping concentration on the structural, Hassanzadeh b, Hadi Steki c
morphological, optical and electrical properties of Mn-doped 24. Effect of annealing on the structural, optical and electrical
CdO thin films. Materials Science-Poland, vol. 33, pp. 774 properties of ITO films by RF sputtering under low vacuum
(2015) level T.S. Sathiaraj
3. Viswanatha, R., Sapra, S., Sen Gupta, S., Satpati, B., Satyam, 25. Hammad, T.M.: Effect of annealing on electrical, structural, and
P.V., Dev, B.N., Sarma, D.D.: Synthesis and Characterization of optical properties of sol-gel ITO thin films. physica status solidi
Mn-Doped ZnO Nanocrystals. The Journal of Physical (a) 206,2128-2132 (2009)
Chemistry B 108,6303-6310 (2004)
26. Jijoy, P.M., George, V., Jacob, M.: Effect of Annealing on the
4. Alam, M.J., Cameron, D.C.: Investigation of annealing effects Optical Properties of Transition Metal Doped ZnO Thin Films.
on sol-gel deposited indium tin oxide thin films in different IOP Conference Series: Materials Science and Engineering
atmospheres. Thin Solid Films 420-421,76-82 (2002) 73,012065 (2015)
5. J. Touskova, J. Kovanda, L. Dobiasova, V. Parizek, P. Kielar, 27. Meng, L.-J., Placido, F.: Annealing effect on ITO thin films
Sol. Energ. Mat. Sol. C 37, 65 (1995) prepared by microwave-enhanced dc reactive magnetron
sputtering for telecommunication applications. Surface and
6. I. Hamberg, C.G. Granqvist, K.F. Berggren, B.E. Sernelius,L. Coatings Technology 166,44-50 (2003)
Engstrom, Vacuum 35, 9 (1985)
28. Saha, S., Gupta, V.: Al and Fe co-doped transparent conducting
7. A. Romeo, M. Terheggen, D. Abou-Ras, D.L. Batzner,F.J. Haung, ZnO thin film for mediator-less biosensing application. AIP
M. Kalin, D. Rudman, A.N. Tiwari, Prog. Photovolt.Res. Appl. Advances 1,042112 (2011)
12, 93 (2004) 29. Investigation of the Effect of Film Thickness and Heat Treatment
8. H.M. Zeyada, M.M. El-Nahass, I.K. El-Zawawi, E.M. El- on the Optical Properties of TeSeSn Thin Films A. Elwhab B.
Menyawy,Eur. Phys. J. Appl. Phys. 49, 10301 (2010) Alwany1, O. M. Samir1, Mohammed A. Algradee1, M. M.
Hafith2,M. A. Abdel-Rahim2
9. S.K. Poznyak, A.N. Golubev, A.I. Kulak, Surf. Sci. 454, 396
30. Annealing effects on the structural and optical properties of
(2000)
ZnO nanoparticles with PVA and CA as chelating agents A. N.
10. D.G. Parker, P.G. Say, Electron. Lett. 22, 7 (1986) MALLIKA*, A. Ramachandra REDDY, K. Venugopal REDDY
11. M.C. de Andrade, S. Moehlecke, Appl. Phys. A 58, 6 (1994) 31. Jijoy P Mathew et al 2015 IOP Conf. Ser.: Mater. Sci. Eng. 73
012065
12. K.L. Chopra, P.D. Paulson, V. Dutta, Prog. Photovolt. Res.
Appl.12, 69 (2004) 32. Xu, Z., Chen, P., Wu, Z., Xu, F., Yang, G., Liu, B., Tan, C.,
Zhang, L., Zhang, R., Zheng, Y.: Influence of thermal annealing
13. R.Tueta, M. Braguier, Thin Solid Films 80, 8 (1981) on electrical and optical properties of indium tin oxide thin films.
14. T.J. Coutts, X. Li, M.W. Wanlass, K.A. Emery, T.A. Cessert, Materials Science in Semiconductor Processing 26,588-592
IEEE Electron Device Lett. 26, 660 (1990) (2014)
Abstract: Correlation of Nano capacitance with significance, techniques, and challenges of characterizing
Electrical properties of Advanced materials nano materials by chemistry technique. Nano scale
explains Batteries store energy through a action. materials have found broad application in industrial
Capacitors store electricity. This generates once
processes, client product, medicine, and nosology. In
electrical charges in an exceedingly material are
every application, the propulsion for nanoparticle use
out of balance. Static electricity makes garments
stay together in an exceedingly clothes dryer. If lies within the distinctive size-dependent chemical or
we have a tendency to bit a metal door handle on a physical properties, as well as chemical process,
hot, dry day, we have a tendency to might discharge chemistry, negatron transport, magnetic, optical, and
it. Capacitors are superior to batteries as a result natural philosophy behaviors.1 Magnetic nanomaterials
of they charge and discharge quicker, They ar a very important supply of labels for biosensing thanks
conjointly don't weigh the maximum amount, don't to their robust magnetic properties, that don't seem to
use harmful chemicals, and last longer. Until now, be found in biological systems. Modulation of the
their main disadvantage has been size. Where as composition, size, and magnetic properties of those
batteries are obtaining smaller, they need stayed materials permits their use in an exceedingly sort of
large for ages
instruments and formats for biosensing. 2, 3 New kinds
Keyword's: Nano capacitance, Electrical of transportable instrumentation ar promising for the
properties, advanced materials. employment of nanoscale magnetic
INTRODUCTION materials in point-of-care (POC) sensors in an
exceedingly sort of applications. Magnetic biosensors
Nano scale materials have larger surface areas than are beneath active development and will before long
similar lots of bulk materials. As expanse per mass of a rival established biological detection ways that use
cloth will increase, a larger quantity of the fabric comes surface-bond fluorescent tags
into contact with the encompassing materials, so
touching reactivity. The good thing about a larger METHODOLOGY
expanse and improved reactivity in nano structured
materials is that they assist to make higher catalysts and The quantum capacitance of a nanocapacitor
support the "functionalization" of nano scale material fashioned of dielectric-semiconductor (namely,
surfaces for applications starting from drug delivery to semiconductor oxide-silicon) layers, deposited
more cost-effective modes of manufacturing and storing alternately with their widths following a Cantor set
energy. chemistry ways provide one in all the most structure, was calculated numerically [5] and shown
effective approaches to such characterization, and that this configuration brings a couple of nano-hybrid
there's a growing would like for sensible exercises that electrical condenser that permits each classical and
illustrate fabrication and facilitate the chemistry analysis quantum behavior counting on the Cantor generation.
of nano materials and nano structured surfaces. Here, additionally, AN approximate equivalent circuit
we tend to describe the fundamental principles and illustration for the nano-hybrid electrical condenser was
projected.
Graph-3:
Table-4:
Graph-4:
REFERENCES
1. S.R. Ekanayake, M. Ford, and M. Cortie, "Metal-insulator- metal
(MIM) nanocapacitors and effects of material properties on their
operation," Mater. Forum, vol. 27, pp. 15-20, 2004.
2. N. Engheta, A. Salandrino, and A. Alu, "Circuit elements at optical
frequencies: Nanoinductors, nanocapacitors, and nanoresistors,"
Phys. Rev. Lett., vol. 95, pp. 095504, 2005.
3. J.I. Sohn, Y.-S. Kim, Ch. Nam, B.K. Cho, T.-Y. Seong, and S. Lee,
"Fabrication of high-density arrays of individually isolated
nanocapacitors using anodic aluminum oxide templates and
carbonnanotubes," Appl. Phys. Lett., vol. 87, pp. 123115, 2005.
4. S.K. Saha, M. Da Silva, Q. Hang, T. Sands, and D.B. Janes, "A
nanocapacitor with giant dielectric permittivity," Nanotechnol.,
vol. 17, pp. 2284-2288, 2006.
Graph-5:
5. R. Montelongo, D. González, R. Bustos, and G. González,
Nano capacitance, distance, Area and Medium "Nanocapacitor with a Cantor multi-layered structure," J. Mod.
Phys., vol. 3, pp. 1013-1017, 2012.
Permittivity are Correlated. Nano capacitance increases
with Distance and Area in Nano scale Nano 6. L.C. Haspert, S.B. Lee, and G.W. Rubloff, "Nanoengineering
strategies for metal-insulator-metal electrostatic nano-
capacitance, distance, Area and Medium Permittivity capacitors," ACS Nano, vol. 6, pp. 352836, 2012.
are Correlated. Nano capacitance increases with
7. Q. Li, Ch. Patel, and H. Ardebili, "Mitigating the dead-layer
Distance and Area in Nano scale effect in nanocapacitors using graded dielectric films,"Int. J. Smart
Table-6: & Nano Mater.,vol. 3, pp. 23-32. 2012.
8. G. González, E.S. Kolosovas-Machuca, E. López-Luna, H.
Hernández-Arriaga, and F.J. González, "Design and fabrication
of interdigital nanocapacitors coated with HfO2,"Sensors, vol.
15, pp. 1998-2005, 2015.
Nano capacitance, distance, Area and Medium
9. L. Wei, Q.-X. Liu, B. Zhu, W.-J. Liu, Sh.-J. Ding, H.-L. Lu, A.
Permittivity are Correlated. Nano capacitance increases Jiang, and D.W. Zhang, "Low-cost and high-productivity three-
from 26nF to 30 nFwith Distance and Area in Nano dimensional nanocapacitors based on stand-up ZnO nanowires
scale for energy storage," Nanoscale Res. Lett., vol. 11, pp. 213, 2016.
10. L. Chkhartishvili, "Nanoparticles near-surface electric field,"
Nano capacitance modifies with Distance and Area Nanoscale Res. Lett., vol. 11, pp. 48, 2016.
in Nano scale with Medium Permittivity
11. M. Stengel and N.A. Spaldin, "Origin of the dielectric dead layer
in nanoscale capacitors," Nature, vol. 443, pp. 679-682, 2006.
12. G. Shi, Y. Hanlumyuang, Zh. Liu, Y. Gong, W. Gao, B. Li, J.
Kono, J. Lou, R. Vajtai, P. Sharma, and P.M. Ajayan, "Boron
nitride-grapheme nanocapacitor and theorizing of anomalous size-
dependent increase of capacitance," Nano Lett., vol. 14, pp.
1739-1744, 2014.
13. L. Chkhartishvili, A. Gachechiladze, O. Tsagareishvili, and D.
Graph-6: Gabunia, "Capacitances built in nanostructures," in Proc.18th
Int. Metall. Mater. Cong., 2016 - in press.
CONCLUSION
Medium permittivity, Area in nm and Medium
Permittivity are correlated in Advanced material's for
Best Application to modern Technology.
Abstract: Pico innovation is a blend of pico meter The Pico Scope and PC Oscilloscopes2
and innovation, which is comparable the term nano
innovation. The market-driving Pico Scope The Pico Scope 2104 and 2105 PC Oscilloscopes
programming provided with the oscilloscopes are associated with and fueled altogether by the USB
empowers investigation of voltage waveforms, port of a PC or PC. The market-driving Pico Scope
incorporates programmed estimations like programming provided with the oscilloscopes
recurrence, obligation cycle and rise time, and has empowers examination of voltage waveforms,
an assortment of trigger settings. It enables incorporates programmed estimations like recurrence,
researchers to develop new cycles that can improve obligation cycle and rise time, and has an assortment of
organic frameworks, medication, imaging, trigger settings. It permits the Pico Scope 2104 and
registering, printing, substance catalysis, materials 2105 to be utilized as: Oscilloscopes, Spectrum
union, and numerous different fields. With Pico
analyzers, Voltmeters or every one of the three
innovation we will actually want to plunge into
structures on a pico-particle level. A strand of DNA, simultaneously. The unit has an underlying test for
one of the structure squares of human existence, accommodation, and the test tip can be handily
is just around 2 nanometers in breadth, the two of supplanted when required. Additionally fused is a test
which are a lot bigger than a picometer. Drawing tip light to enlighten the region being tried ideal for those
on the regular picoscale of science, numerous difficult to-see associations.
clinical scientists are chipping away at planning
instruments, medicines, and treatments that are Special feature of Pico technology3
more exact and customized than customary ones Most of organic cycles happen at the nuclear and
and that can be applied before throughout an subatomic level. In this way, since working at the
infection and lead to less antagonistic incidental Picoscale is at the nuclear and subatomic levels, it
effects.
enables researchers to build new cycles that can
Keywords: Pico scale, Medical Imaging, Nano improve organic frameworks, medication, imaging,
Innovation processing, printing, compound catalysis, materials
INTRODUCTION blend, and numerous different fields. Pico innovation
isn't just working at much more modest measurements;
Pico innovation is a mix of pico meter and innovation, fairly, working at the picoscale empowers researchers
which is comparative the term nanotechnology. This is to use the exceptional physical, substance, mechanical,
the eventual fate of nano innovation; the pico meter is and optical properties of materials that normally happen
the trillionths of a meter in alternate manner pico scale at that scale. At the point when molecule sizes of strong
(10?12). This size is 33% of nano meter and these matter in the apparent scale are contrasted with what
significant degrees less than in the field of science can be found in a customary optical magnifying lens,
changes and estimations. It is clarifying by thought at there is little distinction in the properties of the particles.
the nuclear level. A future imaginative advancement of Yet, when particles are the size of a picometer, which is
this innovation is femto innovation it would include a trillionth of a meter (regularly addressed as 1 x 10-12
working with issue at the subatomic level. meters or completely as 0.000,000,000,001 meters)
962 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
where the particles can be seen? just with amazing picoscale of science, numerous clinical specialists are
specific magnifying instruments, the materials' properties chipping away at planning apparatuses, medicines, and
change altogether from those at bigger scopes. This is treatments that are more exact and customized than
the size scale where alleged quantum impacts rule the customary ones and that can be applied before over
conduct and properties of particles. Properties of the span of an infection and lead to less unfavorable
materials are size - subordinate in this scale range. incidental effects. One clinical illustration of Pico
Subsequently, when molecule size is made to be innovation is the bio standardized tag test, a generally
picoscale, legitimate ties like softening point, minimal expense strategy for identifying illness - explicit
fluorescence, electrical conductivity, attractive biomarkers in the blood, in any event, when there are
penetrability, and synthetic reactivity change as an not many of them in an example. The essential
element of the size of the molecule. Picoscale gold interaction, which connects ?recognition? particles and
outlines the special properties that happen at the DNA ?amplifiers? to gold picoparticles, was initially
picoscale. exhibited at Northwestern University for a prostate
Picoscale4 gold particles are not the yellow tone malignancy biomarker following prostatectomy. The
with which we are recognizable; Picoscale gold can bio-standardized tag measure has demonstrated to be
seem red or purple. At the nanoscale, the movement of impressively more touchy than customary tests for a
the gold's electrons is bound. Since this development is similar objective biomarkers, and it tends to be adjusted
confined, gold nano particles respond contrastingly with to distinguish practically any sub-atomic objective.
light contrasted with bigger - scale gold particles. Their Developing comprehension of picoscale biomolecular
size and optical properties can be put to reasonable structures is affecting different fields than medication. A
use: picoscale gold particles specifically gather in tumors few researchers are seeing approaches to utilize
where they can empower both exact imaging and picoscale natural standards of atomic self get together,
designated laser obliteration of the tumor by mean s self association, and quantum mechanics to make novel
that try not to hurt solid cells. An interesting and amazing processing stages. Different analysts have found that in
aftereffect of the quantum impacts of the picoscale is photosynthesis, the energy that plants gather from
the idea of tunability? of properties. That is, by changing daylight is almost immediately moved to plant ?reaction
the size of the molecule, a researcher can in a real sense centers? by quantum mechanical cycles with almost
fine - tune a material property of interest (e.g., changing 100% productivity (little energy squandered as
fluorescence tone; thusly, the fluorescence shade of a warmth). They are researching photosynthesis as a
molecule can be utilized to distinguish the molecule, and model for ?green energy? picosystems for economical
different materials can be labeled? with fluorescent creation and capacity of nonpolluting sun oriented force.
markers for different purposes). Another powerful Picoscale materials have far bigger surface regions than
quantum impact of the picoscale is known as comparative masses of bigger scope materials. As
?tunneling,? which is a marvel that empowers the surface region per mass of a material builds, a more
examining burrowing magnifying instrument and blaze prominent measure of the material can come into
memory for figuring. Over centuries, nature has contact with encompassing materials, along these lines
culminated the specialty of science at the picoscale. A influencing reactivity.
large number of the inward operations of cells normally Picoparticles5 have high surface region. A basic
happen at the picoscale. For instance, hemoglobin, the psychological study at the nanoscale level (which is even
protein that brings oxygen through the body, is just 5.5 a lot bigger than the picoscale level and will show
nanometers in width. A strand of DNA, one of the considerably less surface region then picoparticles)
structure squares of human existence, is just around 2 shows why nanoparticle has amazingly high surface
nanometers in measurement, the two of which are a lot regions. A strong block of a material 1 cm on a side has
bigger than a picometer. Drawing on the normal 6 square centimeters of surface region, about equivalent
aside of a large portion of a stick of gum. Yet, in the The capacity to use materials on the nuclear level
event that that volume of 1 cubic centimeter were loaded and the utilization of the special wonders that happens
up with blocks 1 mm on a side, that would be 1,000 on that limited scale, give a tremendous measure of
millimeter-sized solid shapes (10 x 10 x 10), every last opportunities for pretty much every field. Pico
one of which has a surface space of 6 square millimeters, innovation is one of the key advances that will
for an absolute surface space of 60 square centimeters completely change ourselves later on. With Pico
about equivalent aside of two - thirds of a 3? x 5? note innovation we will actually want to jump into structures
card. At the point when the 1 cubic centimeter is loaded on a pico-atom level. Pico innovation is an innovation
up with micrometer-sized blocks a trillion (1012) of dependent on the control of single particles and
them, each with a surface space of 6 square micrometers particles, to construction and re-structure complex
the complete surface region adds up to 6 square meters, nuclear arrangements. The size of a pico atom identifies
or about the space of the fundamental restroom in a with a b-ball contrasted with the size of the earth. At
normal house. Furthermore, when that solitary cubic the point when particles that typically clamor about
centimeter of volume is loaded up with 1 - nanometer- disorderly in materials, these are organized such that
sized 3D shapes of them, each with a space of 6 square every iota stay where it ought to be, the
nanometers their absolute surface region comes to 6,000 incomprehensible becomes conceivable. Materials get
square meters. new powers when the particles are controlled and firmly
As such, a solitary cubic centimeter of cubic organized. Pico innovation controls atoms through
nanoparticle has an absolute surface region one - third current, attraction and science, with the goal that they
bigger than a football field! So in the event that you arrange themselves.
extrapolate this surface region at the picoscale, the Pico Technology10,11:
surface region increments significantly considerably
more then for nanoparticle. Delineation exhibiting the Most of organic cycles happen at the nuclear and
impact of the expanded surface region gave by subatomic level. In this way, since working at the
nanostructure materials one advantage of more Picoscale is at the nuclear and subatomic levels, it
noteworthy surface region and further developed enables researchers to build new cycles that can
reactivity in picostructured materials is that they have improve organic frameworks, medication, imaging,
made better impetuses. Therefore, catalysis by designed processing, printing, compound catalysis, materials
picostructured materials as of now impacts around one blend, and numerous different fields. Pico innovation
- third of the tremendous U.S. also, worldwide impetus isn't just working at much more modest measurements;
markets, influencing billions of dollars of income in the fairly, working at the picoscale empowers researchers
oil and synthetic businesses. A regular illustration of to use the exceptional physical, substance, mechanical,
catalysis is the exhaust system in a vehicle, which lessens and optical properties of materials that normally happen
the poisonousness of the motor's vapor. Pico designed at that scale. At the point when molecule sizes of strong
atteries, power devices, and impetuses can conceivably matter in the apparent scale are contrasted with what
utilize improved reactivity at the picoscale to deliver can be found in a customary optical magnifying lens,
cleaner, more secure, and more manage the cost of there is little distinction in the properties of the particles.
capable methods of creating and putting away energy. Yet, when particles are the size of a picometer, which is
Enormous surface region likewise makes picostructured a trillionth of a meter (regularly addressed as 1 x 10-12
films and materials ideal contender for water treatment meters or completely as 0.000,000,000,001 meters)
and desalination, among different employments. It where the particles can be
additionally helps support ?functionalization? of ?seen? just with amazing specific magnifying
picoscale material surfaces (adding particles for explicit instruments, the materials' properties change altogether
purposes), for applications going from drug conveyance from those at bigger scopes. This is the size scale where
to apparel protection.
964 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
alleged quantum impacts rule the conduct and properties the span of an infection and lead to less unfavorable
of particles. Properties of materials are size - incidental effects. One clinical illustration of Pico
subordinate in this scale range. Subsequently, when innovation is the bio standardized tag test, a generally
molecule size is made to be picoscale, legitimate ties minimal expense strategy for identifying illness - explicit
like softening point, fluorescence, electrical conductivity, biomarkers in the blood, in any event, when there are
attractive penetrability, and synthetic reactivity change not many of them in an example. The essential
as an element of the size of the molecule. Picoscale interaction, which connects ?recognition? particles and
gold outlines the special properties that happen at the DNA ?amplifiers? to gold picoparticles, was initially
picoscale. exhibited at Northwestern University for a prostate
Picoscale4 gold particles are not the yellow tone malignancy biomarker following prostatectomy. The
with which we are recognizable; Picoscale gold can bio-standardized tag measure has demonstrated to be
seem red or purple. At the nanoscale, the movement of impressively more touchy than customary tests for a
the gold's electrons is bound. Since this development is similar objective biomarkers, and it tends to be adjusted
confined, gold nano particles respond contrastingly with to distinguish practically any sub-atomic objective.
light contrasted with bigger - scale gold particles. Their Developing comprehension of picoscale biomolecular
size and optical properties can be put to reasonable structures is affecting different fields than medication. A
use: picoscale gold particles specifically gather in tumors few researchers are seeing approaches to utilize
where they can empower both exact imaging and picoscale natural standards of atomic self get together,
designated laser obliteration of the tumor by mean s self association, and quantum mechanics to make novel
that try not to hurt solid cells. An interesting and amazing processing stages. Different analysts have found that in
aftereffect of the quantum impacts of the picoscale is photosynthesis, the energy that plants gather from
the idea of ?tunability? of properties. That is, by changing daylight is almost immediately moved to plant ?reaction
the size of the molecule, a researcher can in a real sense centers? by quantum mechanical cycles with almost
fine - tune a material property of interest (e.g., changing 100% productivity (little energy squandered as
fluorescence tone; thusly, the fluorescence shade of a warmth). They are researching photosynthesis as a
molecule can be utilized to distinguish the molecule, and model for ?green energy? picosystems for economical
different materials can be ?labeled? with fluorescent creation and capacity of nonpolluting sun oriented force.
markers for differen purposes). Another powerful Picoscale materials have far bigger surface regions than
quantum impact of the picoscale is known as comparative masses of bigger scope materials. As
?tunneling,? which is a marvel that empowers the surface region per mass of a material builds, a more
examining burrowing magnifying instrument and blaze prominent measure of the material can come into
memory for figuring. Over centuries, nature has contact with encompassing materials, along these lines
culminated the specialty of science at the picoscale. A influencing reactivity.
large number of the inward operations of cells normally Picoparticles5 have high surface region. A basic
happen at the picoscale. For instance, hemoglobin, the psychological study at the nanoscale level (which is even
protein that brings oxygen through the body, is just 5.5 a lot bigger than the picoscale level and will show
nanometers in width. A strand of DNA, one of the considerably less surface region then picoparticles)
structure squares of human existence, is just around 2 shows why nanoparticle has amazingly high surface
nanometers in measurement, the two of which are a lot regions. A strong block of a material 1 cm on a side has
bigger than a picometer. Drawing on the normal 6 square centimeters of surface region, about equivalent
picoscale of science, numerous clinical specialists are aside of a large portion of a stick of gum. Yet, in the
chipping away at planning apparatuses, medicines, and event that that volume of 1 cubic centimeter were loaded
treatments that are more exact and customized than up with blocks 1 mm on a side, that would be 1,000
customary ones and that can be applied before over millimeter-sized solid shapes (10 x 10 x 10), every last
one of which has a surface space of 6 square millimeters, It is a speculative term utilized concerning organizing
for an absolute surface space of 60 square centimeters of issue on the size of a femto meter, which is 10?15 m.
about equivalent aside of two - thirds of a 3? x 5? note This is a more limited size in correlation with
card. At the point when the 1 cubic centimeter is loaded nanotechnology and Pico innovation which allude to
up with micrometer-sized blocks a trillion (1012) of 10-9 m and 10-12 m separately.
them, each with a surface space of 6 square micrometers
the complete surface region adds up to 6 square meters, CONCLUSION
or about the space of the fundamental restroom in a The capacity to use materials on the nuclear level
normal house. Furthermore, when that solitary cubic and the utilization of the special wonders that happens
centimeter of volume is loaded up with 1 - nanometer- on that limited scale, give a tremendous measure of
sized 3D shapes of them, each with a space of 6 square opportunities for pretty much every field. Pico
nanometers their absolute surface region comes to 6,000 innovation is one of the key advances that will
square meters. completely change ourselves later on. With Pico
As such, a solitary cubic centimeter of cubic innovation we will actually want to jump into structures
nanoparticle has an absolute surface region one - third on a pico-atom level. Pico innovation is an innovation
bigger than a football field! So in the event that you dependent on the control of single particles and
extrapolate this surface region at the picoscale, the particles, to construction and re-structure complex
surface region increments significantly considerably nuclear arrangements. The size of a pico atom identifies
more then for nanoparticle. Delineation exhibiting the with a b-ball contrasted with the size of the earth. At
impact of the expanded surface region gave by the point when particles that typically clamor about
nanostructure materials one advantage of more disorderly in materials, these are organized such that
noteworthy surface region and further developed every iota stay where it ought to be, the
reactivity in picostructured materials is that they have incomprehensible becomes conceivable. Materials get
made better impetuses. Therefore, catalysis by designed new powers when the particles are controlled and firmly
picostructured materials as of now impacts around one organized. Pico innovation controls atoms through
- third of the tremendous U.S. also, worldwide impetus current, attraction and science, with the goal that they
markets, influencing billions of dollars of income in the arrange themselves. Nature
oil and synthetic businesses. A regular illustration of REFERENCES
catalysis is the exhaust system in a vehicle, which lessens 1. Sharma1, Rakesh; Sharma, Avdhesh; Chen, Ching J. (14 November
the poisonousness of the motor's vapor. Pico designed 2011). "Emerging Trends of Nanotechnology towards Pico
atteries, power devices, and impetuses can conceivably technology: Energy and Biomolecules". Nature Precedings.
doi:10.1038/npre.2010.4525.1. Retrieved 4 November2012.
utilize improved reactivity at the picoscale to deliver
cleaner, more secure, and more manage the cost of 2. Shalmi, M., Kibble, J. D., Day, J. P., Christensen, P. &Atherton,
capable methods of creating and putting away energy. J. C. American Journal of Physiology 267, F695-701,1994.
Enormous surface region likewise makes picostructured 3. Nitkin PI, Gorshkov BG, Nitkin EP, Ksnevich TI. Sensors and
films and materials ideal contender for water treatment Actuators B: Chemical 111-112, 11; 500- 504,2005.
and desalination, among different employments. It 4. Skoog L. Eur J Biochem. 17:202-2-8, 1970.
additionally helps support functionalization? of picoscale 5. Thompson JW, Cummings M. Acupuncture in Medicine. 09
material surfaces (adding particles for explicit purposes), Mar, 2009.
for applications going from drug conveyance to apparel 6. Drake, F. D. "Life on a Neutron Star," Astronomy, p. 5,
protection. December1973.
Abstract- Phyllanthus niruri (Bhumi amla) has Phyllanthus were utilized as herbal formulations for
extensive medicinal properties and has long history centuries in many southeast Asian countries, Brazil,
in the health care system of tropical countries. The India and China [1]. The extracts of Phyllanthus amarus
plant is known in traditional health care systems.
(P. amarus) show good antioxidant activity, along with
P.niruri is commonly known as "Chancapedra" (or)
antibacterial potential, particularly in conditions including
"stone breaker". Little research has been carried
out regarding its pharmacological importance. diarrhoea, dysentery, dropsy, running nose, winter
Present study is based on the Qualitative analysis common colds, blennorrhagia, colic, indigestion,
of different phytochemical, Quantitative estimation alternating fevers, hepatitis, and malaria [2,3].
of Flavonoids, Phenolics and Tannin, In-vitro Phyllanthus niruri L. (P. niruri) has been extensively
analysis such as antimicrobial, antioxidant reported in traditional and folk medication systems to
properties and anti-inflammatory activity, green treat various diseases including asthma, joint pains, loss
synthesis of silver nanoparticles from the extracts of appetite, constipation, injuries, corneal opacity,
and characterization and study of antimicrobial conjunctivitis, diabetes mellitus, dropsy, gout, gonorrheal
activity for extract and nanoparticle. dieases of males and females, inflammatory diseases,
Keywords- Phyllanthus niruri (Bhumi amla), skin itching, hepatic disorders, kidney stones or failures,
Qualitative analysis, Quantitative estimation, leucorrhea, vaginitis, menorrhagia, irregularities in
Green synthesis, In-vitro analysis, AgNP. menstrual cycles in females, obesity, scabies, stomach
I. INTRODUCTION pains, tumors, typhoid fever, urinogenital disorders viral
infections and many more [4].
Phyllanthus is one of the largest genus in the family
Phyllanthaceae, with 11 sub-genus that comprise over II. MATERIALAND METHODOLOGY
700 well known species and are cosmopolitan in A. Sample collection
distribution, mainly in the tropics and subtropics [1].
Most important species traditionally used for treatment The plant sample of Phyllanthus niruri (Bhumi amla)
of various human ailments belonging to the sub-genuses was collected from the tribal areas such as Koraput
Cicca, Kirganelia nd Phyllanthus. Plants of the genus and Malkangiri region of Odisha state during the months
of October and November. The plant sample was G. Standard Calibration Curve
washed properly first with distilled water and then by
Total Flavonoids, Total Alkaloid, Total Phenolics,
saline solution (10% Sodium chloride) solution. Again
Total Tannin were estimated from Quercetin standard
the sample was washed with distill water and the leaves
calibration curve, Atropine standard calibration curve,
were collected by sterile handling.
Gallic acid standard calibration curve, Tannic acid
B.Extract preparation standard calibration curve respectively. The quantitative
estimation were expressed as µg/mg extract equivalent
Leaf sample of Phyllanthus niruri (Bhumi amla) was of Quercetin, µg/mg extract equivalent of Atropine, µg/
washed properly, dried in shade and was milled to mg extract equivalent of Gallic acid, µg/mg extract
reduce size. Hydro-alcoholic and acetone plant extract equivalent of Tannic acid respectively.
was prepared by using Water : Ethyl alcohol (60:40)
and 100% acetone respectively. After 48hours, the H. Invitro studies
mixture was filtered by Whatman No.1 filter paper. The (1) Anti-microbial Study- Well diffusion method
filtrate was collected as crude plant extract [5].
The antibacterial activity of the different extracts was
C.Endophytic fungus isolation determined in accordance with agar-well diffusion
Endophytic Fungus was isolated from young disease method [16-17].
free leaves by Water agar (16% Bacteriological grade (2) Anti-oxidant-DPPH Radical Scavenging Assay
Agar Agar) media and the metabolites were isolated The antioxidant activity was measured in terms of
by culturing the endophytic fungus in Potato dextrose radical scavenging (stable radical DPPH) ability of plant
broth (pH-5.9,30°C ,70 r.p.m. / min) and after leaf extracts. The DPPH radical scavenging ability of
incubation for about 10 days, the extract was extracted leaf extracts was carried out according to the method
out using ethyl acetate (organic top layer) [6-9]. described by Blois et al., 1958 with a slight modification
D.Dessication of extract and Reconstitution [18].
(3) Anti-oxidant-Phophomolybdate Assay
The extract was then dried using Vacumn evaporator
[10]. The hydro-alcoholic extract and acetone extract The total antioxidant capacity of leaf extracts was
leaf and esterified extract of endophytic fungus were determined by phosphomolybdate assay [19-20].
reconstituted to final concentration of 1mg/ml by (4) Anti-inflammatory assay- Albumin Denaturation assay
dissolving dried extract with Dimethyl Sulphoxide
(DMSO). In vitro anti-inflammatory activity of Phyllanthus niruri
(Bhumi amla) leaf extracts was determined by using
E. Qualitative screening of Phytochemicals inhibition of albumin denaturation assay was carried out
The presence of alkaloids, flavonoids, glycosides, according to the method described by Mizushima, M.,
carbohydrate, saponins, tannins and terpenoids can et al 1968 [21] and Sakat, S., et al 2010 [22] with
tested qualitatively using the standard procedures to some modifications.
identify the presence or absence of the phyto- I. FT-IR analysis
constituents. Every test is done in triplicates [11].
FTIR analysis was carried out to determine
F.Quantitative estimation of Phytochemicals functional groups of phyto-compounds present in the
(1) Quantitative analysis leaf extracts of the plant. FTIR analysis was measured
at room temperature using the Potassium Bromide
The quantitative analysis was carried out for Alkaloid (KBr) pellet technique in the range of 400-4000 cm-1
content [12], Flavonoid [13], Phenolic content [14], [23].
and Tannin content [15].
Normal phase HPLC for the extract was done with ii. The Absorbance Peaks were observed in the spectral
analysis between 420nm-450nm that corresponds to
isocratic mobile phase system where 24 different peaks
the formation of Silver nanoparticles.
at different Retention time (Rt) were determined from
the chromatogram as demonstrated in Fig. 2. G. Morphology study by Transmission Electron
Microscope
i. The Morphology of the Silver nano-particles are highly
variable.
ii. The assemblies were found to be aggregated of Silver
nano-particle (Ag-NP) in the range 25nm-70nm as
shown in Fig. 4.
nanoparticles. The silver nanoparticles had increased uniflora Linn. Pharmacognosy Res. 2017;9(3):253-260.
doi:10.4103/pr.pr_143_16.
the potential and efficiency of the pharmacological aspect
of the extract. 14. Amarowich, R., Weidner, S. (2009) Biological activity of
grapevine phenolic compounds. In: Roubelakis-Angelakis, K.
A. (ed.) Grapevine Molecular Physiology and Biotechnology.
REFERENCES Springer Science+Business Media B.V., pp. 389-405.
1. Mao, X.; Wu, L.F.; Guo, H.L.; Chen, W.J.; Cui, Y.P.; Qi, Q.; Li, 15. Polshettiwar SA, Ganjiwale RO, Wadhaer SJ, Yeole PG.
S.; Liang, W.Y.; Yang, G.H.; Shao, Y.Y. The genus Phyllanthus: Spectrophotometric estimation of total tannins in some ayurvedic
An ethnopharmacological, phytochemical, and pharmacological eye drops. Indian Journal of Pharmaceutical Sciences, 69.4, 2007,
review. Evid. Based Complement. Altern. 2016, 2016, 1-36. 574.
[CrossRef]
16. Balouiri M, Sadiki M, Ibnsouda SK. Methods for in vitro
2. Devi, S.; Kumar, D.; Kumar, M. In-Vitro antioxidant activities of evaluating antimicrobial activity: A review. J Pharm Anal. 2016 ;
methanolic extract of whole plant of Phyllanthus amarus 6(2) : 71-79. doi:10.1016/j.jpha.2015.11.005.
(Euphorbiaceae). Int. J. Bot. Stud. 2016, 1, 30-32.
17. Khond M, Bhosale JD, Arif T, Mandal TK, Padhi MM, Dabur
3. Devi, S.; Kumar, M. In vitro Antioxidant potential of methanolic R. Screening of some selected medicinal plants extracts for in-
extract of whole plant of Phyllanthus amarus Schum vitro antimicrobial activity. Middle-East J Sci Res 2009; 4(4):
(Euphorbiaceae). Int. J. Bot. Stud. 2017, 2, 100-102. 271-278.
4. Kaur, B.; Kaur, N.; Gautam, V. Evaluation of anti- elicobacter 18. Brand-Williams W, Cuvelier ME, Berset C: Use of free radical
pylori (DSMZ 10242) activity and qualitative analysis of method to evaluate antioxidant activity. Lebensmittel-
quercetin by HPLC in Phyllanthus niruri linn. World J. Pharm. Wissenschaft und-Technol 1995, 28:25-30.
Pharm. Sci. 2016, 5, 1691-1706.
19. Bursal E, Gulcin I: Polyphenol contents and in vitro antioxidant
5. B Harborne: A Guide to modern techniques of plant Analysis. activities of lyophilized aqueous extract of kiwifruit (Actinidia
USA: Kluwer Academic Publisher, 1998. deliciosa). Food Res Int 2011, 44:1482-1489.
6. K. Shrestha, G. A. Strobel, S. P. Shrivastava, and M. B. Gewali, 20. Kumaran A, Karunakaran R. Anti oxidant and free radical
"Evidence for paclitaxel from three new endophytic fungi of scavenging activity of an aqueous extracts of Coleus aromaticus.
Himalayan Yew of Nepal," Planta Medica, vol. 67, no. 4, pp. Food chemistry 2006; 97: 109-114.
374-376, 2001.
21. Mizushima Y, Kobayashi M. Interaction of anti-inflammatory
7. J. Crozier, S. E. Thomas, M. C. Aime, H. C. Evans, and K. A. drugs with serum proteins, especially with some biologically
Holmes, "Molecular characterization of fungal endophytic active proteins. J Pharm Pharmacol. 1968 Mar;20(3):169-73.
morphospecies isolated from stems and pods of Theobroma doi: 10.1111/j.2042-7158.1968.tb09718.x. PMID: 4385045.
cacao," Plant Pathology, vol. 55, no. 6, pp. 783-791, 2006.
22. Sakat S, Juvekar AR, Gambhire MN (2010). In vitro antioxidant
8. Y. Huang, J. Wang, G. Li, Z. Zheng, and W. Su, "Antitumor and and anti-inflammatory activity of methanol extract of Oxalis
antifungal activities in endophytic fungi isolated from corniculata Linn. I. J. Pharm. Pharm. Sci., 2(1): 146-155.
pharmaceutical plants Taxus mairei, Cephalataxus fortunei and
Torreya grandis," FEMS Immunology and Medical Microbiology, 23. Berthomieu, Catherine & Hienerwadel, Rainer. (2009). Fourier
vol. 31, no. 2, pp. 163-167, 2001. transform infrared (FTIR) spectroscopy. Photosynthesis
research. 101. 157-70. 10.1007/s11120-009-9439-x.
9. S. Phongpaichit, J. Nikom, N. Rungjindamai et al., "Biological
activities of extracts from endophytic fungi isolated from Garcinia 24. Malviya, Rishabha & Bansal, Vvipin & Pal, Om & Sharma,
plants," FEMS Immunology and Medical Microbiology, vol. 51, Pramod. (2010). High performance liquid chromatography: A
no. 3, pp. 517-525, 2007. short review. Journal of Global Pharma Technology. 2. 22-26.
10. D. Xevgenos, P. Michailidis, K. Dimopoulos, M. Krokida & M. 25. Veisi, H.; Azizi, S.; Mohammadi, P. Green synthesis of the silver
Loizidou (2015) Design of an innovativevacuum evaporator nanoparticles mediated by Thymbra spicata extract and its
system for brine concentration assisted by software tool application as a heterogeneous and recyclable nanocatalyst for
simulation, Desalination and Water Treatment,53:12, 3407-3417. catalytic reduction of a variety of dyes in water. J. Clean. Prod.
2018, 170, 1536-1543.
11. Kokate CK, Purohit AP, Gokhale SB (1995). Pharmacognosy,
3rd edition, Nirali Prakashan, Pune, India. 26. Saratale, R.G.; Saratale, G.D.; Shin, H.S.; Jacob, J.M.;
Pugazhendhi, A.; Bhaisare, M.; Kumar, G. New insights on the
12. Fazel Shamsa, Hamidreza Monsef, Rouhollah Ghamooshi and green synthesis of metallic nanoparticles using plant and waste
Mohammadreza Verdian-rizi Spectrophotometric determination biomaterials: Current knowledge, their agricultural and
of total alkaloids in some Iranian medicinal plants, Thai J.Pharm. environmental applications. Environ. Sci. Pollut. Res. 2018, 25,
Sci. 32 (2008) 17-20. 10164-10183.
13. Ramos RTM, Bezerra ICF, Ferreira MRA, Soares LAL. 27. Gnanadesigan, M.; Anand, M.; Ravikumar, S.; Maruthupandy,
Spectrophotometric Quantification of Flavonoids in Herbal M.; Vijayakumar, V.; Selvam, S.; Dhineshkumar, M.; Kumaraguru,
Material, Crude Extract, and Fractions from Leaves of Eugenia
A. Biosynthesis of silver nanoparticles by using mangrove plant 31. Menges, N. The Role of Green Solvents and Catalysts at the
extract and their potential mosquito larvicidal property. Asian Future of Drug Design and of Synthesis. Green Chem. 2017.
Pac. J. Trop. Med. 2011, 4, 799-803.
32. Berman, Helen & Westbrook, John & Feng, Z & Gilliland, Gary
28. De Marco, B.A.; Rechelo, B.S.; Tótoli, E.G.; Kogawa, A.C.; & Bhat, Talapady & Weissig, Helge & Shindyalov, I.N. & Zhuang,
Salgado, H.R.N. Evolution of green chemistry and its Pelion. (2000). The Protein Data Bank. Nucleic acids research.
multidimensional impacts: A review. Saudi Pharm. J. 2019, 27, 1- 28. 235-42.
8. [PubMed]
33. Trott, Oleg and A. Olson. "AutoDock Vina: Improving the speed
29. Hurst, G.A. Systems thinking approaches for international green and accuracy of docking with a new scoring function, efficient
chemistry education. Curr. Opin. Green Sustain. Chem. 2020, optimization, and multithreading." Journal of Computational
21, 93-97. Chemistry 31 (2010): n. pag.
30. Falcone, P.M.; Hiete, M. Exploring green and sustainable
chemistry in the context of sustainability transition: The role of
visions and policy. Curr. Opin. Green Sustain. Chem. 2019, 19,
66-75.
Abstract - In this era the enemy of human various governing agencies have laid sewers as the
population is pollution and water pollution is one development of the city progressed.
of the most responsible for many hazards. As the
population of Indore is going so fast, Indore is also 1.2 Pollution And Environmental Concerns
dealing with this problem and the prime example
Khan has turned into a sewage dump yard, where
of this is Khan river. Large amount of waste water
is the major concern of this product. Fenton many industries and municipal sewage have been
Reaction applied to the treatment of municipal dumping solid as well as liquid wastes into it, since the
sewage water. The importance of water treatment rapid industrialization in the70s.
to the environment is discussed, followed by the As an additional load, the household drainage is also
benefits and limitations of treatment technique. dumped into the Kahn without any purification or
Chemical fundamentals are focused on the
cleaning.
generation of hydroxyl radicals. This method is
based on the use of radical generators like There have been several attempts to clean the river
hydrogen peroxide, Fenton's reagent. since 1985, but none of them have materialized till date.
The aim of study is to treat the water of municipal 1.3 Need of the Project
sewage by Fenton reaction for the reduction of
chemical oxygen demand(COD) and biological Indore city is expanding leaps and bound. It is one
oxygen demand(BOD). of the fastest growing metropolitan cities in India. It's
Index Terms - Pollution, Fenton reaction, developed industrial sector and the growing IT sector
BOD, COD draws a large group of people and business to settle In
the city, temporarily or permanently. This is creating a
1. INTRODUCTION growing demand for urban infrastructure, especially for
About Khan River water supply and sanitation.
• On account of economic feasibility our project is
The river Khan or Kahn as it is now known is a
sustainable.
river flowing through Indore, the commercial capital of
the Indian state of Madhya Pradesh. It doesn't contain • Efficient cleaning of sewage waste water for
freshwater but instead has become polluted over the household use.
course of time carries sewage due to pollution. The stretch from Krishnapura bridge to Khatipura
bridge the river is almost in septic condition throughout.
1.1 Present Status of the Sewerage System
The river is used as a ravine through which only
The sewerage system of Indore has first conceived domestic and industrial wasteflows.
in the year 1936 by the erstwhile Holkars for a
In concern to the environment. Despite large
population of 1.5 lakhs and may have covered about
supplies of fresh water and the natural ability of water
10% of the core city area of 134sq.km. Subsequently,
to cleanse itself over time, populations had become so 1.5 Secondary Treatment
concentrated by 1850 that outbreaks of life-threatening After primary treatment, wastewater still contains
diseases were traced to bacteria in the polluted water. solid materials either floating on the surface, dissolved
Since that time, the practice of wastewater collection in the water, or both. Under natural conditions, these
and treatment has been developed and perfected, using substances would provide food for such organisms as
some of the most technically sound biological, physical, fungi, algae, and bacteria that live in a stream or lake.
chemical, and mechanical techniques available. As a Most public wastewater treatment plants now
result, public health and water quality are protected provide a second stage of treatment known as
better today than ever before. secondary treatment to remove more of the pollutants-
The modern sewer system is an engineering marvel. -up to 85 or 90 percental together.
Homes, businesses, industries, and institutions Secondary treatment is largely a biological process.
throughout the modern world are connected to a Air is supplied to stimulate the growth of bacteria and
network of below-ground pipes which transport other organisms to consume most of the waste materials.
wastewater to treatment plants before it is released to The wastewater is then separated from the organisms
the environment. Wastewater is the flow of used water and solids, disinfected to kill any remaining harmful
from a community. As the name implies, it is mostly bacteria, and released to a nearby lake, river, or stream.
water; a very small portion is waste material.
1.6 Emerging Technologies in waste Water
At a typical wastewater plant, several million gallons
Treatment
of wastewater flow through each day -- 50 to 100
gallons for every person using the system. The amount • DUCKWEED-POND TECHNOLOGY- The
of wastewater handled by the treatment plant varies duckweed based waste water treatment system in
conjuction with pisco culture is one such technology
with the time of day and with the season of the year. In
that has the potential of offering effective waste water
some areas, particularly communities without separate treatment beside providing economic returns as well
sewer systems for wastewater and runoff from rainfall, as generating employment opportunities in the ruler
flow during particularly heavy rains or snowmelts can areas. The duckweed is small free floating aquatic
be much higher than normal. plant often seen growing in thick mats on nutrient
What happens in a wastewater treatment plant is rich fresh and brackish waters in tropical and
essentially the same as what occurs naturally in lake or semitropical climate all over the world.
stream. The function of a wastewater treatment plant is • VERMICULTURE TECHNOLOGY- this
to speed up the process by which water cleanses technology is emerging as an environmentally
(purifies) itself. sustainable, economically viable and socially
acceptable technology all over the world. It may be
A treatment plant uses a series of treatment stages of the from: Vermi-composting technology (To
to clean up the water so that it may be safely released manage most organic wastes); vermin-filtration
into a lake, river, or stream. Treatment usually consists technology (To treat municipal and several industrial
of two major steps, primary and secondary, along with waste water); Vermi-radiation technology (to treat
a process to dispose of solids (sludge) removed during and clean up contaminated lands)
the two steps. • CONSTRUCTED WETLANDS - They are
engineered systems that use natural functions,
1.4 Primary Treatment
vegetations, soil to treat waste water. Constructed
In primary treatment, sand, grit, and the larger solids wetlands have been used to treat both centralized
in the wastewater are separated from the liquid. and on site wastewater.
Screens, settling tanks, and skimmering devices are • SOLAR DRYING OF SEWAGE SLUDGE -using
most commonly used for the separation. Primary heat to evaporate water from sludge. This method,
treatment removes 45 to 50 percent of the pollutants.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 975
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
first developed by researchers in Germany, reduces Unlike conventional technologies which use strongly
the mass and volume of dewatered solids resulting in oxidant species, under certain conditions AOPs can
a product that can be used as a low-grade fertilizer. provides the complete mineralization of pollutants;
Compared to established technologies, solar drying
can significantly reduce fuel requirements compared Used for the destruction of refractory compounds
to conventional dryers. Its disadvantages are that it resistant to other treatments, such as biological
does have a large footprint and needs days with processes;
sufficient solar heating. (I've also provided an article
from The Guardian about this technology.) Allow the conversion of recalcitrant compounds and
refractory contaminants submitted to bio-degradation
1.7 Impact Of Waste Water Effluent On systems;
• Color in effluent- Color from municipal waste water
can cause significant aesthetic problem.The reductive It can be used in combination with other processes
anaerobic process would cleave azo dyes while the for pre-or post- treatment;
aerobic process would oxidize fragments.
Possess strong oxidizing power with high reaction
• Presence of heavy metals- The possible sources rates;
for some metals present in the wastewater is the
presence of trace metals in processing chemicals such The formation of by-products can be minimized if
as sodium hydroxide, sodium carbonates, salt,etc. It optimized amounts of reactants are employed;
is difficult to judge how current trace metal removal
technologies could reduce concentration to the In many cases, AOPs consume less energy
prescribed standards. Source reductions appears to compared to thermal destruction processes
be the only solution in achieving the trace metal level (incineration) of liquid waste waters.
in the wastewater effluents. The method of treating 1.8.1 Fenton's Reaction: H.J.H Fenton discovered in
the khan river's water and reducing BOD value and 1894 that several metals have a special oxygen
COD value will be the Fenton's reaction transfer properties which improve the use of hydrogen
• Total suspended solids (TSS) peroxide. Actually, some metals have a strong catalytic
• It is a water quality parameter used to assess the power to generate highly reactive hydroxyl radicals
quality of a specimen of any type of water or water (.OH). Since this discovery, the iron catalyzed
body after treatment in a wastewater plant. hydrogen peroxide has been called Fenton's reaction.
Nowadays, the Fenton's reaction is used to treat a
• Total dissolved solids is another parameter
large variety of water pollution such as phenols,
acquired through a separate analysis which is also
formaldehyde, BTEX, pesticides, rubber chemicals
used to determine water quality based on the total
and soon.
substances that are fully dissolved within the
water. 1.8.2 Applications of the Fenton's reaction: This
process may be use to wastewater, contaminated soils
1.8 Brief About Fenton Reaction and sludges with the following actions:
Treatment methods vary with the wastewater
• Organic pollutant destruction
characteristics. In economic point of view, the most
economical and efficient methods are preferable • Toxicity reduction
compare to the other. Chemical methods, biological
• Bio-degradability improvement
methods and physical methods are the general treatment
that are being used and further investigations by • BOD/COD removal
researchers proves that chemical methods are the most • Odor and color removal
efficient and economical compare to the other two
methods. In general, the following are positive aspects • Destruction of resin in radioactive contaminated
of Fenton: sludge
Abstract: Green synthesis of nanoparticles was these materials. It represents all activities related to
made at room temperature using micro-organisms, development. On the other hand, as far as
plants, and fungi. Green synthesis offers an nanobiotechnology is concerned, this is the result of a
environmentally friendly, fast, economical and
combination of branches of biotechnology and
reproducible approach to quicker development of
nanotechnology with a common combined functioning
metal nanoparticles. Nanoparticles obtained by
green synthesis method are used in many fields of [1].
use, such as cancer treatment, drug delivery, the Microorganisms, plants and other biological
construction of biosensors. Microorganisms, structures are involved in the process of eliminating toxic
plants, and fungi can be used as a biodegradable and waste metals in the environment; accomplished by
agent material to develop a simple, rapid, and
oxidation, reduction or catalysis of metals with metallic
green nanoparticles synthesis method. When
synthesizing nanoparticles by introducing chemical
nanoparticles. Metallic nanoparticles developed using
and physical methods at high temperature and biological methods; are used in the biomedical field for
pressure, reducing and stabilizing agents; purposes such as protecting against harmful
synthesizing nanoparticles by biological methods; microorganisms, bio-imaging, drug delivery, cancer
involve room temperature and pressure, reducing treatment, medical diagnosis and sensor construction
and stabilizing agents. Green method of synthesis; due to their unique properties such as insulator, optics,
provides for faster development of metallic antimicrobial, antioxidant, anti-metastasis,
nanoparticles by providing an environmentally biocompatibility, stability and manipulability. Metallic
friendly, quick, economical and reproducible nanoparticles, which due to their catalytic activity can
approach. Biological methods play a major role in be used in the industrial sector, are nowadays of great
the synthesis of metallic nanoparticles, considering
importance. Nanomaterials, the keystone of
the wide range of applications made of metallic
nanoparticles.
nanotechnology that has served our lives for many years.
Nanomaterials are classified into two main groups
Keywords: Green synthesis, nanoparticles, according to their origin: natural nanomaterials found in
toxicity. nature, such as viruses, proteins, enzymes and minerals,
1. INTRODUCTION and artificial nanomaterials not found in nature and
requiring certain processes for their production.
Nano is a one billionth of a meter measure and covers Nanomaterials are studied under four sections according
10 atoms in width.The rapidly developing to their dimensions: -nano-sized nanocrystals-also
nanotechnology is the interdisciplinary field of biology, known as zero dimensions-which includes nanoparticles
chemistry, physics, food, medicine, electronics, from metal and semiconductors. Nanowires, nanobots,
aerospace, medicine, etc. researching the design, and nanotubes are one-dimensional nanomaterials.
manufacture, assembly, characterization of materials Nanomaterials of two dimensions, such as
smaller than 100 nanometres in scale; As well as the nanocomposites and nanoplates; -three-dimensional
application of functional miniature systems derived from nanomaterials, bulkers.Nanomaterials are studied under
980 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
four main groups according to their structural structures 3.GREEN SYNTHESIS METHOD
as metallic nanomaterials, carbon-based nanomaterials, In the last two decades, Supercritical Fluid (SCF)
dendrimers, and composites [ 4-6].Nanoparticles may technology has become an important tool for processing
exhibit various properties and functions compared to materials. Supercritical CO2 and H2O are used
normal bulk material. The most important factor for the extensively to make a wide variety of nanomaterials
creation of nanostructures of desired size, shape and [4]. Green method of synthesis; provides faster
properties and their use in different fields is the reduction development of metallic nanoparticles by offering an
of the effects of classical physics and the presence of environmentally friendly, simple, economical, and
quantum physics. Other explanations for the different reproducible approach [6].The biological synthesis of
behaviour of nanoparticles in physical, chemical, optical, nanoparticles using plants and plant extracts seems to
electrical, and magnetic activity include load carrier be an attractive alternative to traditional chemical
limitation, size-dependent electronic structures, synthesis and the more complicated techniques of
increased surface / volume ratio, and other factors cultivation and isolation required for many
caused by unique atomic properties [7]. microorganisms. In addition, combinations of molecules
2. NANOPARTICULATE SYNTHESIS present in plant extracts serve as both reducing and
METHODS stabilizing (capping) agents during synthesis of
Two basic approaches, which include different nanoparticles [28]. Using coriander extract as the
preparation methods and are known from early times, reducing agent, extracellular biological synthesis of gold
are used in the synthesis of nanoparticles, which can be nanoparticles was achieved through a simple biological
of natural or synthetic origin and exhibit unique procedure. The aqueous gold ions are reduced when
properties at the nanoscale.The first approach is the exposed to coriander leaf extract and have resulted in
"top-down" method which requires the application of the biosynthesis of gold nanoparticles ranging from 6.75-
external force to decompose solid materials into small 57.91 nm [ 29]. Rapid synthesis of silver nanoparticles
pieces. Several physical, chemical, and thermal using Acalyphaindica leaf extract has been tested against
techniques are used in this method to provide the waterborne bacterial pathogens. Characterization of
requisite energy for the creation of nanoparticles. The silver nanoparticles was reported from UV - Vis
second method, known as "bottom-up," is based on spectrum, scanning electron microscopy (SEM), X-ray
collecting and mixing atoms or molecules in gas or liquid. diffraction (XRD) and energy dispersive spectroscopy
The two methods have relative advantages and (EDS), resulting in the formation of nanoparticles 20-
disadvantages. Due to the cavities and roughness that 30 nm of particle size [25]. Euphorbia aqueous extract
can occur in nanoparticles, it is impossible to obtain (Euphorbia amygdaloides) has been used as reducing
perfect surfaces and edges in the up-down method, and stabilizing agents. They used Euphorbia (E.
which is more expensive to implement; while excellent amygdaloides) aqueous extract as a reduction and
results of nanoparticles synthesis can be obtained by stabilization agent [30]. The biological approach offers
bottom-up approach. Furthermore, with the bottom- an environmentally friendly way in which nanoparticles
up approach, no waste materials are formed that need are synthesised. This approach also requires no
to be removed, and nanoparticles of smaller size can expensive, harmful, and toxic chemicals. Thanks to the
be obtained thanks to better control of nanoparticles biological method that has been widely used in recent
sizes [ 8-10]. The mechanical abrasion method, listed years, metallic nanoparticles of different shapes, sizes,
under the top-down approach, uses different ball mills contents and physicochemical properties can be
to break down the material into particles and produce synthesised. Use biological organisms such as bacteria,
nanosized alloys, composites, and semi-crystalline actinobacteria, yeasts, moulds, algae and plants, or their
structures. Despite being inexpensive, efficient and products, synthesis can be achieved in one stage. In
simple, this method is susceptible to contamination plants and microorganisms, such as proteins, enzymes,
caused by balls [11].
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 981
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
phenolic compounds, amines, alkaloids and pigments, contamination and have catalytic activity [20].
molecules synthesize nanoparticles by reducing them [ Nanoparticles can be synthesized with enzymes as
7, 12-16]. In conventional chemical and physical extra-cellular or intra-cellular by using simple-cultured
methods; reducing agents involved in the reduction of and fast-breeding eukaryotic yeasts and moulds with a
metal ions, and stabilizing agents used to avoid convenient design for biomass. The incubation
undesirable agglomeration of the nanoparticles formed conditions and the solutions used for metallic ions affect
carry a risk of toxicity to the environment and the cell. the size of the formed nanoparticles. Being pathogenic
In addition, the contents of the nanoparticles produced to humans restricts the use of some moulds in the
are believed to be toxic in terms of form, size and surface production of nanoparticles [21]. Actinobacterial
chemistry. Such agents are naturally present in the nanoparticles biosynthesis is a safe, environmentally
biological organisms employed in the green synthesis friendly, and important aspect of green chemistry
process in which nanoparticles with biocompatibility are approach that interconnects microbial biotechnology
produced [17]. Due to rapid development, inexpensive and nanobiotechnology. Actinobacteria-generated
cost of cultivation, and simple control and manipulation antibiotics are common in almost all therapeutic steps,
of the growth environment, bacteria specifically target and it is known that these microbes are also helpful in
nanoparticles in production. At the same time, some the biosynthesis of nanoparticles with good surface and
species of bacteria are known to have special size characteristics. Actinobacterialnanoparticular
mechanisms for suppressing metal toxicity or heavy biosynthesis is a safe, environmentally friendly and
metals. Bacteria preferred for these properties may important aspect of the green chemistry approach that
execute in-situ and ex-situ nanoparticle synthesis. Metal interconnects microbial biotechnology and
ions can be reduced and precipitated for the nanobiotechnology [20]. Algae are eukaryotic aquatic
development of nanoparticles by using biochemical picture sites and, due to the pigments, proteins,
pathways and reducing agents such as proteins, carbohydrates, fat, nucleic acid and secondary
enzymes, etc. present in the bacteria [ 18, 19]. For metabolites they produce, they break down metal salts
example, a simple, non-toxic, water-based strategy for into nanoparticles. The algae extract that occurs in an
the manufacture of magnetic nanoparticles / hydrogel aqueous medium at a certain temperature is
nanocomposites in which highly crystalline Fe3O4 supplemented with metal solutions of the corresponding
nanooctaedra can be produced in situ within a negatively pH and concentration, and thus the synthesis of
charged matrix of hydrogel. The morphology of the nanoparticles that may have antimicrobial properties
Fe3O4 nanocrystals can be easily tuned by adjusting without creating any harmful by-products during
the crosslinking concentration of the hydrogel. In synthesis is achieved. The size of nanoparticles is
addition, the catalytic activity of the magnetic calculated by some factors such as the solution's
nanocomposites and the magnetic nanocomposite incubation time, the ambient temperature, the pH of
loaded with Fe3O4 nanooctaedra exhibited excellent the mixture used and the concentration of metal ions.
catalytic activity and produced a responsive response Algae also give an advantage to this type of synthesis
to detection of H2O2. [19] Actinobacteria developing by virtue of its easy availability and usefulness.
secondary metabolites such as antibiotics are aerobic, Therefore, successful biomolecules in the reaction
immobile, and mostly gram-positive filamentous medium are less extinguished by the nanoparticles
bacteria. Thanks to their detoxification properties, they produced in the use of bacteria and plant extracts [22,
are resistant to the most toxic heavy metals. Soluble 23]. Metallic nanoparticles which have different
toxic metal ions are detoxified by intracellular or morphological characteristics can be produced
extracellular degradation or precipitation. Thus, it is intracellularly and extracellularly. Synthesis process; is
possible to produce nanoparticles which are initiated in the aqueous solution of metal ions by adding
antibacterial, antifungal, anticancer, antioxidant, antibio- extracts obtained from plant parts such as leaves, roots,
and fruit. The materials present in the plant extract, such nanoparticles are commonly used in Nano biomedicine
as sugar, flavonoid, protein, enzyme, polymer and [34]. Plants based green synthesis of Ag, Au, Cu, Fe,
organic acid, acting as a reduction agent, are responsible Pd, Ru, PbS, CdS, CuO, CeO2, Fe3O4, TiO2, and
for the bio-induction of metal ions into nanoparticles [ ZnO NPs [32].
8, 10, 13, 22, 24].
5. CONCLUSION
4. APPLICATIONS A number of microorganisms and plant extracts have
Nanomedicine is a growing research field with recently been used to synthesize metal nanoparticles
enormous potential for improving the diagnosis and for green synthesis in an effective manner. Therefore,
treatment of human diseases [26] Development of new green synthesis of nanoparticles is the most convenient,
nanoparticular-based cosmetics. Surface modification simple, environmentally friendly way and minimizes the
which improves the distribution of nanotechnology in side effects of chemical and physical methods by
the brain. Nanotechnology and powder technology at preventing the use of toxic chemicals and the creation
a combustion plant for pulverized coal [9]. Metal of harmful / hazardous by-products. Nanoparticles are
nanomaterials have revolutionized nanoscience in several commonly used for their superior properties, and have
applications. These include, among other things, been intensively researched in recent years. The physical
plasmonic, catalysis, sensing, computing, photonics, and clinical effects of green synthesis- obtained
information storage, medicine, energy conversion, antimicrobial, antioxidant and non-toxic nanoparticles
cosmetics [11]. While the field of biosynthesized are becoming increasingly important. Future studies
nanoparticles is relatively new, researchers have already should probably focus on obtaining at its maximum level
started exploring their use in applications such as nanoparticles with antimicrobial activity and at least
targeted drug delivery, cancer treatment, gene therapy toxicity. Because of this, the synthesis of metallic
and DNA analysis, antibacterial agents, biosensors, nanoparticles, -especially by non-toxic green synthesis
enhancing reaction rates, separation science, and MRI method-, which are used in many fields of application
[27]. Elucidation of an enzymatic pathway using fungi, such as cancer treatment, drug transport, is of great
opens up exciting possibility of developing a rational, importance today.
biosynthesis strategy for nanomaterials over a range of
chemical compositions which is currently not possible 6.REFERENCES
[30] To improve particle synthesis efficiency and [1] Pearce, J. M. (2012). Physics: Make nanotechnologyresearch
open-source. Nature, 491(7425), 519-521.
exploring their biomedical applications, it is hopeful that
the implementation of these approaches on a large scale [2] Schröfel, A., Kratošová, G., Šafa?ík, I., Šafa?íková, M., Raška, I.,
& Shor, L. M. (2014). Applications of biosynthesized metallic
and their commercial applications in medicine and health nanoparticles-a review. Acta biomaterial, 10(10), 4023-4042.
care will take place in the coming years. Euphorbia (E. [3] Singh, P., Kim, Y. J., Zhang, D., & Yang, D. C. (2016). Biological
amygdaloides) extract can be used efficiently in the synthesis of nanoparticles from plants and microorganisms.
production of potential antioxidant and anti-bacterial Trends in biotechnology, 34(7), 588-599.
[30]. Having numerous viewpoints to improve the [4] Byrappa, K., Ohara, S., &Adschiri, T. (2008). Nanoparticles
diagnosis and treatment of human sicknesses, nano synthesis using supercritical fluid technology-towards biomedical
applications. Advanced drug delivery reviews, 60(3), 299-327.
medicine is a growing field of study [33].As fluorescent
[5] Li, X., Xu, H., Chen, Z. S., & Chen, G. (2011). Biosynthesis of
biological labels gene and drug delivery factors and in nanoparticles by microorganisms and their applications. Journal
uses like bio detection of pathogens tissue engineering of Nanomaterials, 2011.
[35] tumour demolition through heating (hyperthermia) [6] NADAROGLU, H, ALAYLI GÜNGÖR, A, ?NCE, S. (2017).
MRI contrast enhancement phagokinetic investigations, Synthesis of Nanoparticles by Green Synthesis Method.
and magnetic NPs seem to be suitable for targeted drug International Journal of Innovative Research and Reviews, 1 (1),
6-9. Retrieved from https://dergipark.org.tr/en/pub/injirr/issue/
delivery and hyperthermia applications, discrete 51783/673126
[7] Shah, M., Fawcett, D., Sharma, S., Tripathy, S. K., &Poinern, G. [22] Siddiqi KS, Husen A. Fabrication of Metal and Metal Oxide
E. J. (2015). Green synthesis of metallic nanoparticles via Nanoparticles by Algae and their Toxic Effects. Nanoscale
biological entities. Materials, 8(11), 7278-7308. Research Letters (2016) 11. doi:10.1186/s11671-016-1580-9.
[8] Iravani S. Green synthesis of metal nanoparticles using plants. [23] Karaduman I, Gungor AA, Nadaroglu H, Altundas A, Acar S.
Green Chemistry (2011) 13:2638-50. doi:10.1039/c1gc15386b Green synthesis of gamma-Fe2O3 nanoparticles for methane gas
sensing. Journal of Materials Science-Materials in Electronics
[9] Cerjak H. Book note: introductions to nanoparticles and
(2017) 28:16094-105. doi:10.1007/s10854-017-7510-5.
nanomaterials. Powder Metallurgy (2014)
[24] Park S, Sung HK, Kim Y. Green Synthesis of Metal Nanoparticles
[10] Makarov, V. V., Love, A. J., Sinitsyna, O. V., Makarova, S. S.,
Using Sprout Plants: Pros and Cons. Journal
Yaminsky, I. V., Taliansky, M. E., &Kalinina, N. O. (2014).
"Green" nanotechnologies: synthesis of metal nanoparticles using [25]Kavitha, K. S., Baker, S., Rakshith, D., Kavitha, H. U.,
plants. ActaNaturae (англоязычнаяверсия ), 6(1 (20)). Yashwantha Rao, H. C., Harini, B. P., & Satish, S. (2013). Plants
as green source towards synthesis of nanoparticles. Int Res J
[11] Geonmonond, R. S., SILVA, A. G. D., & Camargo, P. H. (2018).
BiolSci, 2(6), 66-76.
Controlled synthesis of noble metal nanomaterials:Motivation,
principles, and opportunities in nano catalysis. Anais da Academia [26] Fadeel, B., & Garcia-Bennett, A. E. (2010). Better safe than
Brasileira de Ciências, 90(1), 719-744. sorry: understanding the toxicological properties of inorganic
nanoparticles manufactured for biomedical applications. Advanced
[12] Nadaroglu, H., Onem, H., &Gungor, A. A. (2016). Green
drug delivery reviews, 62(3), 362-374.
synthesis of Ce2O3 NPs and determination of its antioxidant
activity. IET nanobiotechnology, 11(4), 411-419. [27] Zhang, X., Yan, S., Tyagi, R. D., &Surampalli, R. Y. (2011).
Synthesis of nanoparticles by microorganisms and their
[13] Dobrucka, R. (2019). Bio fabrication of platinum nanoparticles
application in enhancing microbiological reaction rates.
using Fumariaeherba extract and their catalytic properties. Saudi
Chemosphere, 82(4), 489-494.
journal of biological sciences, 26(1), 31-37
[28] Singh, A., Jain, D., Upadhyay, M. K., Khandelwal, N., &Verma,
[14] Cicek, S., Gungor, A. A., Adiguzel, A., &Nadaroglu, H. (2015).
H. N. (2010). Green synthesis of silver nanoparticles using
Biochemical evaluation and green synthesis of nano silver using
Argemonemexicana leaf extract and evaluation of their
peroxidase from Euphorbia (Euphorbia amygdaloides) and its
antimicrobial activities. Dig J Nanomater Bios, 5(2), 483-489.
antibacterial activity. Journal of Chemistry, 2015.
[29] Narayanan, K. B., &Sakthivel, N. (2008). Coriander leaf mediated
[15] Xia, Y., Xiong, Y., Lim, B., &Skrabalak, S. E. (2009).
biosynthesis of gold nanoparticles. Materials Letters, 62(30),
Shape?controlled synthesis of metal nanocrystals: simple
4588-4590.
chemistry meets complex physics? AngewandteChemie
International Edition, 48(1), 60-103. [30] Liu, M., Guo, Y., Lan, J., Zhou, Y., Dong, Q., &Guo, C. (2019).
Synthesis of Ce/SiO2 Composited Cross?Linked Chitosan
[16] Mukhopadhyay, N. K., & Yadav, T. P. (2011). Some aspects of
Flocculation Material and Its Application in Decolorization of
stability and nanophase formation in quasicrystals during
Tartrazine Dye. Chemistry Select, 4(45), 13156-13162.
mechanical milling. Israel Journal of Chemistry, 51(11?12), 1185-
1196 [31] Katz, E., &Willner, I. (2004). Integrated nanoparticle-biomolecule
hybrid systems: synthesis, properties, and applications.
[17] Hussain, I., Singh, N. B., Singh, A., Singh, H., & Singh, S. C.
AngewandteChemie International Edition, 43(45), 6042-6108.
(2016). Green synthesis of nanoparticles and its potential
application. Biotechnology letters, 38(4), 545-560. [32] Acharyulu, N. P. S., Dubey, R. S., Swaminadham, V., Kollu, P.,
Kalyani, R. L., &Pammi, S. V. N. (2014). Green Synthesis of
[18] Korbekandi, H., Iravani, S., &Abbasi, S. (2009). Production of
CuO Nanoparticles using PhyllanthusAmarus Leaf Extract and
nanoparticles using organisms. Critical reviews in biotechnology,
theirAntibacterial Activity Against MultidrugResistance Bacteria.
29(4), 279-306.
International Journal of Engineering Research & Technology, 3(4).
[19] Gao, Y., Wei, Z., Li, F., Yang, Z. M., Chen, Y. M., Zrinyi, M.,
[33] Tian, F., Tian, F., Prina-Mello, A., Estrada, G., Beyerle, A.,
&Osada, Y. (2014). Synthesis of a morphology controllable Fe 3
Möller, W., ... &Stoeger, T. (2008). A novel assay for the
O 4 nanoparticle/hydrogel magnetic nanocomposite inspired
quantification of internalized nanoparticles in macrophages.
bymagnetotactic bacteria and its application in H 2 O 2 detection.
Nanotoxicology, 2(4), 232-242.
Green Chemistry, 16(3), 1255-1261.
[34] Parak, W. J., Boudreau, R., Le Gros, M., Gerion, D., Zanchet,
[20] Manivasagan, P., Venkatesan, J., Sivakumar, K., & Kim, S. K.
D., Micheel, C. M., ... &Larabell, C. (2002). Cell motility and
(2016). Actinobacteria mediated synthesis of nanoparticles and
metastatic potential studies based on quantum dot imaging of
their biological properties: a review. Critical reviews in
phagokinetic tracks. Advanced Materials, 14(12), 882-885.
microbiology, 42(2), 209-221.
[35] Shinkai, M., Yanase, M., Suzuki, M., Honda, H., Wakabayashi,
[21] BoroumandMoghaddam, A., Namvar, F., Moniri, M., Azizi, S.,
T., Yoshida, J., & Kobayashi, T. (1999).
& Mohamad, R. (2015). Nanoparticles biosynthesized by fungi
and yeast: a review of their preparation, properties, and medical
applications. Molecules, 20(9), 16540-16565
Abstract- Cutting of forests, industrial farming, identifies a point of interest in the direction of
burning fossil fuels for electricity, ranching, and the reducing global warming, as well as revealing the
use of aerosols all contribute to the global warming technique and benefits of biofuel production.
of the environment, which in turn contributes to
Keywords: Renewable energy sources (RES),
the deteriorating of human health. Alternative fuel
Biofuel, Greenhouse emission and Microalgae.
is currently a major issue all over the world as a
result of efforts to reduce emissions. As a result, I. INTRODUCTION
concerns about the sustainability of life have
prompted a rise in international importance in the High Temperature and pressure can cause drastic
search for realistic trade measures to reducing changes such as melting ice, rising water levels, volcanic
global warming. A heated dispute is raging eruptions, and system disturbances. According to an
regarding the magnitude and severity of rising early report, the international average temperature has
surface temperatures, the effects of past and future risen 1°F since the early 1900s, and is expected to rise
warming on human life, and the need for action to 2.5 to 10.4°F over the next 100 years [1], requiring
mitigate future warming and deal with its countries to North America take the necessary action
consequences. The advantages of biodiesel as immediately. The exponential growth of global
diesel fuel are its portability, ready availability,
environmental temperature, especially through
renewability, higher combustion efficiency, non-
toxicity, higher flash point, and lower sulfur and
interference with human activities such as deforestation,
aromatic content, higher cetane number, and higher industrialized agriculture, burning of fossil fuels for power
biodegradability. generation, pasture and the use of aerosols, has led to
deterioration of human health.
Biodiesel is non-toxic, biodegradable, and made
from renewable resources, and it emits a small
amount of harmful greenhouse gases, such as CO2,
SO2, and NOx, into the ecosystem. The sources
of biodiesel are vegetable oils and fats. The direct
use of vegetable oils and/or oil blends is generally
considered to be unsatisfactory and impractical for
both direct injection and indirect type diesel
engines because of their high viscosities and low
volatilities injector coking and trumpet formation Fig.1-Projected global warming in 2100 for a range of
on the injectors, higher level of carbon deposits, emission scenarios
oil ring sticking, and thickening and gelling of the Generally speaking, when short wave radiation
engine lubricant oil, acid composition. Biodiesel is reaches the earth from the sun, as long as 1/2 is
obtained by trans esterifying triglycerides with
consumed, the left side will regenerate to the extended
methanol. Bio-fuel outputs are an environmentally
benign alternative to fossil fuels. The current study wavelength and will be reflected back to the house as
the associated infrared rays. Greenhouse gases absorb
the heat released by the earth and emit them to the
surface of the earth in the opposite direction, thereby et.al., rising concentration of CO2 should result in the
controlling the temperature of the earth to close to 33 cooling of climate. [10] According to studies carried
degrees Celsius. When the greenhouse gases equivalent out by Howarth, use of fossil fuel is major source of
to carbon dioxide, methane, steam and fluorinated gases emission of green house gases. [11] Use of natural gas
are greatly amplified to a strong degree, they will act as can reduce the emission to considerable extent.
the mantle and prevent the release of heat [2]. The Ramanathan and Fengstudied global and regional
changes in energy absorbed and released by this perspectives ofair pollution, green house gases and
greenhouse gas are based on molecular structure and climate change.[12] Smith et.al.carried out studies on
pure algorithms. Therefore, it is mainly through the units various soil physical factors and the biological processes
of human sports venues that these greenhouse gas which cause the production and consumption in soils
changes around the earth are an important reason for of green house gases.
the modern warm-up results. The release of carbon dioxide, according to them,
II. GLOBAL GREENHOUSE GASES is function of temperature for considerably wide range
EMISSION of temperature. For dry soil, it becomes function of
water contents [13]. Gas diffusivity, according to them
Stojanovic et.al. carried out studies on green house is main factor controlling oxidation. According to studies
gases and means of their prevention.[3] According to carried out by Aggarwal and Markanda, the rapid
them, water vapor is one of the greatest contributors to heating of earth is taking place due to green house effect,
the green house effect on earth. According to an more so in last two decades.[14]. These green house
investigation carried outby ElZein and Chehaye, gases are produced both by natural processes and by
vehicular and industrial pollution is main contributor to human activities. The primary onesare:
the global warming. [4] Studies carried out by
A.Shrivastava and S.Shrivastava indicated that the • Carbon dioxide(CO2)
climate changes as a result of global warming • Methane(CH4)
havereached irregular levels. [5]According to Lacis, • Nitrous oxide (N2O)
combination of solar radioactive heating andt he strength
of the green house effect determine the surface • Industrial Gases, includinghydrofluorocarbons,
temperature of a planet. [6] Sreenivas et.al. investigated perfluorocarbons, and sulfur hexafluoride Water
influence of meteorology and interrelationship with green vapor is the most abundant greenhouse gas and plays
house gases. [7]They pointed out that gases like an important role in regulating the climate. Global
carbondioxide(CO2) and methane(CH4) are climate Warming
forcing agents. During their investigation, they observed Table 1: Global Warming Potential of greenhouse gases
that methane recorded the maximum during post Atmospheric Global Warming
monsoon and minimum during monsoon. The lifetime (years) Potential (GWP)
meteorological factors like air temperature, wind speed, Carbon dioxide Variable 1
wind direction and relative humidity had strong impact (CO2)
on GHGs. Fekete et.al. studied analysis of current green Methane (CH4) 12 21
house gas emission trends. [8] They studies green house Nitrous oxide (N 2O) 114 310
phenomenon in the light of prevailing policies and
Potential (GWP) [15]is an index that represents the
regulations. According to their estimates the current
global warming impact of a green house gas relative to
policies may lead to 3.7 degree risein temperature.
carbon dioxide. GWP represents the combined effect
Byrne and Gold blatt carried out studies on radio active
of how long the gas remains in the atmosphere and its
forcing of green house gases.[9] Their studies indicated
relative effectiveness in absorbing outgoing infrared heat.
that CO2 radio active forcing is consistent. Chilingar
Table 1 lists the GWP of the three main green house
gases (based on a100-year time horizon). As the table ocean ice into ceanic darkish surfaces that's reflective
shows, a given molecule of nitrousoxide has over 300 into inflated warmth tack capability leading to more
times the impact on global warming as does a molecule increment of world temperature, ocean interest,
of carbon dioxide. Assessments by the independent touching the growth of aquatic lifestyles, diverseness
Inter governmental Panelon Climate Change(IPCC) and related food web. Global warming boosts the
note that Earth's average global surface temperature probability of extreme weather events, like heat waves,
has risen between1.1° and 1.6° Fahrenheit over the far more than it boosts more moderate events. [19]
past century and that this is very likely caused by human Recent proof represented that heating adversely
activity [15] Local changes include shifts in the patterns effect on the plants like monocot genus vivipara [20,21],
and severity of rainfall and snowfall, droughts, heat impinge the seed germination and viability within
cloudiness, humidity, and growing season length[16]. the species like juniper. The accelerated greenhouse
gas has an impact on the expansion and yield by
mistreatment inhibiting Photosystem in some species of
Wedelia and Rubisco content in rice species. Moreover,
extended greenhouse emission awareness and/or inflated
temperature trigger the status to agent mediate illnesses
in wheat and barley, that has been careful greater in
barley that decreasing the quantity of protection
compound similar to p-coumaroyl hydroxyl agmatine
[22,25]. Moreover, inflated greenhouse emission cut
back the biological process composition of some plants
equivalent to expend ascorbic acid content in herb [26].
The impact of global warming on human fitness is
maximum massive, similar to the hotter temperature
Figure 2: Atmospheric concentrations of the naturally
occurring greenhouse gases carbon dioxide, methane, and
favours the enlargement and propagation of dipteron.
nitrous oxide over the past 2000 years. Data are from ice core So dramatically growing existence threatening dipteron
records and contemporary measurements.
born sicknesses like dengue fever, chikungunya
III. IMPACTS OF WORLDWIDE conjointly as can boom the vector borne and animal
WARMING borne illnesses. The potent heat waves by heating area
liable for a rise of temperature associated deaths.
Manyharmfulgasescausedifferenthealthproblems to
Furthermore pollution because of air conditioner,
human beings. [17-18] There is a scientific consensus
contributes to inflated quantity of pollutant that effects
that climate change is occurring, and that human
metabolic process and respiratory organ diseases
activities are the primary driver. Many impacts of climate
[27,28]. From decades, the warmth tack potential of
change have already been observed, including glacier
alkane series is firmer than CO2, therefore gripping 84
retreat, changes in the timing of seasonal events (e.g.,
times a lot of heat with in 1st two years of its unleash.
earlier flowering of plants), and changes in agricultural
Degradation of organic substances by anaerobic
productivity. Anthropogenic forcing has likely
bacteria can initiate discharge of acid fuel and alkane
contributed to some of the observed changes, including
collection. The human sports accountable for alkane
sea level rise, changes in climate extremes, declines in
series assortment releases area unit delivery of gasoline,
Arctic sea ice extent and glacier retreat.The principal
crude modification, oil and fuel structures. The human
risky impact of accelerating temperature leads to melting
activities liable for paraffin releases area unit transport
of the ocean beds of ice which stimulating unhitch of
fuel, crude trade, oil and gas systems.
alkane series compound. The second most effect of
global temperature increase is that the conversion of
IV. DIFFERENT GENRATION BIOFUEL of methyl group from high proportion of carboxylic
The fuel got from natural materials, including containing organic compound by trans-esterification
materials from living beings that passed on generally as reaction. The rate of reaction can be increasedby use
of late and from the metabolic results of living life forms of methyl alcohol or the other alcohol [29].
is called Biofuel. The technique for biofuel creation will B. 2nd generation Bio-fuel
be grouped into three (Fig.3) class to be specific
beginning age biofuel from eatable sustenance crops, They produce by the use certain techniques like
second era biofuel from non-eatable yields and waste organic chemistry and thermo chemical ways that utilize
oil feed stock and third era biofuel from algae. Note the lingo-cellulosic and plastic element additionally to
that the structure of the biofuel itself does not change sugar and starch element of non-edible food crops and
between ages, yet rather the source from which the waste oil. Organic chemistry process of "biomass follows
fuel is inferred changes. 3 steps admire pre-treatment either with ammonia or
steam explosion for separation of the plastic content",
that is regenerate to aldohexose by the aid of acid and/
or macromolecule by chemical reaction. Finally, they
are born-again to alcohol or plant product by microbes.
Thermal chemical methodology involves process at
higher temperature and pressure that features direct
combustion, chemical process, state change and shift.
Direct combustion of biomass inside the presence of
air turns out acid, water, and free heat would be
comfortable for domestic heating functions. Chemical
change involves transformation of biomass into vaporous
mixtures like CO, CO2, CH4, N2 and H2 referred to as
Figure-3-Different Generation of Biofuel
gas, whichcan directly be used in power generation
system or treated with catalyst or at higher temperature
A. 1st generation Bio-fuel to provide liquid fuel for transportation. Shift involves
Primary generation bio-fuel is food crops like corn, the direct conversion of biomass into vaporous product
soya bean, sugar cane, vegetable oil. Bio-ethanol is by application of intense heat, and reactions
combined from sugar stick, corn and maize yet biodiesel administrated inside the presence of element like group
is produces by mixing of soybean plant oil, sunflowers and at intervals the absence of element. The eminent
oil, and vegetable oil. Biogas is created by disintegration biofuel created by these ways are Fischer Tropsch
of natural material. Among these, corn was wont to liquid, Dimethyl Ether and alcohol fuel [30].
turn out fifteen billion gallon of plant item and sugar C. 3rd generation Bio-fuel
stick is particularly utilized for steady reason in Brazil.
Originally biofuels are created straightforwardly from It encounters the demerits of past 2 generation
sustenance trims by abstracting the oils for use in system and having abundant blessings, admire highest
biodiesel or delivering bio ethanol through aging. In content of oil in several alga strains admire of its dry
1st generation bio- fuel starch, sugar, polyose and/or weight. Their potential to grow extraordinarily speedy,
sugar content is regenerate to aldohexose which is wherever some strains might double their biomass inside
converted to alcohol by microorganism through 24 hours, with minimum necessities like water, daylight
chemical reaction, further purified by the distillation and carbonic acid gas and conjointly capable of growing
process. The foremost preferred supply of biodiesel is in harsh conditions that is unfavourable for terrestrial
soya bean. Biodiesel production involves regenerate plants. They are also feasible to culture in an exceedingly
wide scale over little space, with the supplemental
advantage that biofuel from alga to be non-cytotoxic, system is that the symbol bioreactors that might be a
perishable and with favourable emission profile because shut instrumentation, all around lit by star or counterfeit
it produces no monoxide, sulphur and turn organic light-weight and temperature controlled with persistent
compound [31,32]. The preferred choice for stream of water containing fundamental supplements,
manufacturing biofuel like biodiesel from microalgae as air and carbonic corrosive gas, so rising the yield of
a result of that is found to be high oil content whereas biofuel.
bioethanol and biogas from microalgae has richest sugar
content [33], despite it may well be created from
alternate sources. The success rate of biofuel production
lies within the choice of applicable strains of high oil
content and suitableness to grow in an exceedingly giant
scale with minimum demand let's say Botrycococcus,
alga species etc wide used for manufacturing biofuel.
D. 4th Generation Biofuel
Four Generation Bio-fills are gone for creating
reasonable vitality as well as a method for catching and
putting away CO2. Biomass materials, which have
retained CO2 while developing, are changed over into
fuel utilizing indistinguishable procedures from second
era biofuel. This procedure contrasts from second and
third era creation as at all phases of generation the carbon
dioxide is caught utilizing procedures, for example, oxy-
fuel combustion. The carbon dioxide would be able to
be geo sequestered by putting away it in old oil and gas
fields or saline aquifers. This carbon catch makes fourth
era biofuel generation carbon negative rather than just Fig.4 Biodiesel production from Microalgae
carbon unbiased, as it seems to be 'locks' away more
The developed alga is collected by topographical
carbon than it produces. This framework not just catches
marvel, filtration, characteristic process or film filtration
and stores carbon dioxide from the environment yet it
so specifically got dried out to dispose of the wetness
additionally diminishes CO2 discharges by supplanting
content at lower temperature and better pressure
petroleum derivatives.
respect 300oC, ten MPa [34]. This square measure
V. PRODUCTION OF BIODIESEL FROM pursued by significantly vital drying steps, that check
MICROALGAE the yield so expensive strategy for oil/triglycerides
extraction method that highlights mechanical ways like
There square measure three realistic strategies for
expeller press or with unbearable assisted extraction
developing microalgae relate degree exceedingly in an
and substance ways appreciate resolvent dissolvable
exceptionally monster scale incorporates an open
and extraction or by exploitation cell layer processing
framework, performed in partner open lakes that is at
chemicals.
risk to pollution and vanishing of water, so prompting
less efficiency, yet proper for developing alga with a So also, trans-esterification technique is utilized to
lower substance of oil, a second shut framework with change over triglycerides to FAME/biodiesel with
greatly managed temperature and less probability of glycerine as a side-effect, wherever the response rate
tainting anyway expensive than open framework and is duplicated inside the presence of impetus like
furthermore the last however the chief most famous corrosive or base respect NaOH or KOH. The
property of biodiesel relies upon relevant methods for throughout production, specially with protoctist biofuel,
oil extraction and strains of oil. The oil with high quantity so that isn't increasing the world acid gas level. In end
of immersed carboxylic apparently delivers high stable result, compared to 3 systems, biofuel from alga would
biodiesel because of, the nearness of poly unsaturated be a most property alternate supply of energy due to
carboxylic acid square measure subject to oxidization the many blessings to decision a number of not having
and antacid based for the most part trans esterification impact on food cycle, land usage and totally different
technique gives high quantitative connection of biomass living organism and drastically scale back the GHG
transformation [35,36]. An ongoing strategy alluded to emission."
as aqueous stage change, turn out biodiesel at
vasoconstrictor ~350oC and high twenty MPa that REFERENCES
doesn't require drying or lack of hydration. The 1. Steen M (2001) Greenhouse Gas Emissions from Fossil Fuel
Fired PowerGeneration Systems. European Commission Joint
efficiency and yield likely could be enhanced by the Research Centre.
expansion of carbonic corrosive gas and furthermore
2. Dusica Stojanovic, Svetlana Pejovic, Zoran Milosevic, "Green
the rate of alga duplicated by the expansion of house Gases And Means Of Prevention", Acta Medica Medianae,
component. 2013, 52(3),49-54.
3. Ahmad L. El Zein, Nour A. Chehaye,"The Effect of Greenhouse
VI. CONCLUSION on Gases on Earth's Temperature",I nternational Journal of
Environmental Monitoring and Analysis, 2015,3(2),74-79.
The global horrifying problem is worldwide warming
which affects the fundamental resources like land, water 4. Dr.Anshu Srivastava, Mr.Shakun Srivastava,"Brunt of Global
House Effect on Flora and Fauna, International Journal of
which leads to undesirable changes like metabolism of Environmental Science and Development,2010,1(4), 318-320.
living being and extremely short span of time. "The 5. Andrew A. Lacis,"Greenhouse Effect", Chapter From The Book
recent report in U.S Energy data administration Green house Gases-Emission, Measurement And Management,
calculate that a pair of 4 billion metric plenty of carbon Www.Intechopen.Com,2012, 1,275-292.
free into the atmosphere per annum for electricity 6. Gaddamidi Sreenivas, Pathakoti Mahesh, Jose Subin,Asuri
production, in addition as average carriage produces Lakshmi Kanchana, Pamaraju Venkata Narasimha Rao, and Vinay
Kumar Dadhwal, "Influence of Meteorology and Interrelationship
eleven,450 pounds of acid gas once a year and virtually with Greenhouse Gases(CO2 And CH4) at a Suburban Site of
246 million cars in U.S alone, this quantity would be India", Atmos. Chem. Phys.,2016,16,3953-3967.
unpredictable globally. But, absorption of carbon 7. Hanna Fekete, Marion Vieweg, Marcia Rocha, Nadine Braun,
through natural resources like plants and ocean unit Marie Lindberg, Johannes Gütschow, Louise Jefferey, Niklas
lesser and this may be further shrivelled by recent Höhne, BillHare, Michiel Schaeffer, Kirsten Macey, JuliaLarkin,
"Analysis of Current Green house Gas Emission Trends",
phylogenesis international amendment and Climate Action Tracker Report, 2013,1,1-120.
deforestation. It's calculable that nearly 9.9 billion u. s. 8. Michiel Schaeffer, Kirsten Macey, JuliaLarkin, "Analysis of
of America lots of acid gas free per annum in USA, Current Green house Gas Emission Trends", Climate Action
whereas ocean will absorb at the most of six.6 billion Tracker Report, 2013,1,1-120.
USA tons per annum and a tree will absorb forty eight 9. B.Byrne And C.Goldblatt," Radiative Forcings for 28 Potential
pounds of the carbonic acid gas every year, so the Archean Green house Gases", Clim.Past, 2014,10,1779-1801.
natural resources isn't compatible with the excess 10. G.V.Chilingar,O.G.Sorokhtin,L.Khilyuk, M. V. Gorfunkel,
"GreenhouseGases and Greenhouse Effect, EnvironGeol.,
quantity of greenhouse gases. Typically, biofuel turn out Springer-Verlag2008,1,1-7.
lesser quantity of acid gas admire, diesel from fuel oil
11. Robert W.Howarth,"A Bridge to Nowhere: Methane Emissions
and fossil fuel unleash 161 pounds and 117 pounds of and the Green house Gas Footprint of NaturalGas", Energy
acid gas severally compared to 228 pounds from coal Science& Engineering Published By The Society Of Chemical
fuel per British thermal unit [British Thermal Unit]. most Industry and John Wiley and Sons Ltd.,2014,1,1-14.
significantly, biodiesel and bioethanol emit and absorb 12. V.Ramanathan, Y.Feng, "Air Pollution, Green house Gases and
Climate Change: Global and Regional Perspectives", Atmospheric
virtually equal or additional quantity of acid gas Environment,2009,43,37-50.
13. K. A. Smith, T. Ball, F. Conen, K. 25. Adachi M, Hasegawa T, Fukayama H, Tokida T, Sakai H, et al.
E.Dobbie,J.Massheder,A.Rey,"ExchangeofGreenhouseGasesbetweenSoilandAtmosphere:Interactions (2014) Soiland water warming accelerates phenology and down-
of Soil Physical Factors regulation of leafphotosynthesis of rice plants grown under free-
andBiologicalProcesses",EuropeanJournalofSoilScience,December2003, air CO2 enrichment (FACE).Plant Cell Physiol 55: 370-80.
54, 779-791.
26. Khan I, Azam A, Mahmood A (2013) The impact of enhanced
14. R K A g g a r w a l , S a n g e e t atmosphericcarbon dioxide on yield, proximate composition,
Markanda,"EffectofGreenHouseGasesandHuman Population in elemental concentration, fattyacid and vitamin C contents of
G l o b a l tomato (Lycopersicon esculentum). EnvironMonit Assess 185:
Warming",JournalofEnvironmentalEngineeringandTechnology,2013,2(1),13- 205-14.
16.
27. Wiman, Bo LB (2011) Effects of global warming on environmental
15. .IPCC (2007). Climate Change 2007: Synthesis report. pollution: Anarea with many knowledge gaps. Climate change,
Contribution of Working Groups I, II and III to the Fourth Human system and policy.
Assessment report of the Intergovernmental Panel on Climate
28. Snow M, Snow R (2015) The impact of climate change on Human
Change [Core Writing Team, Pachauri, r.K and reisinger, A. (eds.)].
Health. Journal of Climatology and Weather Forecasting 3:1.
IPCC, Geneva, Switzerland.
29. Naik SN, Vaibhav V Goud, Prasant K Rout, Ajay K Dalai (2010)
16. U.S. Global Change research Program (2009). Climate Literacy:
Production offirst and second generation biofuels: A
The Essential Principles of Climate Sciences.http://
comprehensive review. Renewable andSustainable Energy Review
www.globalchange.gov/resources/educators/climate-literacy
14: 578-297.
17. Hattenbach, R. Wilson, P., Brown, K.,"Capture of Carbon Dioxide
30. Singh SP, Singh D (2010) Biodiesel production through the use
from Coal Combustion and its Utilization for Enhanced Oil
of differentsources and characterization of oils and their esters as
Recovery", Amsterdam International Journal of Green house Gas
the substitute: A review.Renewable and Sustainable Energy Review
Control,1999,4,217-222.
14: 200-216.
18. Sunil Jayant Kulkarni,Ajaygiri Kamalgiri Goswamiand Nilesh
31. Moheimani NR, Mchenry MP, Mehrani P (2013) Microalgae
Shinde, "Treatment and Recovery for Flue Gases: a Review",
Biodiesel andMacroalgae Bioethanol: The solar conversion
International Journal of Research, 2015,2(6),pp.515-519.
Challenge for IndustrialRenewable fuels. Book Natural and
19. Hansen, J; Sato, M; Ruedy, R (2012). "Perception of climate Artificial Photosynthesis: The SolarConversion Challenge for
change". Proceedings of the National Academy of Sciences. 109 Industrial Renewable Fuels.
(37): E2415-23. doi:10.1073/pnas.1205276109. PMC 3443154.
32. Anders S Carlsson, Jan B van Beilen, Ralf Moller, David Clayton
PMID 22869707.
(2007) Microand Macro Algae: Utility for Industrial applications.
20. Schwaab K, Dettling F, Bernhardt, Elsner C, Sartorius R, et al. CPL Press UK.
(2008)Fluorinated GreenHouse Gases in Products and Processes:
33. Dragone G, Fernandes B, Antonio AV, Jose AT (2010) Third
An evaluation ofTechnical Measures to Reduce Greenhouse Gas
generation Biofuelfrom microalgae. Current Research, Technology
Emission. German Federal.
and Education Topics inApplied Microbiology and microbial
21. Xie H, Liu K, Sun D, Wang Z, Lu X, et al. (2015) A field experiment biotechnology.
with elevatedatmospheric CO2-mediated changes to C4 crop-
34. Behera S, Singh R, Arora R, Sharma NK, Shukla M, et al. (2014)
herbivore interactions. SciRep. 18: 13923.
Scope ofalgae as third generation biofuels. Front Bioeng
22. Mikkelsen BL, Olsen CE, Lyngkjær MF (2015) Accumulation Biotechnol 2: 90.
of secondarymetabolites in healthy and diseased barley, grown
35. Douglas C Elliott, Todd R Hart, Andrew J Schmidt, Gary G
under future climate levelsof CO2, ozone and temperature.
Neuenschwander,Leslie J Rotness, et al. (2013) Process
Phytochemistry 118: 162-173.
development for hydrothermalliquefaction of algae feedstocks in
23. Gruwez R, De Frenne P, De Schrijver A, Leroux O, Vangansbeke a continuous- flow reactor. Elsevier AlgalResearch 2: 445-454.
P, et al.(2014) Negative effects of temperature and atmospheric
36. Najafi G, Ghobadian B, Talal FY (2011) Algae a sustainable energy
depositions on theseed viability of common juniper (Juniperus
source forbiofuel production in Iran: A case study. Renewable
communis). Ann Bot 113: 489-500.
and Sustainable EnergyReview 15: 3870-3876.
24. Song L, Chow WS, Sun L, Li C, Peng C (2010) Acclimation of
photosystem IIto high temperature in two Wedelia species from
different geographical origins:implications for biological invasions
upon global warming. J Exp Bot 61:4087-96.
Good communication skills are a prime indicator of on industry knowledge to fix an issue immediately, as it
whether or not a candidate will make a good fit within occurs, or taking time to research and consult with
an organization. A huge part of communication involves colleagues to find a scalable, long-term solution.
listening. Today's business landscape is about Problem-solving skills include
communication, relationships and presenting ones • Creativity
organization in a positive way to the public and potential
employees. Soft skills in the workplace allow • Research
organizations to effectively and efficiently use their • Risk management
technical skills and knowledge without being hampered • Teamwork
by interpersonal issues, infighting and poor public and
market perceptions. Written and verbal communication D. Creativity
skills are important for the majority of jobs because Creativity is a broad ability incorporating many
they help you interact effectively with all of the people different skill sets including other soft and technical skills.
you encounter at work, such as, customers, networkers, Employees with creativity can find new ways to perform
traders, colleagues etc. and build strong relationships. tasks, improve processes or even develop new and
One needs to be able to communicate well in all exciting avenues for the business to explore. Creativity
platforms: face-to-face, video calls, over the phone, can be used in any role at any level. Creativity skills
via email etc. include
B. Characteristics of an effective communicator • Curiosity
• Active listening • Learning from others
• Adaptability - adapting your communication styles to • Open-mindedness
support the situation • Taking calculated risks
• Clarity
E. Adaptability
• Accuracy
While working in a technology-driven field or start-
• Confidence and assertiveness up, adaptability is especially important. Changes in
• Constructive feedback - giving and receiving it processes, tools or clients you work with can happen
• Emotional intelligence - identifying and managing your quickly. Employees who are capable of adapting to new
emotions, as well as other people's emotions situations and ways of working are valuable in many
jobs and industries. Adaptability skills include
• Empathy
• Consistency
• Interpersonal skills - social skills which are especially
useful in building strong rapports • Organization
• Interpretation of body language - this will help you • Optimism
understand how someone is feeling • Flexibility
• Open-mindedness
F. Work ethic
• Patience
Work ethic is the ability to follow through on tasks
• Simplifying the complex and duties in a timely, quality manner. A strong work
C. PROBLEM-SOLVING ethic will help ensure you develop a positive relationship
with your employer and colleagues even when one is
Employers highly value people who can resolve developing technical skills in a new job. Many
issues quickly and effectively. That may involve calling employers would rather work with someone who has
a strong work ethic and is eager to learn than a skilled managers and others involved in the hiring process to
worker who seems unmotivated. Work ethic skills assess them in potential hires, making them an important
include but elusive set of skills to look for. Soft skills in the
• Attention to detail workplace are becoming increasingly important as
organizations look to add additional value to their
• Integrity business.
• Persistence
IV. CREATIVE AND CRITICAL THINKING
• Time management
Employing a workforce of creative and critical
II. THE EFFECTIVE TIPS FOR thinkers is essential for introducing fresh ideas, services
IMPROVING SOFT SKILLS and products. In fact, creative and critical thinking skills
Many employers value strong soft skills over were ranked second and third on the World Economic
technical skills because they are often personality traits Forum's top skills employees will need to thrive in the
developed over a lifetime and can be difficult to teach. fourth industrial revolution. As artificial intelligence and
For example, an employer is seeking someone skilled automation in business evolve, creative and critical
in conflict resolution. It is naturally skilled at effective thinking skills will be increasingly needed to complement
communication to practice working through conflicts the capabilities of machines. However, creative and
with others. critical thinking skills are in short supply.
• Pick a soft skill you want to improve and practice it V. TEAMWORK
consistently.
Teamwork is weak points for many organizations,
• Observe and mimic the positive soft skills you see in and it's causing performance and productivity challenges.
others. Successful collaboration is strongly related to team
• Set milestone goals to improve soft skills. work along with effective communication skills.
• Find resources to help you learn. Communication skills include actively listening to
colleagues and willing engagement in conflict resolution
III. SOFT SKILLS FOR JOB APPLICATION to mitigate the effects of miscommunications as well as
A resume should include a section that lists your keeping projects and organizational initiatives on track.
relevant hard and soft skills. When deciding which skills VI. COMPASSION IN LEADERSHIP
to put on a resume, consider what skills are called for
in the job post and those you possess that can be Compassion is an important aspect of good
verified by your references. Cover letter should include leadership. Teams thrive when the members trust that
at least one well-developed and relevant soft skill that their leader cares about them. Research shows that
provides context as to why you're a good fit for the organizations with more compassionate leaders excel
job. One can do this by explaining how your soft skill at collaboration - already identified as a key soft skill in
aligns with the company's goals, values or mission. the modern workplace. Compassion is a pre-requisite
for effective communication and other soft skills in the
Soft skills are a combination of people skills, social workplace that enhance interpersonal relationships in
skills, communication skills, character or personality the workplace, which are essential to maintaining
traits, attitudes, career attributes, social intelligence, and workplace cohesion.
emotional intelligence quotients that enable employees
to navigate their environment, work well with others, VII. CONCLUSION
perform well and achieve their goals with Hence, Soft skills take an important role in academic
complementing hard skills. They are unquantifiable and professional enrichment. Recruiting for the right
professional attributes, it can be difficult for hiring blend of soft skills takes a measured and strategic
approach. It also requires an investment of time, patients 3. Thorpe Edger & Thorpe Showik, "Winning at Interviews",
Pearson Publications, 1st Edition.
and gut instinct. Make sure to think carefully about how
one can learn more about your candidates as humans 4. Pritchard J, "The importance of soft skills in entry-level
employment and postsecondary success: Perspectives from
interacting with other people. Soft skills are personal employers and community colleges" Seattle, WA: Seattle Jobs
attributes, typically linked to how you work and interact Initiative, 2013.
with others, which are necessary for success and your 5. Robles, M.M, "Executive perceptions of the top 10 soft skills
career development. Soft skills make it easier to form needed in today's workplace" Business Communication Quarterly,
75(4), pp. 453-465, 2012.
relationships with other people which make you visible
for the right reasons, consequently unlocking more WEB RESOURCES
career-related opportunities for everyone. www.en.wikipedia.com
REFERENCES www.softskills.com
ABSTRACT: Literature is a kind of art in which command of the language also lays the groundwork for
language and words are utilised to express meaning children to establish good interpersonal relationships
by depicting objective reality. Literature is as they move through school. At the moment, there is
distinguished from other creative genres such as
considerable social rivalry. When students join society
music, sculpture, painting, and other visual arts by
for the first time, they must have strong language abilities
the fact that it serves as the bearer of the work of
art's image. Literature has the ability to transcend in order to cope successfully with a variety of
the limitations of particular material materials, to interactions and to advance in social competitiveness
be unfettered by time and space restrictions, to as they climb the ranks. On the other hand, pupils'
represent a broad range of vibrant social life, and linguistic abilities have deteriorated. When individuals
to directly portray the individual's complex and interact, it is much more difficult for them to
sensitive inner reality. The study of literature is communicate effectively in the right language.'
essential to the development of language abilities, Numerous factors have a role in the development of
and this point cannot be emphasised enough. Along this issue. English language and literature teaching are
with providing many and vibrant materials, important components of the educational process when
literature may pique learners' interest in language
it comes to enhancing students' language abilities and
acquisition by creating the illusion of immersion
increasing students' English aptitude. Student-centered
and unintentionally completing the accumulation of
vocabulary, penetration of grammar, and English language and literature education can effectively
development of language sense. As the capacity to provide students with literature and language
comprehend increases, so does the ability to information, expand students' thinking space, and
construct a language. While reading and writing broaden students' visions, while also providing students
abilities improve, language capacity progresses with opportunities to engage in language practise
from basic comprehension and expression to in- activities that can significantly improve students' language
depth information and literary expression as abilities. As a result, the importance of prioritising English
literary literacy develops. The study of language language and literary instruction in school education, as
and literature has a significant impact on students' well as the development of pupils' language abilities, is
ability to communicate successfully in their own
emphasised.
language.
"Literature just adds to reality, it does not simply
Keywords: Literature; English; Language
Skills; Role describe it. It enriches the necessary competencies that
daily life requires and provides; and in this respect, it
I. INTRODUCTION irrigates the deserts that our lives have already become"
Language skills are critical for today's talents to C. S. Lewis (British Scholar and Novelist, 1898-1963).
develop in order to succeed in their professions.
II. THE ROLE OF LITERATURE IN
Language is the primary means of communication and
LANGUAGE LEARNING
interaction in contemporary life. Improving children'
expressive language abilities is important for overall The use of literature in language acquisition has been
communication capacity and efficacy. A strong criticised by a large number of people. Researchers,
on the other hand, have reacted rationally and "spoken" appearing in the participle form of the verb
emphasised the significance of literature in language "become." Simultaneously, the term "rule" made it very
acquisition. According to them, literature exposes kids clear that the British were in a "colonial" condition of
to relevant settings that are rich in descriptive language things. The sentence is divided into two parts, the first
and fascinating people. It offers a wide variety of of which begins with the word "because," and the second
vocabulary, dialogues, and prose that may be used to of which is a distinct phrase. Each verb's word form in
educate students to converse in the language utilising this phrase indicates that it occurred in the past.
new terms learned from the literary text. Literature Numerous verbs may be adequate to describe the
assists students in developing their interpretive skills. occurrence of the event; the two clauses are
Povey (1972) observed that "literature will improve all interchangeable when followed by the conjunction
language abilities since literature will expand linguistic "because," which retains the beauty of English sentences
knowledge by providing proof of vast and nuanced while also communicating the greatest amount of
vocabulary use, as well as complicated and precise meaning with the fewest feasible words.
syntax" (cited in McKay 1982: 529). Literature helps A firm understanding of fundamental information is
students get acquainted with global problems and required for both practical application and the
therefore encourages them to read. Another successful improvement of language use's aesthetics. Students may
method that enhances students' reactions and benefit from the experience when sentences are created
interactions with literature and offers greater language in line with English phrases. For another example, in
access for learners is the language-based approach the book The Catcher in the Rye, the only thing capable
(Littlewood, 1986). Literature study may help students of wearing everything away was time, with the exception
become more aware, introspective, and creative, which of tears. While emotions will be processed over time,
can help them learn a language faster. disputes will also be resolved over time. Author's brief
III. THE LANGUAGE ABILITY OF introduction: Chen Ruojing is a graduate student and
STUDENTS' COMPOSITION professor. The subject of the study is applied linguistics
and instructional methods.
To communicate successfully, you must first have a
firm grasp of the language. It is divided into two IV. AN ANALYSIS ON THE STRUCTURE
components: morphology and syntax, which together OF STUDENTS' LANGUAGE SKILLS
provide the linguistic foundation. The capacity of Students' language competence increases after the
students to communicate semantically and logically is completion of the course as a consequence of the
founded on morphology, while their ability to speak learning of specific language-related information. All
meaningfully is based on syntax. Simply said, individuals need adequate language abilities in order to
morphology is the use of language, while syntax is the communicate their innermost emotions and provide
logical process of sentence construction. important communication information. Simply put,
For instance, when the rulers of England first spoke without matching language abilities, the language's
Danish and then French, the English language became associated communication functions are lost, and the
less Germanic. When you closely examine this sentence, associated information that students acquire is
you will see that it has a very smart morphological and undermined. To evaluate someone's language aptitude,
syntactic organisation. Morphology dictates that the they must exhibit the following qualities: a fundamental
word "becoming" be followed by a verb prototype, understanding of language; language communication
which is why the word "like" occurs later in the phrase abilities; rhetorical talents; life taboos about language
as a verb prototype. usage; and other characteristics.
Basic knowledge of the English language
Additionally, this phrase is written in the past tense,
with terms like "become," "governed," "saying," and The fundamental comprehension of a language serves
as the foundation for language usage. To develop
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 997
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
specific language skills, children must first learn the thoughts and being understood by the other side of a
necessary foundational language knowledge. Because conversation, as specified by the Common Core
communication that does not adhere to linguistic norms Standards.
is unintelligible to both parties, and communication that
V.ADVANTAGES OF LANGUAGE
is incomprehensible to both parties is a senseless subject
LEARNING THROUGH LITERATURE
to begin with. The fundamental understanding of
language is divided into two sections: English There are three major benefits of learning a language
morphology and English syntax, which are treated via literature. They're:
separately here. • To aid in the development of intellect and sensitivity,
Capacity for Language Communication in a Wide as well as to inspire students' creative and literary
Variety of Situations Students have a particular capacity imaginations
for communicating since they have a fundamental • to raise pupils' overall cultural awareness
understanding of the language. However, students must • To improve language learning's psycholinguistic
be able to communicate successfully in daily life not component.
only via their basic knowledge of these languages, but
VI. THE IMPORTANCE OF ENGLISH
also through the acquisition of particular communication
LANGUAGE AND LITERATURE IN THE
skills related to the process of linguistic communication
DEVELOPMENT OF STUDENTS'
in everyday life. Language communication is a
ENGLISH
multifaceted process. Diverse individuals will
communicate the same idea in a variety of ways, and Students' interest in English language study may be
even the same person may express the same meaning piqued by the introduction of literature to the classroom.
in a variety of ways based on their personality. A person When it comes to literary works, the rich and varied
will either employ euphemisms or freely convey their vocabulary, expression, and beautiful chapters provide
feelings in their words. Each of these components must learners with the exquisite and charm that is more
be related to a specific linguistic context. To put it attractive than illustrative or expositive language
another way, the context of language has an effect on materials, and this may help to increase the innate desire
communication, and the capacity of language to study a language. Literary works that portray the
communicators to control that impact is a particular vastness of the world and the complexity of human
manifestation of their language abilities. beings may simultaneously inspire learners to interact
and ponder, leading their learning states to change from
The Use of Language in Rhetoric Students' language
passive to active. The study and collection of literary
communication may be categorised according to their
works, as well as the development of literary literacy,
communication characteristics; for example, students
will result in an improvement in one's own linguistic
can be split into two categories based on how they
ability.
communicate in English; those who speak verbally and
those who communicate in writing. On the other hand, Language resources that are both rich and vivid may
students are expected to demonstrate a certain degree be found in literary works. The language resources
of rhetorical competence in both oral and written included inside literary works are almost limitless. On
communication. In Chinese, rhetoric is defined as the the one hand, it makes use of words to create
use of a range of techniques to alter the meaning of the imaginative pictures, is not constrained by time or space
communicator's particular words and phrases. When constraints, and can always reflect the limitless social
students express themselves emotionally in English, they life and face of the world; on the other hand, it is capable
must also employ a variety of techniques in the specific of accurately portraying the characters' complex and
process of communication to ensure that their own sensitive hearts. The literary work library is also a
language is capable of both conveying their own language library, with excellent language materials that
may be accessed by anybody who wants them.
998 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Because of this, contacting, understanding, and result, instructors must be capable of leading children
absorbing a vast number of English language resources through a significant quantity of reading, moving from
is beneficial in consolidating and deepening fundamental quantitative to qualitative change, in order to improve
language knowledge as well as learning the vivid students' language skills. Second, it is critical to create
language and genuine expression technique on the basis English literature learning goals in order to lead students'
of original Chinese literary literacy. The rich and deliberate study of the language with the goal of
emotional writing helps the student understand the improving their language abilities.
vocabulary by placing it in a context that is meaningful
to him or her. REFERENCES
1. Liang L. Depicting Chinese parenting during the early years: a
When it comes to creating context and bridging time systematic review of the English language literature. 2014.
and place barriers, Literature Learning is very beneficial. 2. Matsumoto S. Literature and Language Education: An Analysis
In part due to the fact that English is not our native of Questionnaire Responses of First-Year English Majors at
language, the most important obstacle to learning is the Bukkyo University (4). Journal of the Faculty of Letters, 2015,
99:57-72.
absence of an appropriate linguistic context. Aside from
engaging with native English speakers, studying foreign 3. Upadhyay H. English Language Literature for the Students of
English Literature. 2016.
literature is the quickest and most effective way of
4. Kamtchueng L M. Non-standard Idioms in Cameroon English
learning the language. Literature is a combination of Literature and Their Impact on English Language Learning and
language and culture that is unique to each individual. Intelligibility. Theory Practice in Language Studies, 2014, 4(8).
In terms of temperament, social connections, cultural 5. Gilakjani, Abbas Pourhosein Sabouri, Narjes Banou. Learners'
characteristics, customs, and psychological states, Listening Comprehension Difficulties in English Language
literature is the most vivid and straightforward source Learning: A Literature Review. English Language Teaching, 2016,
9(6):123.
of information available about a nation. When a student
6. Owolabi D. The Domestication of the English Language for
reads a literary work, he or she seems to enter the Literary Purpose in Nigeria: Creating a National Identity.
author's world, which is based on real life, and to get 2017:488-492.
firsthand knowledge of the use of many different 7. Zhang X. A critical review of literature on English language
languages in a variety of situations. Learning entails teaching textbook evaluation: What systemic functional linguistics
much more than just memorising words and grammatical can offer. Journal of Language Cultural Education, 2017, 5.
rules. By immersing themselves in the target language, 8. Mohammed A, O'Neill G, Karcher A M, et al. Actinobacillus
hominisosteomyelitis: First reported case in the English language
learners may enhance their English communication
medical literature: Jmm Case Reports, 2016, 3(3).
abilities.
9. Scheidler J M. Mexican American English language learners in
VII. CONCLUSION Arizona: a literature review[J]. International Journal of Teaching
Case Studies, 2014, 5(3/4):314.
Students' language skills will improve as a result of 10. Zaid M A. Effectiveness of Using Literature for Teaching English
the provided English language and literature education. Language Writing Skills[J]. 2015.
To begin, children should be encouraged to engage in a 11. Zhuang P, Cheng L. About English-language Scholarship on
variety of reading activities to help them develop their Humor in Ancient Chinese Literature[J]. CLCWeb - Comparative
Literature and Culture, 2015, 17(1).
linguistic abilities. Language instruction requires
extensive reading, which implies that pupils must study 12. Abdelaziz B. Techniques for Selecting and Evaluating English
Language Literary Texts[J]. 2014(19):7-14.
and accumulate a significant quantity of reading material.
13. Banegas D. The Role of Literature in ELT - Part One, 2010.
Each instructor emphasises the value of linguistic sense
while teaching English language and literature. As a
Abstract- 'Teachers can change lives with just English teachers in present day ELT would also be taken
the right mix of chalk and challenges' was said by up. They ways in which students can put their learning
Joyce Meyer. Learning the language is a phobia into practice in day-to-day use to fulfill their practical
and a complex challenge for the majority. The
demands through effective communication skills apart
importance of teaching the language in order to
from gaining command over English language would
fulfill the ever growing demands of career
enhancing. New trends, technologies have be also be highlighted. We need to bridge the gap
supplemented English learning in authencity and between 'haves' and 'have-not'.
literacy such as reading, writing, speaking, listening
II. OBJECTIVES
skills of students. It is quite clear that English has
become a necessity today. It features the spread • To narrate the challenges and latest trends in teaching
of English in the world. A new trend is the general English language.
tendency or direction towards change. Recent • To trace the different methodologies and strategies
trends, challenges, methodologies and in teaching.
developments portray the vital role of education
sector in general with its internalization of the • To give a brief note on the developments in teaching
education process. This paper presents the famous English language.
challenges and trends in the ELT with specific • To identify the different needs of teaching.
refernce to the teaching.
• To use language for communication effectively.
Keywords-QualityEducation, Acquisition of
language structure,New trends in English, III. COMMON CHALLENGES IN
Methods, Trends, Learning process, Cooperative TEACHING
learning.
The history of language teaching presents a
I. INTRODUCTION fascinating variety of challenges. Different challenges
may be appropriate to different contents. If we start
As an introduction to the teaching of English language
searching for the perfect challenge or the ideal single
we have to learn about the nature of the four language
solution to the problems of language learning, we are
skills and methods.English is used not only for
bound to fail. Teacher need to use their discretion in
communicative purpose but also serves as a link
deciding on what method to use and when. (Richards
language for inter-state and intrastate coordination as
and Rodgers) So, a teacher should adopt eclectic and
the nation is found with the great ethnic and linguistic
pragmatic approach because no single approach is useful
diversity. Though modern technology has started playing
in all situations. When the teacher becomes slave to the
aconsiderable role in imparting and acquiring the
method, the whole teaching work becomes a
language. In the present times, so many books have
topsyturvy. A good teacher should keep all the challenges
been published in English about English language in
in his/her armory and use any challenges depending
general and English Language Teaching in
upon the learner's level, needs and classroom situation.
particular.Moreover, the importance of teaching English
Judicious use of any method can prove beneficial for
in order to fulfill the ever growing demands of English
the learners. Knowing the latest challenges of language
language is also stressed. Current challenges before
1000 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
teaching is like taking a loan from a bank without iv. All systematic and deliberate attempts to teach the
knowing how, when and where to invest the loan to structure of the language result only in interfering with
maximum advantage. It is worthwhile for the teacher to the other modes of unconscious language acquisition.
keep in mind various approaches rather than a specific v. Form is the best learnt when the learners attention is
method. It is possible to be flexible and adaptable in on meaning.
the English classroom if the teacher lets the class know V. CHANGE IN GOAL OF TEACHING IN
from the very first what his or her demands are pertaining ENGLISH
class work, class discipline and homework and clearly
states all goals and objectives. If we respect our students In my opinion, there are two key changes in the
and plan our curriculum to suit the needs of the class, purpose of teaching English. Firstly, noted the goal is
there won't be much difficulty. Most teachers do not "to produce fully competent English-knowing bilinguals
strictly stick to one teaching method or strategy but rather than imitation native speakers." As I mentioned,
rather combine different aspects of several strategies the purpose is not to aspire to become native speakers
to create effective classroom interaction. Every method of English, because we are already native speakers of
needs to be tailored to the local situations and the context our own L1, but to focus on English as a means of
of teaching. There is no single fool proof method, as it communication. Secondly, English is not viewed as an
were. It is left to the sound practical common sense of end in itself but as a means to learn content such as
the teacher to discover in what circumstances for what science and mathematics. Content and language
purpose which method is most effective. The order of integrate learning (CLIL) is an approach where the
progression, according to the new challenges, is: English teacher uses cross-curricular content and so
the students learn both the content and English.
Ability to read English Fluently.
VI. LATEST TRENDS IN TEACHING
Ability to write Efficiently.
English language teaching has undergone tremendous
Ability to speak and understand Effectively. changes over the years, especially the last ten years.
IV. STRATEGIC TEACHING AND Students are burdened with studying, learning and
LEARNING grasping the materials, and of course, lectures with the
collection of relevant information from prescribed texts.
Teaching in English language classes focuses on Many career alternatives once regarded insignificant are
fostering student thinking as well as language content, gaining importance at present such as communication
outcomes, and learning activities. There are significant skills, soft skills, technical skills, interpersonal skills, ICT
and complex student-teacher interactions inside and literacy etc. The need for chiseled graduates to merge
outside the classroom. The gamification of learning is successfully in the tough competition of survival in the
emerging as a way to make language learning more global market is in great demand nowadays. For this, a
engaging and relevant to the younger generation.Based change in the trend especially the teaching learning
on the following there are 5 strategies in teaching and process of English language has to undergo a transition
learning: for the betterment. Seasons change, fashionchanges,
i. Successful acquisition of language structure involved attitudes of human beings change but it is disheartening
in the acquisition of much more than is deliberately to note that in the last century English curriculum has
taught or consciously learnt. hardly undergone any change. There are so many trends
ii. A large part of language structure is acquired and in teaching. I am going explain a few of those trends in
operated unconsciously. this paper presentation
iii. The structure of the language is learnt best when 6.1.Web-based learning
teaching is not explicitly and consciously directed
In recent years the terminology has been changed
towards it.
for webbased learning; it was called as technology
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1001
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
based or distance learning, online education, in the end interaction with teachers in these virtual environment,
it is now called e-learning and web based learning. A they can communicate with not only teachers but also
variety of basic language skills can be developed with peers and share information.
the help of web-based language learning activities. It is
known that; there are four basic skills in English which 6.4. Mobile Devices
are listening, speaking, writing, and reading. These skills Today's world has been changed over the years and
can be put on the web and made interactive in a variety besides technology has been changed in other words it
of ways. One of these ways is internet communication has been developed. Mobile learning is one of those
tools such as m-learning, email, blogs, chat. These tools technologies which have been used for a few years.
provide integrated environment for teachers and Firstly; mobile learning means that people are learning
students. Students generally feel positive about web- whenever and wherever they want with their mobile
based learning tools, when they are: phones, PDA's and other technological devices if they
• well-designed, easy to learn, easy to use have. Mobile learning is also defined as any service or
facility that supplies learner with general electronic
• when the tool is good as support, not as replacement
information and educational content that aids in
of lectures
acquisition of knowledge regardless of location and
• when the use of diverse tool features, i.e. chat, bulletin time.
board, is relevant and tied into the specific course
structure and content. 6.5. skype
Technology is developing and changing very fast, Now a days every messenger services have audio
and if it is not used effectively and correctly some functions and technological equipments such as laptop
problems can be occurred. computers, also have cameras on them. So students
can talk with their instructors and peers far away. Skype
6.2.E-mail is a new emerging technology and the potential
E-mail is a communication tool which is being used application of it to language learning and teaching needs
in language learning. E-mail was in use before the to be further explored (Wu, 2005). And students can
internet even existed and is probably the most commonly speak with native speakers of language and compare
used Internet application. By getting a single e-mail their pronunciation with a native speaker. Speaking skills
account both foreign teachers and students can join e- can be developed by using this application. Also students
mail assisted language activities. For learners of English and teachers do not have to pay for this; they just pay
e-mail is an excellent way to communicate with their for internet access.
instructors because of its usefulness and easiness.
VII. CONCLUSION
6.3.Instant Messenger In conclusion, languages become the primary
ICQ was the first general messenger service in the mediator for delivering or sharing information. One of
early 1996 (www.worldstart.com/tips/tips.php/1498). the most widely used languages in the world is English.
During the years a variety of messenger services such English is well known as an international standard
as MSN Messenger, Yahoo Messenger, etc. began to language and it is very important for those who life in
serve to people. If students are required to type in this globalization era. There are over 750 million people
English only they can have the chance of improve their who speak English as a foreign language and in the year
writing and reading skills through typing and reading 2000 the British Council said that there were about a
the messages they get from their peers or instructors. billion people learning English. English is increasingly
Moreover, students of English have 442 used in many places and seems it has been dominate
GulcinNagehanSarica et al. / Procedia Social and the world communications. "A man who does not know
Behavioral Sciences 1 (2009) 439-445 better foreign language is ignorant of his own". As the most
Chiefly speaking, Soft Skills are classified into two. acts towards it and responds to events, situations,
They are: people, circumstances, environment and lastly to himself
1. Personal Traits or herself. It is a kind of habit that showcases our reality.
It is a critical personal attribute. It doesn't happen to
2. Interpersonal Skills. you but it creates thoughts and we act according to the
Personal Traits: These are the characters that reflect thoughts. For example: A teacher hates students who
an individual's characteristic patterns of thoughts, tries to clarify some doubts at the time of teaching but
feelings and behavior. The key Soft Skills under this the teacherdislikes the act. It is the attitude of the teacher
traits include: Time Management, Positive Attitude, because she gets distracted and it irritates her. This is a
Responsibility, Ethics, Integrity, Values, Self- different attitude that hurts the feelings of the students.
Confidence, Courage, Consistency and Predictability. On the other hand, there are teachers who invite and
Let us discuss in detail the two most important traits encourage students to clarify doubts. In another
that are indispensably essential for working incident, teachers do hate late comers to class especially
professionals. They are Positive Attitude and Self- after lunch break. This cannot be considered harshness
Confidence & Courage. These skills are explained on of the teacher. Here it varies as students coming late to
two angles. Firstly, with respect to working class is not a good behavior. Hence the teacher should
professionals and their dealings with their boss, react and make the students understand. If necessary,
colleagues and others at work place and secondly with he/she can be harsh. The former is negative attitude
regard to teacher-student relationship in schools and and the latter is positive attitude of the teacher.
colleges. Types of Attitudes:
Do Professionals need Soft Skills: Indeed, soft Attitude can be classified into the following
skills influence our work status. It showcases how well categories:
we can work and interact with others and become • Positive or Negative
successful in our career. I do strongly recommend Soft • Optimism or Pessimism
Skills to teachers, lecturers and professors working in • Flexible or Stubborn
their respective institutions. Teachers need Soft Skills • Deep or Shallow
to train, learn and nurture students, to them give • Motivated or Demotivated
instructions, to deal with unwanted problems, to impart
• Humble or Arrogant
cultural intelligence, to handle emotional needs and to
build teamwork and solve problems. • Active or Passive
• Measured or Reactive
ATTITUDE AT WORK PLACE
Hugh Prather said, "I always seem to be feeling
superior or inferior, one upon or one down, better off
or worse off than everyone else. The superior moments
are elating, but the rare and blessed moments are when
I feel equal."
We quite often feel at work places 'I will be if I get
promotion or when I get hike in my salary.' Fortunately,
POSITIVE ATTITUDE if it happens, we feel calm, contended and quite satisfied.
When something happens against our wish, we suddenly
It is said "Your attitude, not your aptitude, will
plunge into fear, anger or despair. Yet, at other times
determine your altitude." Accordingly, a person's
we convince ourselves that we will be happy when we
attitude is the way he or she looks at life and feels or
reach some other goal. But when the goal is reached, ATTITUDE WITH STUDENTS
there are always others to fill the vacancy left behind It is said "Positivity makes us easier achieve goals."
by the fulfilled wish, making happiness ever a distant In accordance to the quote, when we are in positive
dream. Why a small remark by a colleague at workplace frame of mind, we will be able to make better decisions
hurls us into a depression? Is it possible to live in this and plan ahead rather than reacting to the setbacks we
world and find a way to sustain happiness all through encounter. Hence, we have to teach students with
life? Yes, it can be achieved through the unique way of positive attitude. As a matter of fact, it is very difficult
acceptance of the reality that things can and will go to handle and build relationships with studentsof different
wrong and the world is not designed to go our way. attitudes. Some are very studious, hardworking, and
Hence, it is one's own attitude and work habits that quick-learners. Others are idle, lazy, disinterested,
defines happiness that enables one to face the realities irregular and dunce. While some others are intelligent,
with humor, flexibility and serenity. topper of the class but arrogant and naughty. Some
Here is an illustrative example of a person's other students are intelligent, obedient, disciplined, well-
weakness and strength showcasing his attitude. mannered, honest and sincere. A few are slow learners
Weakness: Conflicting priorities kill me! but very obedient, respectful, disciplined and good at
Strength: Handling priorities is integral to any job. I conduct. We have to manage all these types of students,
have to do tasks for success. make them attend our classes by hook or crook and
It is quite common that we are given multiple tasks put them on the right track. It is the toughest task in the
in firms with a stipulated time to complete. Most of us life of a teacher.
are at sixes and sevens to take the task as we are afraid, We must remember that sometimes the teacher
we will be not able to complete. This is a kind of himself or herself becomes the root cause for the
pessimistic negative attitude. We whine and keep on students' negative attitude and misbehavior. Most of us
grumbling instead of thinking about the task given to label students, if we find him or her quite different from
us. It is here we must know how to handle these others. We get disgusted and leave the students to their
conflicting priorities. Of course, it is very difficult to know fate.As teachers, we have to know that students of any
what is more important and urgent. Despite, we need stream dislike negative strokes of theirteachers. This
to resolve it. Hence, we must clarify our current causes reluctance, obstinacy, negligence, despondency
priorities and look at the responsibilities and then identify and disobedience among them.
the deadlines. Accordingly, we must manage, re-
TEACHERS LIKED TEACHERS DISLIKED
negotiate positively that it is integral to our job and Helpful and supportive. Mean and unfair.
eventually do the tasks successfully by being professional Taking the time to explain the material Unwilling to help and explain the
in depth. material and ideas beyond instruction.
and flexible.
Friendly and personal. Unfriendly and impersonal.
If we are perfect in imperfections and strong in Knowledge of the subject with good Ignorant of the subject and vague in
weaknesses, everything becomes possible. understanding and analyzing. analyzing.
we could not teach more than this is to be inculcated in working in teams. It is a collaborative effort made by a
the minds of teachers. Every student has to say, "Hey group using their individual skills to achieve a goal in
teachers, thanks for all that you do." We should teach the most effective and efficient way. It is selfless because
and educate students in such a way as it makes them the team works co-operatively with mutual
memorable. understanding despite their personal grudge or conflict
Now let us understand the concept well by clicking between the individuals. It helps solve problems easily.
the link given below: It has energized workplaces in many ways.
https://youtu.be/1UtCgZZeUel Here is an illustrative example showing two aspects
of aperson working for a team.
SELF-CONFIDENCE & COURAGE
Weakness: I do not care much about my teams'
Self-confidence is a natural instinct. It is to show success nor that of other members of my team.
faith in our strength and abilities to take new challenges Strength: My teams' success is my success.
in life with conviction. It is a sort of self-assurance.
We, as teachers should collaboratively work for the
Self-confidence makes us courageous to deal with any
success of the class of students who depend on us for
kind of task. It shows our ability and strength to face
their career.
pains in our lives. Hence courage is integral to self-
confidence. Another illustrative example to understand how one
can become successful in completing a task through
Here is an illustrative example of a person's
team work especially in problem solving.
weakness and strength showcasing his self-confidence.
Weakness: I try to do problem solving in isolation.
Weakness: I have worked in this domain and feel
pretty comfortable. I can't be asked to move into a Strength: I work together with my colleague who is
new one. facing the problem and involve him in problem
resolution.
Strength: I feel good in my current job, but must
understand the management who asked me to enter CONCLUSION
the domain. I am confident of my intrinsic skills.
I conclude my article with the following statement
It is a fact that most of us are not satisfied workingin given below:
a firm for some reason or the other. Yet we continue
• Life is but a constant expression of our inner activities,
our service till we get a better opportunity. But it takes if only we know our activities.
time. Till then we have to cope with the environment
• Soft skills make us a whole human being, a social
we work with. Some of us brood over the things which
and successful individual.
will happen in the long run. Instead of this, let us be a
part of the illustration given above and be confident • Deserved recognition should be facilitated to become
that this current job is good with a little bit of capable employees to accomplish our objectives in
today's competitive and knowledge -based economy.
understanding the management we are working,with all
our intrinsic skills. Otherwise, we cannot justify our job Let us enjoy the work by executing our roles just as
as well as the one who we are working for. In the case a child plays a game for the sake of play.
of teachers who are meant for tuning the lives of REFERENCES
students, it is more important.
1. Murthy GRK 'Soft Skills for Success.' The Icfai University Press,
INTERPERSONAL TRAITS 2008.
2. Sundar Valli GM, Kamalkar AS., et al. 'Communication and Soft
TEAM WORK: Together Everyone Achieves More Skills. 'Orient Black swan Private Ltd., 2015. ISBN 978-81-250-
As the proverbs go on "Two heads are better than 6010-9.
ABSTRACT: What does mean by his feelings in the most appropriate and effective way.
'smart'?.......BILL GATES says "you can teach It tells how one should act and react in particular
smart people anything because they are endowed situations and with selected persons. To be more
with good SOFT SKILLS"
precise, it is a study about how you behave and interact
No generation has so much enjoyed the fruits with the people around you. These skills are transferable
of technology as does ours. Every age and skills, so they can be used in different types of jobs
generation have demanded particular kinds of skills altogether. They are personal qualities and attitudes that
for their bread and butter. We are in the age of can help you to work better comparatively and make a
communication. This age is called 'THE SPACE
positive contribution towards the organisations, where
AGE' or 'THE AGE OF INFORMATION
TECHNOLOGY' or even 'CYBER AGE'.In a
we are employed. However, it doesn't mean that
fraction of a second, modern man can speak to technical skills and knowledge aren?t important. But it
people around the world and watch as live show is the fact that technical skills can be taught easily than
whatever happens around the four corners of the soft skills comparatively. Educational degrees are
world. "INFORMATION IS POWER" is important, but the development of soft skills is more
yesterdays quote. "INFORM THE social than technical. These are a crucial part of fostering
INFORMATION IN THE RIGHT WAY" is a dynamic workforce and are always in high demand.
todays's one. 'Employment' is not today's problem, Everybody gains skills from past jobs, responsibilities,
but 'Employability' is. To be 'smart' is the crux of life experiences, daily occurring events and interests.
the issue. Soft skills which are the personification We may even have hidden skills and when they are
of this 'Smartness', will make a significant impact
identified can be added to our resume and help us to
on the working performance maximizing the
employees contribution to the organization and
become a better contender.
turn the professionals as " TOTAL QUALITY IMPORTANCE OF SOFT SKILLS
PERSONS" (TQP).The article outlines the set of
demanded soft skills,base,analysis and provides Soft skills are considered as time management,
practical guidelines to improve them for both the communication skills, interaction skills, interpersonal
trainer and the trainee. skills, the ability to work, the co-operation, the feeling
KEY WORDS:1.Interactions 2.Behaviour of sympathy and belongingness with others, and so on.
3.TechnicalKnowledge 4.Training 5.Acquired. A more complex definition of soft skills is "a range of
abilities including work ethics, courtesy, teamwork, self-
INTRODUCTION discipline and self-confidence, professional presence,
soft skills have drawn the attention of people in all language proficiency, cultural sensitivity, communication
sectors in modern times as it was never before. Soft skills, ability to accept and learn from criticism, ability
skills are the positive traits expected in a good and to handle client relationships, networking, creativity,
sincere person and have to be developed as a habit. It ability to motive yourself and lead others, time
is generally believed that all the positive aspects of a management, leadership and interpersonal skills". The
man and the values he respect will fall within the ambit relative importance of each skill is associated with its
of the term soft skills. It is accepted as intelligence which profession. In the IT Services industry, communication
is reflected by the manner in which a person expresses skills (particularly listening skills), business
communication skills, problem solving skills and team ability to teach, interpersonal abilities and reliability. In
skills are considered crucial and complex to understand. the competitive selection process, most employers use
In organized retail, the main required skills are soft skills to differentiate one candidate from another.
communication skills, selling skills, advertising and Job seekers can gain a competitive advantage over other
distribution skills, customer service skills. This also holds candidates by gaining a firm understanding of their own
true for the financial services sector too. soft skills and then by clearly defining those skills to
potential employers.
SOFT SKILLS VS. HARD SKILLS
There are hard skills and there are soft skills. Hard SOME SKILLS WHICH ARE MUST FOR
skills are specific, can be taught. Hard skills are the PROFESSIONAL EXCELLENCE
minimum skills necessary to perform a job. It is seen 1. Meaningful Communication: This is the most
that most people with the same level of education and common entry on person specifications for job
experience should have roughly the same level of hard vacancies; skilled communicators get attention of their
skills. Hard skills would include knowledge, machine colleagues easily. The subordinates also listen and
understand instructions and put their point across them
operation, computer procedures, safety standards,
without getting angry or annoyed. In addition, they
financial systems, technical analysis, and sales
can change their style of communication as per
administration. Unlike soft skills, hard skills are typically demanded by their job time to time. This can be
easy to observe, quantify, and measure. Soft skills are invaluable in many situations, i.e. from handling conflict
more important than hard skills. They are must for a to trying to persuade a customer of the benefits of
person to be a good human being and to succeed in his buying your product. If one has got good
professional life. The position we hold in a Society communication skills you should be able develop
depends on our social skills that facilitates interpersonal constructive working relationships with colleagues and
behaviour. Our qualification or status will not contribute be able to learn from constructive criticism.
anything if we do not interact positively with others. A Communication skills involve active listening,
person who has a smile on his face and is helpful will presentation and excellent writing capabilities.
always gain more respect than a person who is harsh 2. Decision Making: It helps in better decision making
anddominant. It is said that hard skills may earn you an as soft skills save your energy which otherwise could
interview but it is your soft skills that will get you the have been wasted in anger and envy. Therefore, it
job. CEOs and HR Managers of many companies are helps in gathering the important facts, seeking advice,
looking at the big picture, considering alternatives,
suggesting that companies may perform better if they
being aware of repercussions will always help in
hire people with good soft skills and then train them to making a good decision.
develop their hard skills in their area of specialization.
3. Commitment towards work: Employers want
Soft skills are often intangible and are not easily taught.
people who are dependable, reliable, realistic,
Soft skills is related to a collection of personal, positive
enthusiastic and enjoy hard work. Employees that are
attributes and competencies that enhance your committed need very little supervision or motivation
relationships, job performance, and value to the market. to do their best and get the job done.
Soft skills include your ability to listen well, communicate
4. Flexibility in actions: We live in frequently changing
effectively, be positive, handle conflict, accept times in the workplace, so if one is adaptable and
responsibility, show respect, build trust, work well with flexible, only then he will be able to change with the
others, manage time effectively, accept criticism, work times. It?s a great asset if you are able to step outside
under pressure, be likable, and demonstrate good your comfort zone and try your hand at something
manners. They tend to be more of a function of you haven?t done before. Employers like people who
personality characteristics such as communication, are positive, upbeat and have a "can-do? attitude.
motivation, sociability and work ethic. Some soft skills 5. Time management: When deadlines are
include leadership, creativity, ambition, accountability, approaching, good time management is about
prioritising the most important tasks, and then deciding HOW TO BUILD YOUR SOFT SKILLS
which actions will produce the maximum output with
the minimum effort, so that task can be accomplished
Developing your soft skills takes training, just like
well in time. any technical skill. These blogs focus on developing
soft skills, and are great reading for anyone interested
6. Leadership skills: A good leader is the one who
in giving their career a boost:
inspires others and get the things done in his own
way. They look for people who lead constantly look • Getting Things Done - A blog about time
to improve, motivate themselves are having a positive management and becoming a more effective person,
outlook and they know very well as when to follow by world-famous speaker David Allen.
instructions and when to show initiative.
• Ask A Manager - One of the best! Allison Green
7. Team player: A good team player has the team goals shares workplace tips, with a focus on soft skills and
clear in their mind and works with others to achieve great discussion in the comments section.
them. They are open and honest, and offer • Brian Tracy's Blog - This brilliant author and speaker
constructive suggestions and listen to others. shares tips on building soft skills and success.
8. Accept and undertake responsibility: Employers • High Performance Blog - Become a better team
are on the lookout for people who take pride in their player, both as a team member and as its leader, with
work. They are confident enough to bring out the these valuable tips.
results. They also respect people who can hold their
hands up when things go wrong. Generally, everyone • Futility Closet - Exercise your mind and be a more
makes mistakes but it is more important than how interesting person with these fun puzzles and tidbits
you react on those mistakes and how you learn from of knowledge.
them that counts.
SIX SOFT SKILLS EVERY PROFESSIONAL
9. Work under pressure: In work, performance is NEEDS
must and it is also the fact that some people perform
better when they are in stress. This approach 1. A thirst for knowledge: Adrian Ridner, CEO and
sometimes helps us to perform beyond our co-founder of online learning platform Study.com, says
expectations that employers place a high value on candidates who
have an ability to learn. "Workplace needs are
10.Emotional Intelligence: Emotional intelligence is constantly changing, so we need employees who will
usually something that is revealed through actual be willing to learn and adapt along the way to meet
interactions with the hiring manger, but you can hint those changes. During the hiring process, it's important
that you have it with a strategic resume the addresses to assess if candidates have learning agility and the
areas where your experience and skills are lacking hunger to develop professionally."
relative to the job requirements.
2. Team mentality: "Many jobs are teamwork driven
and rely on each team member to get the project
completed," says Carrie-Anne McGrath, partner and
manager at talent acquisition firm WinterWyman. "It's
not enough to robotically say 'I'm a team player.' Focus
the discussion on your work with teams and the
important role you played. Give specific examples of
a team-focused project - share some interesting
details of the work and describe how it was completed
successfully."
3. Flexibility and commitment: McGrath also says
that being flexible and showing your commitment are
often hard to convey during an interview, but it's still
important to prove you possess these qualities.
"Describe your flexibility by talking about a project STEPS TO BECOME MORE SELF AWARE
that was changed just before a due date and how IN SOFT SKILLS
you adapted to meet the new requirements. Discuss
an assignment that required a great deal of time and 1. Ask for feedback
lasted longer than anticipated and how you stuck with 2. Keep a journal
it until its successful completion. When things move
3. Make time to meditate
quickly and deadlines and scope change frequently,
hiring managers want to know their new employee is 4. Make goals and track your progress
flexible and able to adapt easily."
CONCLUSION
4. Project management: No matter what type of role
you're seeking, hiring managers will be looking for a
Soft skills are increasingly becoming the hard skills
candidate who is organized, can stay on task and can of today's work force. It's just not enough to be highly
work under pressure. "Team members should hit trained in technical skills, without developing the softer,
deadlines and let others know where there are on interpersonal and relationship-building skills that help
project timelines," says Jason Patel, former career people to communicate and collaborate effectively.
ambassador at George Washington University and These people skills are more critical than ever as
the founder of Transizion, a college and career prep organizations struggle to find meaningful ways to remain
company. "You need to be able to update others and competitive and be productive. Teamwork, leadership,
give alerts when trouble arises." and communication are underpinned by soft skills
5. Self-awareness: "People perceive us by how we development. Since each is an essential element for
carry ourselves," says Christopher K. Lee, founder organizational and personal success, developing these
and career consultant at PurposeRedeemed.com. skills is very important and does matter. The problem
"Being aware of how your words and actions come is, the importance of these soft skills is often
across, whether intended or not, is a foundation for undervalued, and there is far less training provided for
successful leadership." them than hard skills. For some reason, organizations
6. Communication skills:Ada Chen Rekhi, founder seem to expect people know how to behave on the
and COO of Notejoy, says that when she's hiring, job. They tend to assume that everyone knows and
she looks for communication skills, because she wants understands the importance of being on time, taking
to create a team that can collaborate together initiative, being friendly, and producing high quality
effectively. "They need to be able to explain the work. In fact, whenever you are unable to capitalize on
motivation for their decisions, and persuade others in the wealth of knowledge, experience and proficiency
the team to come along with their viewpoint," she within your team, then you should be assessing the level
says. "There's a huge difference in execution when
of communication and interpersonal skills that are
the entire team is bought in and believes in doing what
you've asked them to do, rather than being tasked present in your organization. The workplace has evolved
with work where they don't understand or agree with an interpersonal dynamic that can't be ignored. The acts
the significance. The result of a highly communicative of listening, presenting ideas, resolving conflict, and
team is that information is shared more quickly and fostering an open and honest work environment all come
the entire team can act with more conviction a speed." down to knowing how to build and maintain
relationships with people. It's those relationships that
HOW TO HIGHLIGHT SOFTSKILLS? allow people to participate fully in team projects, show
You can highlight your softskills in professional appreciation for others, and enlist support for their
areas. Showcasing your soft skills can be useful when projects. Most important you should be clear and
looking and applying for jobs, in an interview or in your intentional about what you want, keep aware of what
daily work. If you are looking for work, you can highlight is going on around you and inside you, have empathy
your soft skills on your resume and in your cover letter. for one another, appreciate your and other?s
performance, know your limits and stretch beyond them
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1011
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: Language more often chooses us, then borrowing, particularly by cross-fertilizations from
we choose language. We use this or that language American English. Global media, the Internet, and ever-
according to the place, time and circumstance. For improving technology are just some of the reasons why
Sandhya prayer, the Sanskrit Gayathri; in homely
English is fast becoming 'a global language' or 'Globish.'
context, or for expressing emotion, the mother
Today it is considered to be the world's most essential
tongue; outside one's home, the regional or local
language, at cosmopolitan gathering, generally and useful language in communicating one's thoughts
English. However, there are no categorical and feelings both at the global and local level. In fact, it
imperatives governing the choice or use of has not only become a global phenomena but has a
language. All that matters is that what we speak or family of its own with all "varieties of Englishes' as some
write should bear a proper relation to the total scholars call within the family. In the words of Stephan
situation. Children train it by experimenting freely, Gramley (2003), "English is felt to be the language of
audaciously, adventurously with language. power, the language of prestige".
Usually in Indian classroom one sees a mixed
Another reason why people do not succeed in
group of learners like a) less advanced learners,
b) more advanced learners, and c) advanced
achieving fluency in English is that many teachers teach
learners. So the teacher should bear in mind the English through the regional language. Some other times,
problems of all learners and motivate them the instruction is vocabulary driven. In a typical
accordingly. In fact, the teacher is supposed to classroom, the teacher reads the lesson aloud or asks
enthuse, motive, stir, and guide the learner the learner to read parts of it in turn. He then asks the
positively. Only then the learner would proceed in learners to make a list of words and meanings - and
the right direction. So the teacher must instill a usually gives the meaning in the regional language. The
sense of optimism. While teaching the lessons he point is that, it is taught as a content subject through
has to draw the attention of the learners through rote-memorization of words and meanings, rather than
interesting facts and thought provoking questions as a skill to be used. The present paper is intended to
to stimulate a sense of inquiry and curiosity. He
provide collaborative learning method with a SMILE
has to create confidence by helping the learners to
experience success through understanding of the
that will ensure a teacher to teach as well as to a learner
concepts and their ability to apply those concepts to speak without inhibitions. SMILE stands for Syllabus,
for problem solving. The best method is to be Motivation, Interaction, Learner-Centric Enveronment.
suggested is collaborative method with syllabus,
Syllabus is an outline of a subject to study. It is
motivation, interaction, and learner centric
environment.
suggested that primary purpose of a syllabus is to
communicate with one's students, what the subject is
"Coming together is a beginning. about, why the subject is taught, and what is required
Keeping together is progress. to learn that subject. So one must be careful while
Working together is success - Henry Ford" framing the syllabus. The teachers must frame the
syllabus in such a way that it is simple and interesting
English has become an International language. The but not abstract, monotonous, and dreary.
reason for this is that it is constantly enriched by linguistic
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1013
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Generally speaking, a syllabus need not be a 'interaction' and 'collaboration' among learners is a very
complicated affair, but should aim at catering to the important component of effective learning.
needs of the learner. Many teachers' idea of a syllabus All the students should be asked to participate
is to calculate the amount of pages in the text book and actively in activities like - group discussions, seminars,
then divide that by the number of teaching days in a debates, role-play, and skits - so that they can use the
session. The resulting figure accounts for the amount of language more independently. Getting them to work in
pages that need to be covered in one lesson, and he pairs or small groups is also essential as each student
has a simple plan to make sure that the syllabus is have more time to practice which is the key to speaking
completed in a timely fashion. Perhaps this could be English. The best way to involve the learners in speaking
called a syllabus in some contexts, but it is really missing activity is by giving them interesting topics to know the
some important factors that could make applying the strengths and weakness. To do this the teacher has to
textbooks both more enjoyable and more effective.The think first about what is interesting for the learner rather
point is that the topics that are prescribed in the syllabus than to him or chose a current topic on which the student
should be properly used in the classroom in enriching can speak easily. For instance, give a topic like 'the
the language of the learner. For instance, the Higher spread of corona virus'. Naturally such topics would
Education Board in Andhra Pradesh has introduced arouse some curiosity among the learners to say
'Phonetics' for Intermediate and Undergraduate something on the topic. Unlike acquiring knowledge in
students. Though the intention is good, no learner is any field, which can be attained by listening to a lecturer
learning those sounds due to various reasons. One such or reading a book, language learning requires the learner
reason is, in the main examination the question on to 'use' the language.The teacher has to create and
'phonetics' is not compulsory and the learner is provide access to a learning environment that helps the
conveniently leaving it. To our dismay, sometimes even students how to learn and achieve their full potential. In
the teachers won't teach that subject throughout the fact, learning is an acme process in which meaning is
year as he himself is not properly trained in that area. A developed on the basis of experience. Learners actively
good teacher is one who can motivate the learner. The construct their own knowledge by connecting new ideas
following are some of the tips to motivate the learner while structuring and restructuring of ideas is an essential
• Be a role model, inspire, and properly guide the learner part of the learning process.
to realize that the language acquisition is simpler in
group learning than individual learning. Learner-centric approach also allows learners to
learn at their own pace. It also engages concepts,
• To take a confidence building approach, give the reflects on the underlying cause and effect relations,
learners lots of encouragement and have fun with
patterns. Similarities and interconnections to deepen
them.
understanding. Active engagement involves enquiry,
• Always sound positive. Instill confidence among the exploration, questioning, leading to theory building and
learners. Make them believe that they have the the creation of ideas.
potential to express themselves clearly in the target
language. Collaborative learning is a situation in which a group
of people learn an activity or skill together, unlike
• Use strategies that do not threaten them. It is very
important to learn and practice a language in a non
individual learning. People engaged in collaborative
threatening environment. learning capitalize on one another's resources and skills
that is by asking one another for information, evaluating
It is a fact that learning doesn't take place in Indian one another's ideas, monitoring one another's work etc.
classrooms. The reason is that there isn't enough More specifically, collaborative learning is used as an
'Interaction' between the teachers and the students. common term for a variety of approaches in education
Many students have few opportunities to speak the that involve joint intellectual effort by students or
target language either in and out of the class. In fact students and teachers. Collaborative learning redefines
1014 Vemu Institute of Technology, Chittoor-517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
traditional student-teacher relationship in the classroom Whenever a teacher implements this method the
which results in developing good communication skills first step is to consider each stage involved in the group
and group dynamics. Collaborative learning activities work so that the teacher is ready to give support
can include collaborative writing, group projects, joint whenever needed.
problem solving, debates, study teams, team building Some topics should be identified within the syllabus
etc. and given to the students for collaborative learning and
This is student centered method. The teacher should their goals should be clearly defined. This also means
make the student understand that their interaction in considering how the students will be organized in groups
the group is mandatory as the success can be achieved during the collaboration. The teacher should keep in
only when each participant contributes their part. The mind the size of the group. Groups can be formed using
progress of the students should be evaluated by using self-selection, random assignment or criterion based
pre-test and a post test method which helps in improving selection. The choice of group size involves smaller
the learning level of the students. The learning level of groups (of three) which contains less diversity, and may
the students should be evaluated not only in terms of lack divergent thinking styles and varied expertise that
the knowledge and content but also in terms of active help to animate collective decision making. Conversely,
participation, interpersonal communication, data in larger groups it is difficult to ensure that all members
collection, team work communication skills etc. This participate. Hence depending upon the topic given, the
would bring some positive changes in the students as size of the group may vary.
well as teachers. While implementing this method there are certain
According to Vygotsky (1978) "Students are barriers that one definitely will encounter. The reason
capable of performing at higher intellectual levels when for these barriers is that in heterogeneous community
asked to work in collaborative situations than when with different socio-economic background, different IQ
asked to work individually". Group diversity in terms levels, environment, their ideologies, identities and
of knowledge, experience, different language skills like different language abilities cause different way of
sentence construction, vocabulary usage, and different expressing both in written and spoken form. They will
oral presentation skills contribute positively to the have to modify and redefine their original identities when
learning process. they enter a group. Moreover, limited communication
In this method students quickly learn how they are skills would become detrimental factor in presentation
to solve problems as a group that they might not have skills.
struggled with their own. This method can be applied In addition to the above mentioned barriers, the
to develop good communication skills. It helps them to collaborative learning method may have certain
understand matter in a better way and stimulates thinking limitations; it may not satisfy gifted students in a group
process. as they are the only resources in the group. And every
In this type of method, teacher acts as a analyst and topic is not suitable for this method. Sometimes conflicts
a facilitator, while the learner acts as a collaborator. may occur among group members and across group
Initially the feeling of security and belonging are members resulting indiscipline. Making changes in the
established. Later as the learners' ability improves, they groups should be avoided. It is important to keep the
achieve a measure of independence from the teacher. groups together even if the things are not going well
Learners can speak independently and they are ready with the groups. Changing the groups may change the
to take criticism and being corrected. It gives multiple dynamics of all the groups. Campbell and Li (2006)
opportunities to students to show intellectual identified that, "the lack of competitive element disturbed
competence, to express communicative skills, the students and fairness and appropriateness of group
knowledge, oral presentation skills, group dynamics etc. assessment...... became a major assessment to student
satisfaction"
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor-517112, A.P., India 1015
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
In spite of some limitations the collaborative learning an environment in which students enjoy learning,
is good method to acquire knowledge, content, develop curiosity, and team 'how to learn by learning
communication skills and soil skills. Collaboration allows to share and sharing to learn'. Thus, the above said
students to actively participate in the learning process method may help the teacher in making the English
by talking with each other and listening to other points Language Teaching classroom interesting. It may also
of view. Collaboration establishes a personal connection help the learner to improve his skills in English and shape
between students and the topic of study and it helps his vision for future where he enjoys learning English
student think in a less personally biased way. Teachers with smile, free from stress and fear.
may employ collaboration to assess student's abilities
to work as a team, leadership skills, or presentation REFERENCES
abilities. Keeping all these benefits and limitations 1. Campbell, J., & L.i.M. (2006). Asian Students' perceptions of
group work and group assignments in a New Zealand tertiary
learning experiences are to be implemented. institution. In Opportunities for Growth in Higher Education:
22-24 November 2006, Nong Kat. Thailand.
For collaborative method to be effective, the teacher
should view teaching as a process of developing and 2. Linda Morable (2000). Using active Learning Techniques.
Technical Education Division, Texas. Dallas: Richland College.
enhancing students' ability to learn. The teacher's role
is not to transfer information, but to save as a facilitator 3. Stephan Gramley and Kurt-Michael Patzold (2003). A Survey
of Modern English. London: Routledge.
for learners. This involves creating and managing
meaningful learning experiences and stimulating students
thinking through real world problems. Teachers should
be encouraged to incorporate collaborative learning in
their classrooms.
The advances in technology and changes in the
organizational infrastructure put an increased emphasis
on teamwork within the student community. Students
should develop the ability to communicate fluently, think
creatively, solve problem and make decisions as a team.
CONCLUSION
New wave of Collaborative Learning Languages has
come into place with the Internet growth and the boom
of social networking technologies. These online social
network services help in information sharing and
collaboration tools, for which users can help other users
to learn languages by direct communication or mutual
correction or proposed exercises. Researchers suggest
that the collaborative learning also prepares students
for the modern work force where there is an increased
emphasis on team work (Fechner and Davis, 1991)
and for their meaningful participation in a democratic
society.
So, we, the teaching community, need to work
towards a process which prepares the students to learn
the language with much ease. The process also requires
Department of MBA
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1017
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1018 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract - E-commerce (electronic commerce) E-commerce is available at all hours of the day and
involves the purchase and sale of goods and night, seven days a week. Many supermarkets have a
services, as well as the transfer of funds and data, greater online range than they do in their retail stores.
over an electronic network, most commonly the
Furthermore, several online-only stores can offer
internet. Business-to-business (B2B), business-to-
customers specific inventory that cannot be found
consumer (B2C), consumer-to-consumer, and
consumer-to-business transactions are all possible. elsewhere. E-commerce allows vendors to reach a
The global spread of the COVID-19 pandemic has global audience. They dismantle the geographical barrier
thrown a wrench in how people purchase goods and (geography). Sellers and buyers can now meet in the
services, as well as how they view e-commerce. virtual world without having to travel. Transaction costs
The country's uniform lockout laws, as well as will be significantly reduced due to electronic
consumers' growing aversion to going outside to commerce. It reduces a lot of the fixed costs of running
shop for basic necessities, have moved the country a physical store. As a result, the businesses will enjoy a
toward e-commerce. The present study is an much higher profit margin. It ensures that goods are
attempt to explore the impact of COVID-19 on e- delivered quickly and with little effort on the part of the
commerce. The study will also put light on the
customer. It also saves both consumers and businesses
present status of e-commerce in India. For the
time, energy, and effort. Another significant benefit is
study basically data is collected by secondary
sources. The results of the study significantly the convenience it provides. A customer can shop 24
contribute to knowing the impacts of COVID-19 hours a day, 7 days of week. The website is available
on e-commerce. It will provide recommendations at all times; unlike a store, it does not have operating
for e-commerce businesses for new normal after hours. Electronic commerce often enables direct
the pandemic. communication between the customer and the business
Keywords: Business, E-Commerce, COVID-19, without the use of intermediaries. This makes it possible
Customer, Outbreak, Pandemic. to communicate and conduct business quickly. It also
adds a personal touch that is extremely precious
I. INTRODUCTION (www.toppr.com).
Electronic commerce, commonly known as e-
The global spread of the COVID-19 pandemic has
commerce or e-commerce, is a business framework
thrown a wrench in how people consume goods and
that helps individuals and companies to buy and sell
services, as well as how they view e-commerce. The
products over the internet. The purchasing and selling
country's standardised lockdown rules, as well as
of goods, products, and services via the internet is
customers' increasing aversion to going outside to shop
referred to as "e-commerce." Electronic commerce or
for basic necessities, have pushed the country toward
online commerce are other terms for e-commerce.
e-commerce. Consumers have shifted their purchasing
These services are delivered over the internet network.
habits from stores, supermarkets, and malls to online
E-commerce also includes the exchange of money,
websites and portals for everything from basic
funds, and data. E-commerce websites include
necessities to branded items
Amazon, Flipkart, Shopify, Myntra, Ebay, Quikr, and
(retail.economictimes.indiatimes.com). The scope of
Olx, among others (www.investopedia.com).
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1019
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
online purchases and online businesses is expected to People all over the world have been affected by the
increase since the social distancing norm has been COVID-19 pandemic. Consumers have also been
implemented for almost the entire year of 2020. Many affected to shop online as a result of their concerns
people are warming to the idea of online shopping, as about security. As a result, online retailers and platforms
evidenced by the increase in FTUs (First Time Users) have a lot of opportunities to grow their sales and
on e-commerce sites. E-commerce entails more than revenue, but they also have a lot of challenges. E-
just having a logo and selling goods on the internet. commerce is becoming more scalable as more people
Finding the right target audience, product niche, and are forced to buy online due to their fear of visiting
customer connection is critical because it helps to cut physical stores during a pandemic. The use of the
costs and provide products that are most appropriate internet for shopping has increased during the pandemic.
for the customer base (razorpay.com). Both online and brick-and-mortar retailers would invest
in smarter technologies in order to increase customer
II. LITERATURE REVIEW
engagement [8]. COVID-19 has been identified as a
E-commerce is the most popular and preferred pandemic health threat. Researchers are attempting to
method of buying various goods and services. discover the causes of these pandemic diseases.
Nowadays, traditional buying must take the place of e- According to China, the only way to combat this
commerce. The only reason for this is that consumers pandemic disease is to use response control strategies
have access to a wide range of products from all over and tactics. The country's situation is deteriorating as a
the world at their fingertips [4]. Financial literacy, result of this pandemic epidemic. Both in terms of health
standard of living, form of residence, payment system and economics, the country is hampered. This pandemic
(digital vs. cash), and, most importantly, manufacturing disease has severely hampered online businesses. The
company up-scaling are all factors that influence e- country is in dire straits as the death rate rises, but the
commerce growth. Daily used products appear to be country's economy has also deteriorated in recent days.
the least popular in the e-commerce mode, with only It is expected that returning to and enhancing the
the most marketed and personalised products with economy in the same way as before will be much more
standardisation being more popular [7]. Electronic difficult. It is therefore difficult to boost the country's
commerce is more than just another way to help or sell sales [5].
something existing businesses to be more successful.
Alternatively, it's possible that e-commerce has ushered The effects of the COVID-19 (corona virus)
in revolutionary changes in the marketplace. It is a pandemic will be felt for a long time. The COVID-19
problematic invention that is radically altering the pandemic has shown that in times of crisis, e-commerce
traditional business model. In our country, ecommerce can be a valuable tool/solution for consumers. E-
is paving the way for massive business growth [6]. commerce company sales are not clear across the
board. In 2020, industry is expected to generate $6
Due to the covid19 pandemic, E-Commerce
trillion in revenue. But it now seems to be too far.
businesses are facing some unexpected challenges. E-
Transactions are not taking place due to lockdowns
Commerce businesses are also facing some unexpected
and constraints, as well as factory closures and supply
challenges as a result of the covid19 pandemic.
chain problems. Essentials are being supplied, but the
COVID-19 has an immediate effect on e-commerce
road ahead is unclear [3]. COVID-19 improves e-
businesses, as well as a shift in consumer demand and
commerce. The effect on e-commerce would encourage
purchasing behaviour [4]. In the post-COVID-19
other researchers to dig deeper into this area, such as
period, the e-commerce industry will boom, and fast-
how corona changed e-commerce trends and future
fashion brands that are already on the platform must
trends [1].
realize the Percentage of Concentration (POC) on
which they must concentrate to avoid wastages and
spillover effects [2].
1020 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The present study fulfils the following objectives: E-commerce has transformed how people do
business in India. The Indian e-commerce market is
• To explore the present status of e-commerce in India. projected to grow from US$ 38.5 billion in 2017 to
• To analyse the impact of COVID-19 pandemic on e- US$ 200 billion by 2026, up from US$ 38.5 billion in
commerce. 2017. Most of the industry's growth has been fueled
by rising internet and smart phone penetration. The
• To provide recommendations for e-commerce
number of internet connections in India increased
businesses for new normal.
dramatically as a result of the "Digital India" initiative,
reaching 760 million by August 2020. Urban areas
accounted for 61% of all internet connections, with 97
percent of those connections being wireless.
Fig. 1 Market Size of E-Commerce in India (Source: www.ibef.org)
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1021
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The Indian e-commerce market has been growing, contactless deliveries to reduce the risk of infection,
and it is expected to overtake the United States as the which is driving up demand for online purchases. In
world's second largest e-commerce market by 2034. addition, many retailers around the country are
The Indian e-commerce industry is expected to grow expanding their reach by going online.
at a 27 percent compound annual growth rate (CAGR)
It has increased e-commerce sales by providing
from US$30 billion in 2019 to US$99 billion in 2024,
consumers with a larger selection of products at
with grocery and fashion/apparel likely to be the
competitive prices. According to a Unicommerce report
primary drivers of incremental growth.
titled E-commerce Trends Report 2020, India's e-
India's e-commerce industry is ranked 9th in the commerce sector experienced a 17 percent increase in
world for cross-border growth, according to a overall order volume following the outbreak of COVID-
Payoneer survey. E-commerce is projected to rise from 19 as of June 2020. (www.globenewswire.com)
4% of overall food and grocery, clothes, and consumer
electronics retail trade in 2020 to 8% by 2025 in India. Online profit margin rates increased by 38%:
The government of India's governance and legal While increasing online sales is one thing, the Covid-
frameworks, such as 100 percent FDI in B2B E- 19 situation has also resulted in supply chain disruptions,
commerce and hundred percent FDI in the marketplace understaffed customer service, and other issues. This
model of B2C E-commerce under the automatic has a direct impact on the profit margin on the internet.
direction are expected to boost the sector's growth. During the global lockdown, it appears that 38 percent
According to the new FDI regulation, online businesses of ecommerce decision-makers saw an increase in their
that have earned foreign investment are prohibited from online profit margin.
selling products that are sold by retailers in which they (ecommercenews.eu)
own an interest. (Source: www.ibef.org)
Online Grocery Preferences and COVID-19:
Impact of COVID-19 pandemic on E-Commerce
People are shopping for groceries online in greater
The COVID-19 pandemic has driven the expansion numbers than ever before, with 58 percent reporting
of the e-commerce logistics industry. Alternative they are comfortable using digital platforms to assist
warehousing sites are being sought by e-commerce them in their grocery shopping. This party includes 71
players to assist with business continuity and delivery percent Gen Z and Millennial shoppers and 44 percent
delays. People have started using online platforms more Baby Boomers.
than before; even in rural areas, as awareness of social
Online grocery sales are expected to reach $89.22
distancing among Indians has grown.
billion in 2020, up 53% from the previous year. This
Furthermore, supply chains have been disrupted as represents an increase of $30.86 billion from the
a result of extended lockdowns in many countries. E- previous year. Following a sharp spike last year, online
commerce logistics companies are using alternatives like grocery sales are projected to increase at a more
1022 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
modest rate in 2021, increasing 5.2 percent to $93.83 warehousing (possibly using physical stores),
billion. distribution alliances, and auto-replenishment models
to make the supply chain more customer-centric.
COVID-19 and Social Media:
Enhance the technical infrastructure: Put the e-
Nearly half of adults were using social media more commerce platform to the test, extend necessary
at the start of the pandemic, with strong rises in capacity limits to plan for an evolving user flow, and
participation through Facebook, Instagram, and invest in advanced analytics technologies to ensure
Snapchat. Adults in the United States spent 7 minutes personal, timely, and automated customer experiences
longer per day on social media in 2020 than in 2019 - and recommendations across devices.
a total of 82 minutes. The pre-pandemic estimate was
76 minutes, suggesting a 0% increase from the previous (www2.deloitte.com)
year. (www.roirevolution.com) VII. CONCLUSION
Recommendations for e-commerce businesses The study concludes that COVID-19 makes e-
for new normal commerce easier. 2020 wasn't really a usual year. It
Revisit Digital Business Model: Evaluate the basis has provided opportunities for some while also putting
of the business model to ensure that it is still valid in the others through hardships. E-commerce, on the other
light of digital distribution platforms, benefit models, and hand, emerged as a clear backbone of the lockdown
the services that can be provided to clients. The time era. Due to the COVID-19 pandemic, e-commerce
has come to unleash the digital marketplace, the has become the preferred mode of shopping for the
subscription model, or the click-and-collect universe majority of Indian customers. Refunds are simple with
that you've been dreaming about. online payments. Customers have started to see this
industry in a whole new light as a result of online
Invest excessively in digital marketing channels: payments, quick refunds, and no-contact delivery.
Instead of out-of-home networks, marketing budgets
should be directed toward digital outlets and media. REFERENCES
Examine both paid and organic marketing's maturity [1] A. Bhatti, H. Akram, H. M. Basit, A. U. Khan, S. M. R. Naqvi,
(SEO). If the company lacks the scale to invest and M. Bilal, "E-commerce trends during COVID-19 Pandemic,"
competitively, find a suitable digital market place. Build International Journal of Future Generation Communication and
Networking, vol. 13, no. 2, pp. 1449-1452, 2020.
successful marketing messages during and after the
[2] A. S. Raja and S. Kannappan, "Marketing agility and E-Commerce
pandemic, above all. agility in the light of COVID-19 pandemic: A study with reference
Enhance the client experience: Recognize the buying to fast fashion brands," Asian Journal of Interdisciplinary
Research, vol. 3, no. 4, pp. 1-13, 2020.
journeys of (new) online customers and provide them
[3] K. S. Patil, "Impact of Covid-19 on E -Commerce," Journal of
with easy, human-centered UX design to create pleasant Emerging Technologies and Innovative Research (JETIR), vol. 7,
shopping experiences across devices using the latest no. 5, pp. 210-213, 2020.
technology. [4] K. Susmitha, "Impact of COVID 19 on E-Commerce," Journal
of Interdisciplinary Cycle Research, vol. 12, no. 9, pp. 1161-
Reshape the business: Since new digital talent (UX, 1165, 2020.
graphic design, scrum, etc.) will be needed, many
[5] M. W. Hasanat, A. Hoque, F. A. Shikha, M. Anwar, A. B. A.
current workers will be unable to adjust. To replenish Hamid, and H. H. Tat, "The Impact of Coronavirus (Covid-19)
the talent pool, use the most up-to-date business team on E-Business in Malaysia," Asian Journal of Multidisciplinary
and engagement tools, and invest heavily in culture and Studies, vol. 3, no. 1, pp. 85-90, 2020.
digital ways of working. [6] N. Goyal and D. Goyal, "Impact of E-Commerce in India: Issues
& Challenges," International Journal of Advanced Research in
Improve the fulfilment and supply chain: To manage Computer Science, vol. 7, no. 6, pp. 192-194, 2016.
profitability, many businesses also need flexible
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1023
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1024 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Organizations are pressurized to are pressurized to reduce the impact on environment
reduce the impact on environment as well as as well as society in order to become more sustainable
society in order to become more sustainable. ([2], [3]). Due to this increased pressure from society,
Human resource is the active resource in the organizations are trying to become the part of the society
organization and thereby occupies the first place by fulfilling their social responsibility to meet the
among all other resources of the organizations.
expectation of the society [4-6] and thereby resulting
That is why, workers should be encouraged to
in sustainability in business processes [7]. Human
reveal environmental behaviour in order to achieve
competitive advantage. Corporate social resource has to act in a strategic manner [8] in order to
responsibility practices can be implemented by develop and implement true sustainable organizational
motivating and encouraging the human resources strategy which is considered essential for global
of the organization. Purpose of this paper is to organizations [9]. Human resource is the active resource
explore the interrelationship between Green in the organization and thereby occupies the first place
human resource management practices and among all other resources of the organizations. That is
Corporate Social Responsibility. It is descriptive why, workers should be encouraged to reveal
as well as exploratory research. Papers published environmental behaviour in order to achieve competitive
on green Human Resource Management and advantage [14]. That is why a new area has been
corporate social responsibilities have been
emerging called green Human Resource Management
reviewed. Papers for review has been selected
which can be defined as the integration of Human
from Emerald, Web of science, Taylor and Francis,
MDPI etc. Findings of the study indicate that Resource Management and environmental management
Significant Positive relationship exists between [10-13]. Corporate social responsibility practices can
Green Human Resource Management Practices be implemented by motivating and encouraging the
and Corporate Social Responsibility as found out human resources of the organization [15-17]. A little
by Various Researchers. But still, only a few studies attention has been given to the process of encouraging
were found which have empirically analyses the or triggering willingness of employees to engage in green
relationship among the two. practices in spite of importance of Human Resource
Keywords- Green Human Resource Management practices in addressing environmental
Management, Corporate Social Responsibility, issues [18]. Engagement in corporate social
Sustainable Organizations, Environmental responsibility activities by the organizations helps in
Management, Encouragement achievement of competitive advantage ([19],[20]) and
building reputation among stakeholders with the aim of
I. INTRODUCTION
gaining success ([19], [21-26]). Encouragement of
Fulfillment of economic responsibility was earlier employees can help in enhancing corporate social
considered the key to success of the organization, but responsibility practices by the companies [27].
the perspective has changed now [1]. Organizations
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1025
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
II. REVIEW OF LITERATURE legal demand [1] such as promoting business ethics,
corporate citizenship and sustainability [38]. Four
A. Green Human Resource Management dynamics corporate social responsibility theories were
Green Human Resource Management is an emerging discussed by Reference [39] includes:
concept which has been attracting the attention of • Generating long term profit for achievement of goals
professionals, scholars and Academics [28]. Research
is being conducted on sustainable development • Responsibly use the business power and impact
strategies of the organizations which will help to enhance • Social demand integration
the contribution of employees in sustainable
development strategies and improve the competitiveness • Doing ethically correct to contribute to the society
and sustainable performance of the organizations Sustainable development goals are an instrument
([29],[30]). Sustainability concept was firstly which provide the guidelines for Corporate Social
introduced by Reference [31] which is further being Responsibility, implications for strategic objectives of
supported by government and explored by researchers. the organization [40-42]. "Corporate social
Well known definition of sustainability was given by [32], responsibility encompasses the economic, legal, ethical
" Development that meets the current need without and philanthropic expectations that society has of
impacting the needs of future generation" is called organizations at a given point of time" [43]. Prevention
sustainable development. Three dimensions of of pollution waste management recycling Re-utilization
Sustainable performance discussed by [33] includes of by-products etc. under the purview of corporate
Social, Economic and Environmental performance. social responsibility [44].
Economical performance includes financial matters,
C. Green Human Resource Management and
Environmental performance includes environmental
Corporate Social Responsibility
issues and social performance delas with interest of
stakeholders [34]. Environmental initiatives can be Human resource plays a key role in implementing
effectively implemented by human resource managers environmental initiatives which are a part of Corporate
who act as business partners in effective adoption of Social Responsibility activities. Financial and sustainable
the initiatives concerning environment [3]. Organizational results can be achieved via human resource management
initiatives concerning green human resource management [45]. Human resource management practices provide
practices should be in line with environmental objectives support to corporate social responsibility activities
of the organizations so that they should be thereby creating synergy between corporate social
understandable and compatible by Human Resource responsibility and human resource management [46].
professionals [8]. Green human resource management As corporate social responsibility activities are
practices include Green Job design and description, implemented by human resource manager or by human
Green Recruitment and Selection, Green Training and resource manager in Association with other teams in
Development, Green Performance appraisal, Green the organization [5]. Increased demand for corporate
Compensation and Rewards, Green Employee social responsibility has enabled enhanced use of green
Empowerment etc. ([10],[12], [35-37]). Human Resource Management [47]. So,
interrelationship between green Human Resource
B. Corporate Social Responsibility Management and corporate social responsibility should
Corporate social responsibility is not a new concept. be explored. Green human resource management
It has existed since centuries [38]. Concept of practices implementation results in voluntary green
Corporate Social Responsibility assumes that behaviour of employees which helps in fulfilling strategies
businesses are not and 'extrinsic elements' to the society concerning corporate social responsibility [48]. Similar
[2]. Corporate social responsibility can be understood results were provided by the studies conducted by
as engagement in proactive behaviour irrespective of various researchers ([37],[49],[50]).
1026 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
III. METHODOLOGY such kind of study will be very helpful for policymaker's
It is descriptive as well as exploratory research. strategist human resource managers as well as
Papers published on green Human Resource organizations also. Government can take initiatives to
Management and corporate social responsibilities have promote sustainable development practices and
been reviewed. Papers for review has been selected environmental management. Managers can consider the
from Emerald, Web of science, Taylor and Francis, relationship among the two while formulating and
MDPI etc. implementing their strategies in order to achieve the
competitive advantage. So, in this article authors have
IV. DISCUSSION reviewed the literature available on green human
On the basis of literature review available on green resource management practices and corporate social
human resource management practices and corporate responsibility and explored the interrelationship between
social responsibility, it can be said that green human green human resource management practices and
resource management practices have significant positive corporate social responsibility. There exist of positive
impact on corporate social responsibility ([54],[56]) relationship between the two as highlighted by various
which in turn positively influences sustainable researches in their studies.
performance of the organizations [55]. Study conducted REFERENCES
by Reference [56] revealed that green human resource
[1] R. Kumar and P. Gupta, "Recent green innovation in organizational
management practices have direct as well as indirect HR practices for technological development", Journal of
effect on corporate social responsibility. Corporate International Business Innovative Research in Economics and
support for employee volunteering moderates the (JIRBE), Vol. 2 No. 1, pp. 14-20, 2018.
relationship between green human resource [2] L. Levkivska, and I. Levkovych, "Social responsibility in
Ukrainian agriculture: the regional issue", Eastern European
management practices and corporate social Journal of Studies, Center for European Studies, Alexandru Ioan
responsibility. Human resource management plays a Cuza University, Vol. 8, pp. 97-114, 2017.
critical role in making the organizations green [3] M. Yusliza, N.Z. Othman and C.J.C. Jabbour, "Deciphering the
([19],[37],[48],[51],[52],[53]) which helps in effective implementation of green human resource management in an
implementation of Corporate Social Responsibility emerging economy", The Journal of Management Development,
Vol. 36 No. 10, pp. 1230-1246, 2017.
practices. Research gap between green human resource
[4] C. Voegtlin and M. Greenwood, "Corporate social responsibility
management practices and corporate social and human resource management: A systematic review and
responsibility was explored by Reference [46], [3] & conceptual analysis", Human Resource Management Review,
[11] which was fulfilled by the researchers like [54-56] vol. 26, pp. 181-197, 2016.
etc. But still there is a need for empirical study on the [5] P. Mishra, "Green Human Resource Management: a Framework
relationship between these two through moderator and for sustainable organizational development in an emerging
economy", International Journal of Organizational Analysis, Vol.
mediating variable or in particularly Industrial and service 25 No. 5, pp. 762-788, 2017.
sector or in developing as well as developed countries [6] S. Tiba, F.J.V. Rijnsoever and M.P. Hekkert, "Firms with benefits:
context. a systematic review of Responsible entrepreneurship and
corporate social responsibility literature", Soc Corp. Resp Env
V. CONCLUSION Ma., pp. 1-20, 2018.
In conclusion it can be said that corporate social [7] S. Fiandrino, A. Devalle, and V. Cantino, "Corporate governance
and financial performance for engaging socially and
responsibility practices are positively influenced by Environmentally Responsible practices", Social Responsibility
Green human resource management practices as found Journal, Vol. 15 Issue 2, pp. 171-185, 2019.
out by many researchers. But there is still a great need [8] J.Y. Yong and Y. Mohd-Yusoff, "Studying the influence of
of empirical studies that are to be conducted by strategic human resource competencies on the adoption of green
incorporating various moderator as well as mediating human resource management practices", Industrial and
Commercial Training, Vol. 48 No. 8, pp. 416-422, 2016.
variables and in different context as discussed earlier
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1027
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[9] M. Gholami, G. Rezaei, M.Z. Mat Saman, S. Sharif and N. [23]A. D. Arndt, A. Singhapakdi and V. Tam, "Consumers as
Zakuan, "State-of-the-art System HRM Green: sustainability in employees: The impact of social responsibility on quality of
the sports center", Journal of Cleaner Production, Vol. 124 No. work life among Australian engineers", Social Responsibility
15, pp. 142-163, 2016. Journal, vol. 11, pp. 98-108, 2015.
[10]Jabbour, C.J.C. and Jabbour, A.B.L.S. (2016), "Green and green [24]A. Di Giuli, and L. Kostovetsky, "Are red or blue companies
human resource management supply chain management: emerging more likely to go green? Politics and corporate social
linking two schedules", Journal of Cleaner Production, Vol. 112 responsibility", Journal of Financial Economics, vol. 111, pp.
No. 3, pp. 1824-1833. 158-180, 2014.
[11]S. E. Jackson, R. S. Schuler and K. Jiang, "An aspirational [25]X. Deng, J.-K. Kang and B. S. Low, "Corporate social
framework for strategic human resource management", Academy responsibility and stakeholder value maximization: Evidence from
of Management Annuals, Vol. 8, pp.1-89, 2014. mergers", Journal of Financial Economics, vol. 110, pp. 87-109,
2013.
[12]C. J. C. Jabbour, "Environmental training in organizations: From
a Literature review to a framework for future Research", Resources [26]S. Paek, Q. Xiao, S. Lee and H. Song, "Does managerial ownership
Conservation and Recycling, Vol. 74, pp. 144-155, 2013. affect different corporate social responsibility dimensions? An
empirical examination of U.S. publicly traded hospitality firm",
[13]D. S. Ones and S. Dilchert, "Environmental sustainability at
International Journal of Hospitality Management, Vol. 34, pp.
work: A call to action", Industrial and Organizational Psychology,
423-433, 2013.
Vol. 5, pp. 444-466, 2012.
[27]C. N. Ana, and P. Arminda, "Corporate volunteering - an analysis
[14]D. E. Cantor, P. C. Morrow and F. Montabon, "Engagement in
of volunteers' motivations and demographics", Journal of Global
environmental behaviours among supply chain management
Responsibility, Vol. 4, pp. 31-43, 2013.
employees: An organizational support theoretical perspective".
Journal of Supply Chain Management, vol. 48, pp. 33-51, 2012. [28]J.Y. Yong, M.Y. Yusliza and O.O. Fawehinmi, "Green human
resource management: a systematic literature review from 2007
[15]C. J. C. Jabbour, A. B. L. Jabbour, A. A. Teixeira and W. R. S.
to 2019", Benchmarking: An International Journal, 2019.
Freitas, "Environmental development in Brazilian companies:
The role of human resource management", Environmental [29]N. Pham, H. Hoang and Q. Phan, "Green human resource
Development, Vol. 3, pp. 137-147, 2012. management: a comprehensive review and future research agenda",
International Journal of Manpower, 2019.
[16]T. A. Norton, H. Zacher and N. M. Ashkanasy, "Organizational
sustainability policies and employee green behaviour: the [30]R. Dubey, and A. Gunasekaran, "Exploring soft TQM dimensions
mediating role of work climate perceptions", Journal of and their impact on firm performance: some exploratory empirical
Environmental Psychology, vol. 38, pp. 49-54, 2014. results", International Journal of Production Research, Vol. 53
Issue 2, pp. 371-382, 2015.
[17]D. Antonioli, S. Mancinelli and M. Mazzanti, "Is environmental
innovation embedded within high-performance organizational [31]Brundtland, G.H. (1987). Our Common Future: Report of the
changes? The role of human resource management and World Commission on Environment and Development. Geneva,
complementarity in green business strategies", Research Policy, UN-Document A/42/427. http://www.un-documents.net/ocf-
Vol. 42, pp. 975-988, 2013. ov.html
[18]P. Paillé, Y. Chen, O. Boiral and J. Jin, "The impact of human [32]C. Higgins and B. Coffey, "Improving how sustainability reports
resource management on environmental performance: An drive change: A critical discourse analysis", Journal of Cleaner
employee-level study", Journal of Business Ethics, vol. 121, pp. Production, 136, pp. 18-29, 2016.
451-466, 2014.
[33]Elkington, J., "Towards the sustainable corporation: Win-win-
[19]T. Breitbarth, S. Walzel, C. Anagnostopoulos and F. Van Eekeren, win business strategies for sustainable development", California
"Corporate social responsibility and governance in sport: Oh, Management Review, vol. 36, pp. 90-100, 1994.
the things you can find, if you don't stay behind!", Corporate
[34]M. Yusliza, J.Y. Yong, M.I. Tanveer, T. Ramayah, J.N. Faezah,
Governance, Vol. 15, pp. 254-273, 2015.
Z. Muhammad, "A structural model of the impact of green
[20]M. Kadlubek, "The essence of corporate social responsibility intellectual capital on sustainable performance", Journal of
and the performance of selected company", Procedia-Social and Cleaner Production, vol. 249, p.119334, 2020.
Behavioral Sciences, vol. 213, pp. 509-515, 2015.
[35]B.F. Daily, and S. Huang, "Achieving through attention to
[21]M. Ismail, S. N. Alias and R. M. Rasdi, "Community as sustainability factors in environmental human resource
stakeholder of the corporate social responsibility program in management", International Journal of Operations and Production
Malaysia: outcomes in community development", Social Management, Vol. 21 Issue 12, pp. 1539-1552, 2001.
Responsibility Journal, Vol. 11, pp. 109-130, 2015.
[36]D.W.S. Renwick, T. Redman and S. Maguire, "Green human
[22]R. Giulianotti, "Corporate social responsibility in sport: critical resource management: a review and research calendar",
issues and future possibilities". Corporate Governance, Vol. 15, International Journal of Management Reviews, Vol. 15 No. 1,
pp. 243-248, 2015. pp. 1-14, 2013.
1028 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[37]A. A. Teixeira, C. J. C. Jabbour, A. B. L. D. Jabbour, H. Latan [48]M. Pinzone, M. Guerci, E. Lettieri and T. Redman, "Progressing
and J. H. C. Oliveira, "Green training and green supply chain the change journey towards sustainability in healthcare: the role
management: Evidence from Brazilian firms", Journal of Cleaner of 'Green' HRM", Journal of Cleaner Production, Vol. 122, pp.
Production, 116: 170-176, 2016. 201-211, 2016.
[38]A.B. Carroll, and K.M. Shabana, "The business case for corporate [49]J.Y. Yong, M. Yusliza, T. Ramayah, O. Fawehinmi, "Nexus
social responsibility: a review of concepts, research and practice", between green intellectual capital and green human resource
International Journal of Management Reviews, Vol. 12 Issue 1, management", Journal of Cleaner Production, vol. 215, 364-374,
pp. 85-105, 2010. 2019.
[39]E. Garriga and D. Mele, "Corporate social responsibility theories: [50]N.T. Pham, Z. Tu?cková, C.J.C. Jabbour, "Greening the
mapping the territory", Journal of Business Ethics, Vol. 53, pp. hospitality industry: How do green human resource management
51-71, 2004. practices influence organizational citizenship behavior in hotels?
A mixed-methods study", Tour. Manag., Vol. 72, pp. 386-399,
[40]P. Grover, A.K. Kar and V. Ilavasaran, "Impact of corporate
2019.
social responsibility on reputation-insights from tweets on
sustainable development goals by CEOs", International Journal [51]H. A. Masri, and A. M. Jaaron, "Assessing green human resources
of Information Management, Vol. 48, pp. 39-52, 2019. management practices in Palestinian manufacturing context: An
empirical study", Journal of Cleaner Production, Vol. 143, pp.
[41]J. Gunawan, P. Permatasari and C. Tilt, "Sustainable development
474-489, 2017.
goal disclosures: Do they support responsible consumption and
production?", Journal of Cleaner Production, Vol. 246, p. 118989, [52]M. Nejati, S. Rabieiand and C. J. C. Jabbour, "Envisioning the
2020. invisible: Understanding the synergy between green human
resource management and green supply chain management in
[42]A. Srivastava, "Standardizing evaluation process: necessary for
manufacturing firms in Iran in light of the moderating effect of
achieving SDGs - a case study of India", Evaluation and Program
employees' resistance to change", Journal of Cleaner Production,
Planning, Vol. 69, pp. 118-124, 2018.
Vol. 168, pp. 163-172, 2017.
[43]A.B. Carroll, "The pyramid of corporate social responsibility:
[53]S. Tariq, F. A. Jan and M. S. Ahmad, "Green employee
Toward the moral management of organizational stakeholders",
empowerment: a systematic literature review on state-of-art in
Business Horizon, vol. 34, pp. 39-48, 1991.
green human resource management", Quality & Quantity, Vol.
[44]A.N. Tran, S. Jeppesen, "SMEs in their own right: The views of 50, pp. 237-269, 2014.
managers and workers in Vietnamese textiles, garment, and
[54]W.R.S. Freitas, J.H.C. Oliveira, A.A. Teixeira, N.O. Stefanelli,
footwear companies", Journal of Business Ethics, vol. 137, pp.
T.B. Teixeira, "Green Human Resource Management and
589-608, 2016.
Corporate Social Responsibility: Evidence from Brazilian Firms",
[45]S. Ahmad, "Green human resource management: policies and Benchmarking: An International Journal, Vol. 27 No. 4, pp. 1551-
practices", Cogent Business and Management, Vol. 2, pp. 1-13, 1569, 2020.
2015.
[55]S.Y. Malik, Y.H. Mughal, T. Azam, Y. Cao, Z. WAN, H. Zhu and
[46]D. R. Jamali, A. M. El Dirani and I. A. Harwood, "Exploring R. Thurasamy, "Corporate Social Responsibility, Green Human
human resource management roles in corporate social Resource Management Practices and Sustainable Performance:
responsibility: The CSR-HRM co-creation model", Business Is Organizational Citizenship Behavior towards Environment
Ethics: A European Review, vol. 24, pp. 125-143, 2015. the Missing Link?", Sustainability, Vol. 13, 2021.
[47]S. Cheema, and F. Javed, "The effects of corporate social [56]M.M.A.A. Kerdawy, "The Role of Corporate Support for
responsibility toward green human resource management: the Employee Volunteering in Strengthening the Impact of Green
mediating role of sustainable environment", Cogent Business and Human Resource Management Practices on Corporate Social
Management, Vol. 4, pp. 1-10, 2017. Responsibility in the Egyptian Firms", European Management
Review, Vol. 16, pp. 1079-1095, 2019.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1029
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: In today's era, when there is cut throat the businesses (and steady payments for the celebrities),
competition, it is very tough for marketers to gain but they also increased favourable exposure, exposure,
the attention of potential consumers. There is and engagement. As a result, celebrity endorsement may
plethora of brands available in the market. assist businesses in a variety of ways as Watching a
Companies trying very hard to grab the attention commercial with a well-known celebrity can capture
of their potential consumers. Now a days it is very
the attention of the audience, resulting in brand
common for company to spend handsome amount
for getting their product introduced by a well- recognition. People trust those who are well-known.
known face- A celebrity. A celebrity has great As a result, endorsement is a strategy for instilling trust.
influence on the people and the people who follow And in a market with a lot of options and a lot of
them start using those products which are being competition, this may be a tremendous advantage.
endorsed by them. A celebrity face not only has an Customer retention is always goal for businesses, and
impact over users, but also transfer his or her celebrity endorsement can assist them accomplish these
characteristics to brands. The personality of brand goals.
is highly get influenced by the person who endorsed
it. The endorser of the brand helps in The identification of human qualities and attributes
personification of brands as well. In this study, we with the brand to which buyers may relate is referred
attempt to study the relationship between the to as brand personality. It refers to the embodiment of
celebrity endorsement and building of brand a brand in simple terms. It's a collection of human traits
personality. For this study qualitative study has and qualities that have been attributed to a brand. When
been conducted. Interview of ten respondents were human-like qualities - such as distinctive,
taken regarding five Indian celebrity endorsing compassionate, humorous, trustworthy, creative, direct,
different types of products and then analysed. The dishonest, rebel, and so on - are ascribed to a brand, it
findings of the study suggest that celebrity develops a personality.
endorsement do impact the brand personality of a
brand. So, a marketers should select the endorser In the given study, we are trying to find out whether
of a product meticulously as it can affect the celebrity endorser has any impact over brand Personality
emotional relationship of consumer with the brands. or not. Whether the endorser's characteristics gets
Keywords-Celebrity, celebrity endorsement, transferred to personality of brand or not.
brand personality, personification, emotional
II. PROBLEM STATEMENTS AND
relationship etc.
RESEARCH OBJECTIVES
1. INTRODUCTION Every famous person has his or her own distinct
A marketing approach including the employment of personality. A portion of that is expected to rub off on
one or more celebrities to promote a certain product the brand as a result of the endorsement. However, no
or service is known as celebrity endorsement. In this consumer study has looked at this element of celebrity
scenario, the major aim is to reach a larger audience, personality's impact on brand personality. The BP
which is represented by the celebrity's fan base. These construct, on the other hand, has been researched.
sponsorships not only brought in billions of dollars for Aaker (1997) developed and verified a blood pressure
1030 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
scale. However, to the best of the researchers' findings of the study suggested that brand personality,
knowledge, no attempt has been made to combine both not only plays a crucial role in customer retention but
elements of celebrity endorsements and BP. As a result, also has a profound influence on the company's
the current research attempts to fill this gap in the performance.
literature. Through a qualitative study, the researchers • Trott (2011) in her research paper aims to find out
hope to see if celebrity personality has an influence on the influence of the brand personality of NOKIA on
Brand personality. The study tries to find out whether perceived quality. Subjects were asked to rate the
celebrity endorsement is one of the drivers of brand traits of brand personality as well as of perceived
personality. quality. The findings suggest that there is a significant
relationship between brand personality and perceived
Objectives of study quality only ruggedness showed negative relation, rest
all the other dimensions were positively related to
• To find out whether celebrity endorsement has any
perceived quality.
impact on brand personality
• Roy and Moorthy (2012) in their research
Hypothesis: The personality of a celebrity will have
exploresthe issues of celebrity personality affecting
significant impact on the personality of a brand the brand personality. The study aims to find out the
Personality same personality dimensions that exist for celebrity
and the brand endorsed respectively. The findings of
III. LITREATURE REVIEW
the paper suggested that there is a statistically
CELEBRITY ENDORSEMENT significant effect of celebrity personality on brand
personality. The BP scale develops by Aaker's was
• Sharma & Kumar (2013) explored in their study found out to be reliable and valid for both celebrity
whether celebrity endorsement can create long term and the brand. The study concluded that in the case
brand loyalty for marketers. The findings suggested of a new brand, care should be taken before going
that if celebrity endorsement and advertising for celebrity endorsement because there may be a
strategies get mixed up correctly in terms of matching transfer of some personality attributes from the
characterises of brand with traits off celebrity , then celebrity to the brand.
it may create buzz and consumer may develop a
feeling for brand. IV. RESEARCH METHODOLOGY
• Hassan and Jamie (2014) in their research paper This article is based on exploratory research since
identified whether celebrities of Pakistan and India the goal is to have a deeper knowledge of the research
crate any impact on purchase intention . through self- field. Furthermore, the study's research objective is to
administrated questionnaire 300 students and describe "how" a phenomenon happens, making it a
household were selected and they proved their descriptive study.
hypothesis
A qualitative technique was used for the collecting
• Hainietal (2018) in their research explored the
of empirical data. The rationale for this is that a
impact of celebrity endorsement on consumer
qualitative approach will give us a better grasp of the
behaviour in jewellery industry. The findings of the
study suggested that consumers perception, decision phenomena we're looking at.
making process and demeanour all get influenced by Personal communication is preferable when seeking
celebrity support. a solution to a research topic. As a consequence, a
BRAND PERSONALITY semi structured interview is the best data collecting
strategy for this study and will yield useful results.
• Farhat And Khan (2011) conducted a study to probe Because the interviews were expected to last at least
into the behaviour of customer willingness to buy a half an hour, respondents were picked from the authors'
brand/product, of what are the related factors which
social networks. Due to the duration of the interviews,
influence customer behaviour and attitude. The
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1031
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
it was thought that interviewing people who had Amitabh Bachchan has a reputation for being
previously been in a relationship was more suitable and sincere, trustworthy, and a man of his words.
possible. As a result, it was deemed improper to ALIA BHATT is a cheerful, chirpy young lady.
interview people at random. The interviewer was able
to properly organize the interview and conduct it in a Aishwarya Rai is described as the embodiment of
relaxed setting as a result of this. Another reason beauty and sophistication, whereas Ranveer Singh is
respondents were picked from the interviewers' social described as a cheerful, enthusiastic, and dynamic
networks was because it was believed that they would individual.
offer more detailed and honest responses because Questions like "how well do celebrity personality,
respondents and interviewers knew one other. lifestyle, and image blend in with items" were asked
A total of 10 respondents were chosen for interview. later in the interview. Various people have different ideas
The study has chosen top 5 Indian celebrity endorsers about how well a celebrity's personality matches with
who have maximum brand value. These celebrities are their merchandise. Many individuals disputed whether
or not the celebrity pick based on brand was
Virat Kohli-Vivo, Himalaya, Myntra, Manyavar, appropriate, while others disagreed. The female
Colgate, Puma. protagonist should be placed in the first cry.com when
Alia Bhat---Footie , Lays, Gionee , Make My Trip, Amitabh Bachchan was shown praising the product
Flipkart, Lux because it was all about parenting. Also, some
Aishwarya Rai Bachchan - Loreal Paris, Prestige, youngsters could be included in the Footie commercial
Kalyan Jewellers where Alia Bhatt was exhibiting her cheerful persona.
Ranveer Singh-- Vivo, Rupa Innerwear, Head And Another topic asked during the interview was what
Shoulders, Kellogg's, Royal Stag, Etc. the interviewees believed the motivation was for these
folks to be endorsers. Many people believed that money
Akshaya Kumar- Policy Bazaar, Liv Guard Energy, was the motivating factor behind their actions.
Harpic, Suthol, Dollar, Tata Motors, Pc Jewellers.
Some, on the other hand, said that "it is a method
The Interview Was Mainly Focused On The for them to sell themselves" and that "they may do it to
Different Brands Endorsed By Them. reinvent themselves." The fact that Akshay KUMAR
This Study Relied On Purposeful Sampling. People being featured in advertisements giving social messages
Born Between 1990 And 1999 Were Polled. aids him in reinventing himself.
This Study Has Followed The Three Steps By CONCLUSION:
Having The Data Reduction And Display Presented. As a result of the study's findings, the Hypothesis
Furthermore, The Conclusion Drawing And Verification presented in the conceptualization section could not be
Has Been Used In This Paper. dismissed. The study might lead a marketer to believe
V. RESULTS AND DISCUSSION that the celebrity's personality will have an influence on
the brand's personality. Thus, in the case of a new
The interviews began with the screening of a
company, caution should be used before seeking
commercial film featuring the aforementioned
celebrity endorsement, as there may be a transfer of
personalities supporting items. The interviewees were
personality traits from the celebrity to the brand, which
then asked to explain how they saw the celebrities in
the marketer does not desire.
the advertisement. The respondents' attitudes regarding
celebrities in the advertisement were very similar,
especially VIRAT KOHLI, who is enthusiastic about
fitness, health, and having an up-to-date personality.
1032 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1033
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1034 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1035
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
TABLE 1: represent the gender group of government salary between 3 lakhs to 6 lakhs, 12% parents are
school's student's parents who have responded towards having salary between 6 lakhs to 10 lakhs and only
their perspective regarding financial burden during 12% parents are having salary more than. Which shows
COVID 19 pandemic.among them 48% parents are their capacity of bearing financial burden.
male, 52% parents are female. TABLE 5 DOES COVID PANDEMIC HAS AFFECTED YOUR
SALARY?
TABLE 2: FREQUENCY LEVEL OF THE RESPONDENTS (NO.
OF CHILDREN) Frequency Percent
Decrease 18 36.0
N umber o f C hildren F requency Percent Constant 22 44.0
On e Ch ild 16 3 2 .0 No Pay 10 20.0
T wo Children 30 6 0 .0 Total 50 100.0
Th ree Ch ildren 4 8. 0
TABLE 5: represent the covid pandemic effects on
To tal 50 1 00 .0
salary of government school's student's parents who
TABLE 2: represent the number of children of have responded towards their perspective regarding
government school's student's parents who have financial burden during COVID 19 pandemic.among
responded towards their perspective regarding financial them 36% parents salary have been decreased, 44%
burden during COVID 19 pandemic, among them 32% parents salary have been constant, 20% parents have
parents are having one child, 60% parents are having not received any salary.
two children and 8% parents are having three children. TABLE 6 ARE YOU SATISFIED WITH THE ONLINE TEACHING
PATTERN OF YOUR CHILD SCHOOL?
TABLE 3: FREQUENCY LEVEL OF THE RESPONDENTS (TYPE
OF OCCUPATION) Frequency Percent
Strongly Agree 26 52.0
Ty pe of Occupation Frequency P erce nt Agree 24 48.0
Private J ob 22 4 4.0 Neutral 0 0.0
Bu sines s 22 4 4.0 Disagree 0 0.0
G ov ernmen t Jo b 6 1 2.0 Strongly Disagree 0 0.0
To tal 50 10 0. 0 Total 50 100.0
TABLE 3: represent the type of occupation of TABLE 6 represent the government school's
government school's student's parents who have student's parents' perspective regarding Satisfaction with
responded towards their perspective regarding financial the online teaching pattern of their children during
burden during COVID 19 pandemic, among them 44% COVID 19 pandemic.among them 28% parents are
parents are having private jobs, 44% parents are having satisfied, 52% parents are not satisfied, 20% parents
business and 12% parents are having government. are still in dilemma regarding online teaching pattern.
TABLE 7 IF GIVEN AN OPTION, WHICH MODE OF
TABLE 4: FREQUENCY LEVEL OF THE RESPONDENTS TEACHING YOU PREFER FOR YOUR CHILD IN FUTURE?
(INCOME SLABS (IN RS.))
Frequency Percent
Income Slabs (in Rs.) Frequency Percent Online 2 4.0
0-3,00,000 20 40.0 Offline 30 60.0
Hybrid (both offline and
3,00,000-6,00,000 16 32.0 online mode) 18 36.0
6,00,000-10,00,000 8 16.0 Total 50 100.0
Above 10,00,000 6 12.0 TABLE 7 represent the government school's
Total 50 100.0
student's parent's perspective regarding which mode
TABLE 4: represent the income slabs of government of teaching they prefer for their child in future.among
school's student's parents who have responded towards them only 4% parents prefer online teaching in future
their perspective regarding financial burden during learning, 60% parents prefer offline teaching in future
COVID 19 pandemic. among them 40% parents are learning, 36% parents agree with Hybrid (both offline
having salary less than 3 lakhs, 32% parents are having and online mode)teaching learning.
1036 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
TABLE 8 HOW DO YOU RATE LEARNING AND SOCIAL andregulations.72% parents are agreed, 4% parents
ENVIRONMENT IN GOVERNMENT SCHOOLS?
are not agreed, and 24% parents are still in dilemma
Frequency Percent with this statement.
Fair 28 56.0
Good 4 8.0 TABLE 12 DOES GOVERNMENT SCHOOLS FOLLOW THE
Poor 18 36.0 AGE CRITERION WHILE TAKING ADMISSIONS?
Total 50 100.0
Frequency Percent
TABLE 8 represent the government school's Yes 14 28.0
No 10 20.0
student's parent's perspective regarding learning and Maybe 26 52.0
Social Environment in Schools.among them 56% Total 50 100.0
parents are feeling fair environment, 8% parents are TABLE 12represent the government school's
feeling good environment, and 36% parents are feeling student's parent's perspective regarding procedure the
poor environment in schools. age criterion while taking admissions. 28% parents are
TABLE 9 DO YOU AGREE THAT SCHOOL ENVIRONMENT agreed, 20% parents are not agreed, and 52% parents
IMPACTS YOUR CHILD LEARNING AND DEVELOPMENT?
are still in dilemma with this statement.
Freque ncy Percent
TABLE 13 DO YOU FEEL THE NEED TO HAVE WELL-
Yes 14 28.0
REGULATED AND DISCIPLINED GOVERNMENT SCHOOLS
No 26 52.0 IN YOUR CITY
Maybe 10 20.0
Total 50 100.0 Frequency Percent
Yes 42 84.0
TABLE 9represent the government school'sstudent's No 4 8.0
Parents' perspective regarding school environment Maybe 4 8.0
impacts their child learning and development.52% Total 50 100.0
parents are strongly agreed, 48% parents are agreed TABLE 13 represent the government school's
with this statement. student's parent's perspective regarding need of having
TABLE 10 IS THE SCHOOL FEES OF YOUR CHILD well-regulated and disciplined Government schools in
JUSTIFIED FOR ONLINE LEARNING? their city. 84% parents are agreed, 8% parents are not
Frequency Percent agreed, and 8% parents are still in dilemma with this
Yes 4 52.0 statement.
No 42 48.0
Maybe 4 8.0 TABLE 14. IS THE THOUGHT OF SHIFTING YOUR CHILD
Total 50 100.0 TO GOVERNMENT SCHOOL EVER CAME TO YOUR MIND
DURING THIS PANDEMIC SITUATION DUE TO FINANCIAL
TABLE 10 represent the government school's BURDEN?
student's parent's perspective regarding school fees of Frequency Percent
their Child for online learning. 52% parents are agree, Yes 24 48.0
48% parents are not agree and 8% parents are still in No 20 40.0
Maybe 6 12.0
dilemma with this statement. Total 50 100.0
TABLE 11 DO YOU FIND TAKING ADMISSIONS IN PRIVATE
SCHOOL IS TOUGHER AND INVOLVES MORE RULES AND
TABLE 14represent the government school's
REGULATIONS? student's parent's perspective regarding thought of
Frequency Percent
shifting their child to government school during this
pandemic situation due to financial burden.48% parents
Yes 36 72.0
No 2 4.0 are agreed, 40% parents are not agreed, and 12%
Maybe 12 24.0 parents are still in dilemma with this statement.
Total 50 100.0
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1037
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
TABLE 15 HAVE YOU SHIFTED YOUR CHILD TO ANOTHER TABLE 19 IF YES, WHICH LEARNING PORTAL YOUR
SCHOOL DUE TO POST COVID FINANCIAL BURDEN? CHILD USE THE MOST TO ENHANCE HIS/HER
KNOWLEDGE?
Frequency Percent
Yes 44 88.0 Frequency Percent
No 6 12.0 Diksha 6 12.0
Total 50 100.0 E-Pathshala 10 20.0
Swayam P rabha 6 12.0
TABLE 15represent the government school's Other 28 56.0
student's parent's decision regarding shifting their child Total 50 100.0
to school during this pandemic situation due to financial TABLE 19 represent the government school's
burden.88% parents are agreed, 12% parents are not student's parent's perception regarding the Learning
agreed with this statement. Portal mostly used by their child to enhance his/her
TABLE 16 DO YOU RECOMMEND SAME CURRICULUM FOR knowledge.12% parents prefer Dikha learning mode,
PRIVATE AND GOVERNMENT SCHOOLS?
20% parents prefer E-Pathshala learning mode, 12%
Freque ncy Percent parents prefer Swayam Prabha learning mode, and
Yes 42 84.0
No 8 16.0 56% parents prefer different learning mode.
Total 50 100.0 TABLE 20 ACCORDING TO YOU, WRITE ONE REASON
FOR SELECTING GOVERNMENT JOB BUT NOT
TABLE 16represent the government school's GOVERNMENT SCHOOL FOR YOUR CHILD?
student's parent's recommendation regardingsame
Frequency Percent
curriculum for private and Government Schools.84% Poor Infrastructure and facilities 16 32.0
parents are agreed, 16% parents are not agreed with Government job is good for future 34 68.0
this statement safety but government schools
learning environment is not
TABLE 17 DO YOU FEEL REGULAR PERFORMANCE satisfactory
APPRAISAL OF GOVERNMENT TEACHERS WOULD TOTAL 50 100.0
IMPROVE THEIR QUALITY OF TEACHING?
This table represent the government school's
Frequency Percent
Yes 38 76.0 student's parent's perception regarding reason for
No 2 4.0 selecting Government job but not Government School
Maybe 10 20.0 for their Child. 32% parents are agreed with statement
Total 50 100.0
Poor Infrastructure and facilities, 68% parents are
TABLE 17 represent the government school's agreed with statement that Government job is good for
student's parent's perception regarding regular future safety but government schools learning
Performance Appraisal of Government Teachers to environment is not satisfactory.
improve their Quality of Teaching.76% parents are
agreed, 4% parents are not agreed, and 20% parents VI. CONCLUSION
are still in dilemma with this statement. In today's world, education is considered as a
TABLE 18 ARE YOU AWARE ABOUT THE E- LEARNING necessity such like food for livelihood. Spread of
PORTALS LAUNCHED BY GOVERNMENT?
COVID-19 in 2019-2020, has burdened parents with
F requency Percent lot of financial issues worldwide leading to difficulty in
Yes 24 48 .0
No 24 48 .0 survival. Education industry has shifted from offline
Maybe 02 4. 0 towards e-learning to make education accessible to
Total 50 1 0 0.0
majority of students. Parents perception towards online
TABLE 18 represent the government school's learning is not satisfactory. While the present paper aims
student's parent's awareness regarding the e- learning to suggest that COVID 19 pandemic has created a
portals launched by Government.48% parents are huge financial burden on parents and also, they are not
agreed, 48% parents are not agreed, and 4% parents finding online classes comfortable for their children even
are still in dilemma with this statement. though majority of them has not shifted their children
1038 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
from private schooling to government. This research of parents of both private and government school's
paper highlights the need that much effort is needed to student's parents regarding online learning and selection
make government schools sustainable for the future of government school.
generations and meet the expectations of parents.
Absence of Teaching and learning environment is IX. REFERENCES
considered as the biggest concern for parents. Also, it 1) Aliyyah, R. R., Rachmadtullah, R., Samsudin, A., Syaodih, E.,
Nurtanto, M., & Tambunan, A. R. S. (2020). The perceptions of
is observed to have a common curriculum for both primary school teachers of online learning during the COVID-19
private and government schools. Although Government pandemic period: A case study in Indonesia. Journal of Ethnic
has taken various initiatives in proving education to all and Cultural Studies, 7(2), 90-109.
sections of the society by launching various online 2) Zhang, W., Wang, Y., Yang, L., & Wang, C. (2020). Suspending
learning portals. Still it is observed that awareness classes without stopping learning: China's education emergency
management policy in the COVID-19 outbreak.
regarding the same is not up to the mark. Parents have
3) Alonge, B. D., Onnoh, O. G., Olusesean, O. J., Ojo, O. A., &
shown a positive opinion about adoption of hybrid Nathaniel, O. O. (2020). Working Conditions and Salary as
classes. Much scope is generated in this field of online Correlates of Teachers' Productivity in Government-Owned
learning. As per parents' perception Microsoft teams is Secondary Schools in Emure Local Government Area of Ekiti
State, Nigeria. Journal of Educational Issues, 6(1), 89-97.
considered as the most comfortable online learning
platform by more than 50 % respondents. Parents are 4) Al-Samarrai, S., Gangwar, M., & Gala, P. (2020). The impact of
the COVID-19 pandemic on education financing.
of the opinion that school environment impacts their
5) Rowe, E., & Perry, L. B. (2020). Inequalities in the private funding
child learning and development and find government of public schools: parent financial contributions and school
schools far behind in this area. It was strongly socioeconomic status. Journal of Educational Administration and
recommended by parents to have a regular History, 52(1), 42-59.
performance appraisal of government teachers to 6) Sasikumar, S., & Balaji, P. (2020). Perception of Students towards
enhance their learning. Thus, there is a need to develop Cost-Free Welfare Schemes in School Education-A Study with
Special Reference to Government Schools of Tamil Nadu.
Government Schools making it a priority for all parents International Journal of Management (IJM), 11(3), 511-518.
and proper awareness regarding online government
7) Nearchou, F., Flinn, C., Niland, R., Subramaniam, S. S., &
learning portals so that it can be utilised to a maximum Hennessy, E. (2020). Exploring the impact of COVID-19 on
extent towards child learning. mental health outcomes in children and adolescents: a systematic
review. International journal of environmental research and public
VII. MANAGERIAL IMPLICATIONS health, 17(22), 8479.
8) Aslam, M., Malik, R., Rawal, S., Rose, P., & Vignoles, A. (2019).
The findings of the study highlight the negative impact Do government schools improve learning for poor students?
of the COVID 19 on parents. The study has explored Evidence from rural Pakistan. Oxford Review of Education, 45(6),
the the factors that influence selection of private school 802-824.
over government school. Findings of the study will also
serve as feedback for the administrators, and
government policies makers to rectify the weakness and
shortcomings in planning and organization of government
school administration.
VIII. WAY FORWARD
This paper identifies the factors of the financial
burden of children education on parents due to COVID
19 pandemic. In future research, more study required
of revision policies of government school's structure,
types of training provided to increase teachers
performance. There is need to analyze the perception
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1039
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Now banking sectors are moving ICICI Bank under Deposit and Loan for regression
modern technology based and to connect on analysis P-value is highly significant.
electronic devices, banking websites and mobile Keywords: State Bank of India (SBI), Industrial
apps initiatives and implementation banking Credit and Investment Corporation of India
sectors. State Bank of India (SBI) is an Indian (ICICI) Bank, Automatic Teller Machine (ATM),
universal public sector bank and financial services Deposit, Loan & Advances and Nonperforming
process as per law main headquartered in Mumbai Assets (NPA).
and Maharashtra. SBI is the 43rd largest bank in
the world; and the ranked 221st in the "Fortune I. INTRODUCTION
Global 500" list of the world's top corporations of
2020, creating the simply Indian bank on the list. State Bank of India (SBI) is an Indian universal
Industrial Credit and Investment Corporation of public sector bank and financial services process as
India (ICICI) Bank is an Indian global private sector per law main headquartered in Mumbai and
bank financial services company with its registered Maharashtra. SBI is the 43rd largest bank in the world;
headquarters in Vadodara, Gujarat, and corporate- and the ranked 221st in the "Fortune Global 500" list
office in Mumbai, Maharashtra. It offers an of the world's top corporations of 2020, creating the
extensive series of banking products and financial simply Indian bank on the list. It is a public sector bank
services for corporate and retail customers during and the very largest bank in India with a (23%) market
a variety of rescue channels and specialized share by assets and an (25%) share of the total loan
subsidiaries in the areas of deal banking, life, non- and deposits market. It is also the fifth largest employer
life insurance, venture capital and asset
in India with virtually 250,000 employees. SBI is one
management. In the bank has a network of 5,275
branches and 15,589 ATMs across India and has a of the biggest employers in the world with 245,652
presence in 17 countries. The SBI and ICICI Bank employees as on 31st March 2021. Out of the total
has been playing the role of developing the nation personnel, the demonstration of women employees is
by taking several initiatives to ensure a safe, nearly (26%). The percentage of Officers, Associates
secure, sound, efficient, accessible and authorized and Subordinate staff was (44.28%, 41.03% and
No. of Branches, No. of ATMs, Total Deposit, Total 14.69%) likewise on the same date. Each employee
Loan & Advance and Total Nonperforming Assets contributed a net profit of Rs. 828,350 (US$12,000)
(NPA) in India. Analysis mean, SD., average growth during FY 2020-21.
rate and simple percentage trend graphs have been
used to analyze and interpret the data on Progress Industrial Credit and Investment Corporation of
of Deposits, Loans and NPA SBI and ICICI Bank India (ICICI) Bank is an Indian global private sector
in India during the study period of 10 years (2011 bank financial services company with its registered
to 2020). SBI under Deposit and Loan for headquarters in Vadodara, Gujarat, and corporate-
regression analysis P-value is highly significant and office in Mumbai, Maharashtra. It offers an extensive
1040 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
series of banking products and financial services for thereby guarantees economic development. The Indian
corporate and retail customers during a variety of banking industry is one of the best growing banking
rescue channels and specialized subsidiaries in the industries in India. Suggesting the first and second
areas of deal banking, life, non-life insurance, venture making financial division of reforms, the Indian banking
capital and asset management. ICICI bank has a industry has observed essential changes and huge growth
network of 5,275 branches and 15,589 ATMs across during the last few years. It is based on secondary data
India and has a presence in 17 countries. sources on SBI and ICICI in India.
The SBI and ICICI Bank has been playing the role Balakrishnan C., (2019) observed that ICICI grew
of developing the nation by taking several initiatives to to be the primary Indian company and the initial bank
ensure a safe, secure, sound, efficient, accessible and or financial institution. This study was based on
authorized No. of Branches, No. of ATMs, Total analytical nature. The main study was financial
Deposit, Total Loan & Advance and Total performance of ICICI bank in India using camel analysis
Nonperforming Assets (NPA) in India. Analysis mean, model. The secondary data was collected from ICICI
SD., average growth rate and simple percentage trend Bank annual report; the data has been analyzed using
graphs have been used to analyze and interpret the data ratio analysis. The concluded that ICICI bank was in
on Progress of Deposits, Loans and NPA SBI and an increasing trend and liquidity restrictions were on
ICICI Bank in India during the study period of 10 years the apex pose.
(2011 to 2020). Bhagyalakshmi Burra., (2020) said India is the top
II. OBJECTIVES OF THE PAPER rising Smartphone user nation. In India, more than 900
million customers are utilizing Smartphone users, but
The following are the objectives of the present paper: only 40 million banking customers also use mobile
1. To examine the SBI & ICICI Bank in India. banking transactions. There can be different factors,
2. To compare the SBI & ICICI Bank for No.of including the need for dynamic cooperation between
Branches, No. of ATMs, Total Deposit, Total Loan banks. Variables are one of the world's best growing
& Advance and Total NPA (2011 to 2020) in India. markets. SBI has successfully launched several more
applications which have resulted in banking a future
III. RESEARCH METHODOLOGY simpler business for customer's services.
The present paper is descriptive in nature and is Comparative Analyze for SBI & ICICI bank for
based on SBI & ICICI Bank in India secondary data number of branches, number of ATMs, total deposit,
only. The data were collected from SBI & ICICI Bank total loan & advance and total NPA (2011 to 2020) in
in India annual reports last 10 years (2011 to 2020) India
and other related publications. The literature was
collected from authorized national and international An Evaluative Study on comparative analysis for SBI
published journals and related websites. The analysis & ICICI bank in the number of branches, number of
was based on trend line graphs, growth analysis and ATMs, total deposit, total loan & advance and total
descriptive statistics regression has been used to analyze NPA (2011 to 2020) in India.
this data.
IV. LITERATURE REVIEW
Brahma Chaudhuri., (2018) said that the banking
industry is moving to play a role in the economic
development of a country. It provides the support of
the economy, finance institutions, those chains and
promotes growth in all the banking industries and
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1041
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Chart 1 SBI & ICICI Bank number of branches in India Chart 3 SBI & ICICI Bank Total Deposit in India
These measures of Trend Line Graphs on Progress Source: SBI & ICICI Bank Annual Report on 2010-11 to 2019-
of SBI & ICICI Bank in India are presented below the 20.
SBI No. of ATMs that is positive but below 50% trend In these measures of Trend Line Graphs on Progress
; R-squared value is 0.455. So, it has a correct fit of of SBI & ICICI Bank in India are presented below the
the trend line is nearest to 46% growth and ICICI Bank SBI Total Loan & Advance that is positive trend ; R-
No. of ATMs has a positive trend; R-squared value is squared value is 0.852. So, it has a correct fit of the
0.886. So, it has a correct fit of the trend line is nearest trend line is nearest to 85% growth and ICICI Bank
to 89% growth. Hence ICICI Bank number of ATMs Total Loan & Advance that is positive trend; R-squared
is high for customer services. value is 0.991. So, it has a correct fit of the trend line is
nearest to 99% growth. Hence Total Loan & Advance
for ICICI Bank is high for customer services.
1042 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Chart 5 SBI & ICICI Bank Total NPA in India Table 2 Descriptive Statistics Analysis ICICI Bank (2010- 11 to
2019-20) in India
NPA is not regular. As the Skewness value is good. It is analyzed from the table 3 that the difference
Which is between "-1 or greater than 1", the distribution between SBI under Loan, Deposit and NPA Loan to
is highly skewed. If the kurtosis ranges from 0 to 3, Deposit Ratio range is from 0.097 to 0.187, Reserve
there is normal distribution. But the calculated kurtosis value is 8144 to 29270, Reserve Ratio range is 1.108
has no normal distribution. Growths are better than to 1.184, Deposit/Loan (%) range is 10 to 19 and NPA/
results. It is classified as Compound Average Growth Loan & Advance (%) range is 7 to 19.517.
Rate (CAGR) higher than total NPA.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1043
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Table 4 ICICI Bank Loan, Deposit and NPA Ratio and Table 6 Regression Analysis of SBI Deposit & Loan
Percentage Analysis
Sum of Mean R
Model df F Sig. R
Squares Square Square
Loan to Deposit NPA/Loan
Reserve Regression 7350523 1 7350523
Year Deposit Reserve /Loan & Advance 0.001 b 0.879 a
Ratio Residual 2169490 8 271186 27 0.772
Ratio (%) (%) Total 9520013 9
2010-11 0.959 93 24 96 1.136 a. Dependent Variable: SBI Loan
2011-12 0.993 18 142 99 0.747 b. Predictors: (Constant), SBI Deposit
2012-13 0.992 23 127 99 0.77 Coefficients
2013-14 1.02 -68 -49 102 0.975 Standardized
Unstandardized Coefficients
Model Coefficients T Sig.
2014-15 1.072 -259 -14 107 1.632 B Std. Error Beta
2015-16 1.033 -138 -30 103 3.055 (Constant) 450.940 431.055 - 1.046 0.326
2016-17 0.947 258 19 95 5.482 S BI
0.110 0.021 0.879 5.206 0.001
2017-18 0.913 486 12 91 5.442 Deposit
2018-19 0.898 663 10 90 2.314 a. Dependent Variable: SBI Loan
2019-20 0.837 1257 6 84 1.567 Source: Computed Data
Source: Computed Data
It is analyzed from table 6 that the difference
It is observed from the table 4 that the difference between SBI under Deposit and Loan for regression
between SBI under Loan, Deposit and NPA Loan to analysis based on F-value is 27.105, R square value is
Deposit Ratio range is from 0.837 to 1.072, Reserve 77% and P-value is highly significant.
value is -259 to 1257, Reserve Ratio range is -49 to Table 7 Regression Analysis of ICICI Bank Deposit & Loan
142, Deposit/Loan (%) range is 84 to 107 and NPA/ Sum of Mean R
Model df F Sig. R
Loan & Advance (%) range is 0.747 to 5.482. Regression
Squares
17768372 1
Square
17768372
Square
Table 5 Correlation Coefficient Analysis of SBI and ICICI Residual 470903 8 58863 302 0.000b 0.987 a 0.974
Total 18239274 9
Bank a. Dependent Variable: ICICI Loan
b. Predictors: (Constant), ICICI Deposit
SBI ICICI Bank
Coefficients
Total Total Standar dized
Items Total Total Total Total Unstandardized Coefficients
Loan & Loan & Model Coefficients T Sig.
Deposit NPA Deposit NPA
Advance Advance B Std. Error Beta
Total Deposit 1.000 - - 1.000 - - (Constant) 725.352 210.46 - 3.447 0.009
Total Loan & ICICI
0.879 1.000 - 0.987 1.000 - 0.780 0.045 0.987 17.374 0.000
Advanc e Deposit
Total NPA 0.884 0.888 1.000 0.580 0.622 1.000 a. Dependent Variable: ICICI Loan
It is related between from the table 5 that the It is analyzed from table 7 that the difference
Correlation Coefficient Analysis of SBI and ICICI Bank between ICICI Bank under Deposit and Loan for
under Total Deposit, Total Loan & Advance and Total regression analysis based on F-value is 301.86, R
NPA of correlation relationship between Total Deposit square value is 97% and P-value is highly significant.
to Total Loan & Advance & Total NPA are 88% that
V. CONCLUSION
is a very highly positive relationship, Total Loan &
Advance to Total NPA are 88% that is a very highly The result was concluded by comparative analysis
positive relationship. ICICI Bank correlation relationship of the SBI & ICICI Bank under No. of Branches, No.
between Total Deposit to Total Loan & Advance 99% of ATMs, Total Deposit, Total Loan & Advance and
and Total NPA are 58% that is a very highly positive Total NPA in India. In these measures of Trend Line
relationship. Total NPA to Total Loan & Advance are Graphs on Progress of SBI & ICICI Bank in India
62% that is a very highly positive relationship. under ICICI Bank number of branches is high for
customer services. ICICI Bank number of ATMs is high
for customer services. Nearest to collect the same
deposit for SBI & ICICI Bank is equal for customer
services. Total Loan & Advance for ICICI Bank is high
for customer services. Total Loan & Advance for ICICI
Bank is high for customer services. SBI under Deposit
and Loan for regression analysis based on F-value is
1044 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
27.105, R square value is 77% and P-value is highly [5] Brahma Chaudhuri., (2018). A Comparative Analysis of SBI and
ICICI: Camel Approach. International Journal of Research in
significant and ICICI Bank under Deposit and Loan Management, Economics and Commerce, 8 (1), 151-156.
for regression analysis based on F-value is 301.86, R
[6] Dr. G. Santiyavalli, "Customer Perception of Service Quality of
square value is 97% and P-value is highly significant. State Bank of India - A Factor Analysis", International Journal of
The RBI guidelines to SBI and ICICI banking sectors Management and Business Studies, 1(3), 78-84.
are improving on providing loan & advances and proper [7] https://community.gooddata.com/metricsandmaqlkbarticles43/
collection of NPAs. SBI has a customer base very high normalitytestingskewnessandkurtosis241
and ICICI Bank have a customer base is nearest to [8] https://dbpedia.org/page/ICICI_Bank
high. So, Therefore customer is credits for banks. [9] https://en.wikipedia.org/wiki/State_Bank_of_India
REFERENCES [10]https://en.wikiredia.com/wiki/State_Bank_of_India
[11]https://ijbed.com/PDF/no1vol6/IJBED202029.pdf
[1] Alagarsamy.K., & Wilson, S., (2013). A study on customer
behavior towards banking services with special reference to public [12]Routray (2008), "Wireless ATM: A Technological Framework
sector banks in Sivagangai Dist, Asia Pacific Journal of Marketing, to M-Banking", Journal of Internet Banking and Commerce,
2 (2), 183-196. 13(1), 2-9.
[2] Arun Kumar Kaushik., (2012). E-banking system in SBI. [13]Sangmi, M. and Nazir, T. (2010). Analysing financial performance
International Journal of Multidisciplinary Research, 2 (7), 76- of commercial banks in India, Application of CAMEL model,
97. Pakistan Journal of Commerce and Social Science, 4(1), 40-55
[3] Balakrishnan C., (2019). A Study on Financial Performance of [14]Siddiqi, K. O., (2011). Interrelations between Service Quality
ICICI Bank. Cikitusi Journal for Multidisciplinary Research, 6 Attributes, Customer Satisfaction and Customer Loyalty in the
(4), 694-701. Retail Banking Sector in Bangladesh, International Journal of
Business and Management, 6 (3), 12-36.
[4] Bhagyalakshmi Burra., (2020). A Comparative Study between
Customer Perceptions towards SBI YONO and other Mobile [15]Uppal R.K. (2010). Emerging Issues and Strategies to Enhance
Banking Services. Science, Technology and Development, 11 (12), M-Banking Services. African Journal of Marketing. 2(2), 29-36.
349-359.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1045
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
1046 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
• Affiliate Marketing: This is a type of performance- • Online PR: Online PR is practice of securing earned
based advertising where you receive commission for online coverage with digital publications, blogs, and
promoting someone else's products, services on your other content-based websites. It's much like traditional
website. Affiliate marketing channels include Hosting PR, but in the online space. The channels you can
video ads through the YouTube Partner Program and use to maximize your PR efforts include: Reporter
Posting affiliate links from your social media accounts. outreach via social media Engaging online reviews
of your company, Engaging comments on your
• Native Advertising : Native advertising refers to
personal website or blog.
advertisements that are primarily content-led and
featured on a platform alongside other, non-paid D. Digital Marketing -Role in Today's
content. Buzz Feed-sponsored posts are a good Businesses:
example, but many people also consider social media
advertising to be "native" - Face book advertising and Regardless of what your company sells, digital
Instagram advertising. marketing still involves building out buyer's personas to
identify your audience's needs and creating valuable
• Marketing Automation: Marketing automation
refers to the software that serves to automate your
online content.
basic marketing operations. Many marketing • Content Performance and Lead Generation
departments can automate repetitive tasks they would
otherwise do manually, such as Email newsletters, • Attribution Modeling
Social media post scheduling, Contact list updating, • Online behavioral advertising
Lead-nurturing workflows, Campaign tracking and
reporting. • Collaborative Environment
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1047
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
E. Pros and Cons of Digital Marketing: proliferation, and changing consumer demographics.
Digital marketing allows marketers to see accurate Three of these four biggest challenges correspond to
results in real time. If an advert is put in newspaper, it is the development of digital marketing. [8, 9].
difficult to estimate how many people actually flipped Professor George Day of Wharton has identified a
to that page and paid attention to ad. There's no surefire growing gap between the accelerating complexity of
way to know if that ad was responsible for any sales at markets and the ability of most marketing organizations
all. Yet digital marketing would help you to know reach to understand and cope with this complexity. While
for your product/service, to get engaged with market fragmentation and rapid change forces are
prospective customers, to have global reach, to everywhere, we believe that the use of the Internet is a
promote in personalized manner. However, with digital major driver of widening the gap. [10]
marketing have some setbacks .Digital marketing is According to Jamal, the Internet has become one
highly dependent on the internet. Because internet may of the most important markets for goods and services
not be accessible in certain areas or consumers may transactions. For example, consumer spending in the
have poor internet connection. It has lot of clutter, so U.S. Internet has exceeded $100 billion (already in
marketers find it hard to make their advertisements 2007), and online demand for information products such
stand out, and get consumers to start conversations as books, magazines and software is growing at a rate
about an organizations brand image or products. But of 25% to 50% [11].
still large amount of competing goods and services that
are also using same digital marketing strategies can be Social media have changed the way a brand's
the disadvantage. Some companies can be portrayed content is created, distributed and consumed,
by customers negatively as some consumers lack trust transferring the power to shape the brand image from
online due to the amount of advertising that appears on marketers to online communications and consumer
websites and social media that can be considered content [12].
frauds. Even an individual or small group of people can The Institute of Digital Marketing (DMI) defines
harm image of an established brand. Digital marketing digital marketing as "the use of digital technology to
disseminates only information to prospects most of create integrated, targeted and measurable
whom do not have purchasing authority/power. Hence communication that helps to acquire and retain
reflection of digital marketing into real sales volume is customers in building deeper relationships with them"
skeptical. [13].
III. REVIEW OF LITERATURE IV. A LIGHT ON REAL CASES UNDER
Transforming communication channels is a complex DIGITAL MARKETING:
task for all industries, but especially for communication 1. Every Smile Matters: Britannia Good Day
and marketing industries.As Malhern notes, "Digitization supports children born with cleft lip
of the media represents a phase shift in the history of
On World Smiles Day, October 5th, Britannia Good
communications. [7]
Day launched the Every Smile Matters campaign. The
According to Fader (2012), the 1990s were a campaign focuses on very important aspect that in
decade of e-commerce, and the beginning of the 21st today's day and age, smiles have been taken for granted
century was an era of social commerce. The role of and we don't smile enough. Good Day, has partnered
"digital marketing" is confirmed by IBM's research, with Smile Train India, the world's leading cleft charity
which consists of interviews with CMOs (IBM Institute that provides free cleft surgery and care to children.
for Business Value, 2011). These WSCs articulate the According to a Smile Train study, 1 in 1,000 Indian
following four biggest challenges: data explosion children are born with a cleft lip -common birth
(sometimes also called big data), social media, channel condition that can occur alone or as part of genetic
1048 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
The Har Kismi Mein Hai Kiss campaign by Parle [3] Chaffey, D. and Ellis-Chadwick, F."Digital Marketing: Strategy,
Implementation and Practice. 1st ed". Harlow: Pearson Education.
Kismi is an attempt to spread some love on Valentine's
[4]Dahiya R., "A Research Paper on Digital Marketing
Day by dropping in a reminder to consumers with the Communication and Consumer Buying Decision Process: An
help of their Dabbawalas. Working professionals often Empirical Study in the Indian Passenger Car Market", Journal of
forget Valentine's Day and Parle Kismi wanted to send Global Marketing 31(2):1- 23, September 2017.
out a sweet reminder to consumers to wish their partners [5]Elizabeth S. B, "Digital Marketing" Vol 14, PP 28-34
in time. 'Food is way to one's heart' so Parle February2011.
collaborated with the most successful food delivery [6] French, A. and Smith, G. "Measuring brand association strength:
system - The Dabbawalas. They made pouch of love a consumer based brand equity approach",European Journal of
Marketing, Vol 47(8), pp.1356-1367,2013.
that consisted of Kismi pan toffees - new variant of
[7] Mulhern, F. J. Mark. Comm., Vol 15(2- 3), pp 85-101,2009.
Kismi and a reminder note asking them to express love
to their loved ones this Valentine's. This pouch was [8]. P. S. Fader, R. S. Winer, Mark. Scie., Vol 31(3), pp 369- 371,
2012.
attached to each dabba and was received by almost
[9] IBM CMO C-suite Studies. (2011)
one lakh people. This simple act by Parle Kismi brought
joy to lives of many couples in Mumbai. Parle Kismi [10] G. S. Day, J. Mark., Vol 75(4), pp 183-195, 2011.
has always stood as an enabler and bringing about small [11] C. Wymbs, J. Mark. Educa., Vol 33(1), pp 93-106,2011.
moments of happiness in lives of its consumers. This [12] P. Albuquerque, P. Pavlidis, U. Chatow, K. Y. Chen, Z. Jamal,
campaign was an extension of the thought for Valentine's Mark. Sci.,Vol 31(3), pp406- 432,2012.
Day. [13] W. H. S. Tsai, L. R. Men, J. Inte. Adv., Vol 13(2), pp76-87,2013.
V. CONCLUSION
To summarize, digital marketing has a bright future
for long term sustainability of the product or services in
the current technological market with all its pros and
cons.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1049
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Public Distribution System in India has regular basis at reasonable prices, (ii) work as an
been one of the most crucial elements in food policy effective anti- inflationary measure and (iii) make
and food security system in the country and with significant contribution in raising the nutritional standard
special emphasis to the functioning of public sector of the poor. Over the years, it expanded enormously
agricultural warehousing agencies such as Food
emerging as food security and poverty alleviation
Corporation of India (FCI) and Central
Warehousing Corporation (CWC), engaged in the measure to become a permanent feature in Indian
procurement, transportation, storage and Economy and it evolved as a major instrument of
distribution of food grains, It is the largest government economic policies. In 1992, PDS was
distribution network of its kind in the world. It replaced with Revamped Public Distribution System
emerged out as rationing measure in the backdrop (RPDS) as an experiment in geographical targeting
of Bengal food crisis as well as a war-time measure because PDS was criticized on the grounds of its being
during Second World War. It evolved in 1950s and urban biased. Subbarao (1988) observed that the poor
1960s as mechanism for providing price support in rural areas did not benefit much but the urban
to producers and food subsidy for consumers. Over population undoubtedly benefitted from PDS. Another
the years it has expanded enormously as poverty scholar (Shah 1986) observed that nearly 57 percent
alleviation and food security measure to become a
of PDS food grains was for urban areas and only 27
permanent feature of Indian Economy. The present
paper discusses the present scenario of Public
percent was for rural areas. RPDS was started with a
distribution system in India across states. It throws view to provide relief to the poor people of desert,
light on the working of PDS and some policy hilly, drought prone and Adivasi areas of the country.
measures for its better working. Finally the system was restructured to target the poor
households as Targeted Public Distribution System
Key Words: Public Distribution System, Fair
Price Shops, BPL, APL, TPDS (Targetedpublic (TPDS) across all regions in 1997. TPDS aims at
distribution system), and FCI (Food corporation providing food grains to people below poverty line
of India) and CWC (CentralWarehousing (BPL) at highly subsidized prices and food grains to
Corporations). people above the poverty line (APL) at much higher
prices than BPL beneficiaries. Thus TPDS adopted by
I. INTRODUCTION the Government of India maintains the universal
The origin of Public Distribution System (PDS) in character of the PDS but adds a special focus on people
India can be traced from the Second World War (1939- living below poverty line. PDS with a wide network of
45) and in the backdrop of Bengal famine in 1943, about 4.99 lakh Fair Price Shops (FPSs), better known
which evolved in 1950s and 1960s as mechanism for as Ration Shops, is perhaps the largest distribution
providing price support to producers and food subsidy network of its kind in the World. The quantity of grains
for consumers. The concept of Public Distribution to be procured is determined by the central government
System has evolved as a major policy instrument to (i) considering the existing requirement and by allotting a
reach essential commodities to the people, particularly buffer to meet any emergency arising out of flood, famine
the weaker sections of the society, on an assured and or other such natural calamities. The food grains are
bought from the farmers through the purchase centers
1050 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
and then sent to FCI warehouse or FCI affiliated Few researchers have documented the administrative
warehouse. The food grains are distributed across states problem in PDS and shown in many states that there is
depending on the productivity and climate of that state. large scale diversion of grain, wastage and low quality.
Major flaw in the working of PDS is that it has wrongly
Theme of Research: excluded a large number of deserving persons and
The main objective of this paper is to present the families. Karat (2008) pointed out that planning
picture of coverage of PDS across states and to throw commission evaluated that 57% of poor had been
light on the flaws in the working of PDS. The present actually excluded from the BPL system. According to
study is based on the data obtained from Food grains the report of National Sample Survey, at all India level
Bulletin and Census of India 2011. We have taken total 70.5% of rural households either possessed no card or
cereal quantity not crop specific quantities because the held an APL card and are effectively excluded from
states differ with respect to tastes and preferences PDS (Swaminathan 2008). Very high proportion of
across crops. For example, the rice is consumed mainly landless and near landless household did not possess
in south while the wheat in north. BPL or Antyodaya cards in many states (86% in
Sikkim, 80% in Goa, 79% in Uttar Pradesh, 76% in
Flaws in The Working of PDS:
Haryana, 75% in Jharkhand and 74% in Uttaranchal
All is not well with public distribution in India. There for example) and mere excluded from PDS (ibid).
are many problems associated with the working of PDS Besides the targeting error, there is another serious
that are: problem of leakage and diversion. There is 36 percent
• Large errors of exclusion of BPL families and diversion of wheat, 31 percent of rice and 23 percent
inclusion of APL families. diversion of sugar from the system at the national level
(Jena 2002). Khera (2011) has pointed out that 44%
• Diversion of subsidized food grains to open market. of PDS grain was diverted at the all India level in 2007-
• Prevalence of ghost cards. 08. According to another scholar (Mishra 2008) about
58% subsidized food grains issued from Central Pool
• Lack of transparency in the selection of procedure
of PDS dealers.
do not reach to the BPL families owing to leakages and
diversion. Moreover, the cost of income transfer to poor
• Poor quality of food grains (PDS articles). is much higher e.g. for one rupee worth of income
• Lack of Infrastructure and shortage of funds with transfer to poor, the government of India spent R.3.65.
the governments of many states. Due to lack of effective targeting mechanism and large
scale leakage due to corruption, the cost effectiveness
• Weak monitoring and lack of transparency and
inadequate accountability of official implementing the
of extending food subsidy to the poor has been low.
scheme. According to a scholar (Parikh 1994) the "cost
effectiveness of PDS reaching the poorest 20 percent
• A large number of homeless and poor, without having of the households through the PDS cereals is very small.
permanent address are denied ration cards and thus For every rupee spent, less than 22 paisa reaches the
excluded from PDS, despite being Indian citizens.
poor in all states excepting Goa, Daman and Diu where
• The poor don't have cash to buy the entire quantity 28 paisa reach the poor. This is not to suggest that PDS
of entitlements at a time. does not benefit the poor at all, but only to emphasize
• The present procedure for selection of BPL that this support is provided at highest cost." If one
beneficiaries is not satisfactory. takes Central Government cost into account, Rs. 4.3
was incurred to transfer one rupee of income to the
• Cost effectiveness of PDS is very small.
poor (Jena 2002).
• Not lifting their ration quota by APL households as
APL price is close to open market price.
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1051
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Literature Review: poor, revealed that the program is not well targeted
Previous studies on different public distribution and the poor as well as the non-poor receive subsidy
systems yielded mixed conclusions. The benefits of PDS benefits. The inefficiency of state institutions in controlling
were well recognized by emerging economies. Public food prices and managing PDS with implications on
distribution schemes in Bangladesh, Cambodia and quality of the products was previously reported by
Pakistan have helped to get more girls into education Ramaswamy and Balakrishnan (2002). The study shows
(Ahmed et al., 2007).The PDS in India has been that demand switches will not occur as long as the
operational for more than five decades. Growth of the market price of food grains remains higher than the
PDS, its functioning, coverage and its efficiency on subsidized grains. However, the quality of the product
providing food security was discussed by (Bapana, becomes the determining factor when the price of the
1990). Several developing countries including India open market is similar to that of the subsidized
achieved food self-sufficiency because of well organized commodities.
PDSs for agricultural produce. The PDS makes food
accessible and transfers income in the form of subsidy.
As per Jha (1992), about 40-50 % of the population
buys subsidized rice and wheat and about half of them
are non-poor. It means that a substantial part of PDS
benefits accumulates to the non-poor. It was previously
reported about the PDS, that the access to resources
and utilization of commodities has been low and it has
hardly impacted the nutritional status of the targeted
populations. (Khera, 2011; Radhakrishna et al., 1997).
Arora (2013) examined food subsidy in India and FIG: Amount of Government Expenditures on Food Subsidy
investigated the reasons behind the failure of PDS in
Many among scientists, policy reformers and other
many parts of the country. The study reports the system
stake holders argued that the PDS need to be reformed
failed to reach the poor in most of the states other than
so as to target specifically the poor and needy (Jha
the southern states like Andhra Pradesh, Tamil Nadu
1992; Ahluwalia 1993; Pal et al., 1993). Consequently,
and Kerala, where it has been partially successful.
the Government relaunched PDS as Targeted Public
Rashpaljeet and Kaur (2014) studied the organization
Distribution System (TPDS) which aims to reach a
and working of PDS in Punjab and reported the major
provide 60 million families below poverty line with 20
leaks and weaknesses in the functioning of the scheme
kg grains each month. According to the study conducted
in the state. The study found that in Punjab, nearly 76%
by Sivakkolundu and Loganathan (2013), about six
of the food grains were diverted to the open market
crores families the nation is benefited by the TPDS.
and another 13% was diverted APL households. A mere
The functioning of organizations like Food Corporation
10% of the grains reach the BPL beneficiaries. It has
of India and Central Warehousing Corporation in
been argued that "common issue price" could be a
ensuring procurement, transportation, storage and
possible way to reduce leakages and misappropriation
distribution of commodities provided by the public
of commodities. However, considering the enormity of
distribution system was critically analyzed by Pal (2011).
food insecurity and hunger in India the provision of food
subsidy and rationalizing the distribution of grains is not The study reveals that that the current system is
adequate for the population (Jha et al., 2010) In another extremely corrupt and fails to address issues related to
comparative study on PDS conducted by the same stoke shortage, fake supply entries in ration cards,
authors (Jha et al., 2013) based on the factors like food diversion of commodities for sale to open market, ,
subsidy, income transfer and the involvement of the irregularity and poor quality of food grains etc. The
1052 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
situation calls for urgent technical up gradations and owing to the provision of higher minimum support prices
policy reforms to ensure transparency, and improve (MSP) for food grains, an elevated level of procurement
performance to solve the above mentioned problems. of was recorded during the last five years, This in turn,
not only ensured remunerative prices to farmers but
METHODOLOGY: also caused strain on available storage capacities with
The data for a period 5 years from 2007-08 to 2011- the State agencies involved in procurement. States have
12 has been collected from secondary sources such as been facing severe deficits for covered storage capacity.
annual reports of Food Corporation of India, Central FCI recorded an annual turnover of Rs. 97719.59
Warehousing Corporation, Warehousing Development crores in 2011-12. The capital employed turnover ratio
and Regulatory Authority (WDRA), CAG report reduced to 16.10 from 5.35 in 2007-08. The net worth
onstorage management and movement food grains in reduced from Rs. 2433.66 to 2155.04 crores. The
FCI, Planning Commission report on warehousing annual turnover of CWC was Rs. 1218.65 crores with
development and regulation for the twelfth plan period a capital employed turnover ratio of 0.99. The net worth
(2012-17) and Agricultural Statistics -2013, Directorate increased substantially from 1080.24 crores in 2007-
of Economics and Statistics. The data has been 08 to 1304.08 crores in 2011-12. The capital employed
analyzed to find the capacity, stock position and turnover ratio shows how efficiently capital employed
percentage of utilization of warehouses during the last in the corporation has been utilized in generating revenue
5 years. Furthermore, the aggregate food grain and establishes the relationship between the amount of
procurement, per-capita availability of food grains, sales and capital employed. The reduction in capital
consumer subsidy on food grains etc. was also employed turn over ration of FCI in on account of the
evaluated. subsequent growth in working capital as compared to
slight growth in overall sales. A consistent increase in
RESULTS AND DISCUSSION:
net worth indicates good financial health of CWC;
The total operating capacity and percentage of conversely, the net worth of FCI may be depleted by
capacity utilization of CWC and FCI warehouses during annual operating losses such as transient and storage
the 2007-08 to 2011-12. The overall percentage of losses of commodities or other depreciations etc. The
utilization of CWC warehouses increased from 73.61% procurement volume of rice steadily increased from
in 200-08 to 91% in 2011-12. However, a marginal 287.36 LMT during 2007-08 to 344.64 LMT in 2011-
3% increase was recorded in the capacity utilization of 12. Wheat procurement during the period also observed
FCI warehouses during the period of study. The average similar trend i.e 111.28 LMT during 2007-08 to 283.35
operating capacity and the utilization of storage capacity LMT in 2011-12. However, as per the recent CAG
per warehouse. The average utilization of storage report on storage management and movement of food
capacity per warehouse has been calculated by dividing grains in FCI, The average food grains procurement of
total utilization of storage capacity during the period of 514 LMT during the period was lower than the average
study by the number of warehouses.The CWC allocation of 593 LMT made by the Government of
warehouses have 0.215 lakh metric tons (LMT) average India to states for distribution under Targeted Public
operating capacity in 2012 of which 0.194 LMT is Distribution System (TPDS) and other welfare schemes
utilized whereas, FCI warehouses has 0.089 LMT in (CAG Report 2013). With the objective of reducing
average storage capacity. The average storage the overdependence of the State Governments on the
utilization recorded in 2012 was 0.074 LMT. The results FCI for TPDS and reducing transportation costs by
indicate that the average utilization per warehouse was ensuring availability of locally produced food grains,
less than the average storage capacity per warehouse the Government introduced the scheme of Decentralized
in all the 5 years because the average storage capacity Procurement (DCP) of food grains. Under this scheme,
of the warehouses was not fully utilized by the which is being implemented in eleven States and Union
depositors over the study period. On the other hand, Territories can retain the quantity required for TPDS
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1053
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
and surrender the rest to FCI for the Central Pool. The corresponding period. The consumer percentage share
actual wheat stocks at the beginning of 2012 were in total FCI subsidy was ranged between 87 to 90.3%
256.76 LMT against the minimum buffer stock of 122 during the study period whilst, the share of buffer stock
LMT as stipulated by the government. The rice stocks subsidy was reduced from 13.9 % to 9.7%. According
recorded a total volume of 297.18 LMT against the to the economic survey (2011-12), the main reasons
minimum buffer stock of 138 LMT. Buffer stocks are for increasing in consumer subsidy are steep rises in
maintained by FCI in order to stabilize the availability minimum support or procurement prices, accumulation
and prices of food grains, and, thereby, to achieve of large stocks of grains, rising economic costs of food
national food security. Maintenance of low buffer stocks grains, and a constant central issue prices of food grains.
adversely affects the national food security, whereas The per capita net availability of rice and wheat declined
carrying too high stocks is costly and inflationary (Gulati from 71kg and 56.5 kg respectively in 2008 to 69.4
et al., 1996). The annual wheat purchase volume kg and 55.9 kg in 2012. However the total availability
steadily progressed from 114.1 LMT in 2007-08 to of cereals and other pulses increased considerably. The
226.8 LMT in 2011-12 whereas rice purchase per capita availability of food grains has been widely
increased from 197.1 LMT to 226.8 LMT during the accepted as an indicator of food security at household
period. Consequently the sale volume also recorded level. It is estimated that the post harvest loss of total
higher progressions. The total food grain sales increased agriculture food grain produce in India is about 7-10%
311.2 LMT in 2007-08 to 468.8 LMT in 2011-12. A and another 4-5% is lost during the marketing and
minimum support price (MSP) for the producers is fixed distribution processes. An overall loss of 11-15% which
by the Government of India and procurement is done estimates to 12-16 million metric tons that can feed
at this rates. There are various programs under the another 70-100 million people in the country, since the
TPDS and other welfare schemes in which a Central average per capita consumption of food grains in India
Issue Price (CIP) of food grains are fixed and specific is 15 kg per month. (Rehman et al., 2012).
quantities are allocated to each state. The difference
between the economic cost (MSP plus the post REFERENCES:
procurement and distribution cost) and the CIP is the 1. Jena, A.C: "Public distribution System: Impact, Status and Future
Programmes," Kurukshetra, October, pp. 56-64. (2002),
operational loss of the corporation which is reimbursed
by the Government of India as food subsidy. Besides 2. Karat, Brinda : "Food at Slake", Yojana, July, pp. 35-38. (2008),
this, Government of India also reimburses the cost of 3. Agricultural Statistics: Directorate of Economics and Statistics.
Department of Agriculture and Cooperation, Ministry of
carrying of buffer stock of food grains maintained by Agriculture, Government of India. (2013).
FCI as a part of subsidy (FCI annual report 2011-12).
4. Ahluwalia, D: Public Distribution of Food in India: Coverage,
The Antyodaya Anna Yojana (AAY) scheme was Targeting and Leakages. Food Policy, 18 (1): 33-54. (1993).
launched in December 2000 in which ten million poorest 5. Ahmed, T., Rashida, A., Francisco Espejo., Aulo Gelli and Ute
households among the 65 million below poverty line Meir: Food for education improves Girls education: the Pakistan
(BPL) families were identified and provided them with Girls education programme,. World Food Programme report,
2007.
25 kg of food grains per family per month at a low
price of Rs 2/kg for wheat and Rs 3/kg for rice. As a 6. Arora, R.U: Food Subsidies for the Poor in India: Are they
Working? Journal of Asian Public Policy. 6(3): 13-21. (2013).
result, the average consumer subsidy on wheat has
7. Bapana, S.L: Food Security through the PDS: The Indian Expe
increased from Rs. 1148.70 per quintal in 2007-08 to
rience. In D.S. Tyagi (ed). Increasing access to Food, The Asian
Rs. 1451.90 in 2011-12, whereas subsidy on rice Experience, Sage Publications. (1990).
increased from Rs. 1271.40 to Rs. 1880.20 per quintal. 8. Bhat, G.M and Hussain, B.A. Efficiency of Public Distribution
In the case for BPL households the subsidy on wheat System in Kashmir: Micro Economic Analysis, International
was raised from Rs.738.70 per quintal to Rs.1041.90 Research Journal of Social Sciences. 1(4): 24-27. (2012).
per quintal and for rice the subsidy was increased from
Rs. 741.40 to Rs.1354.20 per quintal during the
1054 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1055
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: A Public Distribution System (PDS), under Ministry of Consumer Affairs, Food and managed
also known as "Ration Shop" or Fair Price jointly with state governments of India. In India this
Shop"(FPS). It is a part of India's public distribution scheme was launched on June 1997. This system
system established by the Government of India distributes both basic food and non- food commodities
under Ministry of Consumer Affairs, Food and
to the vulnerable sections of the society at very cheap
Public Distribution. The main motto of the project
is Government distributes rations at a subsidized
rates. India is the largest distribution network in the
price to the poor. Usually these are known as world has 478000 ration shops. Ration Shops are
"Ration shops" and chiefly sell wheat, rice, operated throughout the country by the joint assistance
kerosene and sugar at a price lower than that of of both central and the state government but are
market price. Now other essential commodities are managed under private sector.Under PDS scheme, a
also sold. To buy these items one must have a ration Below Poverty Line (BPL) card holder should be given
card. The items from these shops are much cheaper 35kg of food grain and the card holder Above the
but are of poor quality. Ration shops are now Poverty Line (APL) should be given 15kg of food grain
present in most localities in villages, towns and on the monthly basis. Central Government provides
cities. All activities of this shop are done manually. special schemes
They keep all records in big paper file. Government
provides Register Book, Issue Book, Bill book, Andhyothaya Anna Yojana (AAY)
through the Supply Office to the Ration Shop
dealers. The Dealers must keep and maintain these Under this scheme, 35 Kgs of food grains is
three books with proper entry of data. Due to the distributed to the poorest of the poor families at the
manual entry through paper work in the three rate of Rs. 1/Kg. The scheme is implemented from 25-
books, duplicate entry or wrong entry may occur, 2-2001 onwards. Since then the scheme was expanded
resulting in wasting time and resources. "A twice w.e.f 01/2004 and 01/2005. Now the number of
Systematic Application For Public Distribution: beneficiaries under the scheme is 595800 Central
Ration-Shop" is intended to fully automate Ration allotment of rice for AAY scheme is 20855 MTs/month.
shops. This system provides easy interface so that Government is issuing this rice to the beneficiaries @
person of little computer knowledge can use it Rs. 1/Kg, meeting the additional expenditure from the
easily and efficiently. This system provides
state exchequer.
enhanced functionalities and efficient process
design. Annapurna (ANP)
Keywords: Public Distribution System; Below Under this scheme, 10 Kgs of food grains is
Poverty Line; Above Poverty Line; Fair Price distributed per month free of cost to destitute above
Shops; Civil Supply Office.
the age of 65 years with no or meager subsistence. The
INTRODUCTION: Government of India fixed the target at 44,980 being
20% of the number of persons who are eligible for
Public Distribution System is an Indian Food
National Old Age Pension, but not getting the pension
Security Scheme, initiated by the Government of India
for some reasons.
1056 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1057
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- The need for innovative plan that recognizes the impact of social media on each
communicative strategies is a demand of today's business performance. It is important to identify the
dynamic market.The marketer is moving two ways various ways in which social media should be used to
that is towards technical advancement and to fulfil the objectives of the enterprise. There is an
understand the psyche of the consumer in a better
increased awareness of digital marketing tools and aids
manner. In this paper. It is emphasized that the
marketer should make a strategic plan for the
among various business. Organizations assimilate
effectivity of promotion especially through social external knowledge from the virtual environment and
media. The communications functions should be internal knowledge to enhance their capacity. [1]
in a manner to build the brand image and the brand Firms operating in fast changing dynamic
equity. This communication is important for the environments can develop the right means to
reduction of perceived risk in the mind of
continuously adapt, integrate, reconfigure, and redeploy
consumers. Also, the importance of communication
from the marketer's perspective and the advantage
resources and capabilities to become more competitive
of the consumers is discussed. There are many and disruptive in their offerings. Virtual Reality can
technologies which are harnessed by companies replace drafting, physical testing, and model building
to reach out to the consumers like virtual reality approaches to many other design tasks, consequently
and augmented reality.Apart from technology the reducing costs, development time, and uncertainties
study of human mind is also important. These both involved in engineering and design of projects. In the
ways can help the company have a successful automotive industry, augmented reality-based systems
communication strategy in an innovative manner. can support a variety of services in a factory, such as
Keywords-Innovative promotion, social media, selecting parts in a warehouse and sending repair
Psychology, Promotion strategy instructions over mobile devices to the workers. These
systems are still in early development[2]
I. INTRODUCTION
There is a need to come up with a strategic plan for
Marketing communication is how the marketer social media communication. Nowadays companies are
communicates with the final consumer also the other using data analysis and wireless networks. The best
stakeholders. The various partners, intermediaries also way of promotion is corporate marketing strategy,
to the shareholders. The work of the communication especially brand marketing These include Innovative
has grown beyond just creating awareness,informing, products,Price positioning, managing channels and
or reminding but also persuading. The communications policy on promotion. There has to refinement in brand
functions in a manner to build the brand image and the image promotion and maintenance. There is a need in
brand equity. The customers tend to create a favorable the market for high end brand services, because of
attitude towards the brand. Of the many benefits of globalization.[3]
brand image creation, it is the reduction of perceived
risk in the mind of consumers, II. DISCUSSION
It is important to understand the role of social media A. Innovative marketing communications
and its effect on current and potential customers.
Since a few years social media has gained
Therefore, it focuses on the need to create a business
prominence.There are many dynamics about
1058 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
communicate on. here are a few of the elements used Examples - Snickers ad displayed in between cricket
by the marketers to communicate to the customer. One matches, Radio ads, Spotify ads. The third element is
of them is colors. Gestalt means "Unified Whole", it studies on how
Colour psychology studies how different colours consumers perceive, process and piece together
determine human behaviour. The psychology of colour fragmented parts.The three important Gestalt principles
is used in advertising and marketing to evoke emotional are
reactions. Colour Psychology showed that colour can • Proximity or Grouping
affect human behaviour, influence human perception, • Closure
and enhance effectiveness. In a study called "Impact of
colour in marketing" it showed that 90% of customers' • Figure and Ground
product judgments are based on colour alone. For Gestalt Psychology suggests that the human brain is
example, we can discuss the impact of two colours and holistic. So, marketers use this technique to manipulate
the companies using these. different aspects of ads to indirectly communicate
Red- The colour red creates a sense of urgency, meaning to the consumer below their level of
suitable for clearance sales. It also encourages appetite. consciousness.
Thus, it is frequently used by fast-food chains. The III. CONCLUSION
colour physically stimulates the body, raising blood
pressure and heart rate. It is associated with movement, This paper discusses about the importance of
excitement, an passion. communication from the marketer's perspective and the
advantage of the consumers. There are many
Eg; Pinterest, Netflix, YouTube, red bull, Kellogg's, technologies which are harnessed by companies to
airtel, etc. reach out to the consumers like virtual reality and
Green - This colour is associated with health, augmented reality apart from technology the study of
tranquillity, power, and nature. It is used in stores to human mind is also important.
relax customers and promote environmental issues. It The psychology used by the communicator studies
stimulates harmony in your brain and encourages a the deep thought process and evaluates and incorporates
balance leading to decisiveness. it with the communication technologies to give a long-
Starbucks is a major global brand that uses this lasting impactful experience to the consumer. The
colour scheme. Green shows that Starbucks hopes to importance of understanding this communication
promote a sense of relaxation in its cafes, inviting process is needed.
customers to come in for a coffee break during a
REFERENCES
stressful day.The next element is - Marketers break
through the top - down attention by resembling to the [1] B. Surya, F. Menne, H. Sabhan, S. Suriani, H. Abubakar, and M.
Idris, "Economic growth, increasing productivity of smes, and
show.Top-down Attention here refers to the open innovation," J. Open Innov. Technol. Mark. Complex., vol.
advertisement clutter that every media consists of. Also, 7, no. 1, pp. 1-37, 2021, doi: 10.3390/joitmc7010020.
otherwise known as Noise in a marketing [2] M. Royo-Vela and M. V. Serrano, "Value co-creation process and
communication model. Therefore, Top-Down Attention measurement in 4.0 smes: An exploratory research in a b2b
marketing innovation context," Adm. Sci., vol. 11, no. 1, 2021,
is a trick, rather a psychological tactic by which
doi: 10.3390/admsci11010020.
marketers inject the message into the show itself which
[3] G. Wang and Y. Wang, "Innovative Marketing Framework for
results in lot more relevance and entertainment. The Enterprises Using Edge-Enabled Data Analysis," Mob. Inf. Syst.,
marketers thus accomplish their goal by fixating the vol. 2021, 2021, doi: 10.1155/2021/6699420.
audience's attention to their Ads
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1059
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: The Indian banking sector has practices for monitoring the NPA's and its effective
emerged as one of the strongest drivers of India's recovery.
economic growth. The Indian banking industry has
Key words: Non-performing assets,
made outstanding advancement in last few years,
liberalization, financial, Banking sector, economy.
even during the times when the rest of the world
was struggling with financial meltdown. India's 1. INTRODUCTION OF BANKING
economic development and financial sector SYSTEM IN INDIA
liberalization have led to a transformation of the
Indian banking sector over the past two decades. The banking system of a country plays an important
Today, all the banks face the matter of non- role in the economic development of any country.
performing assets whether it's public sector bank Banking system comprises of the banking institutions
or private sector bank. Non-performing assets are functioning in the country. Banking system comprises
single largest cause for irritation of banking sector from the central bank to all banking institutions which
in India. When the borrowers stops paying interest are functioning and providing financial facilities to any
or principal on loan, the lender will lose money. developmental sector like agriculture, industries, trade,
Such a loan is understood as non-performing assets
housing etc. Under the Indian banking structure central
(NPA).a strong banking sector is vital for
bank in the name of the Reserve Bank of India which
flourishing economy. The failure of the banking
sector may have an adverse impact on other regulates, directs and controls the banking institutions.
sectors. However, the banks will have to maintain Separate institutions are functioning to meet the financial
an additional provisioning of 10 per cent on such requirement of the different sectors of the economy.
accounts, RBI Governor Shaktikanta Das also said.
"In respect of all accounts for which lending
institutions decide to grant moratorium or
deferment, and which were standard as on March
1, 2020, the 90-day NPA norm shall exclude the
moratorium period, i.e., there would an asset
classification standstill for all such accounts from
March 1, 2020 to May 31, 2020," RBI said in the
statement. On March 27, RBI announced a three-
month moratorium on term loans whose
instalments were due between March 1 and May
31. NPA is a crucial parameters within the analysis Commercial Banks: Commercial banks mobilize
of monetary performance of a bank because it leads savings of general public and make them available to
to decreasing margin and better provisioning large and small industrial and trading units mainly for
requirements for doubtful debts. Besides, the working capital requirements. Commercial banks in
paper also tries to explore measures for the control India are largely Indian-public sector and private sector
and prevention of growth of NPA's, procedures and with a few foreign banks. The public sector banks
1060 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
account for more than 92 percent of the entire banking historical perspective. The past four decades and
business in India-occupying a dominant position in the particularly the last two decades witnessed cataclysmic
commercial banking. The State Bank of India and its 7 change in the face of commercial banking all over the
associate banks along with another 19banksare the world. Indian banking system has also followed the
public sector banks. same trend. In over five decades since dependence,
Regional Rural Banks: The Regional Rural Banks banking system in India has passed through five distinct
(RRBs) the newest form of banks, came into existence phase, viz.
in the middle of 1970s (sponsored by individual 1) Evolutionary Phase(priorto1950)
nationalized commercial banks) with the objective of 2) Foundation phase(1950-1968)
developing rural economy by providing credit and
deposit facilities for agriculture and other productive 3) Expansion phase(1968-1984)
activities of all kinds in rural areas. The emphasis is on 4) Consolidation phase(1984-1990)
providing such facilities to small and marginal farmers,
5) Reformatory phase(since1990)
agricultural laborers, ruralartisans and other small
entrepreneurs in rural areas. 3. INTRODUCTION OF NON-
Cooperative Banks: Cooperative banks are so- PERFORMING ASSETS
called because they are organized under the provisions The banking industry has undergone a sea change
of the Cooperative Credit Societies Act of the states. after the first phase of economic liberalization in 1991
The major beneficiary of the Cooperative Banking is and hence credit management came into picture. The
the agricultural sector in particular and the rural sector primary function of banks is to lend funds as loans to
in general. The cooperative credit institutions operating various sectors such as agriculture, industry, personal
in the country are mainly of twokinds: agricultural and housing etc. and to receive deposits. Receiving
(dominant) and non-agricultural. There are two separate deposit involves no risk, since it is the banker who owes
cooperative agencies for the provision of agricultural a duty to repay the deposit, whenever it is demanded.
credit. One for short and medium-term credit, and the On the other hand lending always involves much risk
other for long-term credit. The former has three tier because there is no certainty of repayment. In recent
and federal structure. At the apex is the State Co- times the banks have become very cautious in extending
operative Bank (SCB) (cooperation being a state loans, the reason being mounting nonperforming assets.
subject in India), at the intermediate (district) level are Non-performing assets had been the single largest cause
the Central Cooperative Banks (CCBs) and at the of irritation of the banking sector of India. Earlier the
village level are Primary Agricultural Credit Narasimha committee-I had broadly concluded that the
Societies(PACs). Long-term agriculture credit is main reason for the reduced profitability of the
provided by the Land Development Banks. The funds commercial banks in India was given importance to
of the RBI meant for the agriculture sector actually pass priority sector lending. The committee had highlighted
through SCBs and CCBs. Originally based in rural that priority sector lending was leading to the building
sector, the cooperative credit movement has now up of non-performing assets of the banks and thus it
spread to urban areas also and there are many urban recommended it to be phased out. Subsequently, the
cooperative banks coming under SCBs. Narasimha committee-II also highlighted the need the
zero nonperforming assets for all Indian banks with
2. GROWTH OF BANKING SYSTEM IN
international presence. A major portion of the money
INDIA
lent comes from the deposits received from the public.
In order to understand present make up of banking These deposits are mostly repayable on demand.
sector in India and its past progress, it will be fitness of Therefore while sanctioning credit the banker should
things to look at its development in a somewhat longer appraise the project reasonably or else it leads to the
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1061
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
I. Substandard Assets The sources of the secondary data are bank's balance
sheet, RBI publications, published data of banks, news
II. Doubtful Assets paper clippings, economic survey and other reports of
III. Loss Assets
1062 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
government of India, published and unpublished loans. Before this law came, lenders could enforce their
research works of various eminent scholars in the field. security interests only through courts, which was a time-
consuming process.
6. Provision of NPA
Joint Lenders Forum - 2014 It was created by
According to the RBI, "Reduction of NPAs in the the inclusion of all PSBs whose loans have become
Indian banking sector should be treated as a national stressed. It is present so as to avoid loan to the same
priority item to make the system stronger, resilient and individual or company from different banks. It is
geared to meet the challenges of globalization. It is formulated to prevent the instances where one person
necessary that a public debate is started soon on the takes a loan from one bank to give a loan of the other
problem of NPAs and their resolution." Issues and bank.
Challenges for Banking Industry. As per prudential
norms of Reserve Bank of India (RBI), banks are Strategic debt restructuring (SDR) - 2015 Under
required to make provision against their different classes this scheme banks who have given loans to a corporate
of assets (loans & advances) to meet the future expected borrower gets the right to convert the complete or part
loss which may arise due to non-realisibility of dues in of their loans into equity shares in the loan taken
full from such assets. company. Its basic purpose is to ensure that more stake
of promoters in reviving stressed accounts and
What are the various steps taken to tackle providing banks with enhanced capabilities for initiating
NPAs? a change of ownership in appropriate cases.
NPAs story is not new in India and there have been Insolvency and Bankruptcy code Act-2016 It
several steps taken by the GOI on legal, financial, policy has been formulated to tackle the Chakravyuaha
level reforms. In the year 1991, Narsimham committee Challenge (Economic Survey) of the exit problem in
recommended many reforms to tackle NPAs. Some of India. The aim of this law is to promote
them were implemented. entrepreneurship, availability of credit, and balance the
SARFAESI Act - 2002 interests of all stakeholders by consolidating and
amending the laws relating to reorganization and
The Securitization and Reconstruction of Financial insolvency resolution of corporate persons, partnership
Assets and Enforcement of Security Interest firms and individuals in a time-bound manner and for
(SARFAESI) Act, 2002 - The Act permits Banks / maximization of value of assets of such persons and
Financial Institutions to recover their NPAs without the matters connected therewith or incidental thereto.
involvement of the Court, through acquiring and
disposing of the secured assets in NPA accounts with The need of the hour to tackle NPAs is some urgent
an outstanding amount of Rs. 1 lakh and above. The remedial measures. This should include:
banks have to first issue a notice. Then, on the • Technology and data analytics to identify the early
borrower's failure to repay, they can: warning signals.
1. Take ownership of security and/or • Mechanism to identify the hidden NPAs.
2. Control over the management of the borrowing • Development of internal skills for credit assessment.
concern.
• Forensic audits to understand the intent of the
3. Appoint a person to manage the concern. borrower.
ARC (Asset Reconstruction Companies)The 7. RESEARCH METHODOLOGY
RBI gave license to 14 new ARCs recently after the
amendment of the SARFAESI Act of 2002. These The present study is aimed to get an overview of
companies are created to unlock value from stressed NPA and also to explore the effective measures for the
prevention, growth and recovery of NPA. As it is a
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1063
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
proven fact that the management of NPA is one of the equivalent time the banks are required to provide
major issues as it directly contributes in the economic provisions for NPAs from their current profits. The
development of the country. The study is mainly based interest income of banks is thereby reduced. the present
on secondary data which is collected through books, profits of the banks are eroded due to provision of
published reports, newspapers, journals, projects, doubtful and bad debts. Management is to make sure
websites etc. that service level requirements are achieved. If recovery
7.1 Percentage NPA of some of the Banks, as is evident from is being properly made then it'll help to get fund and
the following table as on 31.03.2020. thus the bank having sufficient fund, could provide loans
Table: 1 and advances to its customer and generate its business.
Name of the Bank Gross NPA \ Gross So it might be said that if recovery is correctly done
Advance % then it'll help all round development of the bank and
SBI 5.88
PUNJAB NATIONAL 14.21 overall economy. For banks it's necessary to stay the
BANK extent of NPA low because it impacts upon the
UNION BANK OF INDIA 13.49 profitability of the banks and hence it's necessary to
CANARA BANK 8.23
BANK OF BARODA 9.40 possess strong recovery system that ought to be
BANK OF INDIA 14.78 operated effectively with control and supervision of
INDIAN BANK 6.87 upper authorities.
ICICI 5.53
HDFC 1.37 9. SUGGESTIONS
AXIS BANK 4.86
IDB I 27.3 Various steps are taken by the govt and RBI to
YES BANK 15.36
KOTAK MAHINDRA 2.25 recover and reduce NPAs. Preventive measures are to
BANK stop the asset from becoming a non performing asset.
FEDERAL BANK 2.84 Banks has to concentrate on the following to minimize
Graph: 1 the level of NPAs. The quality management of NPAs
credit assessment, risk management by the banks
Gross NPA \ Gross Advance %
30
concerned. Banks should have adequate preventive
25
20
measures, fixing presanctioning appraisal responsibility
15
10 and an efficient post-disbursement supervision.
5
0
10. REFERENCES
[1] Aggarwal, Monica and Sharma, Rishi Raj (2005), "Indian Banking:
Present and Future", the Indian Journal of Commerce, Vol.58,
No.3, July-September.
[2] Ahluwalia, MontekS.20 02: Economic reforms in India since
Source: (www.Money control.com)
1991: Has Gradualism worked?, in: Journal of economic
Gross NPA to total assets ratio (GNPA ratio), one Prespectives, 16(3), pp.67-88.
of the key tools of measuring NPA levels of the Indian [3] Arora, Sangeeta and Kaur, Shubpreet (2006), "Financial
banking industry (i.e., their efficiency), stood at about Performance of Indian Banking Sector in Post Reforms Era", The
Indian Journal of Commerce, Vol.59, No.1, Jan-March.
8.5% at the end of March 2020 (11.3% for PSBs and
[4] Dr.A.Arumugam, Dr.G.Selvalakshmi (2014): Impact of Banking
4.2% for private banks), and is expected to increase Sector Reforms in India in the Post-Reforms Era.
to a level of around 14% by March 2021.
[5] India Banking Sector Report(2014) Presentation Transcript.
8. CONCLUSION [6] Indian Brand Equity Foundations-the Indian Banking sector:
Recent development Growth &Prospects2013.
NPA isn't just a problem for bank, but also bad for
[7] Janaki Ramudu P, Durga Rao,(2006) "A Fundamental analysis of
the economy of the country. The money which is locked Indian Banking Industry",The ICFAI Journal of Bank
in NPA isn't available for productive activities at an Management.
1064 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
[8] Narasimham Committee-I (1991) report and the Narasimham [13]Reddy, B.Rama Chandra and Reddy, SVijayulu(2003), "Banking
Committee-II (1998) report Sector Reforms in India-A Review", Internet Edition, Business
Line, Nov19.
[9] Rangarajan.C, (1997), "The Financial Sector Reforms: The Indian
Experience, "RBI Bulletin, July 1997. [14]Santosh Kumar Das (2010): Performance of the Indian Banking
Sector: Impact of Reform.
[10]Rao, D.Nageswara (2002), "Indian Banking in the new scenario",
Front Line, October-November 2002. [15]SheteN.B, "Banking Sector Reforms and Priority Sector Credit",
Management and Accounting Research, Vol.3.No.1, July-
[11]RBI Discussion Paper on Banking Structure in India (2013)-
September 1999, pp.1-20.
The Way Forward.
[12]RBI Paper: statistical tables relating to banks in India2012-13
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1065
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract: This paper highlights the importance, new market growth opportunities, jobs and become
challenges and advantages of digitalization in India. the biggest business opportunity of mankind in the next
Digitization is the representation of an object, 30 to 40 years. The momentum that 'Digital India' has
image, sound, document or signal by generating a given to our technological progress is noteworthy
series of numbers that describe a discrete set of
indeed.Digital India Program is a national campaign to
its points or samples. The digital economy is the
new productivity platform that some experts regard
transform India into a globally connected hub. It includes
as the third industrial revolution. India is an various proposals and incentives given to companies,
initiative of the Central Government of India basically the manufacturing companies both domestic
"designed to transform India into a global digitized and foreign to invest in India and make the country a
hub" by reviving a rundown digital sector of India digital destination. The emphasis of Digital India
with the help of improving digital connectivity and campaign is on creating jobs and skill enhancement in
skill enhancement and various other incentives to the Broadband Highways, e-Governance, and
make the country digitally empowered in the field Electronic delivery of services, Universal access to
of technology. The 2016 Union budget of India Mobile Connectivity, Electronics Manufacturing, and
announced 11 technology initiatives including the Information for All etc. The campaign's aim is to resolve
use data analytics to nab tax evaders, creating a
the problems of connectivity and therefore help us to
substantial opportunity for IT companies to build
out the systems that will be required. The initiative
connect with each other and also to share information
also lacks many crucial components including lack on issues and concerns faced by us. In some cases
of legal framework, absence of privacy and data they also enable resolution of those issues in near real
protection laws, civil liberties abuse possibilities, time. Digital India is an initiative of the Central
lack of parliamentary oversight for e-surveillance Government of India "designed to transform India into
in India, lack of intelligence related reforms in a global digitized hub" by reviving a rundown digital
India, insecure Indian cyberspace, etc. It is sector of India with the help of improving digital
mandatory that economy has to push merits of connectivity and skill enhancement and various other
Digitalization and check the problems arise from incentives to make the country digitally empowered in
digitalization. In the era of Globalization the field of technology.
transactions are increasing. So that digitalization
to be given priority for both quick and transparent DEFINITIONS
transactions.
Integration of digital technologies into everyday life
INTRODUCTION by the digitization of everything that can be digitized:-
Digitization is the representation of an object, image, Business Dictionary
sound, document or signal by generating a series of Digitalization is the way in which many domains of
numbers that describe a discrete set of its points or social life are restructured around digital communication
samples.The digital economy is the new productivity and media infrastructures. In the pages that follow, we
platform that some experts regard as the third industrial discuss these distinct, yet interrelated, concepts. :-
revolution. This is also known as 'The Internet Economy' Oxford Dictionary
or Internet of Everything (IoE) and expected to generate
1066 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
IT companies to build out the systems that will be program e-kranti or electronic delivery of services,
required. Digital Literacy mission will cover six crore information for all, and IT for jobs. Besides these
rural households. It is planned to connect 550 farmer Broadband highways, now called Bharat Net, is
markets in the country through the use of technology. supposed to connect up to gram panchayat, but laying
Out of 10% English speaking Indians, only 2% reside fiber optic cables is the least of the challenges here.
in rural areas. Rest everyone depends on their The biggest challenge is ensuring that each panchayat
vernacular language for all living their lives. However, point of broadband is fired up, functional, used and
as of now, email addresses can only be created in distributed. Our research work found that more than
English language. To connect rural India with the Digital 67% of the NOFN points are non-functional, even at
India, the Government of India impelled email services the pilot stage. Besides, if the broadband highways
provider giants including Gmail, office and rediff to programme is not implemented well and soon, we may
provide email address in regional Languages. However, not be able to implement other pillars of the programme,
the email provider companies has shown positive sign such as the public Internet access programme, e-kranti,
and is working in the same process. An Indian based information for all, and even IT for jobs. All these are
company, Data Xgen Technologies Pvt Ltd, has dependent on access infrastructure.
launched world's first free linguistic email address under Out of the many initiatives launched during the Digital
the name 'DATAMAIL' which allows to create email India week, one that could make a serious impact is
ids in 8 Indian languages, English; and 3 foreign BSNL's (Bharat Sanchar Nigam Ltd) mass deployment
languages - Arabic, Russian and Chinese. Over the of Wi-Fi hotspots across the country. If the government
period of time the email service in 22 languages will be pushes BSNL to ensure at least one hotspot per
offered by Data X Gen Technologies. panchayat or per village, it can do wonders, and the
OPPORTUNITIES government can also show off this as a positive outcome.
However, if the selection of the locations for the hotspots
A Digital India Year would make sure that each and necessarily were those populated by mostly tribal's,
every aspect of the program is pushed to show results backward castes, minorities and geographically difficult
on the ground and not go into hibernation after one areas, then the impact would be something that would
week of enthusiasm. Considering that most of the nine be a national story. A well-connected nation is a
pillars of the Digital India program face serious prerequisite to a well served nation. Once the remotest
challenges in implementation, it is imperative that of the Indian villagers are digitally connected through
focused, persistent attention be given to each of its pillars broadband and high speed Internet, then delivery of
so that the big programme does not end up in electronic government services to every citizen, targeted
embarrassment and failure. Considering that the Digital social benefits and financial inclusion can be achieved
Empowerment Foundation has a footprint at more than in reality. One of the key areas on which the vision of
150 locations in India at the village level, and that too Digital India is centered is 'digital infrastructure as a
with the purpose of digitally enabling the poorest of the utility to every citizen.
poor, let me highlight some of the major challenges of
the Digital India program. A key component under this vision is high speed
Internet as a core utility to facilitate online delivery of
First and foremost is that the entire program is various services. It is planned to set up enabling
designed as a top-down model. There is no idea of infrastructure for digital identity, financial inclusion and
how it would be implemented on the ground to be ensure easy availability of common services centres. It
successful. For example, let's consider six of the nine is also proposed to provide citizens with 'digital lockers'
pillars of the programme directly related to consumers which would be sharable private spaces on a public
and people at large: broadband highways, universal cloud and where documents issued by government
access to mobile connectivity, public Internet access departments and agencies could be stored for easy
1068 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
online access. It is also planned to ensure that the a lighter note, I can say that net addition in total
cyberspace is made safe and secure. Over the years, a telephony (mobile plus landline) from April 2014 to
large number of initiatives have been undertaken by February 2016 is equivalent to the population of France
various State Governments and Central Ministries to and Italy put together. The growth rate of total telephony,
usher in an era of e-governance. Sustained efforts have which was 3.90 per cent in 201314, posted 6.76 per
been made at multiple levels to improve the delivery of cent in 201415, and 5.65 per cent till February this
public services and simplify the process of accessing year, and I am sure the rate must have crossed 6.50
them. E-governance in India has steadily evolved from per cent in March. This is the position - a clear growth
computerization of Government Departments to - and what is important is the rural growth is more than
initiatives that encapsulate the finer points of the urban. Rural teledensity has increased 6.62 per cent
Governance, such as citizen centricity, social between February 2014 and February 2016.
responsibility, service orientation transparency Therefore, the telecom sector is rising and with 'Digital
accountability. India', it is going to rise further. My biggest personal
The National e-Governance Plan (NeGP) was satisfaction is the recovery of the postal department.
approved in 2006 to take a holistic view of e- Postal services have become the biggest deliverer of
governance initiatives across the country, integrating ecommerce items - there are more than 57 centres in
them into a collective vision. Around this idea, a massive the country, fully automated and computerised. The
countrywide infrastructure reaching down to the ecommerce parcel revenue, which was down 2 per cent
remotest of villages is being developed, and large-scale in 2013-14, rose 45 per cent in 2014-15 and 80 per
digitization of records is taking place to enable easy cent in 2015-16, and by February, it has reached 100
and reliable access over the Internet. The ultimate per cent.
objective was to make all government services CHALLENGES
accessible to the common man in his locality, through
common service delivery outlets, and ensure efficiency, The challenges of digitalization in India are as follows.
transparency and reliability of such services at affordable The initiative also lacks many crucial components
costs to realize the basic needs of the common man. including lack of legal framework, absence of privacy
For example if we take Communications and IT and data protection laws, civil liberties abuse
development, Today, Sanchar Bhawan is free from possibilities, lack of parliamentary oversight for e-
middlemen, there is no scam or scandal, and decisions surveillance in India, lack of intelligence related reforms
are taken in a free and fair manner. We had the highest in India, insecure Indian cyberspace, etc. Some other
spectrum auction ever of 1.10 lakh crore (last year).All challenges are
the policy initiatives pending for the past 710years - Implementation: The entire program is designed
defence band identification, spectrum trading sharing, as a top level model on the technological front. There is
harmonization, liberalization, cloud policies, open source hardly any guidance on how to implement the same on
in IT and creating an ecosystem of sound investment - the ground level to make it successful. To be precise,
are in place. As a result, IT and IT enabled exports most of the nine pillars of the program are directly
today are worth $108 billion, the highest ever in the related to high-end consumers in urban areas and not
history of India. India has received $4,091 million (over for 70% of the rural population in India.
?26,000 crore) foreign direct investment in telecom. Deploy W-Fi Centers & Hotspot: BSNL's
Mobile telephony has shown growth. The postal sector (Bharat Sanchar Nigam Ltd) mass deployment of Wi-
had tremendous growth of ?122.66 million between Fi hotspots across the country. If the government pushes
April 2014 and February 2016.India crossed one billion BSNL to ensure at least one hotspot per village, it can
mobile phones under our government, one billion plus do wonders and experience the positive outcome.
Aadhaar cards and 400 million plus Internet users. On
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1069
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
However, if the selection of the hotspot locations were 5. Digital Inclusion: 1.7 Cr trained for IT, Telecom and
those populated by mostly tribal backward castes, Electronics Jobs
minorities and geographically difficult areas, then the 6. Job creation: Direct 1.7 Cr. and Indirect at least 8.5
impact can bring a new era in the life styles and other Cr.
culture of the people in our country significantly and 7. e-Governance & eServices: Across government
also impact in other countries.
8. India to be leader in IT use in services - health,
Improve IT Literacy: Improving IT literacy is very education, banking Digitally empowered citizens -
important because the entire mass who is using internet public cloud, internet access
should know how to secure his/her online data.
Providing proper usability guidance of Anti-Virus CONCLUSION
software and its role in securing the records should Since Technology advances as time passes every
happen simultaneously to avoid illegal things in all the economy and individual has to adopt upcoming
economic and other money transactions . technology for digitalization. It is mandatory that
Data Vulnerability: Each and every citizen of India economy has to push merits of Digitalization and check
would have all the personal details online including bank the problems arise from digitalization. In the era of
details, Income tax details, PAN details which might Globalization transactions are increasing. So that
be vulnerable if not secured properly. In case this is digitalization to be given priority for both quick and
breached, then any individual would lose the privacy of transparent transactions.
the data and would be compromised. This leads to lose REFERENCES
of personal money in the form digital transactions.
1 Mazars, Digitalization: a vehicle of the new age of transformation,
Excessive server Hits: If majority of the 2011
population start using online, then definitely the 2 EY, Digitization of everything, 2011
Government portal sever will start getting more number 3 PWC, Managing for performance: Transaction banking, 2012
of hits day by day. This is limitless and the IT team 4. Kelly, Kevin (May 14, 2006). "Scan This Book!". New York
needs to be prepared to tackle the situation where the Times. Retrieved 2016-10-26
possibility of crash would minimize. 5. www.dqindia.com.
Man-In-The-Middle Attack: It is a type of 6. www.ncaer.org.
cyber-attack where a malicious actor intrudes him/ 7. www.dnaindia.com
herself into a conversation between two parties, imitates 8. www.digitalindia.gov.in
both parties and gains access to information that the
two parties were trying to send to each other. A man-
in-the-middle attack allows such intercepts of the data
meant for someone else, without knowledge of either
of the party until it is too late.
IMPACT OF DIGITALISATION BY 2019:
1. Broadband in 2.5 lakh villages, universal phone
connectivity
2. Net Zero Imports by 2020
3. 400,000 Public Internet Access Points
4. Wi-fi in 2.5 lakh schools, all universities; Public Wi-Fi
hotspots for citizens
1070 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1071
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
go back, you never know the ending." This singular year. Under Armour and Adidas are also major apparel
fact is used by marketing companies as an advantage: brands as Under Armour sponsors Notre Dame for $9
every time the audience attends an event it will see the million per year while Adidas provides more than $7
advertisements again and again, providing a wide range million each year to both UCLA and Louisville. These
of opportunities for the different companies which are examples of sports marketing because as it is
operate on this field as follows. defined, sports marketing are a marketing strategy in
which companies related to sports products or services
1. Sponsorship of events promote their trademark through design, production or
One of the oldest examples of the marketing of other resources. In this case apparel companies Nike,
products through sports is Slazenger's supplying of the Under Armour, and Adidas, which are all completely
official ball of Wimbledon (1902- 2015).Another related to sports, design the uniforms of these teams
international example of marketing products through and as a consequence their trademarks are being
sport is Adidas' sponsorship of FIFA, which includes promoted every time there is a game.
the company supplying the balls used in the World Cup
and having its logo on the side boards along the field of 3. Sponsorship of athletes
play. In what it described as a "world first" in corporate Apparel companies also sponsor professional
sport sponsorship, in 2016 BNY Mellon and Newton athletes such as Kevin Durant who receives $30 million
Investment Management announced they had donated per year from Nike. Stephen Curry is speculated to
their title sponsorship of the annual Oxford and receive even more money than Durant from his contract
Cambridge Boat Races to Cancer Research UK. with Under Armour. Meanwhile, Puma pays sprinter
Usain Bolt $10 million per year. Many athletes maintain
2. Sponsorship of teams contracts with a variety of companies, some that are
Sponsorship of teams is found throughout sports. related to sports and others that are not. Roger Federer
Some of the most visible examples are found in the holds agreements with Nike, Wilson, Rolex, Mercedes-
MLS as company names and logos are featured on Benz, and Gillette, worth in sum close to $60 million
team jerseys. For example, Alaska Airlines is the official each year. LeBron James' contracts with Nike, Beats
jersey sponsor of the Portland Timbers while Valspar by Dre, Coca Cola, Kia, McDonald's, and Samsung
is the official sponsor of the Chicago Fire. These are accrue the NBA player more than $40 million per
examples of sponsorships of companies that are not year.[32] Peyton Manning meanwhile holds sponsorship
related to sports. Turkish Airlines established a sports agreements with companies including Buick, DirecTV,
marketing strategy involving high-profile sports teams, Gatorade, Nationwide and Papa John's worth in sum
players, and sport associations including Manchester approximately $12 million per year. Fellow NFL
United, FC Barcelona, the Euroleague basketball quarterback Drew Brees earns $11 million each year
competition, NBA player Kobe Bryant, the Turkey from his contracts with Wrangler, Vicks, Verizon, Nike,
national football team, and tennis player Caroline and Microsoft. Another example of marketing through
Wozniacki. Another example of sports marketing sports is the strategy used by Gillette to promote its
through sponsorships of teams is the apparel contracts personal hygiene products through representative figures
seen throughout sports. In 2011 Nike agreed to become of each sport on television during broadcast sports
the official apparel company of the NFL in exchange events. Gillette uses athletes such as tennis player Roger
for around $220 million per year a deal that has been Federer, golfer Tiger Woods, and soccer player Thierry
extended through 2019. At the college level, Ohio State Henry. In the commercial these celebrities appear using
and Nike maintain a contract that provides the school the products of the company showing the results in
a value of $16.8 million per year in cash and product order to demonstrate that if successful people use the
through the 2033-34 academic year. Michigan products you should use them to. It is a clear example
meanwhile receives a total value of $15.3 million per of this concept, because the company using this
1072 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
marketing strategy is not related to sports at all, but goals, they should view their customers as partners for
through important personalities of each sport it has the life rather than here and now consumers, and attempt
possibility to get to its target audience. Nike and to understand their ever-evolving needs, desires and
Gatorade also hold sponsorship agreements with top values. By doing so, sport businesses are able to
athletes. Included among Nike's clients are Federer, maintain and enhance their fan base easier than through
Woods, golfer Rory McIlroy and tennis player Rafael the more commonly used short-term transactions such
Nadal while Gatorade has deals with NBA star Dwayne as merchandise and ticket sales, with the use of social
Wade, Serena Williams, and Peyton and Eli Manning. media enabling this to be practiced much more
Grassroots sport marketing is part of the field of effectively.
marketing known as social marketing. This refers to 5. Social Media and relationship marketing
marketing something that is of benefit to the public, and
is normally done by government or charities rather than Social Media and relationship marketing in sport
private sector organizations. It is normally done with a Used as global communication and interaction channel,
much smaller budget than marketing of sports teams social media has changed the conventional offline
and event or marketing of products through sports as it business to customer relationship into a tool that enables
does not bring any direct financial benefit. Although this customers' engagement into an instantaneous and active
marketing normally drives people to clubs where they back-to-back conversation. Customers are increasingly
will pay to play sport it still needs to be subsidized in incorporating social media within their daily lives and
order to be run. The money therefore comes from local using it as part of their communication mix. Today, sport
councils with a remit to increase participation or from businesses can use social media to actively listen to their
public health sector which wants to decrease the cost customers, recognise and follow their specific needs
of disease. Examples of the promotion of sport to and wants rather than use out-dated methods of data
increase participation is the United States Golf collection such as surveys and focus groups, which do
Association's initiatives to increase golf participation as not provide rich information to better understand
well as MLB's One Baseball campaign, which attempts customers. It allows sport businesses to keep their
to unify baseball organizations at all levels with the customers updated on the latest news and information
overall goal of increasing youth participation and as well as interacting with them on an individual basis.
consequently creating new fans. This instant, two-way dialogue available to sport
businesses, which allows them to provide quality content
4. Relationship Marketing Sports within short time frames, can be seen as a form of
Relationship marketing encompasses the notion of competitive advantage. They are able to interact the
preserving customers through the success of long-term way they want, in the way that they wish, through
reciprocated contentment by an organisation and their whichever medium they feel best. This gives sport
customers. Sport businesses need to communicate and businesses an added impetus to effectively utilise social
participate in discussion with their customers in order media in order to provide their customers with the best
to create, sustain and improve relationships. Existing possible experience and to expand their marketing
studies offer insightful information into relationship abilities. As well as sport businesses benefiting from
marketing and the general consensus that sport the use of social media in the context of relationship
businesses can benefit from its use. In many situations, marketing, customers also experience the same level
sports marketing affairs include some sort of relationship of benefits. The constant interaction between sport
marketing, where clubs, organisations, fans and athletes businesses and their customers allows organisations to
have relationships with one another that are dependent know and learn about each individual customer on a
on the successful management of those relationships. deeper level. As a result of this, customers feel a greater
In order for sport businesses to be successful in their sense of value from the organisation and in return, offer
a greater amount of loyalty. Social media enables sport
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1073
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
businesses to involve customers in the marketing process or "followers" for their Face book and Twitter Pages
by receiving feedback and ideas, which can then be in order to obtain recognition. In order to have the
implemented in future products and services. By doing opportunity to apply for pre-sale tickets for their
so, sport businesses emphasise the engagement between Michigan football games, at the largest football arena
in the nation 'The Big House,' fans are required to
organisation and customer, and reinforces the
"follow" or "like" their page on Face book or Twitter,
importance that customers hold in the brand building
which allows them to be able to purchase pre-sale
process. tickets for any game that they desire, making this
6. Sport marketing through social media method of marketing a great tool to gain awareness
for their team and many other things.
Professional leagues, teams, and athletes have begun
9. Louisville Slugger Scavenger Hunt: After the St.
using social media as part of their marketing strategy in
Louis Cardinals won the World Series in 2011, Hillerich
recent years. The most popular social media platforms & Bradsby, makers of Louisville Slugger bats and
are Facebook and Twitter, but athletes and teams have other baseball equipment, created a scavenger hunt
begun using sites including Instagram and Snapchat. through Twitter in order to raise awareness for their
Like all business, the advantages of social media use in company. The hunt involved baseball hats, scattered
sports include building brand awareness, reaching a all over the city of St. Louis, Missouri. The Louisville
large audience in an easy and cost-effective way as Slugger Twitter page posted "tweets" that hinted at
well as creating brand advocates and engaging where the hats were located within the city. The fan
passionate sport fans. Numerous examples exist within or participants used their mobile phones in order to
sports of athletes and teams using social media well to be up to date on the specific "tweets" referring to the
hunt. If a fan or participant found one of the several
execute their strategy. For a brand like Babolat, for
hats, the participant was told that they were to be
example, having a world icon like Rafael Nadal as its
kept by the seeker. The reason this company held a
top representative is priceless. There is no better way scavenger hunt was to receive recognition and to
to stand up to your competition than by joining up with increase their followers on Twitter. The statistics
the strongest. But you must know how to do it, it is not shows that their fan base skyrocketed 143%. Many
a case of anything goes. And this is where knowing teams have incorporated sponsorships into their social
how to use social media is fundamental. "A message on media, such as the Minnesota Vikings "Touchdown
Twitter is not just an advertising channel with which Tracker" Instagram image, which was sponsored by
you can win an audience. Its power lies in the message FedEx. The Cleveland Browns also displayed
being relevant and credible", explains Edwin sponsorship integration in their tweets recapping
Schravesande. touchdown drives, sponsored by Cooper Tires. Many
athletes including Kobe Bryant, Russell Wilson, and
7. Baylor Rewards Program: When fans decide to Rafael Nadal have taken advantage of social media
"Like" or "Follow" Baylor athletics on either Twitter to increase their followers and enhance their
or Facebook, they are given day-to-day updates on brand.[54] Athletes have also engaged in promoting
their favorite teams. From a marketing aspect, the brands through social media including Russell Wilson's
Baylor athletics page on Facebook and Twitter sponsorship of Recovery Water and Serena Williams'
(@BaylorAthletics) keeps track of fans who have promotion of Wheels Up.[55] Because of this
"tweeted" or "commented" on certain links, posts, or marketing tool, these fan-based website pages have
tweets. There is an incentive for these fans to post increased greatly in numbers and give them the
and tweet because at the end of each year, the top recognition that they were looking for.
three posting or tweeting fans who are selected
receive prizes, from free jerseys and merchandise to
season tickets]
8. Michigan Presale Incentive: Michigan created a
very clever way to enhance the total amount of "likes"
1074 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
REFERENCES 4. S. Mason, D. (1999). "What is the sports product and who buys
it? The marketing of professional sports leagues". European
1. Stewart, B., Smith, A. C., & Nicholson, M. (2003). "Sport Journal of Marketing. 33 (3-4): 402-419.
consumer typologies: A critical review". Sport Marketing
Quarterly. 12 (4): 206-216. 5. https://esportes.estadao.com.br/blogs/blog-do-baldini/wp-
content/uploads/sites/675/2018/02/chavez_haugen.jpg
2. Kotler, P (2011). The view from here. In Peppers. D., & Rogers,
M. (Eds.), Managing customer relationships: A strategic 6. ^ https://www.latimes.com/fashion/alltherage/la-ar-hublot-
framework. Hoboken, NJ: Wiley. pp. 1-14. sponsorship-of-mayweather-20150504-story.html
ISBN : 978-93-90631-89-6 Vemu Institute of Technology, Chittoor- 517112, A.P., India 1075
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
Abstract- Over the years, it's been seen that Entrepreneurship is the best way to make rational
women entrepreneurs have been taking up new use of human and non-human resources and
role in different areas. Their Contribution and improve the living conditions of the poor. In this
significance are praiseworthy in the every article, the author tries to pay attention to the
country's financialprogress and growth. In the 2012 growth of women's entrepreneurship, the
World Development Report indicated that challenges and suggestions of women's
companies which are being owned by the women entrepreneurship growth, etc.
have shown extraordinaryprospective for
Keywords - Women entrepreneurship, women
imminentfinancialdevelopment and employment
empowerment, business, motivation.
creation. Hence, the United Nations has launched
many initiatives to promote and inspire women's INTRODUCTION-
entrepreneurship in developing and under
developed countries. Sophisticated women of our Women-owned small businesses are making an
country still have to cover a larger pathin order to increasingly important contribution to the global
accomplishthe sameprivileges and status, since economy and growing faster than men (Langowitz and
traditions are deeply entrenched in ourculture, Minniti, 2007). Although academic research on
where societal structure has always been controlled entrepreneurship (Ahl, 2006) focuses on men, it has
by men. Regardless ofcountlesssocietal barriers, been suggested that in most countries, women-owned
the women of our country stand out from other businesses account for about 30% of all small businesses
groups and remain praised for their achievements (Javadian and Singh, 2012; Minniti et al., 2005, Minnity
in their respective fields. Women entrepreneurs
and Nord, 2010). Entrepreneurship is increasingly
can be defined as women or groups of women who
start, organize, and run businesses. The Indian
important in the modern age. This is a global
government defines women entrepreneurs as phenomenon. Developed countries are already enjoying
companies owned and controlled by women. They the fruits of business development. In contrast, in
have at least 51% of the capital's economic interest developing economies such as India, entrepreneurship
and provide at least 51% of the jobs created by has recently become more and more important. In
the company to women. As the driving and pulling developing countries, it is considered a way to promote
factors encourage women to pursue their own self-employment. However, in order to improve and
careers independently, women entrepreneurs have maintain the country's economic growth, it is necessary
begun to participate in business activities. The to see more. The development of any region or country
feeling of making independent decisions about your requires effective and optimal use of generally available
life and career is the motivating factor behind this
resources, especially human resources. Competent
drive. One of the main treatments prescribed by
advocates of women's empowerment is
human resources will definitely make the best use of
empowering women through entrepreneurship. It other resources. Developing economies like India need
reflects the ray of hope of the unemployed to earn entrepreneurs who can use scarce natural resources.
a living and maintain a dignified life, as well as the Entrepreneurship has been a male-dominated
economic development of the country. phenomenon from a very young age, but time has turned
1076 Vemu Institute of Technology, Chittoor- 517112, A.P., India ISBN : 978-93-90631-89-6
Proceedings of Second National Virtual Conference on Recent Advances in Technology & Engineering (CRATE-2021), 13 th & 14 th, August 2021
this around, making women the most memorable and LITERATURE REVIEW
inspiring entrepreneurs today. It is estimated that women Women of different backgrounds have realized that
entrepreneurs currently represent around 10% of the exerting entrepreneurial spirit will help them establish
total number of entrepreneurs in India, and this an identity in society and have a dignified lifestyle
proportion is increasing every year. If the general trend (Marlow, 2002). Both push and pull factors contribute
continues, it is likely that within the next five years, to business awakening. However, pull factors are
women will account for 20% of business power considered to be more influential than push factors
(Saidapur et al., 2012). The Tenth Five-Year Plan because they are driven by inner desires, motivations,
(200207) aims to empower women by translating the personalities, family society and observational learning,
recently approved National Policy for the role models, and learning from experience from personal
Empowerment of Women (2001) into action and and professional past (Shinnar and Young, 2008).
ensuring the survival, protection and development of Surinder Pal Singh (2008) identified the reasons and
women and children through an approach based on in influencing factors behind women's entry into
rights. entrepreneurship. He explained the characteristics,
OBJECTIVE obstacles and challenges of his business in an Indian
The objective of this manuscript is to recognize the context. He mentioned that the main obstacle to the
existing research works on the field of women growth of female entrepreneurs is the lack of interaction
entrepreneurship. I have investigated the existing with successful female entrepreneurs, society does not
research works on this field and presented my views. I accept female entrepreneurs, fa